Lewis Shepherd Chief Technology Officer Microsoft Institute for Advanced Technology in Governments

Total Page:16

File Type:pdf, Size:1020Kb

Lewis Shepherd Chief Technology Officer Microsoft Institute for Advanced Technology in Governments Lewis Shepherd Chief Technology Officer Microsoft Institute for Advanced Technology in Governments KEYKEY FACTORSFACTORS ININ THETHE FUTUREFUTURE OFOF COMPUTINGCOMPUTING in the Government Enterprise AnAn ExerciseExercise inin Prediction,Prediction, withwith thethe IntelligenceIntelligence CommunityCommunity asas anan ExampleExample ““WhatWhat technologiestechnologies willwill bebe requiredrequired overover thethe nextnext 1010 yearsyears toto protectprotect U.S.U.S. interests?interests?”” WhatWhat ifif wewe hadhad askedasked thatthat question,question, 1010 yearsyears agoago?? SomeSome SurprisesSurprises PostPost--9/119/11 “Asymmetric adversary” = an information challenge (“hard target”) Seeming irrelevance of traditional methods for new targets - Order of battle (counting military elements) - State-to-state analysis - “Kremlinological” approaches Challenges of IT during wartime - Stress on systems infrastructure of 2 wars - Stress on software (link-analysis, SNA, “search”) - Stress on collection capacity (sensor grids, Internet) - Stress on analysts’ – and technologists’ – imagination LimitsLimits ofof ““SearchSearch”” forfor PredictionPrediction WeWeWe don’tdondon’’tt havehavehave aaa “Search”““SearchSearch”” capabilitycapabilitycapability tototo reachreachreach insideinsideinside enemyenemyenemy mindsmindsminds ……… yetyetyet ITIT Challenge:Challenge: LowLow--ObservableObservable AdversaryAdversary HowHow doesdoes THISTHIS …… … … help help performperform analysisanalysis onon THISTHIS?? OurOur databasesdatabases hadhad nono fieldsfields forfor box-cutters,box-cutters, IMIM accountsaccounts PD1 CaseCase Study:Study: IntelligenceIntelligence CommunityCommunity The IC’s post-9/11 challenge Some identified solutions: 1. Grid/Cloud computing 2. Secure SOA platform 3. Web 2.0 tools (Intellipedia, A-Space) Implementation challenges Slide 6 PD1 As with the rest of this template, this is a suggested agenda that may or may not fit your situation. Please feel free to make changes as you see fit, including adding and changing pages. In general, the idea is to educate folks on the technology challenge you faced, how you addressed it, and the business benefits the project ultimately delivered - or failed to deliver, as the case may be. Keep in mind that people can learn a lot by hearing what went wrong with your project, so don't be afraid to mix the bad with the good. Paul Desmond, 10/3/2007 WhatWhat DrivesDrives thethe FutureFuture ofof EnterpriseEnterprise ComputingComputing The value for a new user of a service depends on the number of existing users of the service… “Critical mass” can lead to “Bandwagon effect”… SideSide--EffectsEffects ofof NetworkNetwork EffectEffect Exponential growth of networks, systems Requires Scale Exposes networks to “edge audiences” Requires Security Derives new wisdom from growing “crowd” Makes Smart Systems Scale Scale:Scale: aa ChallengeChallenge forfor LargeLarge CommercialCommercial EnterprisesEnterprises “GOVERNMENT NO EXCEPTION” RemoteRemote OfficeOffice ITIT ScenariosScenarios NoNo InfrastructureInfrastructure MicrosoftMicrosoft Inc.Inc. asas anan EnterpriseEnterprise ExampleExample 141,000 end users 260,000 computers 550 Buildings in 98 countries 358,000 SharePoint sites 29 billion E-mails sent per day 2,500 internal applications 280 billion page views per 2,500,000 internal E-mails day per day 435 million unique users 136,000 E-mail Server accounts 6 billion instant 1,000,000 remote messages (IMs) per day connections per month DefenseDefense IntelligenceIntelligence AgencyAgency asas anan EnterpriseEnterprise ExampleExample One of 16 agencies in the Intelligence Community 9,000+ personnel DIA IT systems support the entire intelligence community 100,000+ users of DIA’s Top Secret network, apps, data Global reach through IT support of all DoD Commands Pacific Command, European Command, etc. The only true “all-source” agency in the IC Collection (signals intell, human intell, measurements & signatures, etc) TheThe Challenge:Challenge: StovepipedStovepiped AnalyticAnalytic CapabilitiesCapabilities Security TheThe SecuritySecurity SideSide ofof ““EnterpriseEnterprise 2.02.0”” SecretSecret toto aa WalledWalled Garden:Garden: ControlControl Definition: On the Internet, a walled garden is an environment that controls the user's access to Web content and services. In effect, the walled garden directs the user's navigation within particular areas, to allow access to a selection of material, or prevent access to other material. [SearchSecurity.com] WhyWhy WalledWalled--GardenGarden ContentContent && Systems?Systems? Rationale on the Internet: Money Paid-Access Content Revenue Member-Fee Revenue Exclusive Ad Revenue (Segmented Eyeballs) Value of Intellectual Property “Enterprise” Rationale: Security Trade Secrets in Operational Data Competitive Advantages “ GOVER NMEN T NO Regulatory Control over Data EXCEP TION” Smart Systems NeedNeed forfor AnalyticAnalytic ReformReform Traditional IC output: ~50,000 stand-alone reports/year Many redundancies Produced in agency/organization silos Lack of collaborative capabilities across (and within) agencies “Intelink” (the IC-wide shared domain) seen as a backlot Forcing Function: 9/11 Commission Report Key Recommendation: From Need-to-Know to Need-to-Share! Realization: “Something that’s 80 percent accurate, on-time, and sharable, is better than something that is perfectly formatted, but too much, too late, and over-classified.” Chris Rasmussen, NGA PD3 BirthBirth PangsPangs ofof ICIC WebWeb 2.0:2.0: 20042004--20052005 Early Efforts were internal, agency-specific projects CIA’s internal blogs, 2004 DIA’s internal “IntelliPedia” wiki, 2004 NGA’s internal blogs, early 2005 DIA’s AJAX mashups in “Lab X,” 2004-05 CIA’s del.ici.ous lookalike, Tag/Connect, 2005 A “Wisdom of Crowds” Culture was forming by 2005 Joint trips to outside conferences Cross-agency collaboration on metadata tagging Formation of “IC Enterprise Services” group, or ICES Tipping Points, sparked by ICES: August 2005 launch of “Intelink Blogs” April 2006 launch of IC-wide Intellipedia Slide 22 PD3 As with the rest of this template, this is a suggested agenda that may or may not fit your situation. Please feel free to make changes as you see fit, including adding and changing pages. In general, the idea is to educate folks on the technology challenge you faced, how you addressed it, and the business benefits the project ultimately delivered - or failed to deliver, as the case may be. Keep in mind that people can learn a lot by hearing what went wrong with your project, so don't be afraid to mix the bad with the good. Paul Desmond, 10/3/2007 OneOne thingthing wewe learnedlearned wikiwiki--wikiwiki…… KeyKey Distinctions,Distinctions, IntellipediaIntellipedia vsvs WikipediaWikipedia Business Practices of intelligence analysis & reporting demanded certain technical features: Not open to the public, only users with access to the IC’s Top Secret network (JWICS), accounts created by ICES. No anonymity. All edits and additions are traceable. Intellipedia does not enforce a “neutral point of view” Actually intended to represent various points of view; viewpoints are attributed to the agencies, offices, and individuals participating Consensus may or may not emerge! IntellipediaIntellipedia’’ss HockeyHockey--StickStick GrowthGrowth TheThe TopTop--SecretSecret WikiWiki GetsGets ClonedCloned Summer 2007, ICES introduced 2 new Intellipedia versions: • One on the SECRET network “SIPRNET” • One on a “Sensitive But Unclassified” network “DNI(U)” (a