Find a Security Clearance Job!

Intelligence


Joint Intelligence Virtual Architecture JIVA

The focus of the Joint Intelligence Virtual Architecture, JIVA, is the modernization of intelligence analytical processes and methodologies. It will provide the Defense Intelligence Community's all-source analytical workforce the cognitive tools, automated capabilities, and training necessary to ensure successful mission accomplishment in tomorrow's high "operational tempo," information-rich environment. Specifically, JIVA focuses on the functions associated with the Analysis, Production, and Dissemination phases of the Intelligence Cycle. This includes cognitive analytical methods and procedures as well as the administrative processes. JIVA also addresses the technical, automation, and related systems and support required for the processing of information and the dissemination of intelligence. Equally important, JIVA includes the training required to operate in a virtual environment.

The overall goal of JIVA is to create a new intelligence operating environment for the 21st century. JIVA seeks to provide the battlefield commander Dominant Battlespace Awareness by fostering real-time situational awareness, information superiority, and an intelligence infrastructure that supports instantaneous intelligence production and dissemination. The following are JIVA's primary objectives:

  • Improve the quality of analysis, and utility of the product;
  • Provide specific and tailored intelligence to enhance the warfighter's ability to visualize the battlespace and ensure total operational awareness;
  • Improve the throughput and speed of delivery of intelligence;
  • Reduce or eliminate unnecessary redundancy and duplication;
  • Strengthen information and production management and ensure policies, procedures, concept development, training, and technical-human engineering to assist in the operation within the new information environment;
  • Establish and integrate standards (based on mandated Department of Defense (DoD) community standards/architectures) for commonality, interoperability, and modernization in coordination with appropriate elements and activities; and
  • Explore and examine very advanced technology and concepts for future integration.

The vision of JIVA is the coordinated production of all-source intelligence by multiple, physically separated organizations collaborating in a dynamic environment. It will ensure access to intelligence information in a standard format, using standard compatible procedures regardless of location. JIVA will leverage and invest in Community initiatives that support this vision. JIVA will also provide the strategy to effectively integrate diverse systems, policies, and procedures necessary to build a virtual production environment.

JIVA represents a set of new capabilities combined with responsive technical insertion strategies designed to foster a dynamic, flexible structure in support of global collaborative computing. It will support echelons from national to tactical, including the Joint Task Force (JTF) Commander and subordinate components. It will integrate support from non-Defense agencies and non-governmental organizations, as required. Finally, JIVA will provide access to virtually all intelligence sources and provide essential data that the Joint Forces Commanders will need to support their operations and accomplish their missions.

The Intelligence Community's initial efforts towards creating a "virtual intelligence architecture" that will link collectors, exploiters, analysts and intelligence customers electronically will transcend organizational boundaries and, by providing more flexibility and less bureaucratic rigidity, electronic connectivity will allow the policy and intelligence communities continually to reevaluate requirements and refocus resources on those issues of paramount importance. Breaking down these boundaries will help synergy in all areas of the Community---collection, analysis, production and requirements formulation and vetting. Programs such as INTELINK and Joint Intelligence Virtual Architecture (JIVA) are harbingers of an era where collaborative reporting will be the standard among analysts throughout the Intelligence Community.

As the Intelligence Community moves towards implementing a virtual intelligence architecture, however, it must thoroughly examine what effect this will have on the Intelligence Community's traditional production and management procedures and "culture." Currently, Intelligence Community managers-situated at the top of a vertical, hierarchical structure-largely control the information flow to and from policymakers. In a virtual intelligence architecture, managers will probably have less direct control over the information flow. Instead, they will act as facilitators who monitor the dialogue between policymakers and substantive experts to ensure that Community resources are appropriately allocated to priority tasks and to help say "no" to requests when resources are not available.

The JIVA Collaborative Environment (JCE) is based on GTE InfoWorkspace.

  • InfoWorkspace provides a fully featured, persistent, place-based collaboration environment, including: rooms for collaboration, chat, whiteboard, audio/video conferencing, document/file cabinet, people locator, and document search.
  • IWS supports room locking for private rooms.
  • The IWS document/file cabinet is web-based, and any documents can be referenced via a URL, however, it does not yet provide any security on the documents.
  • The IWS document/file cabinet supports metadata for documents (e.g., title, comments/keywords, author, owner, date of obsolescence, applicable country, security classification, category) which facilitates search.
  • IWS provides a people locator, supporting search against all user metadata, including job specialty.
  • IWS provides an external data conferencing capability via Microsoft NetMeeting and SunForum, for use in data conferencing sessions outside of the IWS environment. IWS supports multipoint audio and video conferencing via Microsoft NetMeeting and DataBeam NeT.120 Server, for use in audio/video conferencing sessions outside the IWS environment.
  • The Placeware Media Client, which provides the room-based audio conferencing, is not H.323 standards-based, and can only be used for interacting with other IWS users. Video conferencing is supported by IP-addressable web cameras. IWS can support up to 8 web cameras. JIVA is observing that video conferencing is not in high demand by their user community.
  • The IWS shared whiteboard supports screen capture for input, but does not support cut and paste of images. It supports the import of image backdrops including JPEG and NITF images. For NITF, the metadata is not included, and the images are converted upon import. JIVA noted that there would be future enhancements to the whiteboard and suggested the use of NetMeeting and SunForum whiteboards.
  • IWS also provides the Placeware Conference Center for large distributed briefings or training sessions. The conference center also supports recording of the session, for later review.

Future plans for JCE/IWS include enhanced whiteboard, file level access control, support for a thick client, and support for federated servers. Security in JCE is the key challenge. There is a need for an integrated public key infrastructure, and extending this to the stored documents so only authenticated users can get access. The need for replication (e.g., loading, survivability) was discussed by working group members. The key requirements identified are COTS, bundle, standards-based, platform independent, and security.

JIVA will be fielding JCE to a baseline of 6000 analysts across 41 locations worldwide on JWICS in J2s, JICs and standing JTFs (e.g., JSOC). The total number of simultaneous users of JCE has not been documented. Te Air Force observed just fewer than 300 users actively engaging in collaborative activities with CVW in EFX98. The Air Force plans to use IWS in EFX99 and anticipates the need for 500+ simultaneous users on a single server. JIVA will perform collaboration assessment: baseline performance of group, then assess afterwards in Integrated Air Defense Systems - NAIC ++.



NEWSLETTER
Join the GlobalSecurity.org mailing list


Unconventional Threat podcast - Threats Foreign and Domestic: 'In Episode One of Unconventional Threat, we identify and examine a range of threats, both foreign and domestic, that are endangering the integrity of our democracy'


 
Page last modified: 28-07-2011 00:49:43 ZULU