SlideShare una empresa de Scribd logo
1 de 15
Corporate Overview
Company Overview
    Outstanding, mission-centric past performance at the intersection of Intelligence and
                                     Law Enforcement
High performing, cost effective, high end, proven small business
    Founded in 2005 by successful industry veterans & entrepreneurs
    Awarded past performance at FBI and TSA
    SECAF finalist for excellence

Cleared, professional workforce
     100% TS/SCI
     66% have advanced degrees
     Average 15 years of experience
     47% veterans

Consulting, analysis, and advisory services exclusively to the national security community
   Organizational Planning and Program Management
   Business Architecture and Analysis
   Technology Management
   Intelligence Processing and Data Exploitation Expertise
Impact of Services

        Mission effectiveness & optimization

        Reduced decision-making timelines

        Coordinated operations

        Cost & mission effective technology

        Measured performance to drive continuous
         improvement

        Alignment of strategy & operations

        Situational Awareness

        Sound financial management
Proven National Security Performance
Market Discriminator:
Intelligence Processing and Data Exploitation
                    Subject matter expertise in intelligence
                     fusion/processing—both strategy & process
                    Significant hands-on experience developing &
                     enhancing operational analytical capability with
                     tools in production environments
                     (NCTC, FBI, TSC, TSA)
                    Data exploitation and analysis concept
                     development & program management (FBI)
                    Developed and manage requirements engineering
                     program for analytical tools and operational
                     enterprise data warehouses (FBI, TSC, TSA)

                    Relationships with commercial data providers and
                     software companies (Dun & Bradstreet, Thomson
                     Reuters) to create new sources for exploitation and
                     use in commercial tools (e.g. Palantir)
                    Community liaison for joint intelligence programs
                    Currently develop curriculum and train usage of
                     geospatial systems for analysis throughout the FBI
Case Study – National Security Mission Expansion
               to Counterterrorism Task Force

MISSION
    Plan, design, and help execute a high visibility National Security mission expansion to DOJ Counterterrorism
    Task Force

APPROACH
   Programmatic – Supported: Identification and acquisition of new information and intelligence streams for
    new mission areas; privacy Impact Assessments; funding requests, budget justification, resource planning,
    schedules, etc.
   Analytic Operations Planning – Lead contractor to assess National Security gaps, intelligence
    requirements, and threats to transition from concept phase to design phase of mission expansion.
   Analytic Process Conceptualization and Prototyping – Coordinated and supported the design, testing,
    and implementation of numerous analytic methodologies and processes to address the gaps and threats
    identified above.
   Analytic Operations Implementation– Authored overall Concept of Operations document; helped enhance
    analytic process effectiveness and efficiency; identification of areas for improvement; training, etc.

OUTCOME
   Initial Operations Capability achieved on-time, on-budget
   Resulting operations have been recognized at the highest level (ODNI Exceptional Achievement Medal),
    and are being adopted by other parts of the Task Force, and are recognized as a best-practice in the FBI.
Case Study – FBI Counterterrorism Task Force


MISSION
Facilitate and expedite information technology support of priority analytical requirements and provide executive staff support

APPROACH
     Programmatic – Develop, advise on, and execute plans, programs, processes, and policies to manage task force
      operations, administration, and communications. Conduct outreach and liaison with U.S. intelligence and law
      enforcement and foreign government partners to create synergies and identify emerging technologies and alternative
      analysis techniques.
     Governance & Requirements Management – Establish uniform process to validate, approve, prioritize and resource
      requirements. Develop enterprise strategies to support FBI programs leveraging proprietary information systems to
      proactively target threats to National Security.
     Strategy & Process Improvement – Embed Business Analysts within operational units to anticipate and translate
      functional requirements. Research and develop analytic solutions from multi-channel All-Source data to address
      enterprise-level intelligence gaps across national security program areas including the counterintelligence,
      counterterrorism, and weapons of mass destruction missions.

OUTCOME
     An enterprise metrics program, developed and managed by IWS, is used by Task Force leadership and FBI
      Headquarters executive management to make operational and administrative decisions. Recognized by FBI Director
      as best low-cost metrics solution.
     An Outreach program developed and managed by IWS provides tools and methods training to FBI Field Offices
      throughout the U.S., increasing awareness of capabilities that improve counterterrorism analysis.
     Tight alignment between software functionality and mission needs that reflects actual requirements and the
      organizational and individual user-level. Development of innovative strategies that direct precious information
      technology resources according to current operational priorities. Operational requirements are well understood,
      documented, traceable and prioritized to align with organizational objectives.
Case Study – FBI National Security Branch
                       IT Portfolio Management

MISSION
    Provide objective program oversight and provide logical solutions to complex business problems in support of
    National Security Branch–wide Information Technology (IT) needs.