protected trunk apart from the regular Internet) Rationale: • Many military intelligence analysts (and most soldiers) only have access to SIPRNET • Many DHS personnel and Law Enforcement have no clearances whatsoever for classified information • Many IC personnel like to work at home on research and topical news items WalledWalled GardensGardens WithinWithin WalledWalled Gardens:Gardens: RelativeRelative ValueValue ofof ClassifiedClassified InformationInformation Relative Number of Users, Relative Growth in Intellipedia Pages Also Relative Volume of Data AnticipateAnticipate aa NetworkNetwork EffectEffect forfor DNI(U)?DNI(U)? Expect increasing rates of growth for DNI(U) usage and information sharing Improved realtime Internet data-mining Awareness of value of collaboration outside traditional IC boundaries (DHS, LE, foreign partners) Improved Web 2.0 tools deployed on DNI(U) to mirror those on JWICS and the Internet IntellipediaIntellipedia TotalsTotals onon AllAll ThreeThree NetworksNetworks 64,782 users 2.3 million edits BottomBottom Line:Line: KnowledgeKnowledge WorkWork isis UniversalUniversal NewNew ICIC Focus:Focus: ““AnalyticAnalytic TransformationTransformation”” Launched by ODNI, April 2007 Both “analysis” side and “techie” side DDNI/A and DNI CIO are the two project owners Several key programs: Community-wide “IC Data Layer” to aggregate access to “all” databases (no one knows the true number) A-Space, a16-agency “collaborative environment for analysis” DNI assigned job of ICDL and A-Space to DIA on behalf of full IC - because of our SOA work DIADIA’’ss Alien:Alien: AlAlll--SourceSource IIntelligencentelligence EnEnvironmentvironment SOASOA PlanningPlanning BegunBegun 20052005:: FullFull webweb--servicesservices frameworkframework Alien is a framework, not a single tool Reliant on globally networked set of data centers New best-of-breed analytic software AlienAlien datadata servicesservices –– tyingtying
Recommended publications
  • Intellipedia-Wrangler.Pdf
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 81322A 28 April 2017 JOHN GREENEWALD Dear Mr. Greenewald: This is our final response to your Freedom of Information Act (FOIA) request of 22 May 2015, for Intellipedia pages on WRANGLER. As stated in our previous response, dated 27 May 2015, your request was assigned Case Number 81322. A copy ofyour request is enclosed. For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. There are no assessable fees for this request. Your request has been processed under the FOIA. For your information, NSA provides a service of common concern for the Intelligence Community (IC) by serving as the executive agent for Intelink. As such, NSA provides technical services that enable users to access and share information with peers and stakeholders across the IC and DoD. Intellipedia pages are living documents that may be originated by any user organization, and any user organization may contribute to or edit pages after their origination.
    [Show full text]
  • FOIA Request Log for Office of the Director of National Intelligence (ODNI), FY 2013
    Description of document: FOIA Request Log for Office of the Director of National Intelligence (ODNI), FY 2013 Requested date: 15-July-2013 Released date: 25-October-2013 Posted date: 19-September-2016 Source of document: Freedom of Information Act Request Director, Information Management Division Office of the Director of National Intelligence Washington, D.C. 20511 Fax: (703) 874-8910 Email: [email protected] The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. Office of the Director of National Intelligence Information Management Division Washington, DC 20511 OCT 2 5 2013 Reference: ODNI Case# DF-2013-00155 This is in response to your email dated 15 July 2013, received in the Information Management Division of the Office of the Director of National Intelligence (ODNI) on 16 July 2013.
