Intelligence

October 9, 2014
By Sandra Jontz

There’s no trick behind this JEDI MIND.

That’s because the Joint Estimation of Deception Intent via Multisource Integration of Neuropsychological Discriminators (yes, that leads to the acronym JEDI MIND) is a complicated algorithm solution to a question posed by a leading intelligence agency research arm: Who can you trust?

Troy Lau and Scott Kuzdeba won the Intelligence Advanced Research Projects Activity's (IARPA's) first public challenge contest, titled Investigating Novel Statistical Techniques to Identify Neurophysiological Correlates of Trustworthiness (INSTINCT).

October 6, 2014

Radiance Technologies Inc., Huntsville, Alabama (FA8604-15-D-7976); Integrity Applications Inc., Chantilly, Virginia (FA8604-15-D- 7975); and Invertix Corp., McLean, Virginia (FA8604-15-D- 7977), have been awarded a combined $960,000,000 indefinite-delivery/ indefinite-quantity contract for services in support of the Advanced Technical Exploitation Program II. Contractors will perform research, development, system sustainment, and intelligence production activities utilizing geospatial-intelligence and non-nuclear measurement and signature intelligence data at the National Air and Space Intelligence Center.

September 30, 2014

The Boeing Company, Seattle, is being awarded a $43,283,263 modification to a previously awarded firm-fixed-price contract (N00019-12-C-0112) for integrated logistics and contractor services in support of the P-8A Poseidon Multi-mission Maritime Aircraft. The company also has been awarded an $11,757,200 modification to a previously awarded firm-fixed-price contract (N00019-12-C-0112) for training specific data storage architecture updates and upgrades in support of the P-8A Poseidon Multi-mission Maritime Aircraft, to include hardware, software, and integration. The Naval Air Warfare Center, Training Systems Division, Orlando, Florida, is the contracting activity.

September 18, 2014
By Rita Boland

The intelligence community is striving to determine how it can work with industry early, before requirements for capabilities are confirmed, to get out ahead of challenges. Leaders want to adopt technology in some of the first phases rather than at the end. The Office of the Director of National Intelligence (ODNI) is looking to standardize capabilities across the intelligence community, determining how its many members can collaborate.

September 17, 2014
By Rita Boland

Cyber is the prime concern of the intelligence community, Sean Kanuck, national intelligence officer for cyber issues, Office of the Director of National Intelligence, said today at the Global Identity Summit in Tampa. Not only is cyber an immense problem in itself, but it also pervades all other national security concerns, including biometrics.

September 11, 2014
By George I. Seffers

The Online Show Daily: Day 3

The final day of AFCEA TechNet Augusta 2014 kicked off with a solemn remembrance of the September 11, 2001 terrorist attacks that rocked the nation. The conference then, necessarily, moved on to the future.

July 14, 2014
By George I. Seffers

The National Institute of Standards and Technology (NIST) primary external advisory board today announced a report calling for the agency to increase its staff of cryptography experts and to implement more explicit processes for ensuring openness and transparency to strengthen its cryptography efforts. In making its recommendations, the Visiting Committee on Advanced Technology (VCAT) specifically addressed NIST’s interactions with the National Security Agency (NSA).

July 14, 2014
By George I. Seffers

The National Security Agency (NSA) has selected five more schools for the National Centers of Academic Excellence (CAE) in Cyber Operations Program, which is designed to cultivate more U.S. cyber professionals. These schools are now designated as Cyber Operations CAEs for the 2014-2019 academic years:

March 27, 2014
By George I. Seffers

Thales recently announced the company has signed a memorandum of understanding with the Qatar Armed Forces to assist in the development of an Optionally Piloted Vehicle-Aircraft (OPV-A), a high-performance intelligence, surveillance, target acquisition and reconnaissance system. The OPV-A will be a hybrid between a conventional and unmanned aircraft capable of flying with or without a pilot on board. Unimpeded by a human’s physiological limitations, an OPV-A is able to operate under more adverse conditions and/or for greater endurance times. The airframe, to be selected by the Qatar Armed Forces, will be integrated with a mission systems capability to enable the optionally piloted capability.

March 11, 2014
By George I. Seffers

The National Weather Service is the granddaddy of open source data, according to Adrian Gardner, chief information officer, Federal Emergency Management Agency (FEMA). And, the National Oceanic and Atmospheric Administration (NOAA) was "into big data before big data was cool," added David McClure, a data asset portfolio analyst within the NOAA Office of the Chief Information Officer. The two officials made their comments during a panel on big data analytics at the AFCEA Homeland Security Conference in Washington, D.C.

