Verified Document

Zalmai Azmi, The FBI's Chief Information Officer Case Study

Zalmai Azmi, the FBI's chief information officer for the last year realized the need for change, even if it would garner political heat, and decided to implement changes to the organization known as the FBI. The change was related to the growing innovation behind technology and the September 11th attacks. The FBI's technological upgrade has been seen by some as lacking efficacy and reliability. Software dilemmas appear to be piling up. The FBI effectively abandoned its custom-built Internet surveillance technology, code name, Carnivore. This software was designed to read e-mails and other online communications in relation to suspected criminals, terrorists and spies, according to bureau oversight reports submitted to Congress. To remedy the failure of the software, the FBI decided to switch gears and use an unspecified commercial software to eavesdrop on computer traffic where they would pay ISPs to monitor and wiretap their customers, the customers the FBI believes are criminals. As 2002 and 2003 rolled to a close, a toals of thirteen wiretaps were performed without the use of Carnivore which was later renamed: the DCS-1000. Ironically the FBI once said Carnivore outperformed commercial software when in reality, the use of commercial software put Carnivore out of use. From 1998-2000, Carnivore was only used twenty five times.

Each time the FBI makes a mistake with their software inventions, the amount used to pay for it became disclosed. Experts outside of the field suggested the amount per failed experiment was $6-$15 million. Acts like the U.S. Freedom of Information Act allowed groups like the Washington-based Electronic Privacy Information Center, a civil liberties group, to obtain information on the flunked sofware since it was first known in 2000. Bresson, the director of the FBI defended the FBI's decision to use commercial software to wiretap by stating the need for the government to reduce spending and the commercial software becoming unnoticeable by its subscribers.

The backlash from the public from the new information prompted the FBI to revisit a once hoped for solution to data collection and criminal case management, and resurrect the $'170 million dollar baby. Some experts sympathized with the FBI's inability to match the technological growth of the private sector stating the FBI's at first assumed the private sector technology was subpar. Realizing the technology expanded and evolved beyond its scope is what made the descend all the more difficult said Henry H. Perritt Jr., who led an oversight study of Carnivore in 2000.

One of the reasons the FBI was so disinterested in the technolgy the private sector had intially was the possiblity of having their staff not fufill their orders effectively because of lack of communication through some glitch in the system due to faulty private sector sofware. Donald Kerr, who later became CIA's chief gadget-maker said with enthusiasm that Carnivore was ar better than any private sector software. Ironically private sector software took Carnivore's place. So underestimation of private sector software and overestimation of Carnivore's abilities led to the decline of the overall use of FBI generated software.

FBI Virtual Case File = Total Disaster

2.

Background

Due to the attacks of 9/11, the 9/11 commission felt the need to modernize the FBI information network. The modernization failed due to the need for workers to sign, write, and scan by hand the documents into the system daily. Director Robert Mueller of the FBI himself declared the inefficacy of the system upgrade implementation.Another major contributor to the dissatisfaction was the delay in deploying the system to 100%. Only 10% was used y 2004, a far cry from the initial promise of progress. Along with lack of full deployment, lay the hundred of millions of dollars spent on implementing the upgrade (or lack there of).

People like Mueller expressed the country's need for an upgraded system in comparison to the CIA and the NSA, but saw the inherent futility in the flawed system. A major flaw in the FBI's Trilogy technology upgrade program was its utter lack of security and efficacy. A system needs to be secure for it to possess the ability to allow users to share terrorist related information. The program or Virtual Case File system not only was the lackluster centerpiece of the installment, but also cost a whopping $170 million. After the 9/11 attacks, information sharing became priority. Because of the FBI's IT systems outdated nature, people declared a need for improvement leading to a rush to modernize the netowork and create the flawed Virtual Case File.

Background on the building of the Virtual Case File...

They also hired Aerospace Corp. To advise on tweeking and fixing any problems the project may have and if it could be salvaged. The major issues surrounding the beginning stages of the project was the step implementation process. They used "less-risky, incremental, phased-in" deployment rather than all at once. The FBI also had too many managers on the project, which started in 2001 allowing for control of the program to dilute between to much staff. The lac of focus and communication between the large number of managers allowed for the project to lack proper setting of system requirements.
Another reason why they say the Virtual Case File system became so flawed is because the FBI and its contractors could not keep up with the speed of new technology. Trilogy began at a point where certain technologies later on didn't exist. Aerospace Corp, the company sent to advise about the project, determine whether or not to shelf the project or bring in other software that would make the job of information sharing easier for the FBI. Congress, determined to update the FBI's system, allowed for the allocation of billions of dollars in additional funding. The upgrade cost them as of late $581 million. The software problems are expected to begin debates whether or not the FBI is using the additional funding responsibly or not. In order to determine whether the project could be salvaged, they began a series of independent studies knowing it would be a waste and cost more money if they went with new software.