    [Show full text]
  • Making Friends in Dark Shadows: an Examination of the Use
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Directory of Open Access Journals © 2011, Global Media Journal -- Canadian Edition Volume 4, Issue 2, pp. 95-113 ISSN: 1918-5901 (English) -- ISSN: 1918-591X (Français) Making Friends in Dark Shadows: An Examination of the Use of Social Computing Strategy Within the United States Intelligence Community Since 9/11 Andrew Chomik Centre for Military and Strategic Studies, Canada Abstract: The tragic events of 9/11 highlighted failures in communication and cooperation in the U.S. intelligence community. Agencies within the community failed to “connect the dots” in the intelligence they had, which was cited by the 9/11 Commission Report as a reason for the terrorist attacks being allowed to happen. Since then, the U.S. intelligence community has made organizational and operational reforms towards intelligence sharing. As part of this reform, the Director of National Intelligence has introduced web-based social computing technology to be used by all members of the intelligence community. This paper argues that while this technology has been adopted into the intelligence environment, it has reached a “plateau” in its use, and that intelligence failures continue to persist in the U.S. post-9/11 world. It identifies and analyzes the challenge of implementing social computing and Web 2.0 technology into the U.S. intelligence community, as well as account for possible deficiencies in the community that might be contributing to these intelligence failures. Finally, the definition of “success” in intelligence analysis and social computing is explored, and critique against information sharing is put forth.
    [Show full text]
  • New Tools for Collaboration: the Experience of the U.S. Intelligence Community
    JANUARY 2016 1616 Rhode Island Avenue NW Washington, DC 20036 202-887-0200 | www.csis.org Lanham • Boulder • New York • London 4501 Forbes Boulevard Lanham, MD 20706 301- 459- 3366 | www.rowman.com Cover photo: Rawpixel.com/Shutterstock New Tools for Collaboration The Experience of the U.S. Intelligence Community A Report of the CSIS Strategic Technologies Program ISBN 978-1-4422-5912-6 AUTHOR Ë|xHSLEOCy259126z v*:+:!:+:! Gregory F. Treverton Blank New Tools for Collaboration The Experience of the U.S. Intelligence Community AUTHOR Gregory F. Treverton January 2016 A Report of the CSIS Strategic Technologies Program Lanham • Boulder • New York • London About CSIS For over 50 years, the Center for Strategic and International Studies (CSIS) has worked to develop solutions to the world’s greatest policy challenges. Today, CSIS scholars are providing strategic insights and bipartisan policy solutions to help decisionmakers chart a course toward a better world. CSIS is a nonprofit organization headquartered in Washington, D.C. The Center’s 220 full-time staff and large network of affiliated scholars conduct research and analysis and develop policy initiatives that look into the future and anticipate change. Founded at the height of the Cold War by David M. Abshire and Admiral Arleigh Burke, CSIS was dedicated to finding ways to sustain American prominence and prosperity as a force for good in the world. Since 1962, CSIS has become one of the world’s preeminent international institutions focused on defense and security; regional stability; and transnational challenges ranging from energy and climate to global health and economic integration. Thomas J.
