Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Who Killed the Virtual Case File? (FBI SNAFU...Antithesis of Able Danger)
IEEE Spectrum Online ^ | September ,2005 | Harry Goldstein

Posted on 09/11/2005 5:08:27 PM PDT by Dat Mon

In a devastating 81-page audit, released in 2005, Glenn A. Fine, the U.S. Department of Justice's inspector general, described eight factors that contributed to the VCF's failure. Among them: poorly defined and slowly evolving design requirements; overly ambitious schedules; and the lack of a plan to guide hardware purchases, network deployments, and software development for the bureau.

Fine concluded that four years after terrorists crashed jetliners into the World Trade Center and the Pentagon, the FBI, which had been criticized for not "connecting the dots" in time to prevent the attacks, still did not have the software necessary to connect any new dots that might come along. And won't for years to come.

"The archaic Automated Case Support system—which some agents have avoided using—is cumbersome, inefficient, and limited in its capabilities, and does not manage, link, research, analyze, and share information as effectively or timely as needed," Fine wrote. "[T]he continued delays in developing the VCF affect the FBI's ability to carry out its critical missions."

This past May, a month after it officially ended the VCF project, the FBI announced that it would buy off-the-shelf software at an undisclosed cost to be deployed in phases over the next four years. Until those systems are up and running, however, the FBI will rely on essentially the same combination of paper records and antiquated software that the failed VCF project was supposed to replace. The only recent addition has been a new "investigative data warehouse" that combines several of the FBI's crime and evidence databases into one. It was completed as the VCF started its final slide into oblivion. In addition, the FBI recently digitized millions of its paper documents and made them available to agents.

(Excerpt) Read more at spectrum.ieee.org ...


TOPICS: Crime/Corruption; Foreign Affairs; Government; Technical; War on Terror
KEYWORDS: abledanger; atta; fbi; government; technology; terorism
This is a lengthy article...but I have excerpted what I consider a key section...to keep filed away for future reference when the Able Danger hearings get under way.

If you have read and followed the numerous threads on AD, you will note that I keep getting back to an important point...this computer program worked, and worked exteremely well...and yet... somebody apparently decided to not only erase all the data generated by the program, but also to erase the programs SOURCE CODE, and DOCUMENTATION as well. We will find out who, when, and why when the hearings get under way.

As I have maintained, IMHO, this is non-routine destruction of government property, and a loss of a valuable technology resource, which was paid for by the American taxpayer.

If you read this article, you will see that many software development programs run by the government (its all governments...not just the Feds) do not produce software that works nearly as well as AD apparently did. This is why..aside from what AD may have produced in the way of incriminating associations...the destruction of the program technology, technology that according to this article... the FBI DOES NOT YET HAVE AT THE PRESENT TIME , is in my mind a scandel, and needs to be answered for.

1 posted on 09/11/2005 5:08:29 PM PDT by Dat Mon
[ Post Reply | Private Reply | View Replies]

To: Peach; Enchante; ravingnutter; johnny7; george76
ping FYI
2 posted on 09/11/2005 5:11:07 PM PDT by Dat Mon (still lookin for a good one....tagline)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dat Mon

An excellent post and I'm quite certain you are correct...that the destruction of this government property is most certainly not routine.


3 posted on 09/11/2005 5:22:34 PM PDT by Peach (South Carolina is praying for our Gulf coast citizens.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Peach

Maybe the data they collected pointed to high elected officials getting illegal payoffs from foreign governments. And that's the real reason why the program was scrubbed and data destroyed. And it left us vulnerable.


4 posted on 09/11/2005 5:51:22 PM PDT by i_dont_chat (Our President's intervention saved lives.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Dat Mon

There are several scandals here. One is why the FBI still does not have (apparently) the capability that Able Danger had way back in 2000. The related scandal is why AD source code was (apparently) destroyed when it would have been invaluable to a wide variety of counter-terrorism agencies. Another scandal is why the FBI persists to believe it has any competence at all to oversee software development and project management for IT. Sounds like it has burned through a lot of tax dollars with nothing to show for it.... and we are still years away from having adequate database software for the FBI and our national security. What a mess!


5 posted on 09/11/2005 6:15:39 PM PDT by Enchante (Don't put up with Michael Moore-on's slanders anymore!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dat Mon

Thank you.


6 posted on 09/11/2005 6:36:02 PM PDT by george76 (Ward Churchill : Fake Indian, Fake Scholarship, and Fake Art)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Dat Mon

Able Danger and this FBI turkey were completely different projects.

From the scanty reports, it sounds like Able Danger was put together as a data mining application by people who were also expert in its use.

In the FBI project, agents who were IT neophytes dictated requirements to the application developers who more or less took them at face value, even as they continued to change far into the project. This is always the kiss of death. Never give the users what they say they want. Understand the users well enough to give the users what they need and more than they expect within the constraints of time and budget.


