To truly ensure the principle of one person, one vote, the American electoral infrastructure should adopt security protocols similar to those used in the cybersecurity industry. Electoral management should be conducted using variations on the techniques employed for financial systems and national security data. Unfortunately, today’s U.S. voting mechanisms at all levels as well as national policy would not pass even the most rudimentary information assurance audit.
National Institute of Standards and Technology
Digital structures are needed to protect government information and operations. A group participating in a National Institute of Standards of Technology challenge is offering a secure cloud-based platform that can improve the digital and actual health of a city and protect its information.
A new, highly precise photon sensor could help advance the science of growing human tissue, such as bones, skin or vital organs, in the laboratory and could benefit warfighters and society. The potential applications include monitoring environmental conditions, such as poison gases on the battlefield or toxins in the home.
Cyber insurance can protect organizations from losing more than data, but choosing a cyber insurer and policy comes with its own caveats. The purchase decision maker must consider an individual company’s circumstances, such as revenue, risk tolerance, board guidance and regulatory environment relative to protected categories of information. In addition, every purchase decision must be critically reviewed, particularly regarding the extent of coverage exclusions in each policy.
Facial recognition technology has become “spectacularly” more effective at matching an individual with their photo in a gallery of millions of pictures, according to the latest research by U.S. government scientists.
“The algorithms now are spectacularly more successful [at matching two pictures of the same person] than they were when we first tested this technology in 2010,” Patrick Grother, the biometrics testing project leader at the National Institute of Standards and Technology (NIST) told AFCEA International’s Federal ID Forum and Expo Tuesday.
Blockchain, the digital ledger technology, offers an immutable record of a transaction based on a distributed consensus algorithm. The technology gained notoriety through the use of bitcoin, the digital commodity. However, experts say that the blockchain technology has moved well beyond its initial underpinning role. “Bitcoin is basically like the Model T of blockchain technology, because it was the first one,” says Lee McKnight, associate professor, School of Information Studies, Syracuse University, Syracuse, New York.
The requirement to share information and communicate effectively via radio or other equipment during natural disasters, fires, crimes or catastrophes has only increased for police officers, firefighters and other public safety personnel. The National Institute of Standards and Technology’s (NIST's) Communications Technology Laboratory, known as the CLT, has been working to improve interoperability among the first responders and other public safety organizations, conducting research to update legacy systems and harness new mobile technologies to exchange vital voice and data communications in a crisis
Embedded systems are emerging as the latest challenge in the drive to secure deployed U.S. military technologies, including those residing within weapons and flight controllers. Because they are deeply entrenched inside critical hardware, these systems can be tricky to safeguard, so cybersecurity and cyber resiliency must be considered at the beginning of the design and architecture process. And although upgrades can boost embedded systems’ cybersecurity, system operators must determine when the potential pitfalls of doing so outweigh the benefits.
National Institute of Standards and Technology (NIST) researchers have developed a method for assessing and selecting optimal antenna design for future fifth-generation (5G) cellphones and other wireless devices and base stations.
5G systems will avoid crowded, conventional wireless channels by using higher, millimeter-wave frequency bands. Because transmissions at these frequencies lose a lot of energy along the way, received signal strength can weaken. One solution is “smart” antennas that can form unusually narrow beams and quickly steers them in different directions.
Over the last decade, emergency responders have increasingly relied on robots to assist with public safety functions that may be too dangerous for humans. Autonomous systems can perform search and rescue tasks, provide decision support, transport medical supplies, extinguish fires, map disaster areas or accomplish other important rescue functions.
Amid broad federal, state and local efforts to improve public safety communications, the National Institute of Standards and Technology is leading research to establish interoperability among diverse government organizations that aid the public when it is most in peril. The agency’s goal is for legacy systems and new mobile technologies to exchange vital voice and data communications in a crisis.
Researchers at the National Institute of Standards and Technology (NIST) aim to make virtual reality simulations more of a reality for first responders, enabling firefighters, law enforcement officers and others to train for emergency operations and communications.
A quantum physics-based technology developed by National Institute of Standards and Technology researchers may enable first responders, warfighters and mariners to communicate and navigate in areas where radio and satellite-based communications are limited or nonexistent. The capability would allow military and emergency personnel to stay connected in urban canyons, under rubble, inside buildings, underground or even underwater.
Cybersecurity evolves daily to counter ever-present threats posed by criminals, nation states, insiders and others. To address the changing threat landscape, the National Institute of Standards and Technology (NIST) periodically updates its Risk Management Framework (RMF), a standards-based, security-by-design process that all IT systems within DOD agencies must meet.
Researchers at the National Institute of Standards and Technology (NIST) have developed a method for generating numbers guaranteed to be random by quantum mechanics. Generating truly random numbers is one of the major challenges for quantum-based encryption and could mark a major leap in cybersecurity.
Researchers at the National Institute of Standards and Technology (NIST) have built a superconducting switch that learns like a biological system and could connect processors and store memories in future computers, NIST officials intend to announce today. The switch in some ways outperforms the human brain that inspired it and offers a wide range of benefits for medical diagnoses, smart cars and intelligence analysis.
The NIST switch is called a synapse, after its biological counterpart, and it supplies a missing piece for neuromorphic computers. Envisioned as a new type of artificial intelligence, such computers could boost machine perception and decision making.
Dr. Walter Copan was confirmed by Congress as undersecretary of commerce for standards and technology and director of the National Institute of Standards and Technology.
