Data Sharing

The keys to information interoperability

Jeffrey Edgell

Information superiority is critical to our nation's future, particularly in the realms of defense and homeland security. But beyond access to more types of information than one's adversary, that superiority also requires the ability to process that information faster and more efficiently.

America's information capital is vast. Yet technological obstacles and territorial mind-sets at agencies thwart efforts to bring to bear the full power of all the information residing in federal databases.

Information interoperability addresses the system-level obstacles that prevent information exchange. It acknowledges that independently developed systems use different formats, meanings and standards, and often contain information of varying quality and security levels.

Neutral data models and Web 2.0 technology that allows for semantic mediation are the best tools for achieving governmentwide information interoperability. They provide both a technique and a technology for sharing information where there is no need for specific knowledge about the organizations with which information will be shared.

For example, any organization can map a widget to a universal meaning within a neutral model and share it with every organization using that neutral model. When drivers and events change a widget's definition, the widget owner can remap it without affecting the ability to share accurate information among organizations in real time. Semantic concepts allow information to be combined across sources to augment meaning and sharing, thereby enhancing an organization's overall information enterprise.

Until recently, government agencies primarily used two neutral models: Universal Core and the Justice Department's National Information Exchange Model. The Defense Department's decision in October 2012 to use NIEM made it the de facto standard neutral model, paving the way for greater collaboration among law enforcement, defense and homeland security entities.

In addition to the tools, information superiority also demands a dynamic structure that can accommodate an individual organization's changes without disrupting the overall information-sharing environment. To achieve such a structure, use the following best practices:

1. Avoid single-purpose solutions. Appreciate the need for future information-sharing requirements rather than focus exclusively on the specific communication issue at hand. Embrace universal technologies in the selected solution.

2. Allow operational language autonomy. Let organizations retain their unique vernacular. Forcing conformity is costly and shortsighted.

3. Think in a global sense. Determine what information your agency owns and consider what other entities might be consumers of that information. Keeping others' requirements at the forefront promotes information superiority and allows the information enterprise to grow.

4. Identify what your organization requires. Determine what information will enhance your organization's analytical and situational awareness. Knowing what data is needed to expand your posture will influence your sharing community choices and neutral model participation.

5. Select an appropriate neutral model. Understand your business/mission as a first step, including what will be shared and what is needed to achieve organizational goals. That definition will elucidate the dimensions of the optimal neutral model. Then, map current business processes while knowing that future changes will require remapping.

6. Map to the specific elements in the neutral model. Adhere to this approach to facilitate information sharing and provide direct linkages to other organizations. Then, when another organization wants to access data, it will be mapped and translated in a way that the requesting organization can use in a language native to that organization.

7. Be mindful of security considerations. Recognize that data can be classified (and unavailable for universal consumption) and unclassified. Two key business decisions that inform neutral model design and affect cross-domain issues are: Who needs to see this information, and who do I need to share it with?

About the Author

Jeffrey Edgell is chief technologist at DHA Group, a management consulting and contracting firm serving federal civilian and defense agencies.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.


  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group