7 posted on 09/11/2005 7:08:58 PM PDT by Lessismore
[ Post Reply | Private Reply | To 2 | View Replies]

To: Lessismore
Everyone understands that Able Danger and the VCF were completely different programs.

Thats exactly my point!

From the article....

"So what did the FBI get out of the VCF's last gasp? "We harvested some of the good work from the past," the FBI project manager told me. "We focused that into a pilot. We tested that life-cycle development model of Zal's, and that is a valid, repeatable process. And now we're in a good position to move on."

Thats what they should have done with the guts of AD...but somebody apparently decided to destroy government property and make it unavailable to ANYONE in the counter-terrorism business.

It seems reasonable to suppose that the FBI could have taken the guts of the Able Danger data mining and analysis modules, built a different front end and back end per FBI requirements, and used that as a basis for the VCF program.

I think they probably could have had a working system up and running by now. Much of the money spent so far on VCF could have been spent getting all of the voluminous paper data they have accumulated into the system, and establishing their own open source data entry points. This would allow them to create their own terabytes of background data as AD did to process.

JMHO of course.
8 posted on 09/11/2005 7:46:30 PM PDT by Dat Mon (still lookin for a good one....tagline)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Dat Mon
We tested that life-cycle development model of Zal's, and that is a valid, repeatable process. And now we're in a good position to move on.

What this basically says is that all the code was crap, and they learned some lessons about software engineering and project management methodology. Not much of a salvage job.

As far as I can tell, Able Danger was never used by a large community, while VCF was intended to be used by a large number of field agents, maintain a case data base, and implement a complex workflow with secure communications, approvals, routing, etc.

It's not clear what technology was in Able Danger. Possibly it didn't actually belong to the government.

9 posted on 09/11/2005 8:09:21 PM PDT by Lessismore
[ Post Reply | Private Reply | To 8 | View Replies]

To: Dat Mon
"this computer program worked, and worked extremely well"
It worked so well in fact that it probably exposed a lot of
people other than terrorist. It's possible that it connected the dots on a whole corrupt administration. Wonder what documents Sandy Burgler destroyed or is he keeping them in a safe place to stay alive. If completely exposed this scandal
may make oil for food a mole hill. Just like the Cox report
this will fade away.
10 posted on 09/11/2005 9:06:37 PM PDT by PositiveCogins
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dat Mon

Bump


11 posted on 09/12/2005 2:16:13 AM PDT by enots
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dat Mon

SAIC still has the source code, the program was a piece of meat, and the Government could never agree on what the software was suppose to do. From an IT perspective it was doomed to fail because of the Feds constantly changing the requirements.

"Lost amid the recriminations was an early warning from one member of the development team that questioned the FBI's technical expertise, SAIC's management practices, and the competence of both organizations. Matthew Patton, a security expert working for SAIC, aired his objections to his supervisor in the fall of 2002. He then posted his concerns to a Web discussion board just before SAIC and the FBI agreed on a deeply flawed 800-page set of system requirements that doomed the project before a line of code was written. His reward: a visit from two FBI agents concerned that he had disclosed national security secrets on the Internet."

Source: http://www.spectrum.ieee.org/WEBONLY/publicfeature/sep05/0905fbi.html


12 posted on 09/12/2005 5:44:47 PM PDT by TheFrog
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dat Mon

"If you read this article,"

Page is no longer available.


13 posted on 09/14/2005 12:04:10 AM PDT by strategofr (What did happen to those 293 boxes of secret FBI files (esp on Senators) Hillary stole?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dat Mon

"It seems reasonable to suppose that the FBI could have taken the guts of the Able Danger data mining and analysis modules, built a different front end and back end per FBI requirements, and used that as a basis for the VCF program."

I agree. I have felt for years that a data warehouse was the cost effective way to solve the FBI problem, which hinges on incompatible data. And I am not even an IT person, just a person interested in reading IT ideas!

Personally, I think the FBIs incompetence has been on the level of criminal for a long time in national security-related issues. They completely blew their counterintelligence function in the Cold War. They actually treated valuable Soviet defectors from the KGB, GRU, etc. as "bad people" and gave them the "cold shoulder"!

The bottom line is, we need an MI5 (independent counterintelligence agency) like Britain. Bush blew it after 9-11 in that regard. What we needed was splitting---not consolidation. FBI is a domestic law enforcement agency---period.

Now, the CIA is getting into domestic stuff to cover the FBI weakness. The British system is much better.


14 posted on 09/14/2005 12:11:05 AM PDT by strategofr (What did happen to those 293 boxes of secret FBI files (esp on Senators) Hillary stole?)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Dat Mon

Send the entire FBI out to the parking lot. Call in the Agents you need each day by name. After 30 days of doing this, send home those remaining in the parking lot who have not been called.


15 posted on 09/20/2005 7:32:48 PM PDT by NetValue (No enemy has inflicted as much damage on America as liberals.)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson