SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
Case Study

IMPLEMENTING ENTERPRISE ARCHITECTURE AT THE
UNITED STATES SECRET SERVICE
Andrew Blumenthal

        ABSTRACT

        This article describes a ten-step process used by the United States Secret Service to
        build its Enterprise Architecture (EA) program. EA is the discipline that synthesizes
        key business and technical information across the organization to support better
        decision-making. The Secret Service program improves on the traditional approach to
        EA by going beyond the collection of voluminous information to synthesize and
        present it in a useful and useable format for decision-makers. It achieves this by using
        a clear framework, incorporating a three-tier approach to displaying the information,
        and drawing on principles of communication and design in a 10-step process.


        KEYWORDS

        enterprise architecture, secret service, information technology, strategic planning,
        investment management, knowledge management, information sharing, information
        visualization, Clinger-Cohen Act



INTRODUCTION                                            known as “Clinger-Cohen.” This Act, among
                                                        other things, charged federal agency Chief
Enterprise Architecture (EA) is the discipline          Information Officers (CIOs) with “developing,
that synthesizes key business and technical             maintaining, and facilitating the implementation
information across the organization to support          of a sound and integrated information
better decision-making, as shown in Figure 1.           technology architecture” (110 Stat. 685). This
The information in the EA includes, among               legislation was significant because it
other things, descriptions of business functions        recognized the centrality of EA to good
and activities, information requirements, and           decision-making in the organization.
supporting applications and technologies.

In my experience, before EA existed, such
data was often difficult to get, cumbersome to
access, and challenging to use. Information
Technology (IT) was organized functionally,
not holistically; the relationship between
business and IT stakeholders was often
confrontational rather than collaborative; and
documentation on technology and applications
was often difficult to obtain, if it existed at all.

In 1996, the federal government addressed
this issue by passing the Information
Technology Management Reform Act, also                    Figure 1. EA Support for Decision-Making



    © Journal of Enterprise Architecture – November 2005                                              1
In this article, I describe the experience of       functions, data sources, applications, and
building the Enterprise Architecture at the         technologies.
United States Secret Service (Secret Service)
— how we launched the EA program, built             In addition, the Secret Service experienced a
demand around it, and created a structure and       convergence of situational factors that further
information ‘products’ to satisfy that demand       supported its EA development.           These
systematically. I also explain how we ensured       included:
that the EA information we provided would be        • Management commitment.          We had
accurate, accessible, intuitive, and meaningful     support from the senior management team of
for both the technical and the non-technical        the Secret Service’s Information Resources
business user.                                      Management Division (IRMD) and from the
                                                    EAWG.
SITUATION                                           • Funding. The Secret Service allocated
                                                    funding for contractors to support program
The Secret Service launched its EA program in       requirements.
1998. The program was based on a strategy of
                                                    • Human capital. We put together a talented
building grassroots demand rather than
                                                    EA team with many diverse skills and
implementing it through the more traditional
                                                    backgrounds, including business management,
top-down approach.
                                                    advanced technology, and graphic design.
In accordance with Office of Management and
                                                    In the second half of 2003, I joined the Secret
Budget (OMB) Circular A-130 requirements —
                                                    Service as the EA program manager. Under
that federal agencies ensure information
                                                    the leadership of the then-chief enterprise
systems align with federal, agency, and bureau
                                                    architect and working with our dedicated team,
architectures — the Secret Service established
                                                    we set out to build a more robust EA.
an Enterprise Architecture Working Group
(EAWG) (OMB, 2000).          The EAWG was
charged with reviewing IT investments to            CHALLENGE
ensure they were consistent with both IT and
business strategies.        The EAWG was            In taking the EA to the next level, we faced a
composed           of        management-level       difficult challenge: people were hesitant to
representatives from IT and the major lines of      share their information. This resistance was
business. It soon became apparent to the            natural. Employees of any organization,
members of this group that better information       especially in law enforcement, are cautious
about our IT environment (such as IT product        about giving out information, because they fear
standards, applications, security parameters,       that it could compromise the security of the
and so forth) was needed to meet these review       mission. More generally, in any organization
responsibilities.                                   people feel that knowledge is power, and fear
                                                    losing power if they share it.
By 2003, demand increased to the point where
we needed to develop a formal framework,            To help overcome this, we concentrated our
policy, governance, and EA product set.             efforts on aligning the EA with the mission of
Demand was coming from a variety of user            the Secret Service and presenting it in a useful
groups, including:                                  and useable format, through what eventually
                                                    became a 10-step process.
• EAWG members.          These individuals
needed better information to evaluate
proposed IT investments.                            PROCESS
• Project managers. Business and technical
                                                    In developing the EA for the Secret Service,
project managers needed EA information to
                                                    we did not consciously set out these 10 steps
guide IT development efforts.
                                                    in advance. We started with OMB’s Federal
• Department of Homeland Security (DHS).            Enterprise Architecture (FEA) and built on it
DHS required extensive EA information from          through the team’s collective professional
the Secret Service after the creation of the        experience and education, and simple trial-
Department in 2002, including business              and-error. The process evolved from there.


2   © Journal of Enterprise Architecture – November 2005
Figure 2. EA Value Proposition

Step 1: Clearly       articulate   the    value       physical example to explain to others why EA
proposition                                           is important.        We selected the famous
                                                      Winchester House built in San Jose, CA in the
In order for everyone to understand the benefit       late 1800’s as our example of what happens
of what we were doing, we needed to clearly           when you build without planning first. Shown
articulate the value that the architecture would      in Figure 3, this house was also used as an
bring to the organization. In the case of the         example of what not to do by Dr. Steven
Secret Service, the value proposition of EA           Spewak in his pivotal book on EA Planning
was creating “order out of chaos.”                    (Spewak, 1992). This bizarre house had 147
Accordingly, we identified the value proposition      builders but not a single architect. Therefore,
by creating an overview map of the EA                 $5.5 million and 38 years later, this 160-room
process.                                              Victorian mansion had 65 doors that opened to
                                                      blank walls, 13 abandoned staircases, and 24
Figure 2 above shows how a wide range of              skylights built into the floor.
data is transformed into information products
that are easily used by business and technical
users to support enhanced decision-making
outcomes.        It resembles an integrated
definition function (IDEF) activity diagram in
that it depicts how an input is processed by the
EA program function (which is moderated by
mechanisms and controls) to become an
output. However, it was not intended, in and of
itself, for business process improvement.
Rather, the purpose was to comprehensively
yet simply portray the EA value proposition.

