Intelligence

June 1, 2014
By Kent R. Schneider

The world may be more dangerous today than in any period in history. Threats are widespread and diverse. It no longer is enough to watch nation-states. In this period of asymmetric warfare, with the addition of the cyberthreat, almost anyone can become a threat to national security. In this dangerous world, the value of intelligence has risen, and the tools and means of intelligence must be richer than in the past.

June 1, 2014
By Robert K. Ackerman
A Pleiades satellite image clearly shows buildings, including Olympic venues, in Sochi, Russia. The National Geospatial-Intelligence Agency is employing its own intelligence products to help personnel from other intelligence organizations locate and identify structures worldwide that might be the source of hostile cyber activity.

The borderless world of cybersecurity now is benefitting from geospatial intelligence products. The U.S. National Geospatial-Intelligence Agency has joined the fight against cybermarauders by providing imagery to help cyberwarriors track down online adversaries. Experts defending the United States from cyber attack abroad have a new tool in their kit by being able to see the facility from which digital malefactors are plying their wares.

June 1, 2014
By George I. Seffers
The Centers for Academic Excellence-Cyber Operations program is succeeding, NSA officials say, but enthusiasm at some schools has been dampened as a result of documents leaked by former NSA contractor Edward Snowden.

The first graduates are emerging from centers of excellence for cyber operations that teach the in-depth computer science and engineering skills necessary to conduct network operations. The program better prepares graduates to defend networks and should reduce the on-the-job training needed for new hires, saving both time and money.

April 30, 2014
By George I. Seffers

Intelligence agencies could have investigated more thoroughly and shared information more effectively, but even if they had performed perfectly, they may not have been able to prevent last year's Boston Marathon bombing, according to a report delivered before the Senate Homeland Security and Governmental Affairs Committee.

May 1, 2014
BY Rita Boland
Maj. Gen. Jack Shanahan, USAF, commander, U.S. Air Force ISR Agency, extols the virtues and necessity of technology education to high school students at the Alamo First Robotics Competition.

The U.S. Air Force is emerging from almost 13 years of conflict in the Middle East with a different perspective on its intelligence, surveillance and reconnaissance. Lessons learned from those battlefields are leading to new directions that will entail abandoning traditional approaches and methods.

March 27, 2014
By George I. Seffers

Thales recently announced the company has signed a memorandum of understanding with the Qatar Armed Forces to assist in the development of an Optionally Piloted Vehicle-Aircraft (OPV-A), a high-performance intelligence, surveillance, target acquisition and reconnaissance system.

April 1, 2014
By Henry S. Kenyon
PEALDS builds on the work of preceding efforts to advance the state of data analysis, sensor fusion and storage retrieval technologies. The program’s goal is to combine these advances into a system that will enable users to predict the potential
movements and actions of enemy forces based on their previous actions.

The U.S. Air Force is using big data analysis tools to create a picture of a battlefield or area of interest that can be monitored in real time as well as stored and replayed. By merging sensor streams with data tagging and trend detection software, this capability will allow analysts and warfighters to observe, track and potentially predict enemy force operations based on their observed behavior.

April 1, 2014
By Kent R. Schneider

Open source intelligence, which is gained from the public domain, is certainly not new. Intelligence professionals have used open sources as long as intelligence has been gathered and utilized. So what is different today? Why is open source intelligence (OSINT) getting more attention and the commitment of more resources?

April 1, 2014
By George I. Seffers
Albanian soldiers are attacked in a simulated riot during training at the Joint Multinational Readiness Center in Hohenfels, Germany. Researchers working with the Intelligence Advanced Research Projects Agency use open source intelligence to predict social upheaval events.

Researchers working on behalf of the U.S. intelligence agencies can use reams of open source, anonymous data to foretell social turmoil such as disease outbreaks or international political unrest. Once fully developed, the capability to predict coming events may allow U.S. officials to more effectively respond to public health threats; to improve embassy security before an imminent attack; or to more quickly and effectively respond to humanitarian crises.