3. Description of the use of existing information systems

"It was late 2003, and a contractor, Science Applications International Corp. (SAIC), had spent months writing 730,000 lines of computer code for the Virtual Case File (VCF), a networked system for tracking criminal cases that was designed to replace the bureau's antiquated paper files and, finally, shove J. Edgar Hoover's FBI into the 21st century. "(Eggen, D. And Witte, G. 2006) The FBI in the past admitted the Virtual Case File technology was a complete loss because it had failed to meet the bureau's requirements. They confessed the time and money put into the project was wasted.. SAIC and Mueller shared the blame. The reason for the loss, in regards to the inefficacy of the project, was in part due to the tremendous pressure placed upon the FBI after the attacks made on September 11, 2001. "This was both SAIC and the FBI all going to the sounds of the gun with our heads down on a very ambitious, high risk, highly concurrent project,"(Frieden, T. 2005) SAIC Executive Vice President Arnold Punaro told reporters.

In order to see if the VCF had anything that could be of use or be salvaged, the FBI established a short-term project in its New Orleans office. To continue performing their duties, the FBI chose to explore and possibly buy commercially available software or private sector software. A couple of the reasons for the problems began with the change in the FBI's prime mission from criminal investigations to preventing terrorism, inadequate management choices early in the project, and poor oversight for the budget. The FBI's poor performance in commuication regarding counterterrorism and data sharing and analyzing in general led to the many tecnological shortcomings viewed by the country.

Mueller's testimony showed the frustration the bureau had with itself and the documented waste of taxpayer money. The Fbi did attempt to alleviate the situation by stating their efforts in sharing information with the Investigative Data Warehouse program. The program provides "agents, intelligence analysts, and members of Joint Terrorism Task Forces with access to 47 sources of counterterrorism data, including information from FBI files, other government agencies and open-source news feeds."(Frieden, T. 2005) Although the program made some progress in the FBI's need to share data effectively, the inspector general states it was not enough to fufill full capability. The reasons behind this are the program's inability to manage case workflow and it being a poor substitute for effective case management.

The program deals and sorts through information by assigning priority: "Counterterrorism information collected by agents gets top priority and is entered into the warehouse system within 24 hours. Information dealing with such matters as violent crime, organized crime, fraud and other white-collar crime may take days to be shared throughout the law enforcement community, according to an FBI official." The program in essence was meant to give access to agents a wealth of data concerning criminal activities in…

Sources used in this document:
References

Alsikhan, M. (2013) Who Killed the Virtual Case File? By Mohanad Alsikhan. [online] Available at: http://malsikhan.net/?p=12 [Accessed: 23 Apr 2013].

Dizard, W. (2005) Sentinel project to replace FBI's abandoned Virtual Case File effort -- GCN. [online] Available at: http://gcn.com/articles/2005/05/13/sentinel-project-to-replace-fbis-abandoned-virtual-case-file-effort.aspx [Accessed: 22 Apr 2013].

Eggen, D. And Witte, G. (2006) The FBI's Upgrade That Wasn't. [online] Available at: http://www.washingtonpost.com/wp-dyn/content/article/2006/08/17/AR2006081701485.html [Accessed: 23 Apr 2013].

