Intelligence

April 1, 2015
By Lt. Gen. Robert M. Shea, USMC (Ret.)

Today’s intelligence community is facing new challenges. That in and of itself is not new; the community has been evolving for decades. What is new is both the changing nature of the threat and the approach that must be taken to meet it.

At the top of everyone’s solution list is information sharing. As intelligence information is collected, it must be shared among agencies, civilian government organizations, including the law enforcement community, and international partners. And, this information must be accurate and effective, not merely comprehensive.

April 1, 2015
By Robert K. Ackerman
A United Launch Alliance Atlas V launches a National Reconnaissance Office payload into orbit last year. The Office of the Director of National Intelligence is seeking to mine new intelligence technologies in government and the private sector by creating an overarching partnership among all elements of the intelligence community.

The U.S. Office of the Director of National Intelligence is matching the technology needs of the intelligence community to the capabilities of the private sector with the goal of speeding innovation to the user community as well as introducing community specialists to new technologies.

This program eschews individual matchmaking between separate intelligence disciplines in favor of a broad effort that encompasses all the technological needs of the intelligence community. The idea is to cast a net across the intelligence research community to collect ideas and innovations that might be applied to areas where they are not even known.

March 20, 2015
By Bill Nolte

A year or two ago, I wrote an article proposing a Hart-Rudman Commission for the 21st Century, referring to a neglected effort from the 1990s to review America’s national security. (I’m happy to share the article, along with its rejection letters.) More recently I have advocated at several events for a strategic review of intelligence, more than a decade after the post-9/11 “reforms.” Its focus should be a study of the environments U.S. intelligence could face in 2030 or 2040. The consequences of such a study should be a rigorous evaluation of existing structures and processes, presumably reaffirming some while altering or eliminating others.

March 1, 2015
By Robert K. Ackerman

Challenges ranging from teaching people new ways of learning languages to providing security for homemade computer chips head the priority list for researchers at the National Security Agency. The exponential expansion of technology capabilities is perhaps matched by the growth of potential conflict areas, and both are increasing the issues faced by the agency’s research community.

March 1, 2015
By Tiffany Moriarty Roth

Rapidly evolving commercial solutions are having a large effect on how the intelligence community collects, processes and analyzes data to gain improved strategic agility. Enhanced reactive and predictive awareness will allow the United States to engage with global partners successfully while out-maneuvering adversaries at home and abroad. But for this to work, the U.S. government must challenge the status quo, stop accepting incremental change and push a cultural shift in policy.

March 1, 2015
By George I. Seffers
A Standard Missile 3 is launched from the guided missile cruiser USS Shiloh during a ballistic missile flight test in the Pacific Ocean. Virtually every wartime mission for the U.S. Defense Department, including command and control of major weapon systems, relies on information technology, making cybersecurity a top priority for critical infrastructure protection.

An intelligence network being developed at the Pentagon will enable military leaders to monitor disasters as they happen. The network will provide a common operating picture, allowing officials to better plan for and react to events adversely affecting the critical infrastructure and the military mission.

February 27, 2015
By Terry Roberts

Several years back, my tech savvy college student son, Michael, was helping me to set up my new (at that time) iPhone 4. When he was done, he had downloaded several applications (apps) that he thought I would want to have such as BBC News, his Radford University app, Pandora, etc.  But instead of being an appreciative mother, the paranoid career intelligence professional screamed inside: What did he put on my phone (that I use for work and my entire personal life)? I have no clue what these apps could do to the privacy and security of my data and all my communications.

February 26, 2015
By Maryann Lawlor

The Intelligence Advanced Research Projects Activity (IARPA) is looking for a few good ideas. The organization’s Office for Anticipating Surprise has initiated a competition for its Cyber-attack Automated Unconventional Sensor Environment (CAUSE) program, which aims at discovering ways to anticipate cyber attacks before they occur.

February 20, 2015
By Sandra Jontz
A cyber Joint Users Interoperability Communications Exercise, or JUICE, takes place at Aberdeen Proving Ground, Maryland.

As cybersecurity defenses improve, so do the breaching tactics and methods by adversaries driven to hack into commercial and government networks. And they are doing so at alarming speeds.

“The threat that I see currently from our adversaries of organized crime groups, terrorist organizations and nation-states is increasing at an unbelievably fast pace,” Shawn Henry, president and chief security officer of the cyberthreat tracking company CrowdStrike Services, told a gathering at AFCEA’s Emerging Professionals in Intelligence Committee (EPIC) speaker series.

January 26, 2015
By Sandra Jontz
Lt. Gen. Vincent Stewart, USMC, is the first Marine director to lead the DIA. He previously served as the head of Marine Forces Cyber.

Lt. Gen. Vincent Stewart, USMC, has taken command as the 20th director of the Defense Intelligence Agency, making him the first U.S. Marine to take the helm of the military’s spy agency.