We also realized that we needed a real-world,                    Figure 3. Winchester House
                                                           (Used with permission from Winchester Mystery House)




    © Journal of Enterprise Architecture – November 2005                                                          3
The Winchester House became a metaphor for
what could happen to an organization’s
information technology without EA: It could
easily descend into chaos in a variety of ways.
For example:
•     A mission could fail because information
      was there, but not shared
•     A manager might purchase technology that
      conflicts with the underlying infrastructure
      or is not fully mature
•     Multiple departments could independently
      purchase different software products that
      perform the very same function and not
      even know it, or
•     The organization could be left inadvertently
      vulnerable to cyber-attack


Step 2: Institutionalize through policy

Something we say is “you can have agreement
and buy-in to do the EA, but if you do not
                                                                   Figure 4. EA Framework
formalize it in policy, you cannot make it stick.”
Therefore, once executive buy-in and
management commitment were obtained, we               The following is a brief description of each of
turned to establishing an EA policy that clearly      our EA perspectives:
defined the EA’s purpose, scope, structure,           • Business: What are the functions and
and governance.           In any organization,        activities of the organization with respect to the
including the Secret Service, policy has the          mission?
effect of legitimizing the program by requiring
compliance by all. Here is an excerpt from            • Information: What information is needed to
ours:                                                 support the mission?
                                                      • Applications: How do applications support
    “The purpose of the Secret Service                information needs or requirements?
    Enterprise Architecture program is to
    develop and maintain a baseline and target        • Technology: How does the technology
    enterprise architecture, to develop a             support the applications?
    transition strategy, and to facilitate use of     • Performance:         How      is   performance
    the enterprise architecture in IT investment      measured?
    management decisions, strategic and               •      Security: How is information protected?
    operational planning, and IT program
    management.“                                      The EA perspectives are presented visually in
                                                      the shape of the Secret Service star, with each
Step 3: Establish a simple and well-                  perspective labeled as a point on the star.
rounded framework                                     Again, the overall message is that the EA truly
                                                      represents the organization and is integrated
An EA framework is a basic blueprint for all of       into its mission and culture.
its products. The framework we chose was
largely derived from the Federal Enterprise
Architecture (FEA). As is shown in Figure 4,          Step 4: Identify the core principles
our EA framework uses six perspectives
                                                      Once the EA framework was established, we
through which one can look at business and IT
                                                      developed a set of core principles that each
information. These are used simultaneously to
                                                      perspective would support. The purpose for
obtain a well-rounded view of the organization,
                                                      doing this was to more fully explain the
and are mutually reinforcing.


4     © Journal of Enterprise Architecture – November 2005
perspectives and make them pertinent to the
Secret Service environment. The core
principles are:
• Business-technology       alignment:      IT
investments must be aligned with the mission.
• Information accessibility and sharing:
Information should be accessible and shared
appropriately across the enterprise.
• Interoperable         applications:      Our
applications should work together.
• Technology           standardization      and
simplification: IT should be standardized and
simplified to the greatest extent possible.
• Measurable results: The results            of            Figure 5. Three-Tier EA Meta-Model
investment activity should be measured.
                                                    While the models and inventories are
• Integrity, confidentiality, and availability:     important, we found that the high-level profiles
We must assure the integrity, confidentiality,      were the most valuable products of all. After
and availability of our information assets.         collecting the information and inventorying it,
                                                    we spent significant time analyzing the
To promote agency-wide awareness of and             information in order to develop one-page
support for the EA program, we hung posters         profiles of the key information that provides
of the EA framework and core principles (as         decision-makers with large amounts of
seen in Figure 4) throughout the headquarters       information in quick, easy-to-use formats. We
building of the Secret Service.                     developed multiple profiles for every
                                                    perspective of the architecture. An example of
                                                    a profile is our business profile, which
Step 5: Create a meta-model                         succinctly identifies all the Secret Service’s
                                                    core functions and sub-functions.
A meta-model is a ”model of models” that
explains how information will be catalogued
and presented. It ensures consistency in how        Step 6:    Incorporate   principles          of
information is demonstrated for each                communication and design
perspective of the framework. As far as we
know, the meta-model that we developed for          Before we actually developed any EA
the Secret Service is unique. It is based on a      products, we decided on a core set of design
three-tier architecture, as follows:                principles that would guide us in developing
• High-level profile: Provides a ”20,000 mile-      the full set of EA work products. This was a
high view” or executive summary                     unique step that we initiated in developing EA
                                                    for the Secret Service.       These principles
• Mid-level model: Shows relationships, and         included the following:
is typically a diagram that demonstrates how
items relate to each other                          1. Focus on the mission.
•   Inventory: The detailed information             2. Develop work products that are useful and
                                                       usable.
As is shown in Figure 5, the three information
                                                    3. Simplify complex information.
levels help us to distinguish the details from
the bigger picture.                                 4. Organize and classify information based
                                                       on a structured taxonomy.
                                                    5. Create a common look and feel.
                                                    6. Provide easy access to work products
                                                       through our intranet.
                                                    7. Maximize use of information visualization.
                                                    8. Be creative.


    © Journal of Enterprise Architecture – November 2005                                          5
Based on these principles, we developed EA          Secret Service.
products, such as the concept of operations
(CONOPS) shown in Figure 6. It illustrates          • A mid-level business process model that
focus on mission and use of information             would break down the functions of the Secret
visualization.                                      Service into specific activities.
                                                    •   A business inventory that would detail all
                                                    the functions, sub-functions, and services that
                                                    the Secret Service performs, and align these to
                                                    the DHS parent functions.

                                                    However, in order to develop these products,
                                                    we needed subject matter expertise. More
                                                    than that, we needed ongoing commitment
                                                    from the subject matter experts to collaborate
                                                    with us on developing, and ultimately
                                                    maintaining, the EA products. Accordingly, we
                                                    worked through a senior management team
                                                    and designated subject matter experts from
                                                    the operational areas as the ”product owners”
                                                    for each EA product, who were to be
                                                    responsible for content. The actual design and
                                                    development of the product was assigned to
                                                    individuals on the EA team, and we designated
                                                    these individuals as the ”product managers”
                                                    Together, the product owners and the product
                                                    managers develop and maintain our EA.

                                                    In this collaborative relationship, we asked
                                                    product owners to provide information that they
      Figure 6. Secret Service CONOPS               already had. The product managers brought it
                                                    into the architecture, organized it, identified
The CONOPS not only helped us to better             relationships,   and    developed     effective
understand the mission and functions of the         visualizations. The product owners made sure
agency, but also helped to integrate this           certain the data stewarded by the product
information into a unifying representation that     managers was accurate.
everyone could understand and relate to. An
added benefit is that, like the six-perspective     Finally, in developing our products, we aligned
EA framework poster, it provides a useful           our architecture with the DHS’s architecture by
communication vehicle for the EA program.           using their taxonomies as a starting point and
                                                    then modifying, nesting, and extending the
                                                    Secret Service architecture taxonomies as
Step 7: Define, develop, and maintain               appropriate.
information products

At this point, we were ready to develop EA
products: to find existing information, bring it    Step 8: Set       up   a   single   information
into the EA, organize it, and present it            repository
effectively.                                        In amassing information, it was tempting to
                                                    store it in different databases, or ”buckets,“ for
We started by defining a consistent set of          the sake of convenience.           However, we
information products for each perspective that      realized early on that we would reap the real
would align with each level of the meta-model.      benefits of this information only by capturing all
For example, under the business perspective,        of it in a single repository. We selected and
we committed to developing such things as:          implemented Telelogic’s (formerly Popkin
•   A high-level business profile that would        Software) System Architect™ software product
identify the major functions performed by the       as our EA repository and modeling tool to


6   © Journal of Enterprise Architecture – November 2005
achieve this objective.                               awareness of the EA’s day-to-day value.
                                                      These include briefings, demonstrations,
Although it is still in a relatively early stage of   posters, business cards, and booths at various
implementation, we can already see a number           internal IT fairs. Further, we make the EA
of benefits including ease of use through             information available to all employees on our
centralization, enhanced data integrity, and the      intranet.
ability to show relationships between elements
of the architecture.
                                                      LESSONS LEARNED
Step  9:  Apply           strict   configuration      In the process of creating an EA process and
management                                            set of associated products for the Secret
Configuration Management (CM) is the                  Service, we have learned a number of lessons:
process of identifying, controlling, and              •    Focus on the mission. Use EA to capture
reporting on changes. It was important to             and organize voluminous organizational
integrate CM into our EA because of the need          information to support better decision-making,
to capture and manage a mass of critical              rather than as an end in itself.
information across the enterprise. Specifically,
we needed to track changes to the original EA         • Keep it simple. Don’t develop esoteric
products, so that we could ensure the                 models and frameworks. Instead, concentrate
accuracy and integrity of the information             on creating a few useful and useable products.
contained in them. Therefore, we developed a          •    Be flexible. Develop products as the need
CM plan that provides for the maintenance of          for them becomes apparent, rather than pre-
logs that track changes to EA products;               define what you will offer.
created a quarterly release schedule for new
or changed products; and instituted review and        • Capitalize on information visualization. As
approval by product owners of new or modified         the saying goes, “a picture is worth a thousand
products (and their change logs) before each          words.” By summarizing EA information into
quarterly release of the EA.                          high-level visual profiles, we have distilled
                                                      massive amounts of information in a concise
                                                      and useful manner.
Step 10: Use EA for everyday decision-
making                                                • Communicate early and often. Take the
                                                      time to tell your story. No program can
EA enhances decision-making by providing              succeed without awareness, acceptance, and
services and information in support of strategic      support among key stakeholders.
planning, IT investment management, and
knowledge management. The EA program at
the Secret Service guides strategic and tactical      CONCLUSION
planning, helps conduct IT investment reviews,
and enables us to respond to business and             We can never go back to the days of “build it
technical questions from our stakeholders.            and they will come.” Rather, everyone in the
                                                      organization, particularly those in support
We measure the use of EA for these functions          functions like IT, must make it his/her job to
as a benchmark of our performance against             understand and respond to the needs of the
the goal of providing an EA that furthers the         business. In my view, this is the real strength
agency’s business mission. For example, we            and importance of EA. EA integrates the
track the number of investment reviews                business and technical information of the
conducted, as well as responses to internal           organization to enhance decision-making.
and external requests for EA information.
While not conclusive, these metrics provide           Our own program improves on the traditional
helpful indices for determining how useful our        approach to EA by going beyond the collection
EA is to the Secret Service.                          of voluminous information to synthesize and
                                                      present it in a useful and useable format for
In addition, we engage in various formal and          decision makers. We achieved this goal by
informal activities to enhance our users’             using a strong framework, incorporating a


    © Journal of Enterprise Architecture – November 2005                                           7
three-tier   approach   to  displaying        the    Spewak, S. H. (1992). Enterprise Architecture
information,   and    using  principles         of   Planning: Developing a Blueprint for Data,
communication and design.                            Applications, and Technology. NY: Wiley &
                                                     Sons.
EA is a vital tool for supporting the mission of
the Secret Service. Its benefits are maximized
when EA program leaders deliver a clear and
relevant business value proposition, work
openly and collaboratively with business
customers, and provide meaningful and easily
accessible information.



AUTHOR BIOGRAPHY

Andrew Blumenthal is chief enterprise architect
at the United States Secret Service. He is a
certified enterprise architect (CEA) and project
management professional (PMP) specializing
in the implementation of best-practice
information technology solutions. In addition to
his work with the Secret Service, his two
decades of professional experience include
service at a range of leading public and private
sector organizations, including the National
Oceanic and Atmospheric Administration
(NOAA); the United States Department of the
Treasury; the Dreyfus Corporation; and
International Business Machines (IBM). With
an MBA in organizational behavior and a BBA
in accounting, as well as numerous advanced
certifications in IT, including CIO certification,
Blumenthal has unique insight into the
importance of IT to business success, and
focuses on synthesizing IT practices with
business      needs,     so    as  to     provide
demonstrated results in supporting the broader
mission of the organization.



REFERENCES

Clinger-Cohen Act of 1996. (Public Law 104-
106). Section 5125, 110 Stat. 684.

Integrated Definition Function Modeling
Method (IDEFØ) Overview. Downloaded:
www.idef.com.

Office of Management and Budget (2000).
OMB Circular A-130: Management of Federal
Information Resources, November 30, 2000.




8   © Journal of Enterprise Architecture – November 2005

Contenu connexe

Similaire à Implementing EA at the Secret Service - Andy Blumenthal

Intro to Enterprise Architecture (EA)
Intro to Enterprise Architecture (EA)Intro to Enterprise Architecture (EA)
Intro to Enterprise Architecture (EA)Fahmi Abdul Latip
 
FEDERAL Enterprise Performance Management
FEDERAL Enterprise Performance ManagementFEDERAL Enterprise Performance Management
FEDERAL Enterprise Performance ManagementCraig Prindle
 
Building An Information Technology And Information Systems
Building An Information Technology And Information SystemsBuilding An Information Technology And Information Systems
Building An Information Technology And Information SystemsNicole Savoie
 
December 2015 (144) MIS Quarterly Executive 195Execut
December 2015 (144)  MIS Quarterly Executive   195ExecutDecember 2015 (144)  MIS Quarterly Executive   195Execut
December 2015 (144) MIS Quarterly Executive 195ExecutLinaCovington707
 
Visualizing IT at the Department of Homeland Security with the ArchiMate® Vi...
Visualizing IT at the Department of Homeland Security with the  ArchiMate® Vi...Visualizing IT at the Department of Homeland Security with the  ArchiMate® Vi...
Visualizing IT at the Department of Homeland Security with the ArchiMate® Vi...Iver Band
 
Dave Megliorino Cv April2010
Dave Megliorino Cv April2010Dave Megliorino Cv April2010
Dave Megliorino Cv April2010davemeg
 
Managing Your IT Portfolio
Managing Your IT PortfolioManaging Your IT Portfolio
Managing Your IT PortfolioBill Wimsatt
 
Executive Overview of IT Strategy and Capability Maturity Framework
Executive Overview of IT Strategy and Capability Maturity FrameworkExecutive Overview of IT Strategy and Capability Maturity Framework
Executive Overview of IT Strategy and Capability Maturity FrameworkVishal Sharma
 
A framework for_enterprise_architecture_effectiveness
A framework for_enterprise_architecture_effectivenessA framework for_enterprise_architecture_effectiveness
A framework for_enterprise_architecture_effectivenessbambangpadhi
 