APPROACH
   Programmatic – Collect and analyze IT requirements across six major divisions, providing
    recommendations that ensure limited budgetary and personnel resources are directed toward capabilities
    that best support operational needs and objectives.
   Strategy & Process Improvement – Develop and implement standardized IT management processes
    across all component divisions of the National Security Branch, ensuring alignment with operational goals
    and enterprise lifecycle management policies.
   Training – IWS serves as the primary contract instructor for development and delivery of geospatial
    intelligence analysis training; train FBI intelligence analysts and Special Agents nationwide.

OUTCOME
   Ensured and enforced consolidated IT project management, appropriate allocation of IT resources and
    deployment of capable and operationally suited analytic tools. The most recent example is the deployment of
    the Palantir analytic platform, which has fostered substantial cross-organizational collaboration with the
    USIC, and has led to opening several new investigative cases.
   New and innovative geospatial analysis training program that has led to FBI personnel achieving
    basic/advanced certifications in geospatial intelligence tools.
Case Study – FBI National Security Branch
                                 Establishment

MISSION
    Provide management support to develop and operate National Security Branch business processes.


APPROACH
   Strategy Development– IWS assisted in the development of the Strategic Plans for the National Security Branch and the
    Weapons of Mass Destruction Directorate
   Programmatic - IWS experts have been instrumental in responding to critical inspections and Director’s office business and
    strategy initiatives at the Directorate of Intelligence, and created enterprise-wide, standardized processes for the budget
    development cycle for budget submissions for both the National Intelligence Program (NIP) and the FBI’s Spring Planning
    Estimate (SPE).
   Business Analysis – IWS regularly performs analysis and helps to develops processes required to respond to requirements
    from ODNI, FBI Executive Management and Finance, and DOJ.
   Process Improvement – IWS ensures that the Intelligence Budget Planning Submission (IPBS) and the Congressional
    Budget Justification Book (CBJB) are properly coordinated with all FBI divisions responsible for executing NIP funds, and
    provides key liaison with the FBI Finance Division to ensure coordination with the SPE Budget Submission through DOJ.


OUTCOME
   IWS provided direct liaison support to the IC and developed improved processes for acquiring Intelligence Product feedback,
    helping to identify best practices and establishing a customer feedback working group.
   Significantly improved training program efficiencies and participated in the initial development of career paths for special
    agents and intelligence analysts. IWS analysis led to a reallocation of resources and savings of over $4 million
   Consistently recognized for content input and evaluation for internal and external reviews of all National Security budgetary
    requests.
   Received FBI Program Management and Support Services Contract Extraordinary Contributor Award
Case Study – FBI Enterprise System
                           Business Management Support

MISSION
    Establish an environment for maturing and growing a critical data warehouse initiative into a proactive,
    strategic, well-managed, user- and mission-focused enterprise program

APPROACH
   Business Process Improvement – Design, implement and manage new business processes leveraging existing tools,
    technology, and personnel, allowing the operational business manager to gain visibility and control over program efforts.
   User Advocacy & Outreach – Establish relationships with enterprise users, leveraging adhoc user groups to assist in identifying
    critical system requirements, supporting design reviews, and user acceptance testing, as well as enhancing user support and
    training.
   Governance & Requirements Management – Institute a requirements management framework and workflow that moves
    enhancement requests through analysis, prioritization, technical assessment, development, and deployment to the enterprise.
   Analysis of Tech Solution Alternatives – Provide early, iterative, user- and mission-focused design reviews to flesh out best-
    bang solutions among various technical alternatives; factor these into both near- and long-term architecture planning and fiscal
    year programmatic planning.


OUTCOME
   System utilization has more than doubled (to > 10,000 users), becoming the 2nd most utilized system across the entire FBI.
   Program planning efforts are aligned to mission and user priorities.
   User feedback indicates a strong sense of community ―ownership‖ across the enterprise.
   Risks of budget constrained environment have been reduced through identification of best value enhancements.
   Detailed prioritized requirements and enhanced business processes with the technical team are driving significant enhancements
    in application, data, and search architectures.
Case Study – TSA Secure Flight


MISSION
    Migrate watch list matching from the aviation industry to the USG, spanning roughly 2M passengers daily

APPROACH
   Strategy & CONOPS – Re-base-lined the program’s ConOps, balancing list matching and operational best
    practices with sound compliance, privacy, and redress programs
   Business Architecture – Implemented a Business Architecture Team that focuses on the implementation of
    solutions spanning process, technology, and human capital.
   Requirements – Deployed a Release and Requirements Management practice ensuring the ―right
    capabilities were deployed first‖.

OUTCOME
   Deployed (i.e., migrated) the first aircraft operator on 1/15/2010
   Completed all domestic carrier migrations to Secure Flight on June 22, 2010 and all international carriers to
    Secure Flight on November 23, 2010.
   Saw a significant improvement in the identification of known or suspected terrorists (vs. the legacy aviation
    industry’s practices).
   Key contributor to the government winning a GCN award for IT achievement
Case Study – FBI Terrorist Screening Center (TSC)


MISSION
Direct Support to Leadership in establishment of TSC Initial Operating Capability, Development of Strategic Plans, Business Architecture and
Requirements Group, Total Life Cycle Management, Enterprise Architecture, Governance and Portfolio Management. Advanced Planning,
Design and Build-out of New Primary Facility and Continuity of Operations (COOP) Sites.

