12:44 PM
John Foley
John Foley
Connect Directly

U.S. Intelligence Connects The Dots On Bin Laden

Intelligence agencies are leveraging new surveillance technologies and IT architectures to facilitate information sharing in their anti-terrorism and other national security efforts.

A bullet killed Osama bin Laden, but U.S. intelligence is what did him in.

The counterterrorism mission that caught up to al Qaeda's leader was a multi-agency intelligence effort that, for a change, worked as planned. The CIA, the National Geospatial-Intelligence Agency (NGA), the National Security Agency (NSA), and the Office of the Director of National Intelligence all played a part. James Clapper, the U.S. director of national intelligence, called their work "a more remarkable example of focused integration, seamless collaboration, and sheer professional magnificence."

That's a 180-degree turnaround from what the nation's spy agencies, under intense pressure since their failings on 9/11, have been hearing for much of the past decade. The attempted bombing of Northwest Airlines flight 253, en route from Amsterdam to Detroit, on Dec. 25, 2009, showed that gaping intelligence holes still existed. President Obama fumed that the incident was "totally unacceptable." And the embarrassing leak of Department of Defense and State Department documents via Wikileaks showed that the feds couldn't protect their own databases, let alone U.S. citizens.

So the elimination of the world's most-dangerous terrorist is a much-needed proof point that the U.S. Intelligence Community (IC) -- comprising the four agencies involved in the bin Laden mission and a dozen others -- is up to the monumental security challenges facing our nation. While details are still emerging on the intelligence that led to bin Laden, the foundation has been laid by IC member agencies over the past few years in the form of new surveillance, analysis, and information-sharing capabilities.

Of the $80 billion that the IC spent on intelligence operations in fiscal 2010, $27 billion went to military intelligence -- the Defense Intelligence Agency, for example -- and the balance to non-military intelligence agencies such as the CIA and FBI. One takeaway from the Navy SEAL's successful raid on bin Laden’s Pakistan hideout is that it was a joint effort between non-military U.S. intelligence agencies and the Pentagon. "This operation was the best of both worlds," Army Lt. Col. Tony Schaffer told Fox News. "You have CIA intelligence driving a Department of Defense operation."

How did they do it? Intelligence agency CIOs have been busy developing new platforms to support precisely this kind of collaboration. NSA CIO Lonny Anderson, in an exclusive interview with InformationWeek a few weeks ago, described work the agency is doing to foster information sharing through IT architecture and infrastructure.

One project, called "the Quad," is a joint initiative between NSA, NGA, the National Reconnaissance Office, and the Defense Intelligence Agency to create a shared development environment. Another is the Integrated Intelligence Pilot, or I2P, which involves deploying software and servers on the IC's classified network, the Joint Worldwide Intelligence Communications System, so developers can share applications and run database queries across agencies.

"Instead of taking data from CIA-specific or NSA-specific repositories, or FBI or DIA, you'll be able to query via the cloud into those organizations and ask, 'Do you have information that meets this question?' and they'll be able to say yes or no," Anderson said. NSA's CIO is optimistic that such efforts will lead to an even higher level of integration and data sharing. "Come back a year from now, and it'll be a much different discussion on what data we can share and how," he said.

At the CIA, the big news last month was the announcement that director Leon Panetta will be leaving to take over as Secretary of Defense. Lesser known is that the agency's CIO, Al Tarasiuk, left two months earlier to become CIO of the IC, where he's now responsible for establishing common IT standards and procurement across intelligence agencies and for developing an information-sharing architecture.

Tarasiuk's former IT team at the CIA played an important role in the agency's work to track down bin Laden. His move to the IC bodes well for the IC's continued thrust in information sharing. No mere speeds and feeds guy, Tarasiuk spent his early years overseas in the CIA's National Clandestine Service.

The NGA, one of the other agencies involved in the mission to get bin Laden, provides photos generated by earth-orbiting satellites for use in national defense and in response to natural disasters such as hurricanes and earthquakes. NGA provided the high-res images used by military planners to swoop in on the compound in Abbottabad, Pakistan, where bid Laden was hiding.

Last year, NGA awarded contracts valued at $7 billion to Digital Globe and GeoEye to develop next-generation satellite surveillance capabilities. Look closely at the aerial view of the compound provided by Google in this CNN story, and you'll notice that Digital Globe and GeoEye are credited with providing the image.

For an overview of the other organizations within the IC and what they do, see our guide "Who's Who In U.S. Intelligence."

Uncle Sam's success in tracking down bin Laden is validation of the long, expensive, and often frustrating effort to establish better intelligence capabilities, but there can be no letdown. With the prospect of an al Qaeda response, national security depends on it.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Securing Social Media: National Safety, Privacy Concerns
Kelly Sheridan, Staff Editor, Dark Reading,  4/19/2018
Firms More Likely to Tempt Security Pros With Big Salaries than Invest in Training
Sara Peters, Senior Editor at Dark Reading,  4/19/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.