EA as an Actionable Architecture
EA as an Actionable ArchitectureEA as an Actionable Architecture
EA as an Actionable ArchitectureJerald Burget
 
5th CIO 100 summit Enterprise Architecture presentation by PTI Consulting
5th CIO 100 summit Enterprise Architecture presentation by PTI Consulting5th CIO 100 summit Enterprise Architecture presentation by PTI Consulting
5th CIO 100 summit Enterprise Architecture presentation by PTI ConsultingPeter Mũya H
 
Terrance Knecht Resume
Terrance Knecht ResumeTerrance Knecht Resume
Terrance Knecht ResumeTerranceKnecht
 

Similaire à Implementing EA at the Secret Service - Andy Blumenthal (20)

Resume
ResumeResume
Resume
 
Intro to Enterprise Architecture (EA)
Intro to Enterprise Architecture (EA)Intro to Enterprise Architecture (EA)
Intro to Enterprise Architecture (EA)
 
FEDERAL Enterprise Performance Management
FEDERAL Enterprise Performance ManagementFEDERAL Enterprise Performance Management
FEDERAL Enterprise Performance Management
 
Building An Information Technology And Information Systems
Building An Information Technology And Information SystemsBuilding An Information Technology And Information Systems
Building An Information Technology And Information Systems
 
December 2015 (144) MIS Quarterly Executive 195Execut
December 2015 (144)  MIS Quarterly Executive   195ExecutDecember 2015 (144)  MIS Quarterly Executive   195Execut
December 2015 (144) MIS Quarterly Executive 195Execut
 
Investing for IT Success - Andy Blumenthal
Investing for IT Success - Andy BlumenthalInvesting for IT Success - Andy Blumenthal
Investing for IT Success - Andy Blumenthal
 
The Long View - Andy Blumenthal
The Long View - Andy BlumenthalThe Long View - Andy Blumenthal
The Long View - Andy Blumenthal
 
Managing study.pptx
Managing study.pptxManaging study.pptx
Managing study.pptx
 
Visualizing IT at the Department of Homeland Security with the ArchiMate® Vi...
Visualizing IT at the Department of Homeland Security with the  ArchiMate® Vi...Visualizing IT at the Department of Homeland Security with the  ArchiMate® Vi...
Visualizing IT at the Department of Homeland Security with the ArchiMate® Vi...
 
Visualizing IT at the Department of Homeland Security with the ArchiMate® Vis...
Visualizing IT at the Department of Homeland Security with the ArchiMate® Vis...Visualizing IT at the Department of Homeland Security with the ArchiMate® Vis...
Visualizing IT at the Department of Homeland Security with the ArchiMate® Vis...
 
Dave Megliorino Cv April2010
Dave Megliorino Cv April2010Dave Megliorino Cv April2010
Dave Megliorino Cv April2010
 
april2023.pptx
april2023.pptxapril2023.pptx
april2023.pptx
 
Managing Your IT Portfolio
Managing Your IT PortfolioManaging Your IT Portfolio
Managing Your IT Portfolio
 
Executive Overview of IT Strategy and Capability Maturity Framework
Executive Overview of IT Strategy and Capability Maturity FrameworkExecutive Overview of IT Strategy and Capability Maturity Framework
Executive Overview of IT Strategy and Capability Maturity Framework
 
A framework for_enterprise_architecture_effectiveness
A framework for_enterprise_architecture_effectivenessA framework for_enterprise_architecture_effectiveness
A framework for_enterprise_architecture_effectiveness
 
EA as an Actionable Architecture
EA as an Actionable ArchitectureEA as an Actionable Architecture
EA as an Actionable Architecture
 
5th CIO 100 summit Enterprise Architecture presentation by PTI Consulting
5th CIO 100 summit Enterprise Architecture presentation by PTI Consulting5th CIO 100 summit Enterprise Architecture presentation by PTI Consulting
5th CIO 100 summit Enterprise Architecture presentation by PTI Consulting
 
Terrance Knecht Resume
Terrance Knecht ResumeTerrance Knecht Resume
Terrance Knecht Resume
 
Zenith
ZenithZenith
Zenith
 
BusbiceTim2016t
BusbiceTim2016tBusbiceTim2016t
BusbiceTim2016t
 

Plus de Andy (Avraham) Blumenthal

America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...Andy (Avraham) Blumenthal
 
Free Free Free...Ukraine! _ Andy Blumenthal _ The Blogs.pdf
Free Free Free...Ukraine! _ Andy Blumenthal _ The Blogs.pdfFree Free Free...Ukraine! _ Andy Blumenthal _ The Blogs.pdf
Free Free Free...Ukraine! _ Andy Blumenthal _ The Blogs.pdfAndy (Avraham) Blumenthal
 
The Rebbe Knew _ Andy Blumenthal _ The Blogs.pdf
The Rebbe Knew _ Andy Blumenthal _ The Blogs.pdfThe Rebbe Knew _ Andy Blumenthal _ The Blogs.pdf
The Rebbe Knew _ Andy Blumenthal _ The Blogs.pdfAndy (Avraham) Blumenthal
 
Jewish Students and Faculty Must Sue _ Andy Blumenthal _ The Blogs (1).pdf
Jewish Students and Faculty Must Sue _ Andy Blumenthal _ The Blogs (1).pdfJewish Students and Faculty Must Sue _ Andy Blumenthal _ The Blogs (1).pdf
Jewish Students and Faculty Must Sue _ Andy Blumenthal _ The Blogs (1).pdfAndy (Avraham) Blumenthal
 
By Any Means Necessary _ Andy Blumenthal _ The Blogs.pdf
By Any Means Necessary _ Andy Blumenthal _ The Blogs.pdfBy Any Means Necessary _ Andy Blumenthal _ The Blogs.pdf
By Any Means Necessary _ Andy Blumenthal _ The Blogs.pdfAndy (Avraham) Blumenthal
 
Reincarnation_ Try, Try Again _ Andy Blumenthal _ The Blogs.pdf
Reincarnation_ Try, Try Again _ Andy Blumenthal _ The Blogs.pdfReincarnation_ Try, Try Again _ Andy Blumenthal _ The Blogs.pdf
Reincarnation_ Try, Try Again _ Andy Blumenthal _ The Blogs.pdfAndy (Avraham) Blumenthal
 
The Canary in the Antisemitic Coal Mine _ Andy Blumenthal _ The Blogs.pdf
The Canary in the Antisemitic Coal Mine _ Andy Blumenthal _ The Blogs.pdfThe Canary in the Antisemitic Coal Mine _ Andy Blumenthal _ The Blogs.pdf
The Canary in the Antisemitic Coal Mine _ Andy Blumenthal _ The Blogs.pdfAndy (Avraham) Blumenthal
 
The Occupation Game _ Andy Blumenthal _ The Blogs.pdf
The Occupation Game _ Andy Blumenthal _ The Blogs.pdfThe Occupation Game _ Andy Blumenthal _ The Blogs.pdf
The Occupation Game _ Andy Blumenthal _ The Blogs.pdfAndy (Avraham) Blumenthal
 
