The U.S. Defense Department’s Joint Artificial Intelligence Center (JAIC) will see major progress next year, says Dana Deasy, the department’s new chief information officer. The joint center will accelerate the delivery of AI-enabled capabilities and develop tools and technologies that will offer benefits across the military.
SIGNAL Online Exclusives
U.S. Army officials conducting the third annual Cyber Quest experiment, which ends today, will issue a report in about 30 days that will determine which of the systems involved will transfer to programs of record. The exercise consists of an array of systems, including artificial intelligence and machine learning, that help provide situational understanding of the cyber and electronic warfare realms.
After about a year, the U.S. Air Force is extending its smart base pilot program at Maxwell-Gunter Air Force Base, Montgomery, Ala. The effort takes advantage of Internet of Things (IoT) technologies and applies the smart city concept to the base. The lessons learned at Maxwell likely will be applied to Air Force bases around the world.
The U.S. Air Force Research Laboratory (AFRL) is set to receive a neuromorphic supercomputer from IBM this summer.
Researchers at the National Institute of Standards and Technology (NIST) have built a superconducting switch that learns like a biological system and could connect processors and store memories in future computers, NIST officials intend to announce today. The switch in some ways outperforms the human brain that inspired it and offers a wide range of benefits for medical diagnoses, smart cars and intelligence analysis.
The NIST switch is called a synapse, after its biological counterpart, and it supplies a missing piece for neuromorphic computers. Envisioned as a new type of artificial intelligence, such computers could boost machine perception and decision making.
The Defense Information Systems Agency (DISA) is touting the potential benefits of light fidelity (Li-Fi) technology, a form of wireless, light-based communications. Li-Fi is expected to be more resistant to electronic signature detectors and therefore, less susceptible to electronic warfare techniques.
Lt. Gen. Alan Lynn, USA, the DISA director, stressed the need for the technology during the agency’s November 6 forecast to industry.
He also emphasized the need for software-defined networking, which Gen. Lynn said is inexpensive and versatile. He described a scenario in which warfighters will be able to hop from one network to the next, similar to radios that hop from one frequency to another.
The U.S. Army last week completed an exercise designed to further define how the service adapts operationally to modern threats, including cyber attacks and electromagnetic warfare. During the exercise, the Army tested the cyber-electromagnetic activities (CEMA) cell concept within a brigade combat team and introduced new, yet-to-be-fielded technologies.
Each of the U.S. military services and the Special Operations Command plan to field laser weapons in the coming years. But Lockheed Martin officials say they could deliver now a 30-kilowatt weapon system—powerful enough to bore a hole in a steel plate within seconds—if the military asks.
MITRE Corporation officials say they expect a rush of proposals in the final days of the non-profit organization’s Countering Unauthorized Unmanned Aerial Systems (UAS) Challenge. The deadline for submitting white papers is February 7.
A Small Business Administration (SBA) venture slated to kick off this summer could bring about substantial changes for all small businesses as the agency establishes a governmentwide mentor-protege program.
SBA officials are putting the finishing touches on rule changes that essentially would clone the agency’s 8(a) Business Development mentor-protege program and offer it to the rest of the nation’s small businesses, said Antonio Doss, district director of the SBA’s Washington Metropolitan Area District Office.
The Defense Information Systems Agency (DISA) seeks to use big data analytics to enhance network situational awareness while automating as many cybersecurity capabilities as possible, officials said during the agency’s November 2 forecast to industry in Washington, D.C.
Securing the cyberspace will get worse before it gets any better, warned Adm. Michael Rogers, USN, director of the National Security Agency (NSA) and commander of U.S. Cyber Command.
“The very technical foundation of the world we’ve created with the Internet of Things is going to exacerbate [security vulnerabilities], not make it easier,” he said. Now, it’s not that the Internet of Things is bad, he pointed out. “As a private citizen, I love the convenience. But I also acknowledge it brings inherent challenges when we’re trying to defend something.”
The U.S. Department of Commerce's National Institute of Standards and Technology (NIST) awarded nearly $3.7 million for three pilot projects that seek to fortify online financial transactions and enhance privacy protections for health care, government services, transportation and the Internet of Things.
The studies, awarded by the agency's National Strategy for Trusted Identities in Cyberspace (NSTIC) office, address specific cyber-based missions such as reducing tax refund theft, ensuring better protections of medical information, devising mobile ticketing solutions for use on mass transit and providing secure online data storage, according the agency.
This blog is a followup to an article in the October issue of SIGNAL Magazine, Operation Cooperation: U.S. Defense Officials Intend to Expand Asia-Pacific Partnerships.
Although tighter budgets motivate governments to cooperate on technology development, sequestration and the budget uncertainties in the United States have negatively impacted international partnerships, says Keith Webster, director of international cooperation, Office of the Under Secretary of Defense for Acquisition, Technology and Logistics.
The ease at which criminals can reverse engineer software makes for lucrative transgressions with national security implications, prompting government-backed researchers to seek innovations to shore up vulnerabilities, officials say.
The Defense Advanced Research Projects Agency, or DARPA, turned to academia and awarded a multiyear mission to develop obfuscation technology to better safeguard software intellectual property, both for commercial and government endeavors. The aim of DARPA’s SafeWare program is to find a solution that would render the software, such as proprietary algorithms, incomprehensible to a reverse engineer.
The U.S. government wants in on the resurgence of developments in contactless biometric technology, seeing smart applications of such devices in places such as airport security. But before device deployment, officials need to make sure the scanners and sensors actually do what they say they do—safely and accurately.
The National Institute of Standards and Technology (NIST) is working with a handful of private companies to develop data format standards, best practices and methods for certification testing on new products before any can be used.
Researchers are linking together the power of the Internet of Things, artificial intelligence and cloud computing to create a personal assistant to provide total situational awareness to first responders. The advanced program is wise enough to provide only the information necessary for each user, smart enough to ask questions and versatile enough for virtually anyone to use, including firefighters, warfighters, factory workers and home owners.
If all goes well, the system is set to begin prototype testing within the next 16 months, and an initial capability could be fielded soon.
Ransomware soared as the preferred malware of cybercriminals, with the number of new samples rising 58 percent over the second quarter of this year, and a whopping 127 percent over this time last year, according to a new analysis by Intel Security.
The firm released a retrospective report five years after acquiring McAfee. Its researchers compared what they thought would happen beginning in 2010 to what actually happened with hardware and software security threats, noting the boom in the number of devices connected to the Internet and a general lack of cyberhygiene contributed to the increase of malware intrusions and ransomware attacks.
The Defense Department’s much-anticipated capability solution to access classified voice and email up to the secret level from mobile devices finally migrated from the pilot stage and now is operational within the department and several federal agencies, says Kimberly Rice, program manger for the Defense Information Systems Agency’s (DISA's) Mobility Program Management Office.
Most of the Defense Research and Engineering Network (DREN) has received a major upgrade, providing U.S. military researchers with access to an unprecedented fast fiber optic network connecting five supercomputing centers at speeds 16 times faster than present rates.