APPROACH
     Strategic – IWS employee acted as advisor to first Director and Deputy Director of the TSC, assisting in the establishment of initial
      organizational plans, technology capabilities, and operations processes. Liaison to the IC on behalf of TSC.
     Programmatic – Developed TSC EA framework, Capital Investment Strategy, and Life Cycle Management Processes, then utilized
      them to build out TSC’s new facility. Built project scope awareness through concise set of requirements and conceptual visualization;
      Used EA as the basis for repeatable success process; Acted customer advocate and trusted agent for the construction projects;
      correlated operational scenarios and program requirements to organization vision
     Technical Integration – IWS built TSC’s Business Analysis team processes and procedures. Assisted in the development of the
      Terrorist Screening Database (TSDB) as operations user advocates. Information Technology (IT) collaboration processes led to
      comprehensive facilities integration from outside cable plant all the way to the customer desktop systems; delivery of standards-based,
      compliant technology that is integral, secure, reliable and available in new facility.
     Budget, Planning & Procurement – Full life-cycle support; from conceptual planning, budgeting, design through procurement ,
      installation and sustainment; Capital Planning approach aligned and prioritized investments to mission and strategic objective,
      leveraged during all budget build and execution reviews


OUTCOME
     Initial Operating Capability of TSC and TSDB.
     State-of-the-art facilities, significantly improved IT performance and operational work environments. Two piloted advanced technologies
      and several product enhancements are now Agency standards. All technology and related installation labor delivered on-time and in
      turnkey, end-to-end fashion. Affordable, highest priority solutions delivered per budget constraints; recognized by senior Facility
      stakeholder for outstanding performance and thoroughness.
     Life Cycle Management Plan, Enterprise Architecture and Governance approach recognized as a success model for mid-size
      organizations within the Agency
Case Study – Dun and Bradstreet
                      Data Integration and Exploitation

MISSION
    Develop Automatic Plug-in to D&B Global data providing enhanced data exploitation capability behind the
    firewall for use in classified intelligence analysis

APPROACH
   Technical Planning and Development – Build Web Portal mimicking DNB.Com search portal. Build
    automatic plug in (API) allowing multiple analytical tools to query and exploit D&B data.
   Information Exploitation – Build custom Palantir helper allowing analysts to query and import D&B data
    directly into Palantir and combine the D&B data with additional data sets.

OUTCOME
   Successful deployment of portal and D&B dataset to IC agency for enhanced analysis and discovery in
    support of operational goals.
   Successful deployment of D&B dataset, API and Palantir helper to Recovery and Transparency Board
    (RATB) evaluate program performance and make data-driven operational decisions
Trusted Small Business Partner




                       EMSolutions
Points of Contact

The IWS Advantage
IntelliWare Systems offers mission-focused management services that improve
organizational intelligence and effectiveness. As national security missions expand
and budgets contract, we cost effectively transform information into actionable
knowledge. We are operationally focused and dedicated to helping our clients meet
their complex mission requirements.




  Dom LaPore                                    Randy Lange
  President and COO                             Vice President of Client Services
  dlapore@intelliwaresystems.com                rlange@intelliwaresystems.com
  5608 Southpoint Centre Blvd                   2011 Crystal Drive
  Suite 100                                     Suite 400
  Fredericksburg, VA 22407                      Arlington, VA 22202
  540.604.9095                                  703.682.6946

Más contenido relacionado

La actualidad más candente

Ms 94 2018 solved assignment
Ms 94 2018 solved assignmentMs 94 2018 solved assignment
Ms 94 2018 solved assignmentPramodShaw6
 
Planning concept oiudb
Planning concept oiudbPlanning concept oiudb
Planning concept oiudbAboma Amsalu
 
Monitoring and evaluation of human rights projects
Monitoring and evaluation of human rights projectsMonitoring and evaluation of human rights projects
Monitoring and evaluation of human rights projectsInka Pibilova
 
Building Sustainable Accountability into Strategic RI Planning.
Building Sustainable Accountability into Strategic RI Planning. Building Sustainable Accountability into Strategic RI Planning.
Building Sustainable Accountability into Strategic RI Planning. Preston Healthcare Consulting
 
Managing IT projects by David Bustin
Managing IT projects by David BustinManaging IT projects by David Bustin
Managing IT projects by David BustinDavid Bustin
 
Maurice Bisau Ims Course Lugano Unhcr
Maurice Bisau   Ims Course Lugano  UnhcrMaurice Bisau   Ims Course Lugano  Unhcr
Maurice Bisau Ims Course Lugano Unhcrguest96ac6b
 
Monitoring And Evaluation
Monitoring And EvaluationMonitoring And Evaluation
Monitoring And EvaluationNick Nyamapfeni
 
Preparing a logical framework for your project
Preparing a logical framework for your projectPreparing a logical framework for your project
Preparing a logical framework for your projectKarzen & Karzen d.o.o.
 
