The National Geospatial-Intelligence Agency (NGA) became the first intelligence agency to host an operational capability within Amazon Web Services’ Commercial Cloud Services (C2S) environment after Lockheed Martin deployed NGA’s interactive Map of the World to C2S. With the Map of the World viewer, which could be compared to Google Maps or similar applications, now resting in the cloud, NGA officials intend to add more data and capabilities.
The U.S. intelligence community is moving toward a hypernetwork of sensors and data collectors that ultimately will constitute an Internet of Things for the community and its customers. If it is successful, the intelligence community would have more data, processed into more knowledge, available more quickly and with greater fidelity for operators and decision makers.
For the intelligence community, the Internet of Things (IoT) takes the same approach as that of the commercial world, but it substitutes sensors and other data collection devices for consumer electronics. An intelligence IoT could comprise physical sensors, control devices, multipurpose communications and processing equipment and user interfaces, for example.
Six3 Intelligence Solutions Incorporated, McLean, Virginia, was awarded a $12,783,597 firm-fixed-price multi-year contract for intelligence support services in Afghanistan with an estimated completion date of July 9, 2016. One bid was solicited with one received. Fiscal 2015 operations and maintenance (Army) funds in the amount of $9,587,697 are being obligated at the time of the award. The Army Contracting Command, Rock Island, Illinois, is the contracting activity (W560MY-15-C-0004).
There’s no trick behind this JEDI MIND.
That’s because the Joint Estimation of Deception Intent via Multisource Integration of Neuropsychological Discriminators (yes, that leads to the acronym JEDI MIND) is a complicated algorithm solution to a question posed by a leading intelligence agency research arm: Who can you trust?
Troy Lau and Scott Kuzdeba won the Intelligence Advanced Research Projects Activity's (IARPA's) first public challenge contest, titled Investigating Novel Statistical Techniques to Identify Neurophysiological Correlates of Trustworthiness (INSTINCT).
Radiance Technologies Inc., Huntsville, Alabama (FA8604-15-D-7976); Integrity Applications Inc., Chantilly, Virginia (FA8604-15-D- 7975); and Invertix Corp., McLean, Virginia (FA8604-15-D- 7977), have been awarded a combined $960,000,000 indefinite-delivery/ indefinite-quantity contract for services in support of the Advanced Technical Exploitation Program II. Contractors will perform research, development, system sustainment, and intelligence production activities utilizing geospatial-intelligence and non-nuclear measurement and signature intelligence data at the National Air and Space Intelligence Center.
The Boeing Company, Seattle, is being awarded a $43,283,263 modification to a previously awarded firm-fixed-price contract (N00019-12-C-0112) for integrated logistics and contractor services in support of the P-8A Poseidon Multi-mission Maritime Aircraft. The company also has been awarded an $11,757,200 modification to a previously awarded firm-fixed-price contract (N00019-12-C-0112) for training specific data storage architecture updates and upgrades in support of the P-8A Poseidon Multi-mission Maritime Aircraft, to include hardware, software, and integration. The Naval Air Warfare Center, Training Systems Division, Orlando, Florida, is the contracting activity.
The intelligence community is striving to determine how it can work with industry early, before requirements for capabilities are confirmed, to get out ahead of challenges. Leaders want to adopt technology in some of the first phases rather than at the end. The Office of the Director of National Intelligence (ODNI) is looking to standardize capabilities across the intelligence community, determining how its many members can collaborate.
Cyber is the prime concern of the intelligence community, Sean Kanuck, national intelligence officer for cyber issues, Office of the Director of National Intelligence, said today at the Global Identity Summit in Tampa. Not only is cyber an immense problem in itself, but it also pervades all other national security concerns, including biometrics.
The Online Show Daily: Day 3
The final day of AFCEA TechNet Augusta 2014 kicked off with a solemn remembrance of the September 11, 2001 terrorist attacks that rocked the nation. The conference then, necessarily, moved on to the future.
The National Institute of Standards and Technology (NIST) primary external advisory board today announced a report calling for the agency to increase its staff of cryptography experts and to implement more explicit processes for ensuring openness and transparency to strengthen its cryptography efforts. In making its recommendations, the Visiting Committee on Advanced Technology (VCAT) specifically addressed NIST’s interactions with the National Security Agency (NSA).