    [Show full text]
  • "Collaboration" in the National Security Arena
    TOPICAL STRATEGIC MULTI-LAYER ASSESSMENT (SMA) MULTI-AGENCY/MULTI-DISCIPLINARY WHITE PAPERS IN SUPPORT OF COUNTER-TERRORISM AND COUNTER-WMD Collaboration in the National Security Arena: Myths and Reality - What Science and Experience Can Contribute to its Success June 2009 The views expressed in this document are those of the authors and do not reflect the official policy or position of the organizations with which they are associated. Editorial Board: Jennifer O’Connor (DHS), Chair Elisa Jayne Bienenstock (NSI), Robert O. Briggs (UNO), Carl "Pappy" Dodd (STRATCOM/GISC), Carl Hunt, (DTI), Kathleen Kiernan (RRTO), Joan McIntyre (ODNI), Randy Pherson (Pherson), Tom Rieger (Gallup) Contributing Authors: Sarah Miller Beebe (Pherson), Keith Bergeron (USAFA), Elisa Jayne Bienenstock (NSI), Deborah Boehm-Davis (GMU), Robert O. Briggs (UNO), Chris Bronk (Rice), Kerry Buckley (MITRE), Joseph Carls (ret), Nancy Chesser (DTI), Lee Cronk (Rutgers), Bert Davis (ERDC), M. Jude Egan (LSU), Justin Franks (ODNI), Nahum Gershon (MITRE), Tamra Hall (MITRE), Col Craig Harm (NASIC), Richards Heuer, Jr. (Consultant), LTC Brad Hilton (US Army), Carl Hunt (DTI), Kathleen Kiernan (RRTO), Larry Kuznar (NSI), John M. Linebarger (Sandia), Joseph Lyons (AFRL/RHXS), Jean MacMillan (Aptima), Joan McIntyre (ODNI), Brian Meadows (SPAWAR), Victoria Moreno-Jackson, (Nat'l Assoc for Community Mediation), Gale Muller (Gallup), S. K. Numrich (IDA), Jennifer O’Connor (DHS), Douglas Palmer (ODNI), Stacy Lovell Pfautz (NSI), Randy Pherson (Pherson), Terry Pierce (DHS & USAFA),
    [Show full text]
  • Anna Politkovskaya
    (U//FOUO) Anna Politkovskaya TOP SECRET//SI//NOFORN See the Wikipedia article Anna Politkovskaya Contents 1 (U) Biography Anna_Politkovskaya) ( 2 (U) Murder 2.1 (U) Reaction 2.2 (U) Investigation 2.3 (U) Trial 3 (U) Professional Work 4 (U) References (U) Biography Journalist Anna Politkovskaya (U) Anna Stepanovna Politkovskaya was born in New York City on 30 August 1958. She was the daughter of Soviet Ukrainian diplomats posted at the United Nations. She studied journalism at Moscow State University and began her career with the newspaper Izvestiya. She became a Russia Portal prominent Russian journalist and was noted for her critical opposition to Putin's administration and her reporting on the war in Chechnya. She had received death threats for years, including one from a police officer which forced her to flee to Vienna in 2001, as well as an attempted poisoning on an aircraft while flying to Beslan to help in hostage negotiations. (TS//SI//REL TO USA, AUS, CAN, GBR, NZL) Russian Federal Intelligence Services (probably FSB) are known to have targeted the webmail account of the murdered Russian journalist Anna Politkovskaya. On 5 December 2005, RFIS initiated an attack against the account annapolitkovskaia@US Provider1, by deploying malicious software which is not available in the public domain. It is not known whether this attack is in any way associated with the death of the journalist.[1] (U) Murder (C//NF) Politkovskaya was assassinated in Moscow on 7 October 2006, probably in relation to her professional activities. She was found shot twice in the head in an elevator in her apartment building.
    [Show full text]
  • Intelligence Analysis
    BY ORDER OF THE AIR FORCE HANDBOOK 14-133 SECRETARY OF THE AIR FORCE 27 SEPTEMBER 2017 Intelligence INTELLIGENCE ANALYSIS ACCESSIBILITY: Publications and forms are available on the e-Publishing website at www.e-Publishing.af.mil for downloading or ordering. RELEASABILITY: There are no releasability restrictions on this publication. OPR: AF/A2OA Certified by: AF/A2O (Brig Gen Aaron M. Prupas) Pages: 104 This Air Force Handbook (AFH) is the reference guide for conducting intelligence analysis as prescribed by Air Force Policy Directive (AFPD) 14-1, Intelligence, Surveillance, and Reconnaissance (ISR) Planning, Resources and Operations and supports the operational requirements and processes outlined under Air Force Instruction (AFI) 14-133, Intelligence Analysis and AFI 14-134, Intelligence Analysis Production and Requirements Management. This publication provides the definitions, guidelines, procedures and tools for intelligence analysis operations. It has application and use for Regular Component, Air Force Reserve (AFR), Air National Guard (ANG), and Department of the Air Force (AF) Civilians, except where noted otherwise. Ensure that all records created as a result of processes prescribed in this publication are maintained in accordance with (IAW) Air Force Manual (AFMAN) 33-363, Management of Records, and disposed of IAW the Air Force Records Disposition Schedule (RDS) in the Air Force Records Information Management System (AFRIMS). Refer recommended changes and questions about this publication to the Office of Primary Responsibility (OPR) using the AF Form 847, Recommendation for Change of Publication; route AF Forms 847 from the field through the appropriate functional chain of command. This publication may be supplemented at any level, but all direct supplements are routed to the OPR of this publication for coordination prior to certification and approval.
