FAS

Principles for Implementing IC IT Enterprise

12.10.15 | 2 min read | Text by Steven Aftergood

The guiding principles for implementing and operating the Intelligence Community (IC) Information Technology Enterprise (ITE) were set forth in a 2013 memorandum from the Director of National Intelligence that was recently released under the Freedom of Information Act.

The purpose of IC ITE (pronounced “eye sight”) is to establish a common information architecture for the entire U.S. intelligence community, thereby fostering integration and making information sharing among agencies the default option.

“Information acquired, collected, or produced by IC elements shall be available for access for all IC missions and functions, subject to applicable legal and policy requirements,” the 2013 DNI memo said.

Once available through IC ITE, however, access is still to be limited by need-to-know. “Determinations about access to and use of such information within IC ITE shall continue to be based upon content and mission need.”

Nevertheless, agencies are expected and required to make “their” information available to the larger IC. “Unless a discovery exemption has been obtained, originating IC elements shall authorize and provide for automated discovery and retrieval of intelligence and intelligence-related information in IC ITE.”

“IC ITE moves the IC from an agency-centric IT architecture to a common platform where the Community easily and securely shares technology, information, and resources,” according to an ODNI fact sheet. “These new capabilities, with seamless and secure access to Community-wide information, will positively and deeply change how users communicate, collaborate, and perform their mission.”

IC ITE technically “went live” in 2013, but it is still at an early stage of development.

“The classified annex of the Intelligence Authorization Act for Fiscal Year 2015 required the CIA, DIA, NRO, NGA, and NSA to provide specific plans for adoption of IC ITE-compliant capabilities,” the Senate Intelligence Committee noted in a report earlier this year.

publications
See all publications
Global Risk
Blog
The Pentagon’s (Slimmed Down) 2025 China Military Power Report

On Tuesday, December 23rd, the Department of Defense released its annual congressionally-mandated report on China’s military developments, also known as the “China Military Power Report,” or “CMPR.” The report is typically a valuable injection of information into the open source landscape, and represents a useful barometer for how the Pentagon assesses both the intentions and […]

01.09.26 | 7 min read
read more
Global Risk
Report
On the Precipice: Artificial Intelligence and the Climb to Modernize Nuclear Command, Control, and Communications

Successful NC3 modernization must do more than update hardware and software: it must integrate emerging technologies in ways that enhance resilience, ensure meaningful human control, and preserve strategic stability.

01.08.26 | 2 min read
read more
Global Risk
Blog
What’s New for Nukes in the New NDAA?

The FY2026 National Defense Authorization Act (NDAA) paints a picture of a Congress that is working to both protect and accelerate nuclear modernization programs while simultaneously lacking trust in the Pentagon and the Department of Energy to execute them.

12.18.25 | 5 min read
read more
FAS
Blog
“I’ve always been around people who make a living by caring”: an interview with Impact Fellow John Whitmer

For Impact Fellow John Whitmer, working in public service was natural. “I’ve always been around people who make a living by caring.”

12.18.25 | 3 min read
read more