无忧传媒

Technical Modernization for the Intelligence Community

People and Technology: Accelerating a Strategic Partnership

Each agency faces different challenges in modernizing for the ever-evolving complexities of the national security mission. We help organizations maximize the implementation of leading-edge tech while helping them chart a prioritization strategy that supports a realistic transformation. Here are four principles we apply in bringing next-generation capabilities:

  • Provide open, scalable solutions that fit the need.听鈥淲e look at the latest technology and how we can use it to advance the organization鈥檚 mission and get outcomes to stakeholders faster,鈥 says Josh Perrius, 无忧传媒 vice president and leader of our digital modernization IC support.
  • Create a unique solution that leverages existing tools.听Whether an agency is at the leading edge of technology or transforming legacy systems with a phased approach, our technologists meet stakeholders听wherever they are on the digital continuum. We have an array of tools and strategies we can adapt to solve the immediate problem while positioning the agency for the next level of transformation鈥攆or example, multi-intelligence (multi-INT) fusion and cross-domain integration.
  • Create an environment for top talent to thrive.听鈥淲e want people to be engaged in challenges that excite and interest them. So emerging tech is a win-win, keeping our experts curious and thriving and helping our clients mature technically,鈥 says Becky Robertson, a vice president who heads cybersecurity for national security programs.
  • She also explained that our strategists tailor end-to-end solutions for the unique cultural considerations of each organization. 鈥淲e are the architects and integrators, working side by side with agencies to help them achieve sustained success,鈥 Becky says. This helps ensure that in addition to fulfilling the immediate requirements, each engagement accelerates progress for goals such as those in the听鈥淪econd Epoch" vision. We help navigate transformation across dimensions, from听implementing cloud computing for tradecraft at scale听to听realizing the benefits of a hybrid cleared workforce.
  • Eliminate technical surprise in a fast-changing world.听翱耻谤听cybersecurity solutions and services听help intelligence agencies stay ahead of the threat wherever they take their mission. 鈥淣o one wants to suddenly find out an adversary鈥檚 technology has changed and realize they are not prepared for it,鈥 says Becky.

Innovation for Technology Modernization

The IC needs to deliver deeper insights faster to defenders of the nation. That makes advanced analysis, artificial intelligence/machine learning (AI/ML), and cloud capabilities strategic priorities鈥攖echnical advances that must be accomplished without compromising security.

Technical development is one element; implementation is another. 鈥淥ur clients often have a vision of innovation. Then there鈥檚 the practical side: How do we get this done to achieve the vision? They don鈥檛 have the time to figure it out. So it helps that we know the mission side and we also understand the external world鈥攁dvising commercial industries on cybersecurity for听operational technology, for example. We don鈥檛 just execute based on best guesses. We bring that external experience with us to enrich our solutions with innovative ideas, translating the vision to the day-to-day mission,鈥 says Becky.

鈥淲e use commercial technologies in creative ways to meet the need. If a capability doesn鈥檛 exist, we build it,鈥 Josh explains. For example, we developed Global4Sight罢惭听for clients who need immediate听geopolitical insights and analysis听补苍诲听District Defend听to ensure security for remote devices.

Download Our IC Digital Transformation Guide

Agility to Adapt: DevSecOps for Changing Missions

The world is changing faster and the IC must too. Our strategists and technologists use agile practices to accelerate clients鈥 transformation journey.

Open Architectures: Modularity and Velocity

Our teams apply open-architecture technologies allowing us to modernize rapidly while embedding security into every step. Our transformation is:

  • Modular听鈥 Using government-owned application user interfaces (API) enabling microservices and other听plug-and-play听肠补辫补产颈濒颈迟颈别蝉
  • Interoperable听鈥 Enabling听open data frameworks听to share across systems
  • Scalable听鈥 Allowing for experiments and enhancements before widespread rollout
  • Upgradable听鈥撎Adaptable听for new missions, in some cases with push-button ease

Continual Improvement: 鈥淩esiliency Without Needing a Reset鈥

鈥淲e start on a small scale and then iterate so we can change quickly with new developments. Maintaining a DevSecOps environment enables that approach,鈥 says Josh. For example, he noted, phenomenology and communications technologies are always changing. 鈥淲e need to exploit those, not rest on the fact that we used to collect information a certain way.鈥

DevSecOps and agile software practices allow us to deliver new capabilities rapidly and pivot for changing requirements. 鈥淭he client gets resiliency without needing a total reset,鈥 says Becky.

She explains that our mission understanding allows us to do regular retrospectives from both a strategic and technical point of view. Josh agrees: 鈥淲e like to challenge the status quo. We鈥檙e always saying, 鈥楬ow can we do this better?鈥 Having the agile mindset in both the mission and technical sides lets us deliver with greater velocity.鈥

Advanced Analysis for National Security

础诲惫补苍肠颈苍驳听U.S. tradecraft听requires a focus on AI and ML, areas where 无忧传媒 is at the forefront. We help the IC听operationalize AI听to automate routine analysis. This frees analysts to concentrate on the most challenging problems. We also apply technologies like natural language processing to give analysts a broad view of multi-INT data.

