Challenge after challenge, women overcome barriers in traditionally male-dominated fields and organizations. Allow me to tell you my story. I am Technical Sgt. Bonnie Rushing in the United States Air Force and I am a woman warrior. I faced challenges from the very beginning of my time in the military, during training, and in operations. Not only have I overcome every obstacle along the way, I have come out on top. Let me take you through my journey as a woman warrior and plead for your aid in continued culture change.
The COVID-19 pandemic is reshaping how companies support intelligence community work, in possibly the largest shift since 9/11, experts say. Facing immediate needs for telework in March, firms had to reconfigure how to support the high-level national security missions of organizations such as the Defense Intelligence Agency, the FBI, the CIA and others.
The Coronavirus Aid, Relief, and Economic Security Act (CARES Act) proved essential to the trusted intelligence workforce, experts say, as it ensured the continuity of serving the intelligence community, or IC, during this time, said Judi Dotson, executive vice president, Booz Allen Hamilton.
Two research programs at the Intelligence Advanced Research Projects Agency, commonly known as IARPA, are now undergoing evaluation to see if they may provide solutions to help counter the growing COVID-19 pandemic, IARPA director Catherine Marsh tells SIGNAL Magazine.
Catherine Marsh, director of the Intelligence Advanced Research Projects Activity, is hiring personnel to fill several new office director positions. The new personnel will help recruit program managers, develop and guide programs, and strengthen relationships with the intelligence community, enhancing the transition of technologies from researchers to users.
The Defense Information Systems Agency (DISA) is working more closely with the intelligence community and is partnering with the National Security Agency (NSA) on a number of cybersecurity-related efforts, officials say.
The NSF commissioned the report this past summer to better understand the threats to basic research posed by foreign governments who seek to violate the principles of scientific ethics and research integrity.
The Department of Homeland Security interagency National Vetting Center has created an information clearinghouse that automatically checks the names of foreigners applying to come to the United States against highly classified databases in various intelligence agencies. The clearinghouse relies on a cloud architecture that agencies are building to share information and lays the foundation for powerful new tools that could leverage artificial intelligence and predictive analytics to help find foreign travelers who might be a threat to U.S. national security.
DLT Solutions LLC, Herndon, Virginia, is being awarded a multiple-award, firm-fixed-price Department of Defense (DoD) Enterprise Software Initiative (ESI) blanket purchase agreement (BPA) in accordance with the firms General Services Administration (GSA) Federal Supply Schedule contracts. The agreement is part of a multi-reseller/multi-software publisher software category management award for commercial-off-the-shelf software; information technology asset management software; software maintenance support; information technology professional services; and related services in support of DoD ESI and under the direction of Office of Management and Budget, Enterprise Software Category.
Charged with providing national security information to the nation, the U.S. Central Intelligence Agency, or CIA, has had a long history of partnering with the industry to solve challenges. That need has not diminished, said Randy Burkett, staff historian from the CIA’s Center for the Study of Intelligence.
Burkett, speaking at a recent Foundation for Innovation and Discovery (FINND) event, walked attendees through a few of the agency’s historically interesting challenges in which the industry came to its aid, beginning at the start of World War II.
The Office of the Director of National Intelligence’s John Sherman, chief information officer (CIO) of the intelligence community, is alarmed about the shifting geopolitical forces around the world.
In his position since September 2017, Sherman is leading the flagship integration of the Intelligence Community Information Technology Enterprise, known as IC ITE (and pronounced like eyesight), which has been a six-year effort to modernize the information technology (IT) for the 17 member agencies of the intelligence community (IC).
The United States faces a “toxic mix of threats,” Dan Coats, the director of National Intelligence, testified today before the Senate Select Committee on Intelligence while unveiling the annual Worldwide Threat Assessment of the U.S. Intelligence Community.
The Intelligence Advanced Research Projects Activity (IARPA) has announced two new challenges: the Credibility Assessment Standardized Evaluation (CASE) Challenge, which seeks methods for measuring the performance of credibility assessment techniques and technologies, and the Activities in Extended Video (ActEV) Prize Challenge, which aims to develop algorithms that will monitor surveillance videos for suspicious activity.
The Intelligence Advanced Research Projects Activity (IARPA) is seeking information on research efforts in the area of machine learning with a particular focus on deep learning and in the area of cooling systems for small mobile devices.
Economics, crime, terrorism and technology form the basis of four major challenges confronting the U.S. intelligence community, according to its director. Dan Coats, director of national intelligence, described the causes of these challenges to a large luncheon audience on the first day of the 2018 Intelligence and National Security Summit sponsored by AFCEA International and INSA at National Harbor, Maryland.
Researchers at North Carolina (NC) State University have developed a new computational model that draws on normally incompatible data sets, such as satellite imagery and social media posts, to answer questions about what is happening in targeted locations. The model identifies violations of nuclear nonproliferation agreements.
The generation that remembers “duck and cover” also recalls headlines that included the words Soviet Union and impending dangers. Today, a combination of global instability, rising authoritarianism and democracies in retreat may lead to similar yet more dangerous situations, and this time, the headlines also are likely to include the words “People's Republic of China.”
Researchers working on behalf of the U.S. intelligence community are kicking off a program designed to develop a revolutionary capability for monitoring objects in geostationary orbit, including functioning satellites and hundreds of thousands of bits of space debris. The program will attempt to provide low-cost approaches for passive ground-based interferometric imaging of space objects, a technique using two or more telescopes or lenses.
The billions of bits and bytes that make government services, information sharing and even shopping easier also open the doors for adversaries to gather intelligence that aids their nefarious pursuits. AFCEA International’s Cyber Committee has published a white paper that describes several ways big data analytics can help cybersecurity analysts close those doors or at least shrink the gap and reduce vulnerabilities.
Russia, Iran and North Korea are testing more aggressive cyber attacks against the United States and partner nations, according to the annual Worldwide Threat Assessment of the U.S. Intelligence Community delivered to Congress today by Dan Coats, director of national intelligence.
“The use of cyber attacks as a foreign policy tool outside of military conflict has been mostly limited to sporadic lower-level attacks. Russia, Iran and North Korea, however, are testing more aggressive cyber attacks that pose growing threats to the United States and U.S. partners,” the report states.
Editor’s note: Hugh Montgomery, a legendary longtime officer in the intelligence community and a diplomat, died April 6. Just two weeks ago, he gave an interview to SIGNAL Magazine comparing global threats decades ago and now. We would like to honor his service in the cause of freedom by publishing this excerpt from that article about his experiences over the years. The complete article will appear in the May issue of SIGNAL.