Intelligence

May 7, 2019
By Kimberly Underwood
The FBI’s Cyber Division is strengthening its investigative capabilities to battle more and more digital-based crimes from global adversaries, says Amy Hess, executive assistant director of the FBI’s Criminal, Cyber, Response, and Services Branch. Credit: Atlantic Council/Image Link

The FBI has a full plate: fighting public corruption, organized and white-collar crime and domestic and foreign terrorism; solving violent crimes; protecting civil rights; neutralizing national security threats, espionage and counterintelligence; and mitigating threats of weapons of mass destruction, among other responsibilities. And one part of the bureau is growing to protect the nation against cyber threats.

April 8, 2019
By Maryann Lawlor
The Ghidra tool suite examines compiled code using disassembly, decompilation and graphing.

The National Security Agency is now sharing the source code of Ghidra, its reverse engineering tool developed by the agency’s Research Directorate in support of its cybersecurity mission. Ghidra, a suite of software analysis tools, examines complied code using capabilities such as disassembly, assembly, decompilation, graphing and scripting.

Ghidra helps analyze malicious code and malware and improves cybersecurity professionals’ understanding of potential vulnerabilities in their networks and systems. With this release, developers can now collaborate, create patches and extend the tool to fit their cybersecurity needs.

March 21, 2019
Posted by Kimberly Underwood
The National Geospatial-Intelligence Agency has launched MagQuest, a $1.2 million global open innovation challenge, seeking advanced approaches to geomagnetic data collection. Credit: Shutterstock/Siberian Art

The National Geospatial-Intelligence Agency, headquartered in Springfield, Virginia, today announced the launch of MagQuest, its $1.2 million global open innovation challenge, seeking advanced approaches to geomagnetic data collection.

March 6, 2019
By Kimberly Underwood
The U.S. Marshals Service, the nation’s first federal law enforcement agency, works to protect the judicial process, apprehend fugitives and transport federal prisoners, and needs advanced digital technologies that can keep up, says CIO Karl Mathias. Credit: AFCEA NOVA

As the chief information officer and an assistant director of the U.S. Marshals Service, Karl Mathias spends 75 percent to 80 percent of his time on the day-to-day information technology needs of the agency. In order to focus on developing new technologies, he would rather decrease that time, by leveraging advanced technologies that can help “keep the lights on, so to speak, the circuits alive, and the laptops running, patched and secure.”

March 5, 2019
By Kimberly Underwood
Intelligence community (IC) leaders, led by Dan Coats, director of National Intelligence, testify before the U.S. Senate as to the growing threats the country is facing from non-state and state actors. The IC’s CIO, John Sherman, is calling for urgency in developing U.S. capabilities, so the country will not be surpassed by adversaries' use of cyber, artificial intelligence and other technologies. Credit: ODNI

The Office of the Director of National Intelligence’s John Sherman, chief information officer (CIO) of the intelligence community, is alarmed about the shifting geopolitical forces around the world.

In his position since September 2017, Sherman is leading the flagship integration of the Intelligence Community Information Technology Enterprise, known as IC ITE (and pronounced like eyesight), which has been a six-year effort to modernize the information technology (IT) for the 17 member agencies of the intelligence community (IC).

January 31, 2019
By Kimberly Underwood
Director of National Intelligence Dan Coats, pictured at a recent White House briefing, is calling for the intelligence community to "do things differently,” given the severe threats and complex adversarial environment the United States is facing.  Photo courtesy of ODNI

A new strategy for U.S. intelligence looks to improve integration of counterintelligence and security efforts, increasingly address cyber threats, and have clear guidance of civil liberties, privacy and transparency. As outlined in the U.S. National Intelligence Strategy (NIS), from Director of National Intelligence (DNI) Dan Coats, the intelligence community is facing a turbulent and complex strategic environment, and as such, the community “must do things differently.”

