The Department of Homeland Security interagency National Vetting Center has created an information clearinghouse that automatically checks the names of foreigners applying to come to the United States against highly classified databases in various intelligence agencies. The clearinghouse relies on a cloud architecture that agencies are building to share information and lays the foundation for powerful new tools that could leverage artificial intelligence and predictive analytics to help find foreign travelers who might be a threat to U.S. national security.
DLT Solutions LLC, Herndon, Virginia, is being awarded a multiple-award, firm-fixed-price Department of Defense (DoD) Enterprise Software Initiative (ESI) blanket purchase agreement (BPA) in accordance with the firms General Services Administration (GSA) Federal Supply Schedule contracts. The agreement is part of a multi-reseller/multi-software publisher software category management award for commercial-off-the-shelf software; information technology asset management software; software maintenance support; information technology professional services; and related services in support of DoD ESI and under the direction of Office of Management and Budget, Enterprise Software Category.
Charged with providing national security information to the nation, the U.S. Central Intelligence Agency, or CIA, has had a long history of partnering with the industry to solve challenges. That need has not diminished, said Randy Burkett, staff historian from the CIA’s Center for the Study of Intelligence.
Burkett, speaking at a recent Foundation for Innovation and Discovery (FINND) event, walked attendees through a few of the agency’s historically interesting challenges in which the industry came to its aid, beginning at the start of World War II.
The Office of the Director of National Intelligence’s John Sherman, chief information officer (CIO) of the intelligence community, is alarmed about the shifting geopolitical forces around the world.
In his position since September 2017, Sherman is leading the flagship integration of the Intelligence Community Information Technology Enterprise, known as IC ITE (and pronounced like eyesight), which has been a six-year effort to modernize the information technology (IT) for the 17 member agencies of the intelligence community (IC).
The United States faces a “toxic mix of threats,” Dan Coats, the director of National Intelligence, testified today before the Senate Select Committee on Intelligence while unveiling the annual Worldwide Threat Assessment of the U.S. Intelligence Community.
The Intelligence Advanced Research Projects Activity (IARPA) has announced two new challenges: the Credibility Assessment Standardized Evaluation (CASE) Challenge, which seeks methods for measuring the performance of credibility assessment techniques and technologies, and the Activities in Extended Video (ActEV) Prize Challenge, which aims to develop algorithms that will monitor surveillance videos for suspicious activity.
The Intelligence Advanced Research Projects Activity (IARPA) is seeking information on research efforts in the area of machine learning with a particular focus on deep learning and in the area of cooling systems for small mobile devices.
Economics, crime, terrorism and technology form the basis of four major challenges confronting the U.S. intelligence community, according to its director. Dan Coats, director of national intelligence, described the causes of these challenges to a large luncheon audience on the first day of the 2018 Intelligence and National Security Summit sponsored by AFCEA International and INSA at National Harbor, Maryland.
Researchers at North Carolina (NC) State University have developed a new computational model that draws on normally incompatible data sets, such as satellite imagery and social media posts, to answer questions about what is happening in targeted locations. The model identifies violations of nuclear nonproliferation agreements.
The generation that remembers “duck and cover” also recalls headlines that included the words Soviet Union and impending dangers. Today, a combination of global instability, rising authoritarianism and democracies in retreat may lead to similar yet more dangerous situations, and this time, the headlines also are likely to include the words “People's Republic of China.”
Researchers working on behalf of the U.S. intelligence community are kicking off a program designed to develop a revolutionary capability for monitoring objects in geostationary orbit, including functioning satellites and hundreds of thousands of bits of space debris. The program will attempt to provide low-cost approaches for passive ground-based interferometric imaging of space objects, a technique using two or more telescopes or lenses.
The billions of bits and bytes that make government services, information sharing and even shopping easier also open the doors for adversaries to gather intelligence that aids their nefarious pursuits. AFCEA International’s Cyber Committee has published a white paper that describes several ways big data analytics can help cybersecurity analysts close those doors or at least shrink the gap and reduce vulnerabilities.
Russia, Iran and North Korea are testing more aggressive cyber attacks against the United States and partner nations, according to the annual Worldwide Threat Assessment of the U.S. Intelligence Community delivered to Congress today by Dan Coats, director of national intelligence.
“The use of cyber attacks as a foreign policy tool outside of military conflict has been mostly limited to sporadic lower-level attacks. Russia, Iran and North Korea, however, are testing more aggressive cyber attacks that pose growing threats to the United States and U.S. partners,” the report states.
Editor’s note: Hugh Montgomery, a legendary longtime officer in the intelligence community and a diplomat, died April 6. Just two weeks ago, he gave an interview to SIGNAL Magazine comparing global threats decades ago and now. We would like to honor his service in the cause of freedom by publishing this excerpt from that article about his experiences over the years. The complete article will appear in the May issue of SIGNAL.
Volant Associates LLC,* Chantilly, Virginia, has been awarded a $14,005,098 cost-plus-fixed-fee completion contract for Defense Intelligence Information Enterprise (DI2E) Framework Integrated Collaborative Environment. Contractor will foster interoperability and collaboration of mission systems and capabilities within the Department of Defense and intelligence community by planning, analyzing, evaluating, designing, developing and testing a feasibility demonstration model of a collaborative framework for members of the DI2E community. Work will be performed at Chantilly, Virginia, and is expected to be complete by April 13, 2019.
Booz Allen Hamilton Inc., McLean, Virginia (HHM402-15-D-0014), was awarded a five-year time and materials task order with a maximum ceiling value of $268,000,000 if all options are exercised. The task order is incrementally funded, with $796,000 funded in fiscal 2016. The task order will provide infrastructure engineering and operation services to support Defense Intelligence Agency and intelligence community information technology requirements under the previously awarded Enhanced Solutions for the Information Technology Enterprise (E-SITE), multiple award, indefinite-delivery/indefinite-quantity contract vehicle.
The world of intelligence sharing has gone from on a need-to-know basis between federal agencies to one in which those key players must, by necessity, combine disparate pieces of intel to ascertain a complete picture of potential threats.
Sierra Nevada Corp., Sparks, Nevada, has been awarded a $9,516,004 cost-plus-fixed-fee completion contract for enterprise engine software and hardware prototype system. Contractor will provide design and develop the technology and operational prototypes to satisfy the undersecretary of defense for intelligence goals of optimizing information sharing within the intelligence community (IC), and to enable decision making while maximizing IC capabilities to discover, access, retain, store, share, and exploit information.
U.S. lawmakers launched a bipartisan bid to boost the Department of Homeland Security's powers to better oversee cybersecurity compliance by federal agencies and intervene when they might fail to safeguard their networks.
The Senate bill would strengthen the department's ability to enforce cybersecurity standards governmentwide, and “in the event that a federal agency chooses not to do so, [the] DHS would have the authority to stand in … and prevent worse damages from occurring,” Sen. Susan Collins (R-ME) said in announcing her plans to submit the bill to the full Senate on Tuesday.
Every now and then a poll result pops up that surprises me. Results sometimes are counter-intuitive, or at least counter-narrative from what we're led to believe in major media coverage.
Case in point: An early 2015 poll shows that after nearly two years of a negative spotlight on the U.S. intelligence community, and particularly on the National Security Agency (NSA) and Central Intelligence Agency (CIA), the American people still have a positive view of the NSA and CIA. More startlingly, young Americans have more favorable views of NSA and CIA than older Americans!