Counterterrorism effort gets new tech

The National Counterterrorism Center has enhanced its IT systems in recent months to allow for more effective collection and processing of larger amounts of information, its director said.

The center, which is part of the Office of the Director of National Intelligence, manages the online Terrorist Identities Datamart Environment, a repository of about 640,000 identities linked with global terrorism. The datamart regularly feeds information to several federal watch lists, including the FBI’s Terrorist Screening Center.


Related stories:

Information handcuffs: Counterterrorism IT needs support from the top

Multi-agency task force mining Bin Laden material for intelligence


Since July 2010, as authorities loosened the requirements for putting people on watch lists, more data on identities has needed to be added into the system. The center has taken measures to ensure more effective collection, search and analysis in the datamart, Matthew Olsen, director of the center, told the Senate Homeland Security and Governmental Affairs Committee on Sept. 13.

The new features added to the datamart included applications to ingest bulk amounts of data, automatically process nominations for the datamart, and export records to the terrorist screening center in near real time, Olsen said.

Furthermore, the center increased its ability to store, compare, match and export biometrics such as fingerprint, facial images, and iris scans, he said. He added that the center continues to honor all civil and privacy protections.

Before December 2009, analysts at the center worked manually to search and integrate information residing on various databases. Now the center is working to bring those databases together into the Counterterrorism Data Layer, a single environment in which data can be searched and analyzed.

“For the first time, NCTC analysts can search across key homeland security and intelligence information and get back a single list of relevant results,” Olsen said.

Analytical tools are being used to conduct Google-like searches, link analysis, data visualization and data triage, he added.

The center also has been working to generate additional data.

“One of the key gaps we identified in the watch-listing process was the need to enhance existing Terrorist Identities Datamart Environment records with additional information,” Olsen said. The center “is now taking a more aggressive and innovative approach to seek methodologies and data repositories to ingest biographic, biometric, and derogatory information. We also are conducting large-scale data correlation efforts on a nightly basis, enabling discovery of previously unknown terrorist connections and attributes.”

Other IT-related capabilities added by the center in recent months include:

  • expanding advanced data correlation services to process and filter massive datasets.
  • improving technology supporting the development of leads to identify non-watch-listed names or aliases.
  • updating NCTC's integrated data repository with several country-specific datasets.




About the Author

Alice Lipowicz is a staff writer covering government 2.0, homeland security and other IT policies for Federal Computer Week.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • computer network

    How Einstein changes the way government does business

    The Department of Commerce is revising its confidentiality agreement for statistical data survey respondents to reflect the fact that the Department of Homeland Security could see some of that data if it is captured by the Einstein system.

  • Defense Secretary Jim Mattis. Army photo by Monica King. Jan. 26, 2017.

    Mattis mulls consolidation in IT, cyber

    In a Feb. 17 memo, Defense Secretary Jim Mattis told senior leadership to establish teams to look for duplication across the armed services in business operations, including in IT and cybersecurity.

  • Image from Shutterstock.com

    DHS vague on rules for election aid, say states

    State election officials had more questions than answers after a Department of Homeland Security presentation on the designation of election systems as critical U.S. infrastructure.

  • Org Chart Stock Art - Shutterstock

    How the hiring freeze targets millennials

    The government desperately needs younger talent to replace an aging workforce, and experts say that a freeze on hiring doesn't help.

  • Shutterstock image: healthcare digital interface.

    VA moves ahead with homegrown scheduling IT

    The Department of Veterans Affairs will test an internally developed scheduling module at primary care sites nationwide to see if it's ready to service the entire agency.

  • Shutterstock images (honglouwawa & 0beron): Bitcoin image overlay replaced with a dollar sign on a hardware circuit.

    MGT Act poised for a comeback

    After missing in the last Congress, drafters of a bill to encourage cloud adoption are looking for a new plan.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group