Intelligence

August 3, 2015
By George I. Seffers

Director of National Intelligence James R. Clapper announced today that he has selected Jason Matheny to be the next director of the Intelligence Advanced Research Projects Activity (IARPA), effective immediately.

July 29, 2015
By Terry Roberts

Last week I had the great honor to moderate a National Intelligence University (NIU) Foundation event at the Hart Senate Building focused on cyber intelligence and information sharing policy and practice. As it happens, I am a longtime graduate—which I hate to admit equates to three decades ago at the then-Defense Intelligence College—of the NIU Masters of Strategic Studies. And frankly I owe my 30-year love of scientific and technical intelligence to the artificial intelligence courses that NIU offered me and that I pursued with gusto at that time.

July 21, 2015
By Bill Nolte
Chattanooga residents create makeshift memorials to honor and remember the victims killed by a gunman. The event raises questions about the public's view on intelligence services.

Two separate events, each with implications for intelligence—specifically U.S. intelligence—have thrust important issues to the forefront.

July 17, 2015
By Justin Marston

Roll back the clock to 2009. With great fanfare, General Dynamics and L-3 announced the now infamous (in government circles) Secure Mobile Environment Portable Electronic Device (SME-PED) designed to be a special secure phone—one that, say, a U.S. president might use. But several problems plagued the effort, including cost, weight, short battery life and a lack of functionality. Then, “the iPhone happened,” says a former National Security Agency (NSA) executive. “We missed it. But hey, so did Blackberry and a lot of commercial companies.”

July 15, 2015
By Sandra Jontz

Cyber intelligence is the emerging buzz term as the United States works to fend off not just attacks by criminals and nation-state hackers, but terrorists calling for an electronic jihad.

June 29, 2015
By Terry Roberts

The recent breach at the Office of Personnel Management (OPM) is a cyber event that has touched many of us personally in a way that other breaches have not. It is not simply government employment data; it is the most personal and detailed of information about many of us or our protégés or friends. It is information that can be used in so many insidious ways, it is difficult to account for or imagine them all. It truly is a national security hit of the magnitude of WikiLeaks and the Snowden case because of the millions of lives, careers, families, agencies and missions that it impacts today and well into the future.

June 24, 2015
By George I. Seffers
NSA officials intend to increase open source software releases through GitHub.

The National Security Agency’s (NSA’s) recently established GitHub presence could become a focal point for releasing new technologies into the open source community. Sharing software could benefit the nation’s cybersecurity while also benefiting businesses and economic growth, officials say.

June 23, 2015
By Bill Nolte

Established organizations, especially those confronting dynamic change in their operating environments, must from time to time question which of their processes they throw away, which they revise and which will serve effectively in the future. Almost by definition, these components of the corporate culture helped the organization succeed in the past. But will they do so in the future, even one dimly foreseen?

June 4, 2015
By Lewis Shepherd

By any measure—judging from the Beltway buzz during and after—the sold-out AFCEA Intelligence Committee’s annual Spring Intelligence Symposium (May 20-21) was a success, particularly in highlighting the importance of government agencies working in partnership with the private industry to ensure rapid technological advance.

May 28, 2015
By Terry Roberts

Anyone can read countless articles about the need for cybersecurity, computer science, cyber intelligence, architecture, data analytics and information technology acquisition educated and experienced operators, engineers, analysts and managers. But until you start to experience the brain drain personally, it mostly is ethereal.

May 6, 2015
By Lewis Shepherd

Artificial intelligence, or AI, has been on my mind recently—and yes, that’s something of a sideways pun. But it’s worth exploring the phrase from another double-entendre standpoint by asking whether the nation's intelligence professionals are paying enough attention to AI.

In the past week I have seen two brand-new movies with AI at their center: the big-budget sequel Avengers: Age of Ultron (I give it one star, for CGI alone), and the more artistically minded Ex Machina (three stars, for its lyrical dialogue expressed in a long-running Turing Test of sorts).