March 10, 2014
By George I. Seffers

Following the terrorist attacks on September 11, 2001, government agencies came under widespread criticism for failing to share information and "connect the dots." By contrast, law enforcement agencies were almost universally praised following the Boston Marathon bombing and the shooting at the Navy Yard in Washington, D.C., both of which took place last year, pointed out panelists at the AFCEA Homeland Security Conference in Washington, D.C. on Monday.

February 12, 2014
By Robert K. Ackerman

Having vast amounts of intelligence data will not serve U.S. military needs if it is applied only tactically, according to a U.S. Navy information dominance leader. This data must be used to understand an adversary’s strategic intent, or leaders may not act effectively.

Rear Adm. Paul Becker, USN, director for intelligence, J-2, Joint Chiefs of Staff, raised that issue during the Wednesday morning keynote panel at West 2014 in San Diego. Adm. Becker warned that military leaders must be able to glean a deep understanding of an adversary’s mindset, strategy and intent. “We often are at an information deficit in that area,” he stated.

January 9, 2014
By George I. Seffers

The U.S. intelligence community has taken some flak lately for infiltrating online games, such as Second Life and World of Warcraft. A just-released report commissioned by the Office of the Director of National Intelligence, however, posits that the technology could be abused by extremists.

November 7, 2013
By Robert K. Ackerman

Big Data increasingly is viewed as the future of knowledge management, aided and abetted by the cloud. And, it would seem to be a perfect fit in the field of intelligence.

But two longtime experts in intelligence take opposing views on the utility of big data for intelligence. Lewis Shepherd, director and general manager of the Microsoft Institute, believes in big data serving a valuable role throughout intelligence. Mark Lowenthal, president and chief executive officer of The Intelligence and Security Academy, views it as just another overhyped fad that could divert energy away from what really matters in intelligence.

August 16, 2013

 

North Carolina (NC) State University has announced a new partnership with the National Security Agency (NSA) to create the Laboratory for Analytic Sciences (LAS) on the university’s Centennial Campus. The lab will bring together personnel from government, academia and industry to address the most challenging big data problems and will be a cornerstone of the emerging advanced data innovation hub at NC State.

July 31, 2013
By Robert K. Ackerman

The most damaging cyber attacks possible are among the least likely to happen, because the powers capable of undertaking them are unlikely to launch them, according to an expert with the Office of the Director of National Intelligence (ODNI). Sean Kanuck, national intelligence officer for cyber issues at the National Intelligence Council, ODNI, told the audience at the second day of the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that cyber attack capability need not translate to immediate threat.

July 31, 2013
By Robert K. Ackerman

A “digital Pearl Harbor Armageddon” that inflicts catastrophic damage on the United States is not likely soon or in the foreseeable future. The worst cyber attack that could be expected would have less of an effect for a shorter period of time, said an expert with the Office of the Director of National Intelligence (ODNI).

Sean Kanuck, national intelligence officer for cyber issues at the National Intelligence Council, ODNI, told the audience at the second day of the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that predictions of destruction that would bring the United States to its knees are unnecessarily pessimistic and unlikely to materialize.

July 31, 2013
By Robert K. Ackerman

Democracy has only 20 years left to live if an effective means of digital identification is not developed before that deadline. As young people growing up with social media reach voting age in increasing numbers, they will lead a major shift to online voting. A lack of identity security will throw open the gates to massive voter fraud that will destroy the fidelity of elections, and with it, true representative government.

July 31, 2013
By Robert K. Ackerman

 

One of the world’s leading experts on cybersecurity calls cyber sabotage attacks “the worst innovation of this century.” Cyberweapons have become too dangerous, and cyberattack can lead to visible and important damage to the critical infrastructure or telecommunications. And, attribution is almost impossible.

July 31, 2013
By Robert K. Ackerman

 

Supervisory control and data acquisition (SCADA) systems face numerous threats from cybermarauders coming at them from any of a number of directions. Some systems could suffer malware attacks even though they are not the intended targets, according to a leading security expert.

Eugene Kaspersky, chief executive officer and co-founder of Kaspersky Lab, described the threat to SCADA systems to the audience at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C. Kaspersky described several SCADA attacks that already occurred and warns of new potential vulnerabilities.

Pages