King Truncated Resume
King Truncated ResumeKing Truncated Resume
King Truncated ResumeDallas King
 
Proposal writing resource logical framework-
Proposal writing resource  logical framework-Proposal writing resource  logical framework-
Proposal writing resource logical framework-tccafrica
 

La actualidad más candente (15)

Components of a monitoring and evaluation system
Components of a monitoring and evaluation system  Components of a monitoring and evaluation system
Components of a monitoring and evaluation system
 
Guidence M& E
Guidence  M& EGuidence  M& E
Guidence M& E
 
Ms 94 2018 solved assignment
Ms 94 2018 solved assignmentMs 94 2018 solved assignment
Ms 94 2018 solved assignment
 
Planning concept oiudb
Planning concept oiudbPlanning concept oiudb
Planning concept oiudb
 
Monitoring and evaluation of human rights projects
Monitoring and evaluation of human rights projectsMonitoring and evaluation of human rights projects
Monitoring and evaluation of human rights projects
 
BRResume_72516.doc
BRResume_72516.docBRResume_72516.doc
BRResume_72516.doc
 
Building Sustainable Accountability into Strategic RI Planning.
Building Sustainable Accountability into Strategic RI Planning. Building Sustainable Accountability into Strategic RI Planning.
Building Sustainable Accountability into Strategic RI Planning.
 
Managing IT projects by David Bustin
Managing IT projects by David BustinManaging IT projects by David Bustin
Managing IT projects by David Bustin
 
Maurice Bisau Ims Course Lugano Unhcr
Maurice Bisau   Ims Course Lugano  UnhcrMaurice Bisau   Ims Course Lugano  Unhcr
Maurice Bisau Ims Course Lugano Unhcr
 
Monitoring And Evaluation
Monitoring And EvaluationMonitoring And Evaluation
Monitoring And Evaluation
 
Monitoring and evaluation
Monitoring and evaluationMonitoring and evaluation
Monitoring and evaluation
 
PIP overview presentation
PIP overview presentationPIP overview presentation
PIP overview presentation
 
Preparing a logical framework for your project
Preparing a logical framework for your projectPreparing a logical framework for your project
Preparing a logical framework for your project
 
King Truncated Resume
King Truncated ResumeKing Truncated Resume
King Truncated Resume
 
Proposal writing resource logical framework-
Proposal writing resource  logical framework-Proposal writing resource  logical framework-
Proposal writing resource logical framework-
 

Destacado

#UnitedCVE: Countering Violent Extremism and Counter Narratives
#UnitedCVE: Countering Violent Extremism and Counter Narratives#UnitedCVE: Countering Violent Extremism and Counter Narratives
#UnitedCVE: Countering Violent Extremism and Counter NarrativesOnnik James Krikorian
 
Counterterrorism and Cybersecurity: Total Information Awareness
Counterterrorism and Cybersecurity: Total Information AwarenessCounterterrorism and Cybersecurity: Total Information Awareness
Counterterrorism and Cybersecurity: Total Information AwarenessNewton Lee
 
Checklist Communication Strategy Development
Checklist Communication Strategy DevelopmentChecklist Communication Strategy Development
Checklist Communication Strategy DevelopmentEwen Le Borgne
 
Developing a Communications Strategy for Your Nonprofit
Developing a Communications Strategy for Your NonprofitDeveloping a Communications Strategy for Your Nonprofit
Developing a Communications Strategy for Your NonprofitBig Duck
 

Destacado (6)

2016-06-28 CTP Update and Assessment
2016-06-28 CTP Update and Assessment2016-06-28 CTP Update and Assessment
2016-06-28 CTP Update and Assessment
 
#UnitedCVE: Countering Violent Extremism and Counter Narratives
#UnitedCVE: Countering Violent Extremism and Counter Narratives#UnitedCVE: Countering Violent Extremism and Counter Narratives
#UnitedCVE: Countering Violent Extremism and Counter Narratives
 
Counterterrorism and Cybersecurity: Total Information Awareness
Counterterrorism and Cybersecurity: Total Information AwarenessCounterterrorism and Cybersecurity: Total Information Awareness
Counterterrorism and Cybersecurity: Total Information Awareness
 
Indonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyIndonesia National Cyber Security Strategy
Indonesia National Cyber Security Strategy
 
Checklist Communication Strategy Development
Checklist Communication Strategy DevelopmentChecklist Communication Strategy Development
Checklist Communication Strategy Development
 
Developing a Communications Strategy for Your Nonprofit
Developing a Communications Strategy for Your NonprofitDeveloping a Communications Strategy for Your Nonprofit
Developing a Communications Strategy for Your Nonprofit
 