Finding Strength in Difficult Times _ Andy Blumenthal _ The Blogs.pdf
Finding Strength in Difficult Times _ Andy Blumenthal _ The Blogs.pdfFinding Strength in Difficult Times _ Andy Blumenthal _ The Blogs.pdf
Finding Strength in Difficult Times _ Andy Blumenthal _ The Blogs.pdfAndy (Avraham) Blumenthal
 
The Hostage's Cry _ Andy Blumenthal _ The Blogs.pdf
The Hostage's Cry _ Andy Blumenthal _ The Blogs.pdfThe Hostage's Cry _ Andy Blumenthal _ The Blogs.pdf
The Hostage's Cry _ Andy Blumenthal _ The Blogs.pdfAndy (Avraham) Blumenthal
 
The Topsy Turvy World of Baby Killers and Nazis _ Andy Blumenthal _ The Blogs...
The Topsy Turvy World of Baby Killers and Nazis _ Andy Blumenthal _ The Blogs...The Topsy Turvy World of Baby Killers and Nazis _ Andy Blumenthal _ The Blogs...
The Topsy Turvy World of Baby Killers and Nazis _ Andy Blumenthal _ The Blogs...Andy (Avraham) Blumenthal
 
Love Is Not Blind, But Hate Sure Is _ Andy Blumenthal _ The Blogs.pdf
Love Is Not Blind, But Hate Sure Is _ Andy Blumenthal _ The Blogs.pdfLove Is Not Blind, But Hate Sure Is _ Andy Blumenthal _ The Blogs.pdf
Love Is Not Blind, But Hate Sure Is _ Andy Blumenthal _ The Blogs.pdfAndy (Avraham) Blumenthal
 
Imagine Peace _ Andy Blumenthal _ The Blogs.pdf
Imagine Peace _ Andy Blumenthal _ The Blogs.pdfImagine Peace _ Andy Blumenthal _ The Blogs.pdf
Imagine Peace _ Andy Blumenthal _ The Blogs.pdfAndy (Avraham) Blumenthal
 
Nobody Wanted War _ Andy Blumenthal _ The Blogs.pdf
Nobody Wanted War _ Andy Blumenthal _ The Blogs.pdfNobody Wanted War _ Andy Blumenthal _ The Blogs.pdf
Nobody Wanted War _ Andy Blumenthal _ The Blogs.pdfAndy (Avraham) Blumenthal
 
It Comes Down to Leadership _ Andy Blumenthal _ The Blogs.pdf
It Comes Down to Leadership _ Andy Blumenthal _ The Blogs.pdfIt Comes Down to Leadership _ Andy Blumenthal _ The Blogs.pdf
It Comes Down to Leadership _ Andy Blumenthal _ The Blogs.pdfAndy (Avraham) Blumenthal
 
How To Get The Hostages Out Alive _ Andy Blumenthal _ The Blogs.pdf
How To Get The Hostages Out Alive _ Andy Blumenthal _ The Blogs.pdfHow To Get The Hostages Out Alive _ Andy Blumenthal _ The Blogs.pdf
How To Get The Hostages Out Alive _ Andy Blumenthal _ The Blogs.pdfAndy (Avraham) Blumenthal
 
L'Chaim for Body and Soul _ Andy Blumenthal _ The Blogs.pdf
L'Chaim for Body and Soul _ Andy Blumenthal _ The Blogs.pdfL'Chaim for Body and Soul _ Andy Blumenthal _ The Blogs.pdf
L'Chaim for Body and Soul _ Andy Blumenthal _ The Blogs.pdfAndy (Avraham) Blumenthal
 
Victimhood for the cameras _ Andy Blumenthal _ The Blogs.pdf
Victimhood for the cameras _ Andy Blumenthal _ The Blogs.pdfVictimhood for the cameras _ Andy Blumenthal _ The Blogs.pdf
Victimhood for the cameras _ Andy Blumenthal _ The Blogs.pdfAndy (Avraham) Blumenthal
 
My Supernova _ Andy Blumenthal _ The Blogs.pdf
My Supernova _ Andy Blumenthal _ The Blogs.pdfMy Supernova _ Andy Blumenthal _ The Blogs.pdf
My Supernova _ Andy Blumenthal _ The Blogs.pdfAndy (Avraham) Blumenthal
 
Preventing a Future October 7 _ Andy Blumenthal _ The Blogs.pdf
Preventing a Future October 7 _ Andy Blumenthal _ The Blogs.pdfPreventing a Future October 7 _ Andy Blumenthal _ The Blogs.pdf
Preventing a Future October 7 _ Andy Blumenthal _ The Blogs.pdfAndy (Avraham) Blumenthal
 

Plus de Andy (Avraham) Blumenthal (20)

America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
 
Free Free Free...Ukraine! _ Andy Blumenthal _ The Blogs.pdf
Free Free Free...Ukraine! _ Andy Blumenthal _ The Blogs.pdfFree Free Free...Ukraine! _ Andy Blumenthal _ The Blogs.pdf
Free Free Free...Ukraine! _ Andy Blumenthal _ The Blogs.pdf
 
The Rebbe Knew _ Andy Blumenthal _ The Blogs.pdf
The Rebbe Knew _ Andy Blumenthal _ The Blogs.pdfThe Rebbe Knew _ Andy Blumenthal _ The Blogs.pdf
The Rebbe Knew _ Andy Blumenthal _ The Blogs.pdf
 
Jewish Students and Faculty Must Sue _ Andy Blumenthal _ The Blogs (1).pdf
Jewish Students and Faculty Must Sue _ Andy Blumenthal _ The Blogs (1).pdfJewish Students and Faculty Must Sue _ Andy Blumenthal _ The Blogs (1).pdf
Jewish Students and Faculty Must Sue _ Andy Blumenthal _ The Blogs (1).pdf
 
By Any Means Necessary _ Andy Blumenthal _ The Blogs.pdf
By Any Means Necessary _ Andy Blumenthal _ The Blogs.pdfBy Any Means Necessary _ Andy Blumenthal _ The Blogs.pdf
By Any Means Necessary _ Andy Blumenthal _ The Blogs.pdf
 
Reincarnation_ Try, Try Again _ Andy Blumenthal _ The Blogs.pdf
Reincarnation_ Try, Try Again _ Andy Blumenthal _ The Blogs.pdfReincarnation_ Try, Try Again _ Andy Blumenthal _ The Blogs.pdf
Reincarnation_ Try, Try Again _ Andy Blumenthal _ The Blogs.pdf
 
The Canary in the Antisemitic Coal Mine _ Andy Blumenthal _ The Blogs.pdf
The Canary in the Antisemitic Coal Mine _ Andy Blumenthal _ The Blogs.pdfThe Canary in the Antisemitic Coal Mine _ Andy Blumenthal _ The Blogs.pdf
The Canary in the Antisemitic Coal Mine _ Andy Blumenthal _ The Blogs.pdf
 
