Intelligence

June 29, 2015
By Terry Roberts

The OPM breach should serve as a wake-up call for the government to take specific measures to protect its most valuable assets—its people and their information.

June 24, 2015
By George I. Seffers
NSA officials intend to increase open source software releases through GitHub.

The National Security Agency’s recently established GitHub presence could become a focal point for releasing new technologies into the open source community.

June 23, 2015
By Bill Nolte

The intelligence community needs to change with the times—nothing unusual about that. But, what does it hold onto and where does it let go? The process for determining these choices is as important as its consequences.

June 4, 2015
By Lewis Shepherd

The intelligence community must find a way to work with the private sector, or it risks falling dangerously behind in the key technologies that are reshaping society.

May 28, 2015
By Terry Roberts

The advanced skill sets of intelligence and cyber professionals now are applicable across the spectrum of the business world. Government risks losing this valuable group of people unless it changes its ways.

May 6, 2015
By Lewis Shepherd

Does artificial intelligence (AI) pose a threat to the human race, as many notable technologists recently have suggested? And what should be its role in the intelligence community?

April 28, 2015
By Terry Roberts

It will take many actions to secure cyberspace against intruders, and they must be implemented across the entire realm by all participants.

April 21, 2015
By Bill Nolte

Guest blogger Bill Nolte discusses how attention will shift to verification when and if the Iranian nuclear framework becomes an agreement, marking a major challenge for U.S. intelligence.

April 14, 2015
By Sandra Jontz
DARPA's N-ZERO program aims to develop wireless, event-driven sensors that would remain dormant until triggered by physical, electromagnetic and other activity. The technology could increase mission life, reduce battery size and reduce the maintenance costs of unattended wireless sensors.

The U.S. intelligence community's leading edge in the information-age technology race, particularly in the intelligence, surveillance and reconnaissance domain, has put the Defense Department at a self-imposed disadvantage, marked by some warfighters behind the curve when it comes time to process and analyze the vast amount of information collected. 

April 9, 2015
By Maryann Lawlor

Today more than ever before, it’s all about information. But, it turns out that Sneakers script writers only scratched the surface. 

April 6, 2015
By Lewis Shepherd

Guest blogger Lewis Shepherd says poll results can be surprising, especially when it comes to young people's views on the U.S. intelligence community.

April 1, 2015
By Lt. Gen. Robert M. Shea, USMC (Ret.)

Today’s intelligence community is facing new challenges. That in and of itself is not new; the community has been evolving for decades. What is new is both the changing nature of the threat and the approach that must be taken to meet it.

April 1, 2015
By George I. Seffers
Future warfighters may be able to query collaborative software about available intelligence, surveillance and reconnaissance (ISR) sensors and then task a particular system to provide updated information.

Researchers from the United States and the United Kingdom aim to identify inconsistencies between the data provided by intelligence, surveillance and reconnaissance technologies and the understanding of that data by combat soldiers or other emergency personnel.

April 1, 2015
By Robert K. Ackerman
A United Launch Alliance Atlas V launches a National Reconnaissance Office payload into orbit last year. The Office of the Director of National Intelligence is seeking to mine new intelligence technologies in government and the private sector by creating an overarching partnership among all elements of the intelligence community.

The U.S. Office of the Director of National Intelligence is matching the technology needs of the intelligence community to the capabilities of the private sector with the goal of speeding innovation to the user community as well as introducing community specialists to new technologies.

April 1, 2015
By Robert K. Ackerman
This Web-based NGA map of a portion of Sierra Leone includes data compiled for the fight against Ebola. The agency expects to be providing geospatial intelligence for many more nontraditional missions in the foreseeable future.

The agency tasked with generating geospatial intelligence will be relying significantly on new commercial satellites that will increase the richness of the intelligence it provides its customers.

April 1, 2015
By Robert K. Ackerman
A soldier looks at intelligence data via the Distributed Common Ground System. The NRO’s Future Ground Architecture aims to revolutionize the capabilities of NRO assets available to ground users.

The organization tasked with deploying and maintaining orbital reconnaissance assets is working on improving its ground architecture to keep those space-based capabilities relevant amid a changing threat picture.

March 30, 2015
By Terry Roberts

Guest blogger Terry Roberts shares concerns about the ability of government to continuously attract, recruit and enable top talent of all ages, educational and experiential backgrounds. After all, organizations and companies alike are only as good as their leadership talent pool.

March 20, 2015
By Bill Nolte

Guest blogger Bill Nolte discusses the need for a strategic review of America's intelligence.

February 27, 2015
By Terry Roberts

In 2015, we have approximately 3 million apps that we can download to our wireless devices (iOS and Android), topping out with more than 100 billion apps to be downloaded across all devices. As a result, the hunt is on for assured privacy and security.

February 26, 2015
By Maryann Lawlor

The Intelligence Advanced Research Projects Activity (IARPA) Office for Anticipating Surprise has initiated a competition for its Cyber-attack Automated Unconventional Sensor Environment (CAUSE) program, which aims at discovering ways to anticipate cyber attacks before they occur.

Pages