Intelligence

July 23, 2018
Posted by George I. Seffers
Social media data could become integral to detecting violations of nuclear nonproliferation agreements. Researchers have developed a computation model that incorporates often incompatible sources of data, such as satellite imagery and Twitter posts that indicate when a violation has occurred. Credit: Geralt/Pixabay

Researchers at North Carolina (NC) State University have developed a new computational model that draws on normally incompatible data sets, such as satellite imagery and social media posts, to answer questions about what is happening in targeted locations. The model identifies violations of nuclear nonproliferation agreements.

June 6, 2018
Posted by Kimberly Underwood
Vice Adm. Nancy Norton, USN, pictured at DCOS, looks to the National Background Information System, which DISA built and will operate, to advance the country¹s efforts in federal background investigations. Credit: Mike Carpenter

A new information technology system from the Defense Information Systems Agency (DISA) is set to improve how the federal government conducts background investigations.

More than 4.08 million individuals hold a federal security clearance, according to the Office of the Director of National Intelligence (DNI), National Counterintelligence and Security Center’s Annual Report on Security Clearance Determinations. And it can take federal agencies more than 500 days to process security clearance cases, including background investigations.

March 30, 2018
By Maryann Lawlor
Charlie Allen, principal at The Chertoff Group, says the Intelligence Community must do a better job of anticipating abrupt discontinuities in adversaries' actions.

The generation that remembers “duck and cover” also recalls headlines that included the words Soviet Union and impending dangers. Today, a combination of global instability, rising authoritarianism and democracies in retreat may lead to similar yet more dangerous situations, and this time, the headlines also are likely to include the words “People's Republic of China.”

April 3, 2018
Robert K. Ackerman
Former government intelligence officer Maureen A. Baginski believes open-source material, supplemented with classified data, should be the primary information around which analysts build knowledge.

The intelligence community has gone from scarcity to surfeit in terms of information, and it must adopt a new paradigm or lose the advantages it has from improved collection, according to a retired intelligence official. The best approach for achieving this is to use open-source material as core information and then supplement it with classified material.

April 1, 2018
By George I. Seffers
NASA’s development of new communications satellites began in 1960 based on the theory that placing them in a geosynchronous orbit would keep the satellites in the same area of the sky relative to the rotating Earth. Just 17 months later, NASA launched Syncom I, but the satellite stopped sending signals a few seconds before it reached its final orbit and was soon replaced by Syncom II.  NASA

Researchers working on behalf of the U.S. intelligence community are kicking off a program designed to develop a revolutionary capability for monitoring objects in geostationary orbit, including functioning satellites and hundreds of thousands of bits of space debris. The program will attempt to provide low-cost approaches for passive ground-based interferometric imaging of space objects, a technique using two or more telescopes or lenses.

March 26, 2018
By Maryann Lawlor
Lewis Shepherd (l), executive consultant on advanced technologies at Deloitte, spoke with Jeff Bezos, founder of Amazon and Blue Origin, about the rapid changes in technology at the AFCEA 2017 Spring Intelligence Symposium.

While stopping weapons of mass destruction and cyber attacks are high security priorities, the kinetic effects from cyber forces are a looming threat today. Malevolent uses for artificial intelligence combined with autonomous systems provide frightening new levels of capabilities to potential adversaries, and the U.S. Defense Department and the intelligence community are being called upon to address them with extraordinary vigor.

March 22, 2018
By George I. Seffers
A NATO AWACS takes off from Forward Operating Location Ørland in Norway during during a training exercise. This summer’s Unified Vision will allow NATO officials to assess a variety of intelligence, surveillance and reconnaissance capabilities. Credit: Photo courtesy of NATO E-3A Component Public Affairs Office

When NATO first envisioned a joint intelligence, surveillance and reconnaissance (ISR) capability following a 2012 summit in Chicago, alliance members were not at all sure exactly what that meant, says Matt Roper, the chief of joint ISR within NATO’s Communications and Information Agency.

March 13, 2018
By Kimberly Underwood
Army Sgt. K.C. Pless applies camouflage paint before a multinational weapons training session with Danish troops in Estonia on March 10 in support of support Operation Atlantic Resolve. As the Army operates in an ever-changing world, the service’s military intelligence needs to provide a counter to the evolving threats. Army photo by Spc. Hubert D. Delany III

The U.S. Army Intelligence and Security Command (INSCOM) at Fort Belvoir, Virginia, recently tapped Herndon, Virginia-based ManTech International Corporation to provide counter-intelligence and counter-terrorism support to the command and the command’s 902nd Military Intelligence Group at Fort Meade, Maryland. The $133 million award is for one year, with contract options that could extend the work through 2020.

March 6, 2018
By George I. Seffers
Lt. Gen. Scott Berrier, Army deputy chief of staff, G-2, speaks at the AFCEA Army Signal Conference.

Cloud computing, big data and cyber are among the capabilities that pose a major threat to U.S. forces, said Lt. Gen. Scott Berrier, Army deputy chief of staff, G-2.

“If you’re a threat actor out there, probably a little bit of investment in these areas is going to go a long way to make life very difficult for your adversaries,” Gen. Berrier told the audience at the AFCEA Army Signal Conference in Springfield, Virginia.

March 1, 2018
By George I. Seffers
The Air Force Distributed Common Ground Station is receiving a new open architecture that will allow more rapid adoption of new capabilities and is destined to obtain deep learning technology to enhance data analysis and multidomain command and control.

The U.S. Air Force is deploying a new open architecture for its primary intelligence, surveillance and reconnaissance system. At the same time, Air Force researchers are developing deep learning capabilities that will allow the decades-old system to sort through reams of data more easily, enabling faster decision making on the battlefield and enhancing multidomain command and control.

