Intelligence

August 14, 2014
By Cyndy Hogan

The business world is taking a cue from the gaming world, increasingly using a system of incentives and old-fashioned competition to spur employee engagement. Gamification, which started out on video game screens with top score designations and leaderboards, is now helping companies meet real-life objectives.

“We’re taking what we know from games … and applying that to non-game contexts,” said Mike Campanelli, senior systems engineer at RadiantBlue Technologies, in a presentation from the AFCEA Emerging Professionals in Intelligence Committee to the entire Intelligence Committee.

September 1, 2014
By Robert K. Ackerman
Director of National Intelligence James R. Clapper warns of increasing global threats amid severe intelligence budget cuts.

The U.S. intelligence community has suffered significant damage from a perfect storm of insider revelations and budget cutbacks. Simultaneously, the threat picture confronting the United States has grown to an unprecedented level just when intelligence organizations are hampered in their efforts to continue to protect the nation.

September 1, 2014
By Rita Boland

The United States is in the midst of preparing its largest intelligence hub outside of its own national borders. The center will accommodate operations with reach into several global areas, including those rife with anti-terrorism operations. Hundreds of millions of dollars are being poured into the work that includes consolidating resources from other installations.

September 1, 2014
By Robert K. Ackerman

The National Geospatial-Intelligence Agency is looking toward small business to provide vital technologies as the agency confronts budget constraints. Enticement efforts include targeted outreach, reshaped acquisition patterns and improved networking among potential contractors.

The relationship between small business and the National Geospatial-Intelligence Agency (NGA) is growing, says Sandra Broadnax, the small business director for the NGA. “We’re doing a lot more to embrace and bring industry to the table so that they can better understand our processes,” she states.

July 16, 2014
By Sandra Jontz

Where human analysis might fail in the intelligence community, technological solutions are at the ready to fill the void. Companies are ginning up software programs that can prove to be key for intelligence analysts as they track the bad guys, so to speak—be they insider threats or an outside enemy.

The amount of data produced in the increasingly connected and virtual world makes it difficult for human beings to scour, catalog and process and mounting information and produce actionable intelligence. So industry is devising technological workarounds or complementary programs to ease the workload and make their efforts more effective.

August 1, 2014
By George I. Seffers
Two IARPA programs, Finder and Aladdin Video, are designed to help analysts grapple with massive amounts of photographs and videos in an effort maximize mission effectiveness and enhance national security.

Two closely related science and technology programs aim to improve image location and search capabilities, saving intelligence analysts significant time and effort.

U.S. intelligence analysts often must wade through enormous amounts of imagery—both photographs and videos—to uncover the exact information needed. To make matters worse, data often does not contain geolocation tags, which indicate where the images were taken.

August 1, 2014
By Robert K. Ackerman

Technology innovations, new roles and expanding missions are shaping the move toward big data in the National Geospatial-Intelligence Agency. A mix of tradecraft and technology is ensuing as the agency evolves from an organization that always has worked with voluminous imagery files to one in which big data represents a goal that promises to change many aspects of intelligence.

August 1, 2014
By George I. Seffers

U.S. Army officials envision a future in which ground and air platforms share data and where soldiers at a remote forward-operating base easily can access information from any sensor in the area, including national satellites or reconnaissance aircraft flying overhead. To achieve this big data vision, the service has initiated three pilot projects designed to provide Google-style access in a tactical environment to the lowest echelon without overwhelming soldiers with unnecessary data.

July 2, 2014
By George I. Seffers

The Instant Eye small unmanned aerial system received approval last Thursday from the Federal Aviation Administration (FAA) to be used by an energy company, which will conduct research, development and training to see if the system is practical for inspecting infrastructure such as pipelines, power lines and insulators on towers. It is the first unmanned quadrotor to receive FAA certification and may be the lightest aircraft ever certified. The approval opens the door for the system to be used for a wide range of commercial applications.

May 16, 2014
By George I. Seffers

Representatives from the U.S. Army and Air Force, along with 17 NATO nations and three partner nations, will participate in a joint reconnaissance trial at Orland Air Station in Norway May 19-28 to test and evaluate intelligence, surveillance and reconnaissance (ISR) concepts and technologies. The Unified Vision 2014 (UV14) trial will be NATO’s largest-ever ISR trial and will be used as a major stepping stone to provide NATO warfighters with an enhanced set of ISR capabilities.

June 1, 2014
By William M. Nolte

Q: What are the next steps for intelligence after the post-9/11 era?

A: The next steps should be a radical shift in how resources are allocated, not business
as usual on tighter budgets.