Similar a 2012 IWS Corporate Overview Updated 27 Sept 12

Gallardo_Resume_August_2016
Gallardo_Resume_August_2016Gallardo_Resume_August_2016
Gallardo_Resume_August_2016Greg Gallardo
 
Michelle M. Ogan - Resume
Michelle M. Ogan - ResumeMichelle M. Ogan - Resume
Michelle M. Ogan - ResumeMichelle Ogan
 
Anna Oste resume Sept2016
Anna Oste resume Sept2016Anna Oste resume Sept2016
Anna Oste resume Sept2016Anna Oste
 
Info-Tech Research Group & Boardroom Events Value Prop Presentation
Info-Tech Research Group & Boardroom Events Value Prop PresentationInfo-Tech Research Group & Boardroom Events Value Prop Presentation
Info-Tech Research Group & Boardroom Events Value Prop PresentationHilary Carney Badoian
 
Wiggins - Cover letter and resume Mar 2015
Wiggins - Cover letter and resume Mar 2015Wiggins - Cover letter and resume Mar 2015
Wiggins - Cover letter and resume Mar 2015John Wiggins
 
David Windsor - Resume BPO
David Windsor - Resume BPODavid Windsor - Resume BPO
David Windsor - Resume BPODavid Windsor
 
Semantics in the Enterprise: Roles & Capabilities
Semantics in the Enterprise: Roles & CapabilitiesSemantics in the Enterprise: Roles & Capabilities
Semantics in the Enterprise: Roles & CapabilitiesChristine Connors
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
Supplemental.PDF
Supplemental.PDFSupplemental.PDF
Supplemental.PDFJohn S.
 
John Anthony Painter
John Anthony PainterJohn Anthony Painter
John Anthony PainterJohn Painter
 
FORD-KEITH USAJOBS
FORD-KEITH USAJOBSFORD-KEITH USAJOBS
FORD-KEITH USAJOBSKeith Ford
 
Robert Freeman Resume Aug15
Robert Freeman Resume Aug15Robert Freeman Resume Aug15
Robert Freeman Resume Aug15Robert Freeman
 
Jeff Ganahl Intelligence Research Resume 14 June 15
Jeff Ganahl Intelligence Research Resume 14 June 15Jeff Ganahl Intelligence Research Resume 14 June 15
Jeff Ganahl Intelligence Research Resume 14 June 15Jeffrey Ganahl
 
EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]Luis Martín
 
EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]Luis Martín
 

Similar a 2012 IWS Corporate Overview Updated 27 Sept 12 (20)

Brian Voorhees Resume(4)
Brian Voorhees Resume(4)Brian Voorhees Resume(4)
Brian Voorhees Resume(4)
 
Sheppard Resume 2015 update
Sheppard Resume 2015 updateSheppard Resume 2015 update
Sheppard Resume 2015 update
 
Gallardo_Resume_August_2016
Gallardo_Resume_August_2016Gallardo_Resume_August_2016
Gallardo_Resume_August_2016
 
RBoursiquot Resume 4-24-2016
RBoursiquot Resume 4-24-2016RBoursiquot Resume 4-24-2016
RBoursiquot Resume 4-24-2016
 
Michelle M. Ogan - Resume
Michelle M. Ogan - ResumeMichelle M. Ogan - Resume
Michelle M. Ogan - Resume
 
cv_ current version_august2016
cv_ current version_august2016cv_ current version_august2016
cv_ current version_august2016
 
Anna Oste resume Sept2016
Anna Oste resume Sept2016Anna Oste resume Sept2016
Anna Oste resume Sept2016
 
Info-Tech Research Group & Boardroom Events Value Prop Presentation
Info-Tech Research Group & Boardroom Events Value Prop PresentationInfo-Tech Research Group & Boardroom Events Value Prop Presentation
Info-Tech Research Group & Boardroom Events Value Prop Presentation
 
Wiggins - Cover letter and resume Mar 2015
Wiggins - Cover letter and resume Mar 2015Wiggins - Cover letter and resume Mar 2015
Wiggins - Cover letter and resume Mar 2015
 
David Windsor - Resume BPO
David Windsor - Resume BPODavid Windsor - Resume BPO
David Windsor - Resume BPO
 
Semantics in the Enterprise: Roles & Capabilities
Semantics in the Enterprise: Roles & CapabilitiesSemantics in the Enterprise: Roles & Capabilities
Semantics in the Enterprise: Roles & Capabilities
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Supplemental.PDF
Supplemental.PDFSupplemental.PDF
Supplemental.PDF
 
John Anthony Painter
John Anthony PainterJohn Anthony Painter
John Anthony Painter
 
Michael Bowers Resume
Michael Bowers ResumeMichael Bowers Resume
Michael Bowers Resume
 
FORD-KEITH USAJOBS
FORD-KEITH USAJOBSFORD-KEITH USAJOBS
FORD-KEITH USAJOBS
 
Robert Freeman Resume Aug15
Robert Freeman Resume Aug15Robert Freeman Resume Aug15
Robert Freeman Resume Aug15
 