March 1, 2018
By Kimberly Underwood
Metron uses statistical methods to create inference tools for the Navy.  Metron Scientific Solutions

Employing modern statistical inference tools can provide the U.S. Navy a bridge to improved searching and tracking for people, planes and ships across land and sea. The ability of the tools to incorporate even spotty intelligence data to help locate individuals elevates the Navy’s command and control posture and ultimately aids in protecting the United States from security threats.

February 22, 2018
By Beverly Cooper
(Photography Shutterstock/Serp)

Recognizing analytical gaps spanning innovative technical system analytics, physics studies and modeling and simulation capabilities is a critical component of successful maritime C4ISR efforts. However, the opportunities to hear and discuss these challenges and potential solutions in effective ways are limited by the need for a classified venue and the availability of intelligence personnel with the necessary level of deep technical expertise. 

February 16, 2018
 
The intelligence community is schooling election officials on the risks of adversarial influence campaigns during elections. Credit: Shutterstock/Alexandru Nika

The Office of the Director of National Intelligence (ODNI) announced it is stepping up efforts to combat the risks of adversarial influence campaigns against American democracy. Together with the Department of Homeland Security (DHS) and the FBI, the ODNI will give a classified briefing to election officials in every U.S. state on February 16 and 18.

February 13, 2018
Posted By George I. Seffers
NASA’s Terra spacecraft provides an image of Moscow. IARPA has launched a program intended to significantly reduce the amount of time it takes to build 3-D models of satellite imagery. Credit: NASA/GSFC/METI/ERSDAC/JAROS, and U.S./Japan ASTER Science Team

The Intelligence Advanced Research Projects Activity (IARPA), within the Office of the Director of National Intelligence, has established a multiyear research plan to build 3-D models that leverage satellite imagery to support the nation’s military, humanitarian and intelligence missions. The Creation of Operationally Realistic 3-D Environment (CORE3D) program is intended to significantly reduce the time it takes to build 3-D models.

February 1, 2018
By Kimberly Underwood
As part of the U.S. National Defense Strategy, Secretary of Defense Jim Mattis is calling for investments in C4ISR to field capabilities that will “gain and exploit information, deny competitors those same advantages and enable us to provide attribution while defending against and holding accountable state or non-state actors during cyber attacks.”

No longer can the U.S. military bank on ensured victories. The battlefield is more lethal and disruptive, is conducted at breakneck speeds and reaches further around the globe. And although fighting terrorism has gripped the military’s focus for the last 16 years, it is the rise of so-called inter-state strategic competition against nations such as China and Russia that will now be the primary concern for U.S. national security.

December 13, 2017
By Robert K. Ackerman
A U.S. Air Force U-2 lands at Al Dhafra Air Base in the United Arab Emirates. The Air Force is developing a new intelligence, surveillance and reconnaissance (ISR) strategy that focuses on data instead of collection platforms.

The U.S. Air Force is shifting its emphasis in intelligence, surveillance and reconnaissance (ISR) away from platforms and toward data as it develops a new ISR strategy. Planners are aiming at a new approach that changes how ISR is undertaken and how it benefits decision makers and warfighters alike.

The new strategy is being built around a core philosophy: “We cannot continue to conduct ISR in the same old ways using the same old methods,” states Col. Johnson Rossow, USAF, Air Force A-2 chief of capabilities-based planning under the Future Warfare Directorate. “We need to be looking at … using old tools in new ways, or new tools in new ways.”

February 1, 2018
By Terry Halvorsen

In today’s world, the most valuable resource is information. The fastest-growing companies are data companies. Firms that can apply decision-quality information in time to affect critical business decisions are reaping the greatest success. Just as in warfare, the force that can bring intelligence to the battle edge in near real time will have a tremendous advantage in any engagement.

December 1, 2017
By Margaret S. Marangione

As the need for new analysts continues to grow, the intelligence community is looking to add millennials, the largest generation in the U.S. work force. These young people—born between about 1980 and 2000—bring a new perspective, but teaching them the necessary skills for analysis must be done differently than it was in even the recent past. Their attitudes and thought processes are vastly different from their predecessors, requiring a new approach to intelligence training and education to make the best use of their abundant skills.

November 1, 2017
By Beverly Cooper
Tools that help the big data problem are one of the technologies most desired in the cyber realm, according to panelists at AFCEA TechNet Asia-Pacific., l-r: Maj Gen. Jeffrey A. Kruse, USAF; Capt. Dale C. Rielage, USN; Lt. Col. Ed Guevara, USAF; Col. Pete Don, USA; and Col. Matt Rau, USMC.

In today’s big data environments, it is not that “we don’t know what we don’t know.” It is actually “we don’t know what we do know,” according to Col. Pete Don, USA, deputy senior intelligence officer for intelligence operations, U.S. Army Pacific. “We are being dazzled with so much data that it is hard to focus and find the needle in the haystack." The net seizes our attention only to scatter it, he contends. Col. Don joined three other colleagues as part of a panel on cybersecurity intelligence at TechNet Asia-Pacific

November 1, 2017
By Cmdr. Bryan Leese, USN, and Brooke Wright
The aircraft carrier USS George H.W. Bush (l), the guided-missile destroyer USS Truxtun (c) and the guided-missile cruiser USS Philippine Sea transit the Strait of Gibraltar. The George H.W. Bush Carrier Strike Group helped prove the afloat geospatial intelligence concept through the National Geospatial-Intelligence Agency’s ship rider program.

The U.S. Navy has outsourced geospatial intelligence at sea, delaying its investment in a solution to this core intelligence competency for the afloat commander. The service needs to train its analysts to produce geospatial intelligence and acquire software and hardware for them. A cost-effective systems solution exists, but the lack of commitment to geospatial intelligence holds the Navy back.

Pages