January 29, 2019
By George I. Seffers
Dan Coats, director of national intelligence, released today the intelligence community’s annual threat assessment, which lists cyber, artificial intelligence and weapons of mass destruction as some of the top technological threats. Credit: geralt/Pixabay

The United States faces a “toxic mix of threats,” Dan Coats, the director of National Intelligence, testified today before the Senate Select Committee on Intelligence while unveiling the annual Worldwide Threat Assessment of the U.S. Intelligence Community.

January 9, 2019
Posted by George I. Seffers
IARPA announced today two new technology challenges related to credibility assessment and automated video surveillance. Credit: TheDigitalArtist/Pixabay

The Intelligence Advanced Research Projects Activity (IARPA) has announced two new challenges: the Credibility Assessment Standardized Evaluation (CASE) Challenge, which seeks methods for measuring the performance of credibility assessment techniques and technologies, and the Activities in Extended Video (ActEV) Prize Challenge, which aims to develop algorithms that will monitor surveillance videos for suspicious activity.

January 9, 2019
Posted by George I. Seffers
IARPA has issued two requests for information, one for classified deep learning and machine learning research and another for novel cooling solutions for portable devices. Credit: geralt/Pixabay

The Intelligence Advanced Research Projects Activity (IARPA) is seeking information on research efforts in the area of machine learning with a particular focus on deep learning and in the area of cooling systems for small mobile devices.

November 1, 2018
By Kimberly Underwood
Metadata from communication signals can provide a nonencrypted source of signals intelligence, says David Stupples, professor, School of Mathematics, Computer Science and Engineering, Department of Electrical and Electronic Engineering, City, University of London.  Shutterstock/Sutham

Data from mobile device signals such as GSM may be an untapped resource for signals intelligence on the battlefield. Although the payload of a communication system is encoded, information about the nature of the communication that is included in the GSM signal is not and should not be overlooked. This information, known as metadata, could prove to be an important tool for warfighters, experts say.

September 5, 2018
By Robert K. Ackerman
Panelists discussing the effect of influence operations on the United States are (l-r) panel moderator Shane Harris of The Washington Post; Ronald Waltzman, The Rand Corporation; Joe Morosco, ODNI; and Fran Moore, Financial Systemic Analysis and Resilience Center. Photography by Herman Farrer

Foreign influence operations against the United States and its allies are likely to proliferate as more nations with propaganda agendas learn how to exploit social media technologies, say intelligence community experts. Russia’s attempts to interfere with the 2016 U.S. presidential election are only the tip of the iceberg, and government must learn how to work with industry to counter these efforts.

September 19, 2018
By Robert K. Ackerman
Jim Cannaliato of Engineering Solutions Inc. (l) receives a $3,000 check for his company’s winning entry in the EPIC App challenge. Presenting the check is AFCEA Intelligence Committee member Joe Schmank of Microsoft Azure Government Cloud.

A challenge to develop an intelligence app concluded with software that uses neural networks to predict social unrest around the world. Sponsored by the AFCEA Emerging Professionals in Intelligence Committee (EPIC) and the Cyber Council of the Intelligence and National Security Alliance, the challenge awarded a total of $6,000 to three firms tasked with developing a software solution to a problem currently confronted by the intelligence community.

September 5, 2018
By Robert K. Ackerman
A row of service intelligence chiefs describes today's threats and needed solutions in a panel chaired by (far l) Vice Adm. Jake Jacoby, USN (Ret.). The panelists are (l-r) Vice Adm. Matthew Kohler, USN; Brig. Gen. Dmitri Henry, USMC; Rear Adm. Robert Hayes, USCG;Lt. Gen. VeraLinn “Dash” Jamieson, USAF; and Lt. Gen. Scott Berrier, USA. Photography by Herman Farrer

A resurgent Russian military that has adopted an entirely different posture than its communist predecessor is posing a major military challenge to U.S. forces worldwide, according to U.S. service intelligence chiefs. Where China is boosting its military to realize its goal of global economic supremacy, Russia is focusing its force modernization to defeat the U.S. military in any setting, the flag officers said.