Jeff Ganahl Intelligence Research Resume 14 June 15
Jeff Ganahl Intelligence Research Resume 14 June 15Jeff Ganahl Intelligence Research Resume 14 June 15
Jeff Ganahl Intelligence Research Resume 14 June 15
 
EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]
 
EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]
 

2012 IWS Corporate Overview Updated 27 Sept 12

  • 2. Company Overview Outstanding, mission-centric past performance at the intersection of Intelligence and Law Enforcement High performing, cost effective, high end, proven small business  Founded in 2005 by successful industry veterans & entrepreneurs  Awarded past performance at FBI and TSA  SECAF finalist for excellence Cleared, professional workforce  100% TS/SCI  66% have advanced degrees  Average 15 years of experience  47% veterans Consulting, analysis, and advisory services exclusively to the national security community  Organizational Planning and Program Management  Business Architecture and Analysis  Technology Management  Intelligence Processing and Data Exploitation Expertise
  • 3. Impact of Services  Mission effectiveness & optimization  Reduced decision-making timelines  Coordinated operations  Cost & mission effective technology  Measured performance to drive continuous improvement  Alignment of strategy & operations  Situational Awareness  Sound financial management
  • 5. Market Discriminator: Intelligence Processing and Data Exploitation  Subject matter expertise in intelligence fusion/processing—both strategy & process  Significant hands-on experience developing & enhancing operational analytical capability with tools in production environments (NCTC, FBI, TSC, TSA)  Data exploitation and analysis concept development & program management (FBI)  Developed and manage requirements engineering program for analytical tools and operational enterprise data warehouses (FBI, TSC, TSA)  Relationships with commercial data providers and software companies (Dun & Bradstreet, Thomson Reuters) to create new sources for exploitation and use in commercial tools (e.g. Palantir)  Community liaison for joint intelligence programs  Currently develop curriculum and train usage of geospatial systems for analysis throughout the FBI
  • 6. Case Study – National Security Mission Expansion to Counterterrorism Task Force MISSION Plan, design, and help execute a high visibility National Security mission expansion to DOJ Counterterrorism Task Force APPROACH  Programmatic – Supported: Identification and acquisition of new information and intelligence streams for new mission areas; privacy Impact Assessments; funding requests, budget justification, resource planning, schedules, etc.  Analytic Operations Planning – Lead contractor to assess National Security gaps, intelligence requirements, and threats to transition from concept phase to design phase of mission expansion.  Analytic Process Conceptualization and Prototyping – Coordinated and supported the design, testing, and implementation of numerous analytic methodologies and processes to address the gaps and threats identified above.  Analytic Operations Implementation– Authored overall Concept of Operations document; helped enhance analytic process effectiveness and efficiency; identification of areas for improvement; training, etc. OUTCOME  Initial Operations Capability achieved on-time, on-budget  Resulting operations have been recognized at the highest level (ODNI Exceptional Achievement Medal), and are being adopted by other parts of the Task Force, and are recognized as a best-practice in the FBI.
  • 7. Case Study – FBI Counterterrorism Task Force MISSION Facilitate and expedite information technology support of priority analytical requirements and provide executive staff support APPROACH  Programmatic – Develop, advise on, and execute plans, programs, processes, and policies to manage task force operations, administration, and communications. Conduct outreach and liaison with U.S. intelligence and law enforcement and foreign government partners to create synergies and identify emerging technologies and alternative analysis techniques.  Governance & Requirements Management – Establish uniform process to validate, approve, prioritize and resource requirements. Develop enterprise strategies to support FBI programs leveraging proprietary information systems to proactively target threats to National Security.  Strategy & Process Improvement – Embed Business Analysts within operational units to anticipate and translate functional requirements. Research and develop analytic solutions from multi-channel All-Source data to address enterprise-level intelligence gaps across national security program areas including the counterintelligence, counterterrorism, and weapons of mass destruction missions. OUTCOME  An enterprise metrics program, developed and managed by IWS, is used by Task Force leadership and FBI Headquarters executive management to make operational and administrative decisions. Recognized by FBI Director as best low-cost metrics solution.  An Outreach program developed and managed by IWS provides tools and methods training to FBI Field Offices throughout the U.S., increasing awareness of capabilities that improve counterterrorism analysis.  Tight alignment between software functionality and mission needs that reflects actual requirements and the organizational and individual user-level. Development of innovative strategies that direct precious information technology resources according to current operational priorities. Operational requirements are well understood, documented, traceable and prioritized to align with organizational objectives.
  • 8. Case Study – FBI National Security Branch IT Portfolio Management MISSION Provide objective program oversight and provide logical solutions to complex business problems in support of National Security Branch–wide Information Technology (IT) needs. APPROACH  Programmatic – Collect and analyze IT requirements across six major divisions, providing recommendations that ensure limited budgetary and personnel resources are directed toward capabilities that best support operational needs and objectives.  Strategy & Process Improvement – Develop and implement standardized IT management processes across all component divisions of the National Security Branch, ensuring alignment with operational goals and enterprise lifecycle management policies.  Training – IWS serves as the primary contract instructor for development and delivery of geospatial intelligence analysis training; train FBI intelligence analysts and Special Agents nationwide. OUTCOME  Ensured and enforced consolidated IT project management, appropriate allocation of IT resources and deployment of capable and operationally suited analytic tools. The most recent example is the deployment of the Palantir analytic platform, which has fostered substantial cross-organizational collaboration with the USIC, and has led to opening several new investigative cases.  New and innovative geospatial analysis training program that has led to FBI personnel achieving basic/advanced certifications in geospatial intelligence tools.
