Intelligence

February 27, 2015
By Terry Roberts

In 2015, we have approximately 3 million apps that we can download to our wireless devices (iOS and Android), topping out with more than 100 billion apps to be downloaded across all devices. As a result, the hunt is on for assured privacy and security.

February 26, 2015
By Maryann Lawlor

The Intelligence Advanced Research Projects Activity (IARPA) Office for Anticipating Surprise has initiated a competition for its Cyber-attack Automated Unconventional Sensor Environment (CAUSE) program, which aims at discovering ways to anticipate cyber attacks before they occur.

March 1, 2015
By Tiffany Moriarty Roth

Rapidly evolving commercial solutions are having a large effect on how the intelligence community collects, processes and analyzes data to gain improved strategic agility. Enhanced reactive and predictive awareness will allow the United States to engage with global partners successfully while out-maneuvering adversaries at home and abroad. But for this to work, the U.S. government must challenge the status quo, stop accepting incremental change and push a cultural shift in policy.

February 20, 2015
By Sandra Jontz
A cyber Joint Users Interoperability Communications Exercise, or JUICE, takes place at Aberdeen Proving Ground, Maryland.

As cybersecurity defenses improve, so do the breaching tactics and methods by adversaries driven to hack into commercial and government networks. And they are doing so at alarming speeds, outpacing defense efforts. 

March 1, 2015
By George I. Seffers
A Standard Missile 3 is launched from the guided missile cruiser USS Shiloh during a ballistic missile flight test in the Pacific Ocean. Virtually every wartime mission for the U.S. Defense Department, including command and control of major weapon systems, relies on information technology, making cybersecurity a top priority for critical infrastructure protection.

An intelligence network being developed at the Pentagon will enable military leaders to monitor disasters as they happen. The network will provide a common operating picture, allowing officials to better plan for and react to events adversely affecting the critical infrastructure and the military mission.

March 1, 2015
By Robert K. Ackerman

Challenges ranging from teaching people new ways of learning languages to providing security for homemade computer chips head the priority list for researchers at the National Security Agency. The exponential expansion of technology capabilities is perhaps matched by the growth of potential conflict areas, and both are increasing the issues faced by the agency’s research community.

January 26, 2015
By Sandra Jontz
Lt. Gen. Vincent Stewart, USMC, is the first Marine director to lead the DIA. He previously served as the head of Marine Forces Cyber.

Lt. Gen. Vincent Stewart, USMC, has taken command as the 20th director of the Defense Intelligence Agency, making him the first U.S. Marine to take the helm of the military’s spy agency.

January 12, 2015

Six3 Intelligence Solutions Incorporated, McLean, Virginia, was awarded a $12,783,597 firm-fixed-price multi-year contract for intelligence support services in Afghanistan with an estimated completion date of July 9, 2016. One bid was solicited with one received. Fiscal 2015 operations and maintenance (Army) funds in the amount of $9,587,697 are being obligated at the time of the award. The Army Contracting Command, Rock Island, Illinois, is the contracting activity (W560MY-15-C-0004).

December 12, 2014
By George I. Seffers

With the National Geospatial-Intelligence Agency's interactive Map of the World now residing in the cloud, the intelligence agency plans to expand the tools and content.

January 1, 2015
By Robert K. Ackerman
A soldier with the 3rd Infantry Division monitors activity from an unmanned aerial vehicle. Warfighters and decision makers may have access to better information more rapidly if the intelligence community is able to realize its goal of an intelligence Internet of Things.

The U.S. intelligence community is moving toward a hypernetwork of sensors and data collectors that ultimately will constitute an Internet of Things for the community and its customers. If it is successful, the intelligence community would have more data, processed into more knowledge, available more quickly and with greater fidelity for operators and decision makers.

October 9, 2014
By Sandra Jontz

Two researchers have won the first public challenge contest sponsored by IARPA to predict people's trustworthiness.

October 6, 2014

Radiance Technologies Inc., Huntsville, Alabama (FA8604-15-D-7976); Integrity Applications Inc., Chantilly, Virginia (FA8604-15-D- 7975); and Invertix Corp., McLean, Virginia (FA8604-15-D- 7977), have been awarded a combined $960,000,000 indefinite-delivery/ indefinite-quantity contract for services in support of the Advanced Technical Exploitation Program II.

September 30, 2014

The Boeing Company, Seattle, is being awarded a $43,283,263 modification to a previously awarded firm-fixed-price contract (N00019-12-C-0112) for integrated logistics and contractor services in support of the P-8A Poseidon Multi-mission Maritime Aircraft.

September 18, 2014
By Rita Boland

The intelligence community is striving to determine how it can work with industry early, before requirements for capabilities are confirmed, to get out ahead of challenges.

September 17, 2014
By Rita Boland

Cyber is the prime concern of the intelligence community, and going forward, every identity problem is a cyber issue.

September 11, 2014
By George I. Seffers

The anniversary of 9/11 serves as a reminder of the importance of planning the national security future. In the years since, the country strengthened relationships among departments and agencies, as well as with coalition partners and allies. It also has implemented tactics, techniques, procedures and technologies for sharing information across government and with international partners.

October 1, 2014
By George I. Seffers

The U.S. government is adopting changes to the cloud computing certification program that will better protect against potential insider threats. The improvements include additional penetration testing, more thorough testing of mobile devices, tighter controls over systems being carried from a facility and more stringent scrutiny of systems connecting from outside the network.

August 14, 2014
By Cyndy Hogan

The business world is taking a cue from the gaming world, increasingly using a system of incentives and old-fashioned competition to spur engagement. Gamification, which started out on video game screens with top score designations and leaderboards, is now helping companies meet real-life objectives.

September 1, 2014
By Robert K. Ackerman
Director of National Intelligence James R. Clapper warns of increasing global threats amid severe intelligence budget cuts.

The U.S. intelligence community has suffered significant damage from a perfect storm of insider revelations and budget cutbacks. Simultaneously, the threat picture confronting the United States has grown to an unprecedented level just when intelligence organizations are hampered in their efforts to continue to protect the nation.

 

September 1, 2014
By Rita Boland

The United States is in the midst of preparing its largest intelligence hub outside of its own national borders. The center will accommodate operations with reach into several global areas, including those rife with anti-terrorism operations.

Pages