Virtual Case File
   HOME

TheInfoList



OR:

Virtual Case File (or VCF) was a
software Software is a set of computer programs and associated documentation and data. This is in contrast to hardware, from which the system is built and which actually performs the work. At the lowest programming level, executable code consist ...
application developed by the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country Continental United States, primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., ...
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice ...
(FBI) between 2000 and 2005. The project was officially abandoned in April 2005, while still in development stage and cost the federal government nearly $170 million. In 2006, ''
The Washington Post ''The Washington Post'' (also known as the ''Post'' and, informally, ''WaPo'') is an American daily newspaper published in Washington, D.C. It is the most widely circulated newspaper within the Washington metropolitan area and has a large n ...
'' wrote "In a 318-page report, completed in January 2005 and obtained by The Post under the Freedom of Information Act, Aerospace_Corporation.html" ;"title="The Aerospace Corporation">Aerospace Corporation">The Aerospace Corporation">Aerospace Corporationsaid the SAIC software was incomplete, inadequate and so poorly designed that it would be essentially unusable under real-world conditions. Even in rudimentary tests, the system did not comply with basic requirements, the report said. It did not include network-management or archiving systems—a failing that would put crucial law enforcement and national security data at risk"


Origins

In September 2000, the FBI announced the "Trilogy" program, intended to modernize the bureau's outdated
Information Technology Information technology (IT) is the use of computers to create, process, store, retrieve, and exchange all kinds of data . and information. IT forms part of information and communications technology (ICT). An information technology syste ...
(IT) infrastructure. The project had three parts: purchasing modern desktop
computers A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations (computation) automatically. Modern digital electronic computers can perform generic sets of operations known as programs. These prog ...
for all FBI offices, developing secure high-performance WAN and
LAN Lan or LAN may also refer to: Science and technology * Local asymptotic normality, a fundamental property of regular models in statistics * Longitude of the ascending node, one of the orbital elements used to specify the orbit of an object in spa ...
networks, and modernizing the FBI's suite of investigative software applications. The first two goals of Trilogy were generally successful, despite cost overruns. Replacing the Bureau's Automated Case Support (ACS) software system proved difficult. It had been developed in-house by the bureau and was used to manage all documents relating to cases being investigated by the FBI, enabling agents to search and analyze evidence between different cases. The project was originally scheduled to take three years and cost US$380 million. ACS was considered by 2000 a
legacy system In computing, a legacy system is an old method, technology, computer system, or application program, "of, relating to, or being a previous or outdated computer system", yet still in use. Often referencing a system as "legacy" means that it pave ...
, made up of many separate stovepipe applications that were difficult and cumbersome to use. ACS was built on top of many obsolete 1970s-era software tools, including the programming language
Natural Nature, in the broadest sense, is the physical world or universe. "Nature" can refer to the phenomena of the physical world, and also to life in general. The study of nature is a large, if not the only, part of science. Although humans ar ...
, the ADABAS database management system, and
IBM 3270 The IBM 3270 is a family of block oriented display and printer computer terminals introduced by IBM in 1971 and normally used to communicate with IBM mainframes. The 3270 was the successor to the IBM 2260 display terminal. Due to the te ...
green screen Chroma key compositing, or chroma keying, is a visual-effects and post-production technique for compositing (layering) two images or video streams together based on colour hues ( chroma range). The technique has been used in many fields to ...
terminals. Some IT analysts believed that ACS was already obsolete when it was first deployed in 1995.


Launch

Bob E. Dies, then the bureau's assistant director of information resources and head of the Trilogy project, prepared initial plans in 2000 for a replacement to ACS and several other outdated software applications. In June 2001, a cost-plus contract for the software aspects of the project was awarded to
Science Applications International Corporation Science Applications International Corporation (SAIC), Inc. is an American technology company headquartered in Reston, Virginia that provides government services and information technology support. History The original SAIC was created in 19 ...
(SAIC), and the network aspects were contracted to DynCorp. Dies was the first of five people who would eventually be in charge of the project. The software was originally intended to be deployed in mid-2004, and was originally intended to be little more than a
web Web most often refers to: * Spider web, a silken structure created by the animal * World Wide Web or the Web, an Internet-based hypertext system Web, WEB, or the Web may also refer to: Computing * WEB, a literate programming system created by ...
front-end to the existing ACS data.


