In 2015, we have approximately 3 million apps that we can download to our wireless devices (iOS and Android), topping out with more than 100 billion apps to be downloaded across all devices. As a result, the hunt is on for assured privacy and security.
The Intelligence Advanced Research Projects Activity (IARPA) Office for Anticipating Surprise has initiated a competition for its Cyber-attack Automated Unconventional Sensor Environment (CAUSE) program, which aims at discovering ways to anticipate cyber attacks before they occur.
Rapidly evolving commercial solutions are having a large effect on how the intelligence community collects, processes and analyzes data to gain improved strategic agility. Enhanced reactive and predictive awareness will allow the United States to engage with global partners successfully while out-maneuvering adversaries at home and abroad. But for this to work, the U.S. government must challenge the status quo, stop accepting incremental change and push a cultural shift in policy.
As cybersecurity defenses improve, so do the breaching tactics and methods by adversaries driven to hack into commercial and government networks. And they are doing so at alarming speeds, outpacing defense efforts.
An intelligence network being developed at the Pentagon will enable military leaders to monitor disasters as they happen. The network will provide a common operating picture, allowing officials to better plan for and react to events adversely affecting the critical infrastructure and the military mission.
Challenges ranging from teaching people new ways of learning languages to providing security for homemade computer chips head the priority list for researchers at the National Security Agency. The exponential expansion of technology capabilities is perhaps matched by the growth of potential conflict areas, and both are increasing the issues faced by the agency’s research community.
Lt. Gen. Vincent Stewart, USMC, has taken command as the 20th director of the Defense Intelligence Agency, making him the first U.S. Marine to take the helm of the military’s spy agency.
Six3 Intelligence Solutions Incorporated, McLean, Virginia, was awarded a $12,783,597 firm-fixed-price multi-year contract for intelligence support services in Afghanistan with an estimated completion date of July 9, 2016. One bid was solicited with one received. Fiscal 2015 operations and maintenance (Army) funds in the amount of $9,587,697 are being obligated at the time of the award. The Army Contracting Command, Rock Island, Illinois, is the contracting activity (W560MY-15-C-0004).
With the National Geospatial-Intelligence Agency's interactive Map of the World now residing in the cloud, the intelligence agency plans to expand the tools and content.
The U.S. intelligence community is moving toward a hypernetwork of sensors and data collectors that ultimately will constitute an Internet of Things for the community and its customers. If it is successful, the intelligence community would have more data, processed into more knowledge, available more quickly and with greater fidelity for operators and decision makers.
Two researchers have won the first public challenge contest sponsored by IARPA to predict people's trustworthiness.
Radiance Technologies Inc., Huntsville, Alabama (FA8604-15-D-7976); Integrity Applications Inc., Chantilly, Virginia (FA8604-15-D- 7975); and Invertix Corp., McLean, Virginia (FA8604-15-D- 7977), have been awarded a combined $960,000,000 indefinite-delivery/ indefinite-quantity contract for services in support of the Advanced Technical Exploitation Program II.
The Boeing Company, Seattle, is being awarded a $43,283,263 modification to a previously awarded firm-fixed-price contract (N00019-12-C-0112) for integrated logistics and contractor services in support of the P-8A Poseidon Multi-mission Maritime Aircraft.
The intelligence community is striving to determine how it can work with industry early, before requirements for capabilities are confirmed, to get out ahead of challenges.
Cyber is the prime concern of the intelligence community, and going forward, every identity problem is a cyber issue.
The anniversary of 9/11 serves as a reminder of the importance of planning the national security future. In the years since, the country strengthened relationships among departments and agencies, as well as with coalition partners and allies. It also has implemented tactics, techniques, procedures and technologies for sharing information across government and with international partners.
The U.S. government is adopting changes to the cloud computing certification program that will better protect against potential insider threats. The improvements include additional penetration testing, more thorough testing of mobile devices, tighter controls over systems being carried from a facility and more stringent scrutiny of systems connecting from outside the network.
The business world is taking a cue from the gaming world, increasingly using a system of incentives and old-fashioned competition to spur engagement. Gamification, which started out on video game screens with top score designations and leaderboards, is now helping companies meet real-life objectives.
The U.S. intelligence community has suffered significant damage from a perfect storm of insider revelations and budget cutbacks. Simultaneously, the threat picture confronting the United States has grown to an unprecedented level just when intelligence organizations are hampered in their efforts to continue to protect the nation.
The United States is in the midst of preparing its largest intelligence hub outside of its own national borders. The center will accommodate operations with reach into several global areas, including those rife with anti-terrorism operations.