April 1, 2014
By Rita Boland

The open source domain has a set of vulnerabilities unique in the intelligence world in terms of both what enemies can misuse and critical pieces that might be absent. Because of the public nature of open source, some experts tend to discount its value, while that same feature means that patient malefactors can put together different sources of data leaking through various measures until they develop a comprehensive, damaging picture. Different technologies are helping to mitigate the dangers as the public and private sectors also work to educate their people on safer practices.

March 11, 2014
By George I. Seffers

The National Weather Service is the granddaddy of open source data, according to Adrian Gardner, chief information officer, Federal Emergency Management Agency (FEMA). And, the National Oceanic and Atmospheric Administration (NOAA) was "into big data before big data was cool," added David McClure, a data asset portfolio analyst within the NOAA Office of the Chief Information Officer.

March 10, 2014
By George I. Seffers

Following the terrorist attacks on September 11, 2001, government agencies came under widespread criticism for failing to share information and "connect the dots." By contrast, law enforcement agencies were almost universally praised following the Boston Marathon bombing and the shooting at the Navy Yard in Washington, D.C., both of which took place last year.

February 12, 2014
By Robert K. Ackerman

Having vast amounts of intelligence data will not serve U.S. military needs if it is applied only tactically, according to a U.S. Navy information dominance leader. This data must be used to understand an adversary’s strategic intent, or leaders may not act effectively.

February 1, 2014
By Col. Herbert Kemp, USAF (RET.)

As the national security establishment emerges from more than a decade of counterinsurgency warfare in Iraq and Afghanistan and refocuses on other global priorities, the means by which intelligence, surveillance and reconnaissance (ISR) supports those priorities must change as well. ISR operations in Iraq and Afghanistan have been conducted in relatively permissive air environments that have allowed the use of long-dwell airborne platforms to provide sustained surveillance of targets of interest. This has led to an imagery-, and more specifically, full motion video (FMV)-intensive pattern of collection. While these conditions may be present in some future conflicts, they do not describe many of the scenarios envisioned for potential contested environments in the future.

January 9, 2014
By George I. Seffers

The U.S. intelligence community has taken some flak lately for infiltrating online games, such as Second Life and World of Warcraft. A just-released report commissioned by the Office of the Director of National Intelligence, however, posits that the technology could be abused by extremists.

December 4, 2013
By Robert K. Ackerman

Australia has implemented a cybersecurity policy that brings together government and industry to secure the domain nationally. The country recently elevated cybersecurity as a major priority for national security, and in 2009, it established a Cyber Security Operations Center (CSOC).

December 4, 2013
By Robert K. Ackerman

Now that allied forces have accepted coalitions as a requisite for future military operations, they must undergo a cultural sea change for cybersecurity. Accepting nontraditional partners demands a new way of viewing cybersecurity that entails greater flexibility at its most philosophical level.

December 3, 2013
By Robert K. Ackerman

The U.S. Pacific Command needs effective intelligence, surveillance and reconnaissance (ISR) assets to address its increasing mission activities, according to the command’s deputy commander. Lt. Gen. Thomas L. Conant, USMC, was blunt in his assessment to the audience at the opening breakfast at TechNet Asia-Pacific 2013 in Honolulu, Hawaii.

December 1, 2013
By George I. Seffers
An Afghan Uniform Police officer provides security with a rocket-propelled grenade launcher while U.S. Army medics attend to patients at the Azrah district clinic in Logar province, Afghanistan. Artificial intelligence may one day identify rocket propelled grenades and other weapon systems.

To ease the load on weary warfighters inundated with too much information, U.S. Navy scientists are turning to artificial intelligence and cognitive reasoning technologies. Solutions that incorporate these capabilities could fill a broad array of roles, such as sounding the alarm when warfighters are about to make mistakes.

November 25, 2013
By Rita Boland

The U.S. Navy is expanding its autonomous subsurface fleet with the introduction of a platform designed for persistent intelligence, surveillance and reconnaissance as well as offensive capabilities.

Pages