  • 9. Case Study – FBI National Security Branch Establishment MISSION Provide management support to develop and operate National Security Branch business processes. APPROACH  Strategy Development– IWS assisted in the development of the Strategic Plans for the National Security Branch and the Weapons of Mass Destruction Directorate  Programmatic - IWS experts have been instrumental in responding to critical inspections and Director’s office business and strategy initiatives at the Directorate of Intelligence, and created enterprise-wide, standardized processes for the budget development cycle for budget submissions for both the National Intelligence Program (NIP) and the FBI’s Spring Planning Estimate (SPE).  Business Analysis – IWS regularly performs analysis and helps to develops processes required to respond to requirements from ODNI, FBI Executive Management and Finance, and DOJ.  Process Improvement – IWS ensures that the Intelligence Budget Planning Submission (IPBS) and the Congressional Budget Justification Book (CBJB) are properly coordinated with all FBI divisions responsible for executing NIP funds, and provides key liaison with the FBI Finance Division to ensure coordination with the SPE Budget Submission through DOJ. OUTCOME  IWS provided direct liaison support to the IC and developed improved processes for acquiring Intelligence Product feedback, helping to identify best practices and establishing a customer feedback working group.  Significantly improved training program efficiencies and participated in the initial development of career paths for special agents and intelligence analysts. IWS analysis led to a reallocation of resources and savings of over $4 million  Consistently recognized for content input and evaluation for internal and external reviews of all National Security budgetary requests.  Received FBI Program Management and Support Services Contract Extraordinary Contributor Award
  • 10. Case Study – FBI Enterprise System Business Management Support MISSION Establish an environment for maturing and growing a critical data warehouse initiative into a proactive, strategic, well-managed, user- and mission-focused enterprise program APPROACH  Business Process Improvement – Design, implement and manage new business processes leveraging existing tools, technology, and personnel, allowing the operational business manager to gain visibility and control over program efforts.  User Advocacy & Outreach – Establish relationships with enterprise users, leveraging adhoc user groups to assist in identifying critical system requirements, supporting design reviews, and user acceptance testing, as well as enhancing user support and training.  Governance & Requirements Management – Institute a requirements management framework and workflow that moves enhancement requests through analysis, prioritization, technical assessment, development, and deployment to the enterprise.  Analysis of Tech Solution Alternatives – Provide early, iterative, user- and mission-focused design reviews to flesh out best- bang solutions among various technical alternatives; factor these into both near- and long-term architecture planning and fiscal year programmatic planning. OUTCOME  System utilization has more than doubled (to > 10,000 users), becoming the 2nd most utilized system across the entire FBI.  Program planning efforts are aligned to mission and user priorities.  User feedback indicates a strong sense of community ―ownership‖ across the enterprise.  Risks of budget constrained environment have been reduced through identification of best value enhancements.  Detailed prioritized requirements and enhanced business processes with the technical team are driving significant enhancements in application, data, and search architectures.
  • 11. Case Study – TSA Secure Flight MISSION Migrate watch list matching from the aviation industry to the USG, spanning roughly 2M passengers daily APPROACH  Strategy & CONOPS – Re-base-lined the program’s ConOps, balancing list matching and operational best practices with sound compliance, privacy, and redress programs  Business Architecture – Implemented a Business Architecture Team that focuses on the implementation of solutions spanning process, technology, and human capital.  Requirements – Deployed a Release and Requirements Management practice ensuring the ―right capabilities were deployed first‖. OUTCOME  Deployed (i.e., migrated) the first aircraft operator on 1/15/2010  Completed all domestic carrier migrations to Secure Flight on June 22, 2010 and all international carriers to Secure Flight on November 23, 2010.  Saw a significant improvement in the identification of known or suspected terrorists (vs. the legacy aviation industry’s practices).  Key contributor to the government winning a GCN award for IT achievement
  • 12. Case Study – FBI Terrorist Screening Center (TSC) MISSION Direct Support to Leadership in establishment of TSC Initial Operating Capability, Development of Strategic Plans, Business Architecture and Requirements Group, Total Life Cycle Management, Enterprise Architecture, Governance and Portfolio Management. Advanced Planning, Design and Build-out of New Primary Facility and Continuity of Operations (COOP) Sites. APPROACH  Strategic – IWS employee acted as advisor to first Director and Deputy Director of the TSC, assisting in the establishment of initial organizational plans, technology capabilities, and operations processes. Liaison to the IC on behalf of TSC.  Programmatic – Developed TSC EA framework, Capital Investment Strategy, and Life Cycle Management Processes, then utilized them to build out TSC’s new facility. Built project scope awareness through concise set of requirements and conceptual visualization; Used EA as the basis for repeatable success process; Acted customer advocate and trusted agent for the construction projects; correlated operational scenarios and program requirements to organization vision  Technical Integration – IWS built TSC’s Business Analysis team processes and procedures. Assisted in the development of the Terrorist Screening Database (TSDB) as operations user advocates. Information Technology (IT) collaboration processes led to comprehensive facilities integration from outside cable plant all the way to the customer desktop systems; delivery of standards-based, compliant technology that is integral, secure, reliable and available in new facility.  Budget, Planning & Procurement – Full life-cycle support; from conceptual planning, budgeting, design through procurement , installation and sustainment; Capital Planning approach aligned and prioritized investments to mission and strategic objective, leveraged during all budget build and execution reviews OUTCOME  Initial Operating Capability of TSC and TSDB.  State-of-the-art facilities, significantly improved IT performance and operational work environments. Two piloted advanced technologies and several product enhancements are now Agency standards. All technology and related installation labor delivered on-time and in turnkey, end-to-end fashion. Affordable, highest priority solutions delivered per budget constraints; recognized by senior Facility stakeholder for outstanding performance and thoroughness.  Life Cycle Management Plan, Enterprise Architecture and Governance approach recognized as a success model for mid-size organizations within the Agency
  • 13. Case Study – Dun and Bradstreet Data Integration and Exploitation MISSION Develop Automatic Plug-in to D&B Global data providing enhanced data exploitation capability behind the firewall for use in classified intelligence analysis APPROACH  Technical Planning and Development – Build Web Portal mimicking DNB.Com search portal. Build automatic plug in (API) allowing multiple analytical tools to query and exploit D&B data.  Information Exploitation – Build custom Palantir helper allowing analysts to query and import D&B data directly into Palantir and combine the D&B data with additional data sets. OUTCOME  Successful deployment of portal and D&B dataset to IC agency for enhanced analysis and discovery in support of operational goals.  Successful deployment of D&B dataset, API and Palantir helper to Recovery and Transparency Board (RATB) evaluate program performance and make data-driven operational decisions
  • 14. Trusted Small Business Partner EMSolutions
  • 15. Points of Contact The IWS Advantage IntelliWare Systems offers mission-focused management services that improve organizational intelligence and effectiveness. As national security missions expand and budgets contract, we cost effectively transform information into actionable knowledge. We are operationally focused and dedicated to helping our clients meet their complex mission requirements. Dom LaPore Randy Lange President and COO Vice President of Client Services dlapore@intelliwaresystems.com rlange@intelliwaresystems.com 5608 Southpoint Centre Blvd 2011 Crystal Drive Suite 100 Suite 400 Fredericksburg, VA 22407 Arlington, VA 22202 540.604.9095 703.682.6946