In his new role, Gen. Stewart also serves as the Joint Functional Component Command for Intelligence, Surveillance and Reconnaissance (ISR). He is stationed at DIA headquarters at Joint Base Anacostia-Bolling in Washington, D.C.

December 12, 2014
By George I. Seffers

The National Geospatial-Intelligence Agency (NGA) became the first intelligence agency to host an operational capability within Amazon Web Services’ Commercial Cloud Services (C2S) environment after Lockheed Martin deployed NGA’s interactive Map of the World to C2S. With the Map of the World viewer, which could be compared to Google Maps or similar applications, now resting in the cloud, NGA officials intend to add more data and capabilities.

January 1, 2015
By Robert K. Ackerman
A soldier with the 3rd Infantry Division monitors activity from an unmanned aerial vehicle. Warfighters and decision makers may have access to better information more rapidly if the intelligence community is able to realize its goal of an intelligence Internet of Things.

The U.S. intelligence community is moving toward a hypernetwork of sensors and data collectors that ultimately will constitute an Internet of Things for the community and its customers. If it is successful, the intelligence community would have more data, processed into more knowledge, available more quickly and with greater fidelity for operators and decision makers.

For the intelligence community, the Internet of Things (IoT) takes the same approach as that of the commercial world, but it substitutes sensors and other data collection devices for consumer electronics. An intelligence IoT could comprise physical sensors, control devices, multipurpose communications and processing equipment and user interfaces, for example.

January 12, 2015

Six3 Intelligence Solutions Incorporated, McLean, Virginia, was awarded a $12,783,597 firm-fixed-price multi-year contract for intelligence support services in Afghanistan with an estimated completion date of July 9, 2016. One bid was solicited with one received. Fiscal 2015 operations and maintenance (Army) funds in the amount of $9,587,697 are being obligated at the time of the award. The Army Contracting Command, Rock Island, Illinois, is the contracting activity (W560MY-15-C-0004).

October 9, 2014
By Sandra Jontz

There’s no trick behind this JEDI MIND.

That’s because the Joint Estimation of Deception Intent via Multisource Integration of Neuropsychological Discriminators (yes, that leads to the acronym JEDI MIND) is a complicated algorithm solution to a question posed by a leading intelligence agency research arm: Who can you trust?

Troy Lau and Scott Kuzdeba won the Intelligence Advanced Research Projects Activity's (IARPA's) first public challenge contest, titled Investigating Novel Statistical Techniques to Identify Neurophysiological Correlates of Trustworthiness (INSTINCT).

October 6, 2014

Radiance Technologies Inc., Huntsville, Alabama (FA8604-15-D-7976); Integrity Applications Inc., Chantilly, Virginia (FA8604-15-D- 7975); and Invertix Corp., McLean, Virginia (FA8604-15-D- 7977), have been awarded a combined $960,000,000 indefinite-delivery/ indefinite-quantity contract for services in support of the Advanced Technical Exploitation Program II. Contractors will perform research, development, system sustainment, and intelligence production activities utilizing geospatial-intelligence and non-nuclear measurement and signature intelligence data at the National Air and Space Intelligence Center.

September 30, 2014

The Boeing Company, Seattle, is being awarded a $43,283,263 modification to a previously awarded firm-fixed-price contract (N00019-12-C-0112) for integrated logistics and contractor services in support of the P-8A Poseidon Multi-mission Maritime Aircraft. The company also has been awarded an $11,757,200 modification to a previously awarded firm-fixed-price contract (N00019-12-C-0112) for training specific data storage architecture updates and upgrades in support of the P-8A Poseidon Multi-mission Maritime Aircraft, to include hardware, software, and integration. The Naval Air Warfare Center, Training Systems Division, Orlando, Florida, is the contracting activity.

September 18, 2014
By Rita Boland

The intelligence community is striving to determine how it can work with industry early, before requirements for capabilities are confirmed, to get out ahead of challenges. Leaders want to adopt technology in some of the first phases rather than at the end. The Office of the Director of National Intelligence (ODNI) is looking to standardize capabilities across the intelligence community, determining how its many members can collaborate.

September 17, 2014
By Rita Boland

Cyber is the prime concern of the intelligence community, Sean Kanuck, national intelligence officer for cyber issues, Office of the Director of National Intelligence, said today at the Global Identity Summit in Tampa. Not only is cyber an immense problem in itself, but it also pervades all other national security concerns, including biometrics.

September 11, 2014
By George I. Seffers

The Online Show Daily: Day 3

The final day of AFCEA TechNet Augusta 2014 kicked off with a solemn remembrance of the September 11, 2001 terrorist attacks that rocked the nation. The conference then, necessarily, moved on to the future.

July 14, 2014
By George I. Seffers

The National Institute of Standards and Technology (NIST) primary external advisory board today announced a report calling for the agency to increase its staff of cryptography experts and to implement more explicit processes for ensuring openness and transparency to strengthen its cryptography efforts. In making its recommendations, the Visiting Committee on Advanced Technology (VCAT) specifically addressed NIST’s interactions with the National Security Agency (NSA).

Pages