There’s a new National Institute of Standards and Technology (NIST) cybersecurity framework that’s going against the grain. The Department of Defense has mandated that contractors comply with the guidance laid out in NIST special publication 800-171, which aims to strengthen the protection of controlled unclassified information. Why focus contractors’ limited resources on protecting information that is not top secret? Even if information is not top secret it still can be sensitive. For example, social security numbers, contact information, bank account details and other personal information about U.S.
The U.S. government is racing to identify technologies that will resist the threat from quantum computers, which will render today’s encryption obsolete.
What happens if the Global Positioning System (GPS) that controls precision time signals goes down? The National Institute of Standards and Technology (NIST) and the U.S. Naval Observatory (USNO), which operate U.S. civilian and military time standards, respectively, have worked with two companies—CenturyLink and Microsemi—to identify commercial fiber optic telecommunications networks as a practical backup possibility.
If all goes well with its most recent five-year review, the Joint Quantum Institute will receive a renewal of research dollars next month to continue exploring quantum mechanics and quantum phenomena. The fundamental science could one day lead to revolutionary sensors, electronic devices and computers.
“We’re really pushing the edge of what you can do with technologies,” says Gretchen Campbell, who in April was appointed co-director of the Joint Quantum Institute (JQI). “At the theoretical level, of course, there’s the need to push the frontiers of knowledge.”
A security framework established by the U.S. National Institute of Standards and Technology (NIST) is serving as a template for protecting networks using a threat-centric approach. The framework establishes five core functions in sequential order, and they are applicable across all network sectors.
The five core functions are Identify, Protect, Detect, Respond and Recover. Some of them can be bundled as part of an overall cybersecurity program, which is an approach already being adopted by commercial security providers.
Kiersten Todt has been selected as executive director of the Commission on Enhancing National Cybersecurity in the U.S. Department of Commerce’s National Institute of Standards and Technology, Washington, D.C.
The U.S. Department of Commerce today issued the "Public Safety Analytics R&D Roadmap," which outlines opportunities to spur innovation and improve public safety by making data more accessible and useful for police, firefighters, emergency medical services and other first responders.
The National Institute of Standards and Technology (NIST) has released the final version of a document outlining its process for developing cryptographic standards and guidelines. NIST Cryptographic Standards and Guidelines Development Process (NISTIR 7977) is part of NIST’s “effort to ensure a robust, widely understood and participatory process for developing cryptography,” the institute said in a written announcement.
Most cyber practitioners and many users agree that assessing and managing the risk attributed to cybersecurity and critical infrastructure protection is a shared responsibility between and across a wide array of stakeholders—including government, industry, academia, the nonprofit community and individual citizens.
As part of its efforts to provide practical solutions to real-world cybersecurity challenges, the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) is requesting comments on a draft guidance to help organizations better control access to information systems.
Trained forensics examiners from the FBI and law enforcement agencies worldwide were far more accurate in identifying faces in photographs than nonexperts and even computers, according to a new assessment. The assessment provides “the first strong evidence that facial forensic examiners are better at face recognition than the rest of us,” Jonathon Phillips, a face recognition researcher at the National Institute of Standards and Technology (NIST), said in a written announcement.
The National Institute of Standards and Technology (NIST) has formed an international alliance with about a dozen telecommunications companies and universities to model and measure wireless channels at much higher frequencies than those used today to hasten the development of future cellphones and other devices.
The U.S. Commerce Department’s Public Safety Communications Research (PSCR) program is signing up a new round of industry collaborators for the test bed used to evaluate advanced broadband equipment and software for emergency first responders.
So far, 39 telecommunications companies have signed new, five-year cooperative research and development agreements to participate in the test bed program, according to Dereck Orr of the National Institute of Standards and Technology (NIST).
Researchers at the National Institute of Standards and Technology (NIST) are developing measurement tools for new mobile communications channels that could offer more than 1,000 times the bandwidth of today’s cellphone systems. The research aims to resolve burgeoning bandwidth demands associated with the rapid expansion of wireless devices. Boosting bandwidth and capacity could speed downloads, improve service quality and enable new applications like the Internet of Things connecting a multitude of devices.
The National Cybersecurity Center of Excellence (NCCoE) is inviting comments on a draft project to secure medical devices known as networked infusion pumps, which convey fluids, drugs and nutrients into patients' bloodstreams. Hospitals are increasingly using the devices and connecting them to a central system, which makes them more vulnerable to cyberthreats.
A networked infusion pump can allow centralized control of the device’s programming as well as automated cross checks against pharmacy records and patient data to ensure the right dose of fluids or medication are delivered at the right time to the right patient.
The National Institute of Standards and Technology (NIST) has published the final version of the "U.S. Government Cloud Computing Technology Roadmap, Volumes I and II," which focuses on strategic and tactical objectives to support the federal government’s accelerated adoption of cloud computing.
The road map leverages the strengths and resources of government, industry, academia and standards development organizations to support technology innovation in cloud computing, according to a written announcement from NIST.
A recently released draft plan provides a road map for federal agencies and industry to navigate through the development of the cloud-computing model. In the January issue of SIGNAL Magazine, Technology Editor George I. Seffers explores the document in his article, "Hitting the Hard Spots on the Road to Cloud."
The National Institute of Standards and Technology (NIST) has published for public review draft recommendations to ensure the confidentiality of sensitive federal information residing on the computers of contractors and other nonfederal organizations working for the government.