Notas del editor

  1. Metrics programOutreach programOther PMOU accomplishments
  2. IT Portfolio Management across all of NSB and coordination with CIODevelopment of Business Processes for management of IC and DOJ budget streams over multiple yearsBEARS financial database development and training, along with development of the processes and reportingGeospatial curriculum development and trainingCT Analysts training strategic planning (Ed)DI program management, business process development, metricsOutcome:Consolidated and coordinated management of IT projects across all of FBI IntelligencePalantir training and over the shoulder supportAnalysis of all CT activities across FBI in response to an ODNI question (accomplishment in one of our proposals)Management of X years of budgets from 2 different sourcesDo NOT put anything “training” as our first outcome
  3. IT Portfolio Management across all of NSB and coordination with CIODevelopment of Business Processes for management of IC and DOJ budget streams over multiple yearsBEARS financial database development and training, along with development of the processes and reportingGeospatial curriculum development and trainingCT Analysts training strategic planning (Ed)DI program management, business process development, metricsOutcome:Consolidated and coordinated management of IT projects across all of FBI IntelligencePalantir training and over the shoulder supportAnalysis of all CT activities across FBI in response to an ODNI question (accomplishment in one of our proposals)Management of X years of budgets from 2 different sourcesDo NOT put anything “training” as our first outcome– The National Intelligence Program (NIP) requires a budgetary submission similar to, but separate and distinct from, the FBI’s Spring Planning Estimate (SPE) Budget Submission to the DOJ. The National Security Branch is responsible for compiling and submitting this separate budget request to OMB through ODNI.
  4. Strategic PlanningRequirements EngineeringBusiness ArchitectureEAITPfMCapital Investment