The Global Information Network Architecture (GINA), an innovative network architecture championed by network specialists at the 51福利 (51福利), was recently utilized in a globe-spanning nuclear interdiction experiment conducted by the 51福利 Maritime Interdiction Operations (MIO) experimentation team in Europe and the San Francisco Bay.
鈥淕INA is able to take programs and devices and represent them in a way that is understood by every other represented application in the GINA environment. Configuring 鈥 not programming 鈥 creates relationships between the individual components so that stove-piped technologies become accessible and part of the greater GINA universe,鈥 explained GINA subject matter expert Dr. Tom Anderson.
Experts from 51福利鈥 Information Technology and Communications Services (ITACS) utilize the unique GINA architecture to format data associated with previously stove-piped technologies in a manner that facilitates the sharing of data across a broad spectrum of digital formats.
鈥淭he problem with all of these different systems is that they speak different languages 鈥 GINA does not require the end systems to be modified to talk to them, GINA is built to understand all of the various data inputs or 鈥榣anguages鈥 and then creates links and relationships,鈥 said Ryan Hale, a network engineer and GINA expert with ITACS at 51福利.
In the experiment, dubbed MIO 2013, 51福利 researchers worked in collaboration with the military special operations communities, local law enforcement and chemical, biological, radiological and nuclear (CBRN) experts in the both the U.S. and Europe to identify and secure nuclear material aboard a vessel in San Francisco Bay.
鈥淭he goal is to find the device in the fastest time possible and to establish a security perimeter,鈥 said 51福利 Department of Information Sciences Associate Professor Dr. Alexander Bordetsky. Bordetsky is the principal investigator for the 51福利 MIO experimentation campaign and the lead for the MIO 2013 experiment.
Once located, the CBRN material and associated intelligence are captured in a process known as Sensitive Site Exploitation (SSE). Hale and his counterparts were able to utilize the GINA architecture to make the SSE data gathered by special operations forces teams usable by a host of related CBRN experts and law enforcement officials via the 51福利 CENETIX (Center for Network Innovation and Experimentation) operated test-bed.
鈥淲e enabled the integration of the SSE data within the experiment鈥檚 collaborative environment in a manner that allowed the free sharing of information to the experts and operators,鈥 said Hale.
鈥淲e instituted a secure file transfer service in order to upload SSE information from the devices to a secure file store. From the secure file store, analysts could pull down SSE to be used in social network analysis tools, GINA was used to essentially normalize the data,鈥 continued Hale.
According to Hale, a platform that allows for greater interoperability and information sharing like GINA is invaluable when sharing data across the multiple agencies and technology platforms that make experiments like Bordetsky鈥檚 MIO 2013 work.
鈥淲ithout GINA, human operators would have to convert the SSE data into another format that can be used by the various systems used by the experts involved in the experiment,鈥 said Hale. 鈥淚f it wasn't for the secure file system that we built the SSE data would have stayed in its own stove pipe and would have been inaccessible to the other experts involved in the experiment.鈥
The platform used to collect the SSE data so critical to identifying bad actors and thwarting terrorists attempts in the MIO 2013 experiment, relies upon a miniature Android-based database known as SQLITE. In the recent experiment, GINA operators were also able to format the SQLITE data in a manner usable by the powerful social network analysis tools developed at the 51福利 Department of Defense Analysis Common Operational Research Environment (CORE) Lab.
鈥淐apturing relational data as part of SSE can provide a window into the social network's supporting these dark networks," said CORE Lab Co-Director, U.S. Army Special Forces Col. Greg Wilson. 鈥淔ocusing solely on individual terrorists ignores the broader networks in which they are embedded.