Artificial intelligence technology tested during the Army’s Project Convergence exercise largely met expectations and will help transform the way the Army fights in the future, officials say.
SIGNAL Online Exclusive
The FBI’s pilot iris recognition program initiated in 2013 will likely be fully operational this fall, possibly by October 1. The agency also is developing tools to detect fingerprints that have been deliberately mutilated and a scanner large enough to get a print of the entire palm along with all five fingerprints.
The COVID-19 pandemic has highlighted the federal government’s need for better identity verification and management tools, in part to ensure relief funds go to the people who need them.
Gay Gilbert, administrator, Office of Unemployment Insurance, Department of Labor, told the audience for the FedID Virtual Collaboration Event today that the department was hit with a pandemic-induced perfect storm. “For those of you who have been watching the news, probably you’ve noticed that the unemployment insurance program has become a key—a little bit of a hotbed, actually, with regard to COVID-19,” she said.
Manned-unmanned teaming technologies being assessed in a weeks-long experiment are receiving mostly positive reviews from Army officials and non-commissioned officers.
The Next Generation Combat Vehicle Cross-Functional Team and Combat Capabilities Development Command’s Ground Vehicle Systems Center are conducting soldier operational experiments at Ft. Carson, Colorado, from June 15 through August 14. The goal is to observe, collect and analyze feedback from soldiers to assess the feasibility of integrating unmanned vehicles into ground combat formations.
During the Army’s Network Modernization Experiment 2020 that kicked off last week, researchers are attacking fledgling systems with electronic warfare capabilities that near-peer adversaries are not expected to possess for years to come, officials say.
Two research programs at the Intelligence Advanced Research Projects Agency, commonly known as IARPA, are now undergoing evaluation to see if they may provide solutions to help counter the growing COVID-19 pandemic, IARPA director Catherine Marsh tells SIGNAL Magazine.
The U.S. Army Cyber Command is transferring some of its cyber defense responsibilities for the service’s networks to the Army Network Enterprise Technology Command, commonly known as NETCOM. The change, which officially took effect on June 1, transfers authority for the Army’s worldwide regional cyber centers to NETCOM, allows Cyber Command to increase its focus on electronic warfare and information operations and provides one primary point of contact for warfighters in need of network support.
The U.S. Army’s xTechSearch program, which is designed to rapidly develop technologies, may offer more specialized challenges similar to the one recently conducted to develop a medical ventilator to help in the fight against the COVID-19 pandemic.
The xTechSearch program develops partnerships primarily with nontraditional businesses that do not normally work with the military but that may offer dual-use solutions the Army never knew it needed. While most of the challenges have been wide open with companies allowed to pitch any solution, the program recently issued a challenge targeted specifically at developing the COVID-19 ventilator.
The COVID-19 pandemic presents a unique challenge for the Defense Department. More people are working remotely, networks are busier than ever and hackers from around the world seek to take advantage, driving up demand for more situational awareness data to keep those networks safe. And the Defense Information Systems Agency (DISA) continues to deliver that data under the most unusual of circumstances.
A U.S. Defense Department research program that has not yet even officially begun may contribute advanced testing devices for COVID-19 and other future pandemics.
The program is being run by the Defense Advanced Research Projects Agency (DARPA) and is called the Detect It with Gene Editing Technologies. The acronym, DIGET, is pronounced “dig it.”
With more U.S. Defense Department personnel working from home during the COVID-19 pandemic, the Defense Information Systems Agency (DISA) is experiencing a surge in demand for its prototypical technology developed under the Cloud-Based Internet Isolation program and is seeking to more quickly deliver the technology to larger numbers of users.
The Defense Information Systems Agency (DISA) is working more closely with the intelligence community and is partnering with the National Security Agency (NSA) on a number of cybersecurity-related efforts, officials say.
A new report on the commoditization of cyber weapons suggests that the easy availability of inexpensive offensive cyber tools is reshaping the cyber threat landscape. The report is being briefed to officials across the federal government, including elements of the Department of Defense, Department of Homeland Security (DHS), FBI, Senate Cyber Caucus and the Secret Service.
The Defense Information Systems Agency (DISA) Cloud Based Internet Isolation prototyping effort is already eliminating cyber threats every day, says Angela Landress, who manages the program commonly known as CBII.
The program uses a little technological sleight of hand to keep non-secure Internet browsing in the secure Amazon Web Services (AWS) cloud rather than on the Department of Defense Information Network (DODIN). “What comes back from the cloud is actually just a video-like representation of the webpage. There’s nothing executable in it,” Landress explains.
Defense Advanced Research Projects Agency (DARPA) officials will include a panel discussion on ethics and legal issues at the Artificial Intelligence (AI) Colloquium being held March 6-7 in Alexandria, Virginia.
“We’re looking at the ethical, legal and social implications of our technologies, particularly as they become powerful and democratized in a way,” reveals John Everett, deputy director of DARPA’s Information Innovation Office.
Officials with the U.S. Defense Department and Department of Homeland Security recently signed a memorandum of understanding outlining a partnership that will allow the Defense Department to take a greater role in sharing intelligence and proactively defending the nation’s critical infrastructure, including next week’s mid-term election.
The Defense Department’s unique role in assessing foreign threats means that it often has information that could benefit the other departments and agencies, the defense industrial base and others with a role in defending the nation’s critical infrastructure.
The U.S. Army may be catching up to adversaries in the information warfare domain, but the pace of change remains a challenge.
“The biggest [capability] gap we have is keeping pace. It is very much a cat-and-mouse game. When you have a cat-and-mouse game, you see a lot of change, so we try to anticipate things,” says Gary Blohm, who directs the Intelligence and Information Warfare Directorate (I2WD) at Aberdeen Proving Ground, Maryland.
Army researchers are providing a system to forces in Iraq that provides contact-free fingerprint, facial recognition and iris detection capabilities. The system has been deployed to an undisclosed location as part of a joint urgent operational need and will be assessed for about 30 days to determine if it might be used elsewhere.
It is designed to control access to sensitive areas. Personnel with common access cards simply walk through the system as they would any checkpoint, and the technology reads their various biometric signatures and displays the data on a screen monitored by an operator.
Over the next five years U.S. Defense Department researchers plan to build a prototypical system that will converge radar, communications and electronic warfare functions for a range of unmanned aerial systems, including the RQ-7 Shadow and the RQ-21 Blackjack. A do-it-all system will efficiently switch between intelligence, surveillance and reconnaissance; command and control; networking; and combat operations support missions without changing payloads.