April 28, 2015
By Terry Roberts

Although the RSA Conference (RSAC)—the cybersecurity conference, not the company—started more than 24 years ago, I have attended RSAC just three times over the past five years. The first time, I came to run (with my Carnegie Mellon University Software Engineering Institute team) one of the first cyber intelligence workshops, seeing for myself the power of open collaboration and community that RSAC brings to the cybersecurity arena. Last year I came as a TASC vice president, focused on cyber-related technical, operational and assurance work, attending as many thought leadership talks as humanly possible to hear firsthand the current thinking and direction of cybersecurity-related technologies and best practices.

April 21, 2015
By Bill Nolte

For now, the Iranian nuclear framework is just that—a midpoint in a process that will continue for several months. Already, however, we find apparent—and basic—disagreement between the principal negotiators on just what the framework is supposed to frame. Will sanctions be removed in their totality, on the completion of the accord? Or will they be removed incrementally as the inspection regime takes hold? And, for good measure, what about inspections of facilities collocated on military bases?

April 14, 2015
By Sandra Jontz
DARPA's N-ZERO program aims to develop wireless, event-driven sensors that would remain dormant until triggered by physical, electromagnetic and other activity. The technology could increase mission life, reduce battery size and reduce the maintenance costs of unattended wireless sensors.

The U.S. intelligence community's (IC's) leading edge in the information-age technology race, particularly in the intelligence, surveillance and reconnaissance (ISR) domain, has put the Defense Department at a self-imposed disadvantage, marked by some warfighters behind the curve when it comes time to process and analyze the vast amount of information collected, a former general says. 

April 9, 2015
By Maryann Lawlor

Cosmo: There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information. What we see and hear, how we work, what we think ... it's all about the information!

April 1, 2015
By Robert K. Ackerman
A soldier looks at intelligence data via the Distributed Common Ground System. The NRO’s Future Ground Architecture aims to revolutionize the capabilities of NRO assets available to ground users.

The organization tasked with deploying and maintaining orbital reconnaissance assets is working on improving its ground architecture to keep those space-based capabilities relevant amid a changing threat picture. The National Reconnaissance Office, facing stringent budget pressures, is counting on architecture and technology advances on the ground to enhance the capabilities of existing platforms hundreds of miles above the Earth.

April 6, 2015
By Lewis Shepherd

Every now and then a poll result pops up that surprises me. Results sometimes are counter-intuitive, or at least counter-narrative from what we're led to believe in major media coverage.

Case in point: An early 2015 poll shows that after nearly two years of a negative spotlight on the U.S. intelligence community, and particularly on the National Security Agency (NSA) and Central Intelligence Agency (CIA), the American people still have a positive view of the NSA and CIA. More startlingly, young Americans have more favorable views of NSA and CIA than older Americans!

March 30, 2015
By Terry Roberts

In a recent GovExec article, Kellie Lunney raised a few perspectives regarding the average age of senior executives in government today—it is the mid to late 50s—and the limited compensation flexibility. And I realized that ever since I entered the Defense Intelligence Senior Executive Service (DISES) in early 2004 and was involved in the vetting and filling of more than 40 SES positions, I have been deeply concerned about the ability of government to continuously attract, recruit and enable top talent of all ages, educational and experiential backgrounds.

April 1, 2015
By Robert K. Ackerman
This Web-based NGA map of a portion of Sierra Leone includes data compiled for the fight against Ebola. The agency expects to be providing geospatial intelligence for many more nontraditional missions in the foreseeable future.

Geospatial intelligence is moving into the fourth dimension as temporal factors weigh heavily in future capabilities. The agency tasked with generating geospatial intelligence will be relying significantly on new commercial satellites that will increase the richness of the intelligence it provides its customers.

This development cannot come at a more opportune moment. Geospatial intelligence increasingly is being called on to support nontraditional missions in new and unusual areas of focus. Even its traditional support of conventional geopolitical and military activities is being extended to include new adversaries in new hot spots around the globe.

April 1, 2015
By George I. Seffers
Future warfighters may be able to query collaborative software about available intelligence, surveillance and reconnaissance (ISR) sensors and then task a particular system to provide updated information.

Researchers from the United States and the United Kingdom aim to identify inconsistencies between the data provided by intelligence, surveillance and reconnaissance technologies and the understanding of that data by combat soldiers or other emergency personnel. The ultimate solution may be a Google- or Siri-type capability for intelligence.

Pages