The “post-9/11” era is over. For years I’ve been telling students that a decade marked by the pre-eminence of terrorism as an issue, flush budgets and a volatile information environment has ended. Terrorism must now compete with cybersecurity, energy and other resource issues, regional conflicts and several other concerns in an extraordinary mix—or even a dangerous blending—of several issues. Now of course, we face a resurgent Russia, with all that implies for stability in both Europe and Asia.

June 1, 2014
By Kent R. Schneider

The world may be more dangerous today than in any period in history. Threats are widespread and diverse. It no longer is enough to watch nation-states. In this period of asymmetric warfare, with the addition of the cyberthreat, almost anyone can become a threat to national security. In this dangerous world, the value of intelligence has risen, and the tools and means of intelligence must be richer than in the past.

June 1, 2014
By Robert K. Ackerman
A Pleiades satellite image clearly shows buildings, including Olympic venues, in Sochi, Russia. The National Geospatial-Intelligence Agency is employing its own intelligence products to help personnel from other intelligence organizations locate and identify structures worldwide that might be the source of hostile cyber activity.

The borderless world of cybersecurity now is benefitting from geospatial intelligence products. The U.S. National Geospatial-Intelligence Agency has joined the fight against cybermarauders by providing imagery to help cyberwarriors track down online adversaries. Experts defending the United States from cyber attack abroad have a new tool in their kit by being able to see the facility from which digital malefactors are plying their wares.

The agency long has provided a variety of value-added geospatial products to customers throughout the defense and intelligence communities. In turning its eyes toward cyber, it combines data from partners to produce a unique product that over time may alter the agency’s mission.

June 1, 2014
By George I. Seffers
The Centers for Academic Excellence-Cyber Operations program is succeeding, NSA officials say, but enthusiasm at some schools has been dampened as a result of documents leaked by former NSA contractor Edward Snowden.

The first graduates are emerging from centers of excellence for cyber operations that teach the in-depth computer science and engineering skills necessary to conduct network operations. The program better prepares graduates to defend networks and should reduce the on-the-job training needed for new hires, saving both time and money.

April 30, 2014
By George I. Seffers

Intelligence agencies could have investigated more thoroughly and shared information more effectively, but even if they had performed perfectly, they may not have been able to prevent last year’s Boston Marathon bombing, according to a report delivered today before the Senate Homeland Security and Governmental Affairs Committee.

May 1, 2014
BY Rita Boland
Maj. Gen. Jack Shanahan, USAF, commander, U.S. Air Force ISR Agency, extols the virtues and necessity of technology education to high school students at the Alamo First Robotics Competition.

The U.S. Air Force is emerging from almost 13 years of conflict in the Middle East with a different perspective on its intelligence, surveillance and reconnaissance. Lessons learned from those battlefields are leading to new directions that will entail abandoning traditional approaches and methods.

April 1, 2014
By Henry S. Kenyon
PEALDS builds on the work of preceding efforts to advance the state of data analysis, sensor fusion and storage retrieval technologies. The program’s goal is to combine these advances into a system that will enable users to predict the potential
movements and actions of enemy forces based on their previous actions.

The U.S. Air Force is using big data analysis tools to create a picture of a battlefield or area of interest that can be monitored in real time as well as stored and replayed. By merging sensor streams with data tagging and trend detection software, this capability will allow analysts and warfighters to observe, track and potentially predict enemy force operations based on their observed behavior.

April 1, 2014
By Kent R. Schneider

Open source intelligence, which is gained from the public domain, is certainly not new. Intelligence professionals have used open sources as long as intelligence has been gathered and utilized. So what is different today? Why is open source intelligence (OSINT) getting more attention and the commitment of more resources?

First, the volume of available open source information has increased dramatically as technology has made the creation and dissemination of content easier. The Internet is the source of much of this growth. Traditional newspapers have been digitized all over the globe.

April 1, 2014
By Rita Boland

The open source domain has a set of vulnerabilities unique in the intelligence world in terms of both what enemies can misuse and critical pieces that might be absent. Because of the public nature of open source, some experts tend to discount its value, while that same feature means that patient malefactors can put together different sources of data leaking through various measures until they develop a comprehensive, damaging picture. Different technologies are helping to mitigate the dangers as the public and private sectors also work to educate their people on safer practices.

April 1, 2014
By George I. Seffers
Albanian soldiers are attacked in a simulated riot during training at the Joint Multinational Readiness Center in Hohenfels, Germany. Researchers working with the Intelligence Advanced Research Projects Agency use open source intelligence to predict social upheaval events.

Researchers working on behalf of the U.S. intelligence agencies can use reams of open source, anonymous data to foretell social turmoil such as disease outbreaks or international political unrest. Once fully developed, the capability to predict coming events may allow U.S. officials to more effectively respond to public health threats; to improve embassy security before an imminent attack; or to more quickly and effectively respond to humanitarian crises.

Pages