    [Show full text]
  • A Guide to All-Source Analysis Managers Often Found Ways to Overcome the Inherent Strictures of the Distinction
    Association of Former Intelligence Officers From AFIO's The Intelligencer 6723 Whittier Avenue, Suite 200 Journal of U.S. Intelligence Studies McLean, Virginia 22101 Volume 19 • Number 1 • $15 single copy price Winter/Spring 2012 ©2012, AFIO Web: www.afio.com, E-mail: [email protected] the ability of analysts (and sometimes entire agencies) to access certain types of information and to integrate insights from multiple intelligence disciplines. It was, in effect, a situation that sometimes compelled ana- lysts to work difficult problems without being able to collaborate with counterparts in other agencies. That was never desirable, and good analysts and responsible A Guide to All-Source Analysis managers often found ways to overcome the inherent strictures of the distinction. But in the fast-paced, information-rich, and highly demanding environment by Thomas Fingar, PhD of the 21st century, sharing information and capturing the insights of informed colleagues cannot be a func- he meaning of “all-source analysis” has evolved tion of individual initiative and creative workarounds.2 over time in ways that reflect important changes The potential perils of bureaucratic and behav- Tin the way the Intelligence Community (IC) ioral impediments to information sharing, all-source operates and analysts perform their jobs. Books and analysis, and collaboration among analysts with com- articles on intelligence written more than a few years plementary skills were tragically revealed by the events ago often drew a distinction between “all-source anal- of September 11, 2001 and the post-mortem analysis ysis” that integrated information from multiple types of the 9/11 Commission.3 Few consequences of failure of sources (such as human intelligence or HUMINT to access and incorporate information from all avail- and signals intelligence or SIGINT), and analysis that able sources will be as dramatic or tragic as were the utilized or focused on a single type of information events of 9/11, but the purpose of intelligence analysis (such as imagery or IMINT).
    [Show full text]
  • Wikis Across Government Agencies Tech@State and Wikimania 2012 July 13, 2012
    Wikis Across Government Agencies Tech@State and Wikimania 2012 July 13, 2012 Peter B. Meyer Office of Productivity and Technology, Bureau of Labor Statistics . with lots of advice from others . .not representing the agency, just the named author www.bls.gov Outline: wikis across government agencies Three big internal wikis in US government Intellipedia, Diplopedia, OMB's MAX Many other wikis in government Some design differences Purposes 2 Intellipedia In 2004 the U.S. intelligence agencies reviewed their communication tools and processes (Andrus, 2005; Burton, 2005) They added web tools and work spaces to their network Intellipedia wiki across agencies starting 2006 Blogs, tagging, search, messaging, videos easier search across 16 agencies 3 Diplopedia Intended for sharing procedures (Bronk and Smith 2010) E.g. for staff at new posts Article count grew linearly with time after 2006 start 4 Page growth is often roughly linear over time 5 OMB’s MAX Federal Community Intended first for budget then other groups Runs Conflence software Can recognize NASA computers on login A key capability for the future 6 Many other examples US federal govt Others doing governance DoDTechipedia GCPEDIA (Canadian civil svc) FBI’s Bureaupedia GovDex (Australia) EPA wikis Wikiprogress (OECD) DOL wiki Statistics Explained (Eurostat) OSHApedia City wikis NITRD’s wiki Katrina Help Wiki PowerPedia OpenWetWare Statipedia GovLoop NIH’s several wikis 7 Different wiki designs & uses (1) All-government versus focused knowledge pool GCPedia available
    [Show full text]
  • Intellipedia-Xkeyscore.Pdf