Emeraldinsight.com (1988) Untitled. [online] Available at: http://www.emeraldinsight.com/bibliographic_databases.htm?id=1592700&show=abstract [Accessed: 24 Apr 2013].
Frieden, T. (2005) CNN.com - Report: FBI wasted millions on 'Virtual Case File' - Feb 3, 2005. [online] Available at: http://www.cnn.com/2005/U.S./02/03/fbi.computers / [Accessed: 22 Apr 2013].
Goldstein, H. (2005) Who Killed the Virtual Case File? - IEEE Spectrum. [online] Available at: http://spectrum.ieee.org/computing/software/who-killed-the-virtual-case-file [Accessed: 24 Apr 2013].
Jorvigconsulting.com (2005) FBI's Virtual Case File Project Analysis. [online] Available at: http://jorvigconsulting.com/newsletter/oct_05.htm [Accessed: 25 Apr 2013].
Mehta, A. (2011) A vote of confidence for Mueller, but the same old computer problems for the FBI. [online] Available at: http://www.publicintegrity.org/2011/05/17/4627/vote-confidence-mueller-same-old-computer-problems-fbi [Accessed: 23 Apr 2013].
Mochal, T. (2005) Avoid these common causes for project failure | TechRepublic. [online] Available at: http://www.techrepublic.com/article/avoid-these-common-causes-for-project-failure/5760615 [Accessed: 22 Apr 2013].
Mueller, R. (2005) FBI's Virtual Case File System Testimony. [online] Available at: http://www.fbi.gov/news/testimony/fbis-virtual-case-file-system [Accessed: 24 Apr 2013].
New York Times (2004) F.B.I. SEES DELAY IN NEW NETWORK TO OVERSEE CASES - New York Times. [online] Available at: http://www.nytimes.com/2004/06/26/us/fbi-sees-delay-in-new-network-to-oversee-cases.html [Accessed: 22 Apr 2013].
Scott's Blog (2006) Aftermath: The Failure of Virtual Case File. [online] Available at: http://knot.org/scottlaw/blog/?p=286 [Accessed: 25 Apr 2013].
Sebokwiki.org (2000) FBI Virtual Case File System Case Study - 1.0.1 Sebokcase. [online] Available at: http://www.sebokwiki.org/1.0.1/index.php?title=FBI_Virtual_Case_File_System_Case_Study [Accessed: 23 Apr 2013].
strategicppm (2010) The Failure Of The FBI's Virtual Case File Project. [online] Available at: http://strategicppm.wordpress.com/2010/04/05/the-fbis-virtual-case-file-project-and-project-failure / [Accessed: 25 Apr 2013].
Cite this Document:
Copy Bibliography Citation

Related Documents

FBI and Witness Protection the
Words: 4925 Length: 15 Document Type: Term Paper

Even thenm once in a while the heads of the more powerful families would meet to work out differences (Meltzer, 1990, pp. 40-41). Still, striking at the mob could not be effected easily by the use of normal investigative methods alone. Indeed, the failure of the FBI to use even those methods in a concerted manner is noted by Kessler (2002), who reports that Hoover usually claimed that the FBI

FBI Case Study the Primary
Words: 630 Length: 2 Document Type: Case Study

However, the Academy of Sciences definition of the term enterprise architecture also extends beyond mere IT architecture, although such architecture will certainly support the Academy's definition. This definition denotes "a detailed characterization of the bureau's goals, tasks, strategies, and key operational processes" (National Academy of Sciences, 2004). These objectives would then be facilitated by IT solutions it implement them. One of the most important lessons learned in this particular case

FBI Has No Hard Evidence
Words: 2147 Length: 6 Document Type: Research Paper

Regardless of these facts, the media failed to put arguments such as these on the front page of the paper because of the control the Administration had on the media channels at the time. It is rather difficult to say the extent to which the independent or small town media actually covered the stories, with its details and discoveries. The internet search can prove more useful, but for the aim

FBI Drugs and WMDs
Words: 3378 Length: 11 Document Type: Research Paper

Introduction The USS Cole Bombing in October 2000 was a prelude to the intense focus on the spread of weapons of mass destruction (WMDs) that the FBI took up in earnest one year later in the wake of and in response to 9/11. With the killing of several crewmen and the wounding of several more, the USS Cole Bombing was in reality just one more terrorist incident in an already growing

FBI Data and Sexual Homicide
Words: 730 Length: 2 Document Type: Research Paper

Criminal Justice Issues Since there is no official legal definition of sexual homicide, therefore sexual homicide cannot be truly characterized as criminal behavior. Reaction Although there is no specific legal definition for sexual homicide, homicides that are listed as "criminal" include the killing of humans by either murder or manslaughter, so a closer look at what "sexual homicide" really refers to is warranted. In the book Sexual Murder: Catathymic and Compulsive Homicides, Louis

Looking Into FBI Vs Apple in Relation to the Patriot Act
Words: 3274 Length: 10 Document Type: Essay

FBI vs. Apple in Relation to the Patriot Act America is divided over the tradeoff between personal privacy and security needs. The focus is, now, on the government surveillance, but there are concerns over how data is being used by businesses. The issue was raised after the federal court was requested to force Apple to assist the FBI to unlock one of the phones used by a suspect in the terrorist

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now