September 4, 2018
By Robert K. Ackerman
John Hamre (l), president of the Center for Strategic and International Studies, speaks with John Rood, undersecretary of defense for policy, during a panel discussion moderated by Hamre at the 2018 Intelligence and National Security Summit. Photography by Herman Farrer.

Across-the-board innovation is increasing the national security threat picture, and the U.S. Defense Department is preparing to respond in kind. Technology advances such as hypersonics and artificial intelligence may join macroprojects such as a new space force as peer and near-peer adversaries gear up to overcome U.S. military superiority.

September 4, 2018
By Robert K. Ackerman
Dan Coats, director of national intelligence, describes the challenges facing the community at the Intelligence and National Security Summit. Photography by Herman Farrer

Economics, crime, terrorism and technology form the basis of four major challenges confronting the U.S. intelligence community, according to its director. Dan Coats, director of national intelligence, described the causes of these challenges to a large luncheon audience on the first day of the 2018 Intelligence and National Security Summit sponsored by AFCEA International and INSA at National Harbor, Maryland.

September 1, 2018
By Robert K. Ackerman
A United Launch Alliance Delta IV-Heavy rocket launches a National Reconnaissance Office payload into orbit from Cape Canaveral. While the U.S. intelligence community will continue to rely on government space assets, it will increasingly tap the commercial sector for innovative products and services.

The next sector to benefit from commercial space technology spinoffs could be the intelligence community. Facing a growing threat to its mission capabilities in orbit, the community is weighing several options to prevent adversaries from denying the use of vital systems, including national technical assets. At the same time, plans are in the works for the next generation of space-based intelligence assets.

Among the options is a greater reliance on commercial technologies to ensure space system survivability. The intelligence community is already working to exploit private-sector innovations, and future developments offer the potential to change the U.S. national security space architecture.

September 1, 2018
By George I. Seffers
Artificial intelligence-driven voice forensics can yield a great deal of information about a speaker, including physical characteristics, health, genealogy and environment. Credit: Shutterstock

In the future, voice analysis of an intercepted phone call from an international terrorist to a crony could yield the caller’s age, gender, ethnicity, height, weight, health status, emotional state, educational level and socioeconomic class. Artificial intelligence-fueled voice forensics technology also may offer clues about location; room size; wall, ceiling and floor type; amount of clutter; kind of device, down to the specific model used to make the call; and possibly even facial characteristics of the caller.  

August 22, 2018
By Robert K. Ackerman

A $3,000 bounty awaits the developer who can come up with the best app to suit an intelligence community need, but time is short—the deadline for entry is Thursday, August 23, at 11:59 p.m., EDT. Known as the EPIC APP Challenge, the contest is open to schools or companies wielding a team of no more than five members.

July 23, 2018
Posted by George I. Seffers
Social media data could become integral to detecting violations of nuclear nonproliferation agreements. Researchers have developed a computation model that incorporates often incompatible sources of data, such as satellite imagery and Twitter posts that indicate when a violation has occurred. Credit: Geralt/Pixabay

Researchers at North Carolina (NC) State University have developed a new computational model that draws on normally incompatible data sets, such as satellite imagery and social media posts, to answer questions about what is happening in targeted locations. The model identifies violations of nuclear nonproliferation agreements.

June 6, 2018
Posted by Kimberly Underwood
Vice Adm. Nancy Norton, USN, pictured at DCOS, looks to the National Background Information System, which DISA built and will operate, to advance the country¹s efforts in federal background investigations. Credit: Mike Carpenter

A new information technology system from the Defense Information Systems Agency (DISA) is set to improve how the federal government conducts background investigations.

More than 4.08 million individuals hold a federal security clearance, according to the Office of the Director of National Intelligence (DNI), National Counterintelligence and Security Center’s Annual Report on Security Clearance Determinations. And it can take federal agencies more than 500 days to process security clearance cases, including background investigations.

Pages