Is security the real problem for an intelligence community cloud?

Like the rest of the federal government, the intelligence community [IC] is looking for ways to save money and eyeing the cloud environment as one possible way. Unlike counterparts in other agencies, intelligence organizations are inherently secretive with essentially peerless security requirements. So how will it move to the cloud?

A successful approach will hinge on collaborative partnership, common solutions and effective policies, according to a panel of intelligence officials who spoke March 23 at an AFCEA briefing in Arlington, Va.

“The Defense Department can’t succeed without the IC, and the IC depends on the department for capabilities,” said Neill Tipton, director of information sharing and partner engagement in the office of the Deputy Under Secretary of Defense for Joint and Coalition Warfighter Support. “Technology is the enabler, but it’s about policies that make data available to people where ever they are.”

Tipton said three key factors driving the intelligence community’s move to the cloud include efficiencies mandates being implemented across DOD, department-wide changes in IT like consolidation and the changing needs of current and future mission networks.

But contrary to popular belief, security may not be the biggest problem.

“What difference does the cloud make? It turns out that there are some things that are far more secure…there are a few things that are far less secure. By and large, most security issues are unchanged simply because we changed the technology. We have the same issues, by and large, that we already had,” said Hank Beebe, intelligence community CIO in the Office of the Director of National Intelligence. “The more interesting part is having to deal with things like certification and accreditation, achieving reciprocity [and] moving against the insider threat.”

In fact, those are just a few concerns on a laundry list of challenges outlined by the panelists.

Jack Gumtow, CIO of the Office of Naval Intelligence, said scalability and access to data across DOD and the IC continues to be a problem, as does governance.

Other issues include overcoming a traditionally exclusive approach to problem-solving and the sheer volume of solutions necessary to achieve all the goals of moving to the cloud, Beebe added.

“We’re not going to get [50 percent savings] with cloud. It’s going to be an aggregation of lots of technologies, one of which is the cloud,” Beebe said. “The good news is everyone agrees we need to solve [these] problems. DOD and the IC recognize that this needs to be worked together, not separately. I don’t know there will ever be a common solution, but we need to at least be able to mediate between solutions.”

Some of those solutions are already in play.

Lynn Schnurr, Army Intelligence CIO for the Deputy Chief of Staff, G-2 and director of intelligence in the community information management directorate, highlighted progress in the Army’s distributed common ground system (DCGS) and Land ISR Net, both intelligence networks supporting deployed soldiers that rely on cloud capabilities.

The Air Force also is making progress in its own version of DCGS, which is turning wing operations into data storage sites that can process information and distribute to the field, according to Robert Marlin, Air Force technical adviser for intelligence, surveillance and reconnaissance capabilities and integration.

DCGS is one example of joint DOD/IC use of cloud capabilities, and it’s representative of the new approach, the panelists indicated.

“We know it’s not affordable for us to continue to try to implement architectures of the past. But we all have to continue to work together to find solutions, and that’s the key part. How do we get a common platform? How do we get away from the ‘boxes-R-us’ solutions…and to a common architecture that is more affordable and implementable?” Schnurr said.

About the Author

Amber Corrin is a former staff writer for FCW and Defense Systems.

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.


  • Shutterstock image (by venimo): e-learning concept image, digital content and online webinar icons.

    Can MOOCs make the grade for federal training?

    Massive open online courses can offer specialized IT instruction on a flexible schedule and on the cheap. That may not always mesh with government's preference for structure and certification, however.

  • Shutterstock image (by edel): graduation cap and diploma.

    Cybersecurity: 6 schools with the right stuff

    The federal government craves more cybersecurity professionals. These six schools are helping meet that demand.

  • Rick Holgate

    Holgate to depart ATF

    Former ACT president will take a job with Gartner, follow his spouse to Vienna, Austria.

  • Are VA techies slacking off on Yammer?

    A new IG report cites security and productivity concerns associated with employees' use of the popular online collaboration tool.

  • Shutterstock image: digital fingerprint, cyber crime.

    Exclusive: The OPM breach details you haven't seen

    An official timeline of the Office of Personnel Management breach obtained by FCW pinpoints the hackers’ calibrated extraction of data, and the government's step-by-step response.

  • Stephen Warren

    Deputy CIO Warren exits VA

    The onetime acting CIO at Veterans Affairs will be taking over CIO duties at the Office of the Comptroller of the Currency.

  • Shutterstock image: monitoring factors of healthcare.

    DOD awards massive health records contract

    Leidos, Accenture and Cerner pull off an unexpected win of the multi-billion-dollar Defense Healthcare Management System Modernization contract, beating out the presumptive health-records leader.

  • Sweating the OPM data breach -- Illustration by Dragutin Cvijanovic

    Sweating the stolen data

    Millions of background-check records were compromised, OPM now says. Here's the jaw-dropping range of personal data that was exposed.

  • FCW magazine

    Let's talk about Alliant 2

    The General Services Administration is going to great lengths to gather feedback on its IT services GWAC. Will it make for a better acquisition vehicle?

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above