Counterterrorism effort gets new tech

The National Counterterrorism Center has enhanced its IT systems in recent months to allow for more effective collection and processing of larger amounts of information, its director said.

The center, which is part of the Office of the Director of National Intelligence, manages the online Terrorist Identities Datamart Environment, a repository of about 640,000 identities linked with global terrorism. The datamart regularly feeds information to several federal watch lists, including the FBI’s Terrorist Screening Center.


Related stories:

Information handcuffs: Counterterrorism IT needs support from the top

Multi-agency task force mining Bin Laden material for intelligence


Since July 2010, as authorities loosened the requirements for putting people on watch lists, more data on identities has needed to be added into the system. The center has taken measures to ensure more effective collection, search and analysis in the datamart, Matthew Olsen, director of the center, told the Senate Homeland Security and Governmental Affairs Committee on Sept. 13.

The new features added to the datamart included applications to ingest bulk amounts of data, automatically process nominations for the datamart, and export records to the terrorist screening center in near real time, Olsen said.

Furthermore, the center increased its ability to store, compare, match and export biometrics such as fingerprint, facial images, and iris scans, he said. He added that the center continues to honor all civil and privacy protections.

Before December 2009, analysts at the center worked manually to search and integrate information residing on various databases. Now the center is working to bring those databases together into the Counterterrorism Data Layer, a single environment in which data can be searched and analyzed.

“For the first time, NCTC analysts can search across key homeland security and intelligence information and get back a single list of relevant results,” Olsen said.

Analytical tools are being used to conduct Google-like searches, link analysis, data visualization and data triage, he added.

The center also has been working to generate additional data.

“One of the key gaps we identified in the watch-listing process was the need to enhance existing Terrorist Identities Datamart Environment records with additional information,” Olsen said. The center “is now taking a more aggressive and innovative approach to seek methodologies and data repositories to ingest biographic, biometric, and derogatory information. We also are conducting large-scale data correlation efforts on a nightly basis, enabling discovery of previously unknown terrorist connections and attributes.”

Other IT-related capabilities added by the center in recent months include:

  • expanding advanced data correlation services to process and filter massive datasets.
  • improving technology supporting the development of leads to identify non-watch-listed names or aliases.
  • updating NCTC's integrated data repository with several country-specific datasets.




About the Author

Alice Lipowicz is a staff writer covering government 2.0, homeland security and other IT policies for Federal Computer Week.

The Fed 100

Read the profiles of all this year's winners.

Featured

  • Then-presidential candidate Donald Trump at a 2016 campaign event. Image: Shutterstock

    'Buy American' order puts procurement in the spotlight

    Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market.

  • OMB chief Mick Mulvaney, shown here in as a member of Congress in 2013. (Photo credit Gage Skidmore/Flickr)

    White House taps old policies for new government makeover

    New guidance from OMB advises agencies to use shared services, GWACs and federal schedules for acquisition, and to leverage IT wherever possible in restructuring plans.

  • Shutterstock image (by Everett Historical): aerial of the Pentagon.

    What DOD's next CIO will have to deal with

    It could be months before the Defense Department has a new CIO, and he or she will face a host of organizational and operational challenges from Day One

  • USAF Gen. John Hyten

    General: Cyber Command needs new platform before NSA split

    U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head of Strategic Command told Congress, but it cannot be separated from the NSA until it has its own cyber platform.

  • Image from Shutterstock.

    DLA goes virtual

    The Defense Logistics Agency is in the midst of an ambitious campaign to eliminate its IT infrastructure and transition to using exclusively shared, hosted and virtual services.

  • Fed 100 logo

    The 2017 Federal 100

    The women and men who make up this year's Fed 100 are proof positive of what one person can make possibile in federal IT. Read on to learn more about each and every winner's accomplishments.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group