The Occupation Game _ Andy Blumenthal _ The Blogs.pdf
The Occupation Game _ Andy Blumenthal _ The Blogs.pdfThe Occupation Game _ Andy Blumenthal _ The Blogs.pdf
The Occupation Game _ Andy Blumenthal _ The Blogs.pdf
 
Finding Strength in Difficult Times _ Andy Blumenthal _ The Blogs.pdf
Finding Strength in Difficult Times _ Andy Blumenthal _ The Blogs.pdfFinding Strength in Difficult Times _ Andy Blumenthal _ The Blogs.pdf
Finding Strength in Difficult Times _ Andy Blumenthal _ The Blogs.pdf
 
The Hostage's Cry _ Andy Blumenthal _ The Blogs.pdf
The Hostage's Cry _ Andy Blumenthal _ The Blogs.pdfThe Hostage's Cry _ Andy Blumenthal _ The Blogs.pdf
The Hostage's Cry _ Andy Blumenthal _ The Blogs.pdf
 
The Topsy Turvy World of Baby Killers and Nazis _ Andy Blumenthal _ The Blogs...
The Topsy Turvy World of Baby Killers and Nazis _ Andy Blumenthal _ The Blogs...The Topsy Turvy World of Baby Killers and Nazis _ Andy Blumenthal _ The Blogs...
The Topsy Turvy World of Baby Killers and Nazis _ Andy Blumenthal _ The Blogs...
 
Love Is Not Blind, But Hate Sure Is _ Andy Blumenthal _ The Blogs.pdf
Love Is Not Blind, But Hate Sure Is _ Andy Blumenthal _ The Blogs.pdfLove Is Not Blind, But Hate Sure Is _ Andy Blumenthal _ The Blogs.pdf
Love Is Not Blind, But Hate Sure Is _ Andy Blumenthal _ The Blogs.pdf
 
Imagine Peace _ Andy Blumenthal _ The Blogs.pdf
Imagine Peace _ Andy Blumenthal _ The Blogs.pdfImagine Peace _ Andy Blumenthal _ The Blogs.pdf
Imagine Peace _ Andy Blumenthal _ The Blogs.pdf
 
Nobody Wanted War _ Andy Blumenthal _ The Blogs.pdf
Nobody Wanted War _ Andy Blumenthal _ The Blogs.pdfNobody Wanted War _ Andy Blumenthal _ The Blogs.pdf
Nobody Wanted War _ Andy Blumenthal _ The Blogs.pdf
 
It Comes Down to Leadership _ Andy Blumenthal _ The Blogs.pdf
It Comes Down to Leadership _ Andy Blumenthal _ The Blogs.pdfIt Comes Down to Leadership _ Andy Blumenthal _ The Blogs.pdf
It Comes Down to Leadership _ Andy Blumenthal _ The Blogs.pdf
 
How To Get The Hostages Out Alive _ Andy Blumenthal _ The Blogs.pdf
How To Get The Hostages Out Alive _ Andy Blumenthal _ The Blogs.pdfHow To Get The Hostages Out Alive _ Andy Blumenthal _ The Blogs.pdf
How To Get The Hostages Out Alive _ Andy Blumenthal _ The Blogs.pdf
 
L'Chaim for Body and Soul _ Andy Blumenthal _ The Blogs.pdf
L'Chaim for Body and Soul _ Andy Blumenthal _ The Blogs.pdfL'Chaim for Body and Soul _ Andy Blumenthal _ The Blogs.pdf
L'Chaim for Body and Soul _ Andy Blumenthal _ The Blogs.pdf
 
Victimhood for the cameras _ Andy Blumenthal _ The Blogs.pdf
Victimhood for the cameras _ Andy Blumenthal _ The Blogs.pdfVictimhood for the cameras _ Andy Blumenthal _ The Blogs.pdf
Victimhood for the cameras _ Andy Blumenthal _ The Blogs.pdf
 
My Supernova _ Andy Blumenthal _ The Blogs.pdf
My Supernova _ Andy Blumenthal _ The Blogs.pdfMy Supernova _ Andy Blumenthal _ The Blogs.pdf
My Supernova _ Andy Blumenthal _ The Blogs.pdf
 
Preventing a Future October 7 _ Andy Blumenthal _ The Blogs.pdf
Preventing a Future October 7 _ Andy Blumenthal _ The Blogs.pdfPreventing a Future October 7 _ Andy Blumenthal _ The Blogs.pdf
Preventing a Future October 7 _ Andy Blumenthal _ The Blogs.pdf
 

Dernier

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Dernier (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Implementing EA at the Secret Service - Andy Blumenthal

