Protecting and sharing data

Experts discuss cross-domain intelligence swapping.

Zaid Hamid

TALKING INTEL: From top, the Coast Guard's Michael Payne, DIA's Mark Morrison, ODNI's Richard Russell and TCS' Edward Hammersla.
- Michael Payne, the Coast Guard's chief of the Office of Intelligence, Surveillance, and Reconnaissance Systems and Technology, and assistant commandant for the Intelligence and Criminal Investigations Directorate.
- Richard Russell, deputy associate director for National Intelligence, Information Sharing Customer Outreach, in the Office of the Director of National Intelligence.
- Mark Morrison, chief information assurance officer, Defense Intelligence Agency.
- Edward Hammersla, chief operating officer, Trusted Computer Solutions of Herndon,
Va.
GCN: How do you define secure information sharing?
Hammersla:
Morrison:
GCN: There's a push on to vastly reduce the number of filters or high-assurance guards or cross-domain solutions lying between the various classification levels of databases. What is your viewpoint of the worthiness of that approach, and its likely benefits?
Morrison:
GCN: In this progression toward secure information sharing, what are you doing about risk assessment of the different security measures you're putting in place, and who's going to be responsible for taking on that risk? Everything's about risk assessment these days.
Morrison:
GCN: One of the, perhaps, five things that [the Director of National Intelligence CIO Dale Meyerrose and Pentagon CIO John Grimes] are going to have in their pending release on the C&A (See page 7) remake is this harmonization of the protection levels (PLs). If you could, comment on how that will make everyone happy. How would you go about defining these protection rules anyway?
Morrison:
GCN: Is there a time frame for when that will happen?
Morrison:
GCN: Can you realistically get down to a single portal, or does that concentrate the risk so much that, since you can never get risk down to zero, you wouldn't want to take a chance on your single portal being disabled.
Morrison:
GCN: How about whole idea of using embedded metadata, to have a document that can decide whether it wants to open up, to a specific user, or on a specific computer, or cross a specific cross-domain solution?
Morrison:
GCN: When you get into a shared environment, you're changing that definition into ownership, and the definition of validity. How do you do that in a secure environment?
Morrison:
Russell:
Morrison:
GCN: On integrating open-source or public-source information into classified information, how do you make better use of publicly available information and how that gets filtered in, and what happens when it does?
Russell:
Payne:
Russell:
NEXT STORY: Patch tactics