Matthew Burton

Tag: intelligence

The Death of BRIDGE: The US Government’s IT Failure of the Year

UPDATE: Given the events of the past day, I feel it’s worth referring back to my post from last February in which I discuss how intelligence failures are normally dealt with, and propose a more common sense solution. BRIDGE, the program I discuss below, would have provided a model for doing some of the things I recommended.

Back in October, the Director of National Intelligence killed a program called BRIDGE. (I’ve written about BRIDGE before.) As such a vocal advocate of BRIDGE with a financial interest in its success, my bias is clear, but for whatever that biased opinion is worth, BRIDGE’s death was the biggest government IT failure of 2009.

The cause of BRIDGE’s death is the most frustrating aspect of it, and it’s a reminder of what makes government innovation so logistically difficult: BRIDGE wasn’t deemed a failure or a waste or a PR risk. Technically, it wasn’t even killed; it was just put on ice. Following the presidential transition, new priorities were made at the top levels of the bureaucracy. These priorities had nothing to do with BRIDGE in particular, or any other tech-related goals. BRIDGE just got lost in the shuffle along with countless other programs that deserve attention. Continue reading

On the Weaponization of the Collaborative Web

Around this time yesterday, I, along with countless others, tried to bring down the Web sites of Iran’s information and justice ministries, and state-sponsored media outlets. The idea was to silence the pro-Ahmadenijad, anti-dissent messages coming from these outlets, and in so doing, strengthen the opposition protests in Tehran.

You didn’t have to be computer smart to take part: a developer in San Francisco had set up a push-button tool that would, upon your click, immediately start bombarding 10 Web sites with requests. I clicked Start, and in the 10 little boxes below, I could see the pages load and reload. About half of them were already down.

This was exhilarating. The goal was to promote democracy, and I could actually watch as it happened. Empowering.

But there’s more to it than that. I’m conflicted about the virtue of this idea. I’m still trying to sort out my thoughts about what happened, but I know that we will be talking about yesterday morning for years to come. We turned our collective power and outrage into a serious weapon that we could use at our will, without ever having to feel the consequences. Network warfare became available to the general public. That is frightening. Here is how my thinking evolved throughout the day:

Continue reading

An Information Age Strategy for Government Information Technology

The below is a chapter I wrote for Threats In the Age of Obama (Amazon), recently published by Nimble Books. The book is divided into two portions: one set of chapters on future threats, and another set on ideas for dealing with them. My chapter–in the latter section–focused on information technology solutions.

___

What is the perfect information technology solution to coming national security threats?

There isn’t one solution to multiple threats. Rather than searching for a single solution, our national security community should adapt its IT procurement strategy to develop many solutions, each addressing a specific threat at the lowest possible cost. Continue reading

The Value of Open Source Information: Two Military Intelligence Coups by the Web

Recently, I was a panelist at the Director of National Intelligence’s Open Source Conference. The title of my panel was “Young Analysts Talk About the Value of Open Source.” The intelligence field’s definition of “open source” is different from what you might think: all it means is “information derived from public sources”: newspaper articles, television broadcasts, Web sites, etc.

To outsiders, it might seem odd to have a conference about this: doesn’t everyone understand the value of information? But when your desk has piles of secrets stolen from the enemy, it’s understandably difficult to spend time reading about things the whole world already knows. And because network security is extremely important, many intelligence analysts do not have easy access to the Web. So the Intelligence Community is slow to realize the power of publicly available information in anticipating threats.

Many of the product booths in the exhibit hall showcased products that harvest Web content en masse so that it can be delivered to analysts on a non-Web network. (This is an important point to emphasize to readers outside the intelligence world. Analysts have access to infinite stores of foreign newspapers and news broadcasts, but this content is stored privately, copied from a public medium to a private data store, with an interface that looks like a card catalog rather than the Web sites where the content was originally found.)

What to do with all of that information? Is open source intelligence somehow special or different from classified sources? The title of the panel implied that it is different; it also implied that I would have a unique take. I do.

Continue reading

Copyright © 2017 Matthew Burton

Theme by Anders NorenUp ↑