  • 1. Case Study IMPLEMENTING ENTERPRISE ARCHITECTURE AT THE UNITED STATES SECRET SERVICE Andrew Blumenthal ABSTRACT This article describes a ten-step process used by the United States Secret Service to build its Enterprise Architecture (EA) program. EA is the discipline that synthesizes key business and technical information across the organization to support better decision-making. The Secret Service program improves on the traditional approach to EA by going beyond the collection of voluminous information to synthesize and present it in a useful and useable format for decision-makers. It achieves this by using a clear framework, incorporating a three-tier approach to displaying the information, and drawing on principles of communication and design in a 10-step process. KEYWORDS enterprise architecture, secret service, information technology, strategic planning, investment management, knowledge management, information sharing, information visualization, Clinger-Cohen Act INTRODUCTION known as “Clinger-Cohen.” This Act, among other things, charged federal agency Chief Enterprise Architecture (EA) is the discipline Information Officers (CIOs) with “developing, that synthesizes key business and technical maintaining, and facilitating the implementation information across the organization to support of a sound and integrated information better decision-making, as shown in Figure 1. technology architecture” (110 Stat. 685). This The information in the EA includes, among legislation was significant because it other things, descriptions of business functions recognized the centrality of EA to good and activities, information requirements, and decision-making in the organization. supporting applications and technologies. In my experience, before EA existed, such data was often difficult to get, cumbersome to access, and challenging to use. Information Technology (IT) was organized functionally, not holistically; the relationship between business and IT stakeholders was often confrontational rather than collaborative; and documentation on technology and applications was often difficult to obtain, if it existed at all. In 1996, the federal government addressed this issue by passing the Information Technology Management Reform Act, also Figure 1. EA Support for Decision-Making © Journal of Enterprise Architecture – November 2005 1
  • 2. In this article, I describe the experience of functions, data sources, applications, and building the Enterprise Architecture at the technologies. United States Secret Service (Secret Service) — how we launched the EA program, built In addition, the Secret Service experienced a demand around it, and created a structure and convergence of situational factors that further information ‘products’ to satisfy that demand supported its EA development. These systematically. I also explain how we ensured included: that the EA information we provided would be • Management commitment. We had accurate, accessible, intuitive, and meaningful support from the senior management team of for both the technical and the non-technical the Secret Service’s Information Resources business user. Management Division (IRMD) and from the EAWG. SITUATION • Funding. The Secret Service allocated funding for contractors to support program The Secret Service launched its EA program in requirements. 1998. The program was based on a strategy of • Human capital. We put together a talented building grassroots demand rather than EA team with many diverse skills and implementing it through the more traditional backgrounds, including business management, top-down approach. advanced technology, and graphic design. In accordance with Office of Management and In the second half of 2003, I joined the Secret Budget (OMB) Circular A-130 requirements — Service as the EA program manager. Under that federal agencies ensure information the leadership of the then-chief enterprise systems align with federal, agency, and bureau architect and working with our dedicated team, architectures — the Secret Service established we set out to build a more robust EA. an Enterprise Architecture Working Group (EAWG) (OMB, 2000). The EAWG was charged with reviewing IT investments to CHALLENGE ensure they were consistent with both IT and business strategies. The EAWG was In taking the EA to the next level, we faced a composed of management-level difficult challenge: people were hesitant to representatives from IT and the major lines of share their information. This resistance was business. It soon became apparent to the natural. Employees of any organization, members of this group that better information especially in law enforcement, are cautious about our IT environment (such as IT product about giving out information, because they fear standards, applications, security parameters, that it could compromise the security of the and so forth) was needed to meet these review mission. More generally, in any organization responsibilities. people feel that knowledge is power, and fear losing power if they share it. By 2003, demand increased to the point where we needed to develop a formal framework, To help overcome this, we concentrated our policy, governance, and EA product set. efforts on aligning the EA with the mission of Demand was coming from a variety of user the Secret Service and presenting it in a useful groups, including: and useable format, through what eventually became a 10-step process. • EAWG members. These individuals needed better information to evaluate proposed IT investments. PROCESS • Project managers. Business and technical In developing the EA for the Secret Service, project managers needed EA information to we did not consciously set out these 10 steps guide IT development efforts. in advance. We started with OMB’s Federal • Department of Homeland Security (DHS). Enterprise Architecture (FEA) and built on it DHS required extensive EA information from through the team’s collective professional the Secret Service after the creation of the experience and education, and simple trial- Department in 2002, including business and-error. The process evolved from there. 2 © Journal of Enterprise Architecture – November 2005
  • 3. Figure 2. EA Value Proposition Step 1: Clearly articulate the value physical example to explain to others why EA proposition is important. We selected the famous Winchester House built in San Jose, CA in the In order for everyone to understand the benefit late 1800’s as our example of what happens of what we were doing, we needed to clearly when you build without planning first. Shown articulate the value that the architecture would in Figure 3, this house was also used as an bring to the organization. In the case of the example of what not to do by Dr. Steven Secret Service, the value proposition of EA Spewak in his pivotal book on EA Planning was creating “order out of chaos.” (Spewak, 1992). This bizarre house had 147 Accordingly, we identified the value proposition builders but not a single architect. Therefore, by creating an overview map of the EA $5.5 million and 38 years later, this 160-room process. Victorian mansion had 65 doors that opened to blank walls, 13 abandoned staircases, and 24 Figure 2 above shows how a wide range of skylights built into the floor. data is transformed into information products that are easily used by business and technical users to support enhanced decision-making outcomes. It resembles an integrated definition function (IDEF) activity diagram in that it depicts how an input is processed by the EA program function (which is moderated by mechanisms and controls) to become an output. However, it was not intended, in and of itself, for business process improvement. Rather, the purpose was to comprehensively yet simply portray the EA value proposition. We also realized that we needed a real-world, Figure 3. Winchester House (Used with permission from Winchester Mystery House) © Journal of Enterprise Architecture – November 2005 3
  • 4. The Winchester House became a metaphor for what could happen to an organization’s information technology without EA: It could easily descend into chaos in a variety of ways. For example: • A mission could fail because information was there, but not shared • A manager might purchase technology that conflicts with the underlying infrastructure or is not fully mature • Multiple departments could independently purchase different software products that perform the very same function and not even know it, or • The organization could be left inadvertently vulnerable to cyber-attack Step 2: Institutionalize through policy Something we say is “you can have agreement and buy-in to do the EA, but if you do not Figure 4. EA Framework formalize it in policy, you cannot make it stick.” Therefore, once executive buy-in and management commitment were obtained, we The following is a brief description of each of turned to establishing an EA policy that clearly our EA perspectives: defined the EA’s purpose, scope, structure, • Business: What are the functions and and governance. In any organization, activities of the organization with respect to the including the Secret Service, policy has the mission? effect of legitimizing the program by requiring compliance by all. Here is an excerpt from • Information: What information is needed to ours: support the mission? • Applications: How do applications support “The purpose of the Secret Service information needs or requirements? Enterprise Architecture program is to develop and maintain a baseline and target • Technology: How does the technology enterprise architecture, to develop a support the applications? transition strategy, and to facilitate use of • Performance: How is performance the enterprise architecture in IT investment measured? management decisions, strategic and • Security: How is information protected? operational planning, and IT program management.“ The EA perspectives are presented visually in the shape of the Secret Service star, with each Step 3: Establish a simple and well- perspective labeled as a point on the star. rounded framework Again, the overall message is that the EA truly represents the organization and is integrated An EA framework is a basic blueprint for all of into its mission and culture. its products. The framework we chose was largely derived from the Federal Enterprise Architecture (FEA). As is shown in Figure 4, Step 4: Identify the core principles our EA framework uses six perspectives Once the EA framework was established, we through which one can look at business and IT developed a set of core principles that each information. These are used simultaneously to perspective would support. The purpose for obtain a well-rounded view of the organization, doing this was to more fully explain the and are mutually reinforcing. 4 © Journal of Enterprise Architecture – November 2005
