Изображения страниц
PDF
EPUB

information does not drive poor decision-making. Overall, the dialectic between information sharing and protection, combined with weaknesses in the integration of intelligence information systems is always a challenge within the context of breaking events. At the field level, one needs the greatest fidelity and precision, the Department must continue to find new ways to provide the appropriate intelligence and information systems need by those responding to the local situations.

In summary, historically, the intelligence and law enforcement disciplines had a different worldview and approach to their respective tasks. Consequently, neither perceived a strong need to work closely with the other. Since the disaster of last year and the continuing threat to the homeland, those perceptions are no longer valid in either environment, nor are they any longer held by any of the participants from the Department's perspective. In the post 9/11 scenario, the lines of demarcation have blurred between the intelligence and law enforcement communities. The Department of Energy is in the process of actively breaking down the barriers that used to separate these communities, learning informational and operational needs of all participants, and searching for new opportunities for information exchange.

[blocks in formation]

In response to your request of 25 October 2002, enclosed are the responses to the Questions For the Record (QFRs) you submitted in reference to the 1 October 2002 Joint Inquiry Committee open hearing on information sharing.

Originals of this letter and enclosure are also being sent to the Chairman and Ranking Democratic Member of the House Permanent Select Committee on Intelligence and to the Vice Chairman of the Senate Select Committee on Intelligence.

Sincerely,

Enclosure

Stanley M. Moskowitz

Director of Congressional Affairs

Congressional Questions for the Record
(25 October 2002)

Information Sharing Between Federal Government
and State/Local Agencies
CIA CIO Input

1. What operating system(s) and software package(s) does your agency use for internal classified e-mail correspondence? What is the average age and processing speed of your

workstations?

CIA initiated its Common Workgroup Environment (CWE) program in 1996 to promote a common suite of operating system and desktop software products for the mission. CWE is built on the Windows NT operating system. The office productivity tool used within CWE for e-mail correspondence is Lotus Notes. The Lotus Notes product has been the foundation for CIA internal e-mail and workflow applications for several years due to its flexibility, agility, and reliability in supporting our worldwide environment.

CIA is engaged in a three-year workstation recapitalization program that ensures the mission customer has effective desktop computers available for its needs. Negotiated through bulk-buy acquisition vehicles, we have been very successful in driving down the cost of each workstation while driving up the processing speed and other capabilities of the machine. The cost for a desktop workstation has dropped an average of fifteen (15) percent per year since the institution of a corporate workstation program. The desktops that will be provided in FY2003 will have a processor speed of 2.0-2.53 gigahertz, bringing the average speed of desktop workstations to 450 megahertz.

2. Do individuals in your agency have the ability from their workstations to electronically send and receive e-mails and attachments to all 12 of your sister intelligence agencies (other than by STU-III Fax)? Please identify those agencies with which you do not have this ability. For those agencies with which you can electronically communicate, please identify what special procedures or actions (if any) must be taken in order to communicate with each agency. For example, do special accounts need to be established, or special hardware or software installed?

Individuals within the CIA have readily available, desktop access to send and receive e-mails and attachments to all 12 sister intelligence agencies. Intelligence Community E-mail (ICE-mail) is available through the standard Lotus Notes desktop e-mail product; no special hardware or software is required to use ICE-mail. ICE-mail is approved to support e-mail exchanges at the Top Secret level and below.

3. Do individuals in your agency have the ability from their workstations (assuming appropriate need-to-know) to access electronically classified databases and websites at all 12 of your sister intelligence agencies? Please identify those agencies with which you do not have this ability. For those agencies with which this capability exists, please identify what special procedures or actions (if any) must be taken in order to access such intranets. For example, do special accounts need to be established, or special hardware or software installed?

Individuals within the CIA have readily available, desktop access to many electronically classified databases and websites from sister intelligence agencies. Through the CIA's intranet, called CIALink, CIA users have access to Intelink-TS and many of the resources available on Intelink-TS. IC databases that are not Web-enabled or accessible without the use of extensive add-on modules are not generally available from the standard CIA desktop; information security policy prohibits the movement of certain kinds of data, e.g., mobile code, through the firewalls separating the internal CIA network from other Top Secret, IC networks.

Access to databases or applications not allowed to freely traverse through the firewalls is made available through dedicated desktops connected directly to the appropriate network. For example, access to certain DIA databases and applications is provided through dedicated Joint Worldwide Intelligence Communications System (JWICS) workstations located around CIA.

« ПредыдущаяПродолжить »