The National Security Agency (NSA) has selected five more schools for the National Centers of Academic Excellence (CAE) in Cyber Operations Program, which is designed to cultivate more U.S. cyber professionals. These schools are now designated as Cyber Operations CAEs for the 2014-2019 academic years:
Thales recently announced the company has signed a memorandum of understanding with the Qatar Armed Forces to assist in the development of an Optionally Piloted Vehicle-Aircraft (OPV-A), a high-performance intelligence, surveillance, target acquisition and reconnaissance system. The OPV-A will be a hybrid between a conventional and unmanned aircraft capable of flying with or without a pilot on board. Unimpeded by a human’s physiological limitations, an OPV-A is able to operate under more adverse conditions and/or for greater endurance times. The airframe, to be selected by the Qatar Armed Forces, will be integrated with a mission systems capability to enable the optionally piloted capability.
The National Weather Service is the granddaddy of open source data, according to Adrian Gardner, chief information officer, Federal Emergency Management Agency (FEMA). And, the National Oceanic and Atmospheric Administration (NOAA) was "into big data before big data was cool," added David McClure, a data asset portfolio analyst within the NOAA Office of the Chief Information Officer. The two officials made their comments during a panel on big data analytics at the AFCEA Homeland Security Conference in Washington, D.C.
Following the terrorist attacks on September 11, 2001, government agencies came under widespread criticism for failing to share information and "connect the dots." By contrast, law enforcement agencies were almost universally praised following the Boston Marathon bombing and the shooting at the Navy Yard in Washington, D.C., both of which took place last year, pointed out panelists at the AFCEA Homeland Security Conference in Washington, D.C. on Monday.
Having vast amounts of intelligence data will not serve U.S. military needs if it is applied only tactically, according to a U.S. Navy information dominance leader. This data must be used to understand an adversary’s strategic intent, or leaders may not act effectively.
Rear Adm. Paul Becker, USN, director for intelligence, J-2, Joint Chiefs of Staff, raised that issue during the Wednesday morning keynote panel at West 2014 in San Diego. Adm. Becker warned that military leaders must be able to glean a deep understanding of an adversary’s mindset, strategy and intent. “We often are at an information deficit in that area,” he stated.
The U.S. intelligence community has taken some flak lately for infiltrating online games, such as Second Life and World of Warcraft. A just-released report commissioned by the Office of the Director of National Intelligence, however, posits that the technology could be abused by extremists.
Big Data increasingly is viewed as the future of knowledge management, aided and abetted by the cloud. And, it would seem to be a perfect fit in the field of intelligence.
But two longtime experts in intelligence take opposing views on the utility of big data for intelligence. Lewis Shepherd, director and general manager of the Microsoft Institute, believes in big data serving a valuable role throughout intelligence. Mark Lowenthal, president and chief executive officer of The Intelligence and Security Academy, views it as just another overhyped fad that could divert energy away from what really matters in intelligence.
North Carolina (NC) State University has announced a new partnership with the National Security Agency (NSA) to create the Laboratory for Analytic Sciences (LAS) on the university’s Centennial Campus. The lab will bring together personnel from government, academia and industry to address the most challenging big data problems and will be a cornerstone of the emerging advanced data innovation hub at NC State.
The most damaging cyber attacks possible are among the least likely to happen, because the powers capable of undertaking them are unlikely to launch them, according to an expert with the Office of the Director of National Intelligence (ODNI). Sean Kanuck, national intelligence officer for cyber issues at the National Intelligence Council, ODNI, told the audience at the second day of the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that cyber attack capability need not translate to immediate threat.
A “digital Pearl Harbor Armageddon” that inflicts catastrophic damage on the United States is not likely soon or in the foreseeable future. The worst cyber attack that could be expected would have less of an effect for a shorter period of time, said an expert with the Office of the Director of National Intelligence (ODNI).
Sean Kanuck, national intelligence officer for cyber issues at the National Intelligence Council, ODNI, told the audience at the second day of the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that predictions of destruction that would bring the United States to its knees are unnecessarily pessimistic and unlikely to materialize.