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 104534A 17 August 2018 JOHN GREENEWALD 27305 W LIVE OAK RD SUITE #1203 CASTAIC CA 91384 Dear Mr. Greenewald: This is our final response to your Freedom of Information Act (FOIA) request of 6 June 2018 for Intellipedia records on XKEYSCORE. As stated in our initial response to you, dated 25 June 2018, your request has been assigned Case Number 104534. For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search time and the duplication of 100 pages at no cost. There are no assessable fees for this request. Your request has been processed under the provisions of the FOIA. For your information, NSA provides a service of common concern for the Intelligence Community (IC) by serving as the executive agent for Intelink. As such, NSA provides technical services that enable users to access and share information with peers and stakeholders across the IC and DoD. Intellipedia pages are living documents that may be originated by any user organization, and any user organization may contribute to or edit pages after their origination.
    [Show full text]
  • Diplopedia Imagined: Building State's Diplomacy Wiki
    Preconference Draft – To be published in the proceedings of the 2010 International Symposium on Collaborative Technologies and Systems. Diplopedia Imagined: Building State’s Diplomacy Wiki Chris Bronk Tiffany Smith Rice University U.S. Dept. of State [email protected] [email protected] ABSTRACT undertaken during his tenure as a Foreign Service business practice advisor to the Office of eDiplomacy Considerable interest has been directed by the Obama during 2005 and 2006. The second author, a current Administration in harnessing Web 2.0 technologies such employee of eDiplomacy, served as Project Lead for as blogs, wikis, social media and cloud computing to Diplopedia from 2007 to 2009, and provides further overhaul the business of government. Addressed here is information on the adoption of the wiki’s use by the account of an enterprise wiki at the U.S. State personnel during that time and beyond. The story begins Department. That wiki, Diplopedia is currently employed with a visit from Jimmy Wales, Wikipedia’s “God-King” by the State’s employees to share subject matter and chief booster. knowledge related to the process of diplomacy . Contained herein is an account of how Diplopedia was 2. THE IDEA – MEETING MR. JIMMY conceived and became a functional system for knowledge sharing at the Department of State (DoS). As unlikely as it sounds, on the morning of April 19, 2006, Jimmy Wales, guiding light of Wikipedia, addressed participants attending the Intelink Technical Exchange. KEYWORDS: e-government, wikis, Web 2.0, social Wales delivered a single message arguing that the software, digital diplomacy, enterprise architecture. participants in the Wikipedia experiment were grown-ups and could be trusted to do the right thing in entering their knowledge into the encyclopedia.
    [Show full text]
  • Freedom of Information Act (FOIA) Document Clearinghouse in the World
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 79147A 28 November 2016 JOHN GREENEWALD Dear Mr. Greenewald: This responds to your Freedom of Information Act (FOIA) request dated 15 September 2014 for Intellipedia entries on FREEDOM OF INFORMATION ACT and/or FOIA. As stated in our previous letter, dated 17 September 2014, your request was assigned Case Number 7914 7. For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. There are no assessable fees for this request. A copy of your request is enclosed. For your information, NSA provides a service of common concern for the Intelligence Community (IC) by serving as the executive agent for Intelink. As such, NSA provides technical services that enable users to access and share information with peers and stakeholders across the IC and DoD. lntellipedia pages are living documents that may be originated by any user organization, and any user organization may contribute to or edit pages after their origination.
    [Show full text]