鈥淥ur focus is, 'Can we get the data quickly to the right place to do the computing? Can we make updates quickly to AI and ML algorithms? And then can we disseminate the insights to the right platforms downstream that will make decisions?鈥欌 says Josh.

Keeping Humans in the Loop

There鈥檚 also the human aspect. For example, we鈥檙e always advancing the data analytics and natural language processing used in ML algorithms. At the same time, we understand the need for transparency.

鈥淎nalysts don't want a black box that says, 鈥楧on't worry, we will figure this out for you,鈥欌 says Josh. Intelligence professionals need the ability to inspect algorithmic inputs for accuracy and avoid bias, ensuring ethical AI practices. At the same time, those algorithms need to be protected. We lead research and development into ways to听defend AI against attack.

Real-Time Analytics at the Edge

鈥淲e understand the capabilities as well as the vulnerabilities of edge devices,鈥 says Becky. 鈥淭hat allows us to help analytics become much more efficient wherever our clients take the mission.鈥

In addition, we鈥檙e advancing ways to provide edge processing even in degraded and contested environments where low size, weight, and power are critical. For example, we worked with the U-2 Federal Lab to develop containerized microservices enabling edge processing for a successful test of the military鈥檚 first听AI copilot. We also offer听edge computing听肠补辫补产颈濒颈迟颈别蝉, allowing clients to create听secure, flexible ecosystems using existing devices.

There鈥檚 another way we are advancing the mission: 鈥淲e鈥檙e increasing the speed at which we can pull data back,鈥 says Josh, supporting initiatives such as听space-based听Internet services via clusters of satellites and听5G capabilities. This allows clients greater flexibility in processing approaches.

Elevating Benefits with Cloud

鈥淲e were part of the initial standup of cloud computing in the classified domain,鈥 says Josh. And we continue to innovate, providing a听security-first perspective听to the听cloud services听we provide for a broad base of clients. Intelligence, defense, and Fortune 500 companies are realizing the efficiencies of services such as increased automation and built-in security.

We use our experience across hundreds of large-scale cloud migrations and our expertise as a听third-party certifier (C3 PAO) to provide rapid, efficient transformation. In addition, we package tools and processes like those we used to stand up the U.S.听Treasury鈥檚 FedRAMP-high accredited cloud听so we can apply proven strategies rapidly.

Once skeptical of cloud security, more and more intelligence agencies are realizing the benefits of embedded protection. 鈥淭he more automated security is, the more secure it will be,鈥 says Josh, noting that cloud frees multiple system administrators from making individual patches.听 鈥淎nd we apply measures such as听zero trust听to our solutions, so you secure information at every step in the process,鈥 says Becky.

Bridge to Tomorrow

鈥淧roblems are so multidimensional now. We have to engage in a broader sphere so groups can collaborate to get new insights,鈥 says Josh. Here are two of the areas where we build partnerships.

Connecting Silicon Valley to the IC

鈥淲e鈥檝e invested in building labs and providing prototypes to grow our intellectual capital, expand the skills of our staff, and create collaborative environments for innovative engagements with clients, industry, and academia鈥攆or example,听our 5G lab,鈥 says Becky. In addition, our听tech scouting services听forecast trends and open up collaboration with startups and other nontraditional partners.

Connecting Intel and Industry

鈥淎dversarial countries are pouring resources into their tech buildup. We鈥檙e not going to outspend them, so we need to be really good at identifying the best capabilities in industry and enhance them or incorporate them in novel ways for the intelligence mission,鈥 says Josh. Banking is an example of an industry that shares the need for true attribute-based access control for disparate data merged into one ecosystem.

The flow of information goes two ways, Becky points out. 鈥淪ecurity is more than a government function; it鈥檚 also about protecting national resources and assets. And industry is part of that. Adversaries are focused on these soft targets. Every aspect of society needs to be protected.鈥

Case Study: Clairvoyant

An intelligence agency wanted a solution to help get machine learning developed and deployed into operations for mission-critical national systems. But the IC鈥檚 complex operational environment had made progress difficult. In addition, each application needed to be custom-developed by cloud deployment experts and was subject to accreditation requirements. We provided a DevSecOps tool suite including:

  • A deployment framework that includes Kubernetes clusters for hosting containerized software, a continuous integration and continuous deployment pipeline integrated with security checkpoints to automate security accreditations, and program health monitoring and metrics.
  • An integrated data platform that combines data warehousing, query tools, discovery tools, and streaming services.
  • A solution that allows data scientists to leverage the power of Amazon SageMaker via a secure portal so they can collaboratively build, train, and deploy machine learning models for their mission use cases.

Benefits for intelligence:

  • Enables secure exploitation of ML models
  • Accelerates mission timelines via rapid deployment
  • Delivers new insights into exponentially increasing data.
Learn more about Clairvoyant.

Get Insights

Fill out the form below to get the latest insights on national security from us.