Problems and abandonment

Robert Mueller Robert Swan Mueller III (; born August 7, 1944) is an American lawyer and government official who served as the sixth director of the Federal Bureau of Investigation (FBI) from 2001 to 2013. A graduate of Princeton University and New York ...
was appointed director of the FBI in September 2001, just one week before the
September 11, 2001 attacks The September 11 attacks, commonly known as 9/11, were four coordinated suicide terrorist attacks carried out by al-Qaeda against the United States on Tuesday, September 11, 2001. That morning, nineteen terrorists hijacked four commer ...
. The attacks highlighted the Bureau's information sharing problems and increased pressure for the Bureau to modernize. In December 2001, the scope of VCF was changed with the goal being complete replacement of all previous applications and migration of the existing data into an
Oracle An oracle is a person or agency considered to provide wise and insightful counsel or prophetic predictions, most notably including precognition of the future, inspired by deities. As such, it is a form of divination. Description The word ...
database In computing, a database is an organized collection of data stored and accessed electronically. Small databases can be stored on a file system, while large databases are hosted on computer clusters or cloud storage. The design of databases ...
. Additionally, the project's deadline was pushed up to December 2003. Initial development was based on meetings with users of the current ACS system. SAIC broke its programmers up into eight separate and sometimes competing teams. One SAIC security engineer, Matthew Patton, used VCF as an example in an October 24, 2002 post on th
InfoSec News
mailing list regarding the state of federal information system projects in response to a Senator's public statements a few days earlier about the importance of doing such projects well. His post was regarded by FBI and SAIC management as attempting to " blow the whistle" on what he saw as crippling mismanagement of a
national security National security, or national defence, is the security and defence of a sovereign state, including its citizens, economy, and institutions, which is regarded as a duty of government. Originally conceived as protection against military att ...
-critical project. Patton was quickly removed from the project and eventually left SAIC for personal reasons. In December 2002, the Bureau asked the
United States Congress The United States Congress is the legislature of the federal government of the United States. It is Bicameralism, bicameral, composed of a lower body, the United States House of Representatives, House of Representatives, and an upper body, ...
for increased funding, seeing it was behind schedule. Congress approved an additional $123 million for the Trilogy project. In 2003, the project saw a quick succession of three different CIO's come and go before Zal Azmi took the job, which he held until 2008. Despite development snags throughout 2003, SAIC delivered a version of VCF in December 2003. The software was quickly deemed inadequate by the Bureau, who lamented inadequacies in the software. SAIC claimed most of the FBI's complaints stemmed from specification changes they insisted upon after the fact. On March 24, 2004, Robert Mueller testified to Congress that the system would be operational by the summer, although this seemed impractical and unlikely to happen. SAIC claimed it would require over $50 million to get the system operational, which the Bureau refused to pay. Finally, in May 2004 the Bureau agreed to pay SAIC $16 million extra to attempt to salvage the system and also brought in Aerospace Corporation to review the project at a further cost of $2 million. Meanwhile, the Bureau had already begun talks for a replacement project beginning as early as 2005. Aerospace Corp.'s generally negative report was released in the fall of 2004. Development continued throughout 2004 until the project was officially scrapped in April 2005.


Reasons for failure

The project demonstrated a systematic failure of
software engineering Software engineering is a systematic engineering approach to software development. A software engineer is a person who applies the principles of software engineering to design, develop, maintain, test, and evaluate computer software. The term '' ...
practices: Congressional Testimony, US DOJ Inspector General Glenn A. Fine, February 2005 * Lack of a strong
technical architecture Information technology architecture is the process of development of methodical information technology specifications, models and guidelines, using a variety of information technology notations, for example Unified Modeling Language (UML), within ...
("blueprint") from the outset led to poor architectural decisions * Repeated changes in specification * Repeated turnover of management, which contributed to the specification problem * Micromanagement of software developers * The inclusion of many FBI personnel who had little or no formal training in
computer science Computer science is the study of computation, automation, and information. Computer science spans theoretical disciplines (such as algorithms, theory of computation, information theory, and automation) to Applied science, practical discipli ...
as managers and even engineers on the project * Scope creep as requirements were continually added to the system even as it was falling behind schedule *
Code bloat In computer programming, code bloat is the production of program code (source code or machine code) that is perceived as unnecessarily long, slow, or otherwise wasteful of resources. Code bloat can be caused by inadequacies in the programming la ...
due to changing specifications and scope creep—at one point it was estimated the software had over 700,000 lines of code. * Planned use of a flash cutover deployment made it difficult to adopt the system until it was perfected.


Implications

The bureau faced a great deal of criticism following the failure of the VCF program. The program lost $104 million in taxpayer money. In addition, the bureau continued to use the antiquated ACS system, which many analysts felt was hampering the bureau's new
counter-terrorism Counterterrorism (also spelled counter-terrorism), also known as anti-terrorism, incorporates the practices, military tactics, techniques, and strategies that governments, law enforcement, business, and intelligence agencies use to combat or ...
mission. In March 2005, the bureau announced it was beginning a new, more ambitious software project code-named
Sentinel Sentinel may refer to: Places Mountains * Mount Sentinel, a mountain next to the University of Montana in Missoula, Montana * Sentinel Buttress, a volcanic crag on James Ross Island, Antarctica * Sentinel Dome, a naturally occurring gran ...
to replace ACS. After several delays, new leadership, a slightly bigger budget, and adoption of
agile software development In software development, agile (sometimes written Agile) practices include requirements discovery and solutions improvement through the collaborative effort of self-organizing and cross-functional teams with their customer(s)/ end user(s), ...
methodology, it was completed under budget and was in use agency-wide on July 1, 2012.


References

{{reflist


External links


IEEE Spectrum article: Who killed the virtual case file?
11 page detailed article of the entire timeline

* ttp://www.usdoj.gov/oig/testimony/0502/final.pdf Testimony of Inspector General Glenn A. Fine before the Department of Justice- February 3, 2005: Project Audit results
Testimony of Inspector General Glenn A. Fine before the Department of Justice
- July 27, 2005

* ttp://www.itconversations.com/shows/detail1688.html IEEE Spectrum Radio audio discussion of the failure.Participants are Peter Neumann, Steve Bellovin, Matt Blaze, and Robert Charette. Federal Bureau of Investigation