  • 5. perspectives and make them pertinent to the Secret Service environment. The core principles are: • Business-technology alignment: IT investments must be aligned with the mission. • Information accessibility and sharing: Information should be accessible and shared appropriately across the enterprise. • Interoperable applications: Our applications should work together. • Technology standardization and simplification: IT should be standardized and simplified to the greatest extent possible. • Measurable results: The results of Figure 5. Three-Tier EA Meta-Model investment activity should be measured. While the models and inventories are • Integrity, confidentiality, and availability: important, we found that the high-level profiles We must assure the integrity, confidentiality, were the most valuable products of all. After and availability of our information assets. collecting the information and inventorying it, we spent significant time analyzing the To promote agency-wide awareness of and information in order to develop one-page support for the EA program, we hung posters profiles of the key information that provides of the EA framework and core principles (as decision-makers with large amounts of seen in Figure 4) throughout the headquarters information in quick, easy-to-use formats. We building of the Secret Service. developed multiple profiles for every perspective of the architecture. An example of a profile is our business profile, which Step 5: Create a meta-model succinctly identifies all the Secret Service’s core functions and sub-functions. A meta-model is a ”model of models” that explains how information will be catalogued and presented. It ensures consistency in how Step 6: Incorporate principles of information is demonstrated for each communication and design perspective of the framework. As far as we know, the meta-model that we developed for Before we actually developed any EA the Secret Service is unique. It is based on a products, we decided on a core set of design three-tier architecture, as follows: principles that would guide us in developing • High-level profile: Provides a ”20,000 mile- the full set of EA work products. This was a high view” or executive summary unique step that we initiated in developing EA for the Secret Service. These principles • Mid-level model: Shows relationships, and included the following: is typically a diagram that demonstrates how items relate to each other 1. Focus on the mission. • Inventory: The detailed information 2. Develop work products that are useful and usable. As is shown in Figure 5, the three information 3. Simplify complex information. levels help us to distinguish the details from the bigger picture. 4. Organize and classify information based on a structured taxonomy. 5. Create a common look and feel. 6. Provide easy access to work products through our intranet. 7. Maximize use of information visualization. 8. Be creative. © Journal of Enterprise Architecture – November 2005 5
  • 6. Based on these principles, we developed EA Secret Service. products, such as the concept of operations (CONOPS) shown in Figure 6. It illustrates • A mid-level business process model that focus on mission and use of information would break down the functions of the Secret visualization. Service into specific activities. • A business inventory that would detail all the functions, sub-functions, and services that the Secret Service performs, and align these to the DHS parent functions. However, in order to develop these products, we needed subject matter expertise. More than that, we needed ongoing commitment from the subject matter experts to collaborate with us on developing, and ultimately maintaining, the EA products. Accordingly, we worked through a senior management team and designated subject matter experts from the operational areas as the ”product owners” for each EA product, who were to be responsible for content. The actual design and development of the product was assigned to individuals on the EA team, and we designated these individuals as the ”product managers” Together, the product owners and the product managers develop and maintain our EA. In this collaborative relationship, we asked product owners to provide information that they Figure 6. Secret Service CONOPS already had. The product managers brought it into the architecture, organized it, identified The CONOPS not only helped us to better relationships, and developed effective understand the mission and functions of the visualizations. The product owners made sure agency, but also helped to integrate this certain the data stewarded by the product information into a unifying representation that managers was accurate. everyone could understand and relate to. An added benefit is that, like the six-perspective Finally, in developing our products, we aligned EA framework poster, it provides a useful our architecture with the DHS’s architecture by communication vehicle for the EA program. using their taxonomies as a starting point and then modifying, nesting, and extending the Secret Service architecture taxonomies as Step 7: Define, develop, and maintain appropriate. information products At this point, we were ready to develop EA products: to find existing information, bring it Step 8: Set up a single information into the EA, organize it, and present it repository effectively. In amassing information, it was tempting to store it in different databases, or ”buckets,“ for We started by defining a consistent set of the sake of convenience. However, we information products for each perspective that realized early on that we would reap the real would align with each level of the meta-model. benefits of this information only by capturing all For example, under the business perspective, of it in a single repository. We selected and we committed to developing such things as: implemented Telelogic’s (formerly Popkin • A high-level business profile that would Software) System Architect™ software product identify the major functions performed by the as our EA repository and modeling tool to 6 © Journal of Enterprise Architecture – November 2005
  • 7. achieve this objective. awareness of the EA’s day-to-day value. These include briefings, demonstrations, Although it is still in a relatively early stage of posters, business cards, and booths at various implementation, we can already see a number internal IT fairs. Further, we make the EA of benefits including ease of use through information available to all employees on our centralization, enhanced data integrity, and the intranet. ability to show relationships between elements of the architecture. LESSONS LEARNED Step 9: Apply strict configuration In the process of creating an EA process and management set of associated products for the Secret Configuration Management (CM) is the Service, we have learned a number of lessons: process of identifying, controlling, and • Focus on the mission. Use EA to capture reporting on changes. It was important to and organize voluminous organizational integrate CM into our EA because of the need information to support better decision-making, to capture and manage a mass of critical rather than as an end in itself. information across the enterprise. Specifically, we needed to track changes to the original EA • Keep it simple. Don’t develop esoteric products, so that we could ensure the models and frameworks. Instead, concentrate accuracy and integrity of the information on creating a few useful and useable products. contained in them. Therefore, we developed a • Be flexible. Develop products as the need CM plan that provides for the maintenance of for them becomes apparent, rather than pre- logs that track changes to EA products; define what you will offer. created a quarterly release schedule for new or changed products; and instituted review and • Capitalize on information visualization. As approval by product owners of new or modified the saying goes, “a picture is worth a thousand products (and their change logs) before each words.” By summarizing EA information into quarterly release of the EA. high-level visual profiles, we have distilled massive amounts of information in a concise and useful manner. Step 10: Use EA for everyday decision- making • Communicate early and often. Take the time to tell your story. No program can EA enhances decision-making by providing succeed without awareness, acceptance, and services and information in support of strategic support among key stakeholders. planning, IT investment management, and knowledge management. The EA program at the Secret Service guides strategic and tactical CONCLUSION planning, helps conduct IT investment reviews, and enables us to respond to business and We can never go back to the days of “build it technical questions from our stakeholders. and they will come.” Rather, everyone in the organization, particularly those in support We measure the use of EA for these functions functions like IT, must make it his/her job to as a benchmark of our performance against understand and respond to the needs of the the goal of providing an EA that furthers the business. In my view, this is the real strength agency’s business mission. For example, we and importance of EA. EA integrates the track the number of investment reviews business and technical information of the conducted, as well as responses to internal organization to enhance decision-making. and external requests for EA information. While not conclusive, these metrics provide Our own program improves on the traditional helpful indices for determining how useful our approach to EA by going beyond the collection EA is to the Secret Service. of voluminous information to synthesize and present it in a useful and useable format for In addition, we engage in various formal and decision makers. We achieved this goal by informal activities to enhance our users’ using a strong framework, incorporating a © Journal of Enterprise Architecture – November 2005 7
  • 8. three-tier approach to displaying the Spewak, S. H. (1992). Enterprise Architecture information, and using principles of Planning: Developing a Blueprint for Data, communication and design. Applications, and Technology. NY: Wiley & Sons. EA is a vital tool for supporting the mission of the Secret Service. Its benefits are maximized when EA program leaders deliver a clear and relevant business value proposition, work openly and collaboratively with business customers, and provide meaningful and easily accessible information. AUTHOR BIOGRAPHY Andrew Blumenthal is chief enterprise architect at the United States Secret Service. He is a certified enterprise architect (CEA) and project management professional (PMP) specializing in the implementation of best-practice information technology solutions. In addition to his work with the Secret Service, his two decades of professional experience include service at a range of leading public and private sector organizations, including the National Oceanic and Atmospheric Administration (NOAA); the United States Department of the Treasury; the Dreyfus Corporation; and International Business Machines (IBM). With an MBA in organizational behavior and a BBA in accounting, as well as numerous advanced certifications in IT, including CIO certification, Blumenthal has unique insight into the importance of IT to business success, and focuses on synthesizing IT practices with business needs, so as to provide demonstrated results in supporting the broader mission of the organization. REFERENCES Clinger-Cohen Act of 1996. (Public Law 104- 106). Section 5125, 110 Stat. 684. Integrated Definition Function Modeling Method (IDEFØ) Overview. Downloaded: www.idef.com. Office of Management and Budget (2000). OMB Circular A-130: Management of Federal Information Resources, November 30, 2000. 8 © Journal of Enterprise Architecture – November 2005