On-demand access to public safety data is critical to ensuring that public safety and first responder (PSFR) personnel can deliver the proper care and support during an emergency. This necessitates heavy reliance on mobile platforms while in the field, which may be used to access sensitive information. However, complex authentication requirements can hinder the process…
CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.
Featured Notable Technical Inquiry
Solving today’s most complex scientific challenges often means tracing links between hundreds, thousands, or even millions of variables. The larger the scientific dataset, the more complex these connections become. With experiments generating petabytes and even exabytes of data over time, tracking the connections in processes such as drug discovery, materials development, or cybersecurity can be a Herculean task. Thankfully, with the advent of artificial intelligence,…Learn More
The cyber challenge posed by China is unlike any challenge ever faced by the US and its allies, said the Commander of United States Cyber Command. Speaking yesterday before the House Select Committee on the Chinese Communist Party, Army Gen. Paul M. Nakasone told lawmakers that cyber actors in China have used malware to hold at risk critical U.S. infrastructure, such as systems that provide…Learn More
The Defense Department is just at the start of using artificial intelligence. “Peer competitors are as well,” said Jude R. Sunderbruch, Executive Director of the DoD Cyber Crime Center, who spoke today at the Google Defense Forum. Sunderbruch predicted that in the future, there will be a battle between AI and counter-AI, which will lead to the question: “What is the truth in front of…Learn More
Companies in major industries such as finance and health care must follow best practices for monitoring incoming data for cyberattacks. The latest internet security protocol, known as TLS 1.3, provides state-of-the-art protection but complicates the performance of these required data audits. The National Institute of Standards and Technology (NIST) has released a practice guide describing methods that are intended to help these industries implement TLS…Learn More
WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Federal Bureau of Investigation (FBI), along with key U.S. and international government agencies, published a Joint Cybersecurity Advisory today on malicious activity by a People’s Republic of China (PRC) state-sponsored cyber actor, known as Volt Typhoon, to compromise critical infrastructure and associated actions that should be urgently undertaken by all organizations. CISA…Learn More
A team of Stony Brook University physicists and their collaborators have taken a significant step toward the building of a quantum internet testbed by demonstrating a foundational quantum network measurement that employs room-temperature quantum memories. Their findings are described in a paper published in the Nature journal Quantum Information. Research with quantum computing and quantum networks is taking place around the world in the hopes of developing a…Learn More
SACRAMENTO, Calif. (AFRL) – AFWERX Autonomy Prime partner Xwing Inc. made history by flying the first autonomous logistics mission as part of the U.S. Air Force exercise AGILE FLAG 24-1 at McClellan Airfield in Sacramento, California, Jan. 26, 2024. The flight was one of several autonomous demonstrations conducted during the exercise by Autonomy Prime partners Reliable Robotics and Xwing between Jan. 26 and Feb. 1,…Learn More
FORT MEADE, Md. — The U.S. Senate voted to confirm President Joseph R. Biden, Jr.’s nomination of U.S. Air Force Lt. Gen. Timothy D. Haugh to the rank of General and to assume the duties as the Commander, U.S. Cyber Command (CYBERCOM), Director, National Security Agency (NSA)/Chief, Central Security Service (CSS). Lt. Gen. Haugh is scheduled to assume his new role following a change-of-command ceremony…Learn More
The Cybersecurity & Information Systems Information Analysis Center performed open-source research and obtained white papers and reports from numerous sources to include the Defense Technical Information Center Research and Engineering Gateway and Elsevier’s ScienceDirect. Overall, the research shows that the best way to counter artificial intelligence (AI) offensive tools is with AI defensive tools. The resulting research is described in detail. This TI response report…Learn More
This presentation describes a network survivability assessment methodology for Cyber-Electromagnetic Activities teams to identify cyber threats early in the acquisition cycle. The U.S. Department of Defense Acquisition Process begins with a Material Solution Analysis (MSA) and culminates with operations and support. An Analysis of Alternatives (AoA) takes place after all potential solutions are examined to…
The Rocky Mountain Chapter of AFCEA hosts an annual forum for industry, academia, and government to discuss and propose solutions to the challenges of cybersecurity, community cyber readiness, and homeland defense facing our nation. The…
The National Institute of Standards and Technology (NIST) plans to hold the 5th NIST PQC Standardization Conference from April 10-12, 2024, in Rockville, Maryland. The purpose of the conference is to discuss various aspects of…
Advantage DoD 2024: Defense Data & Artificial Intelligence (AI) Symposium is a three-day cyber and modeling-focused symposium. Key topics include generative AI, large language models, data and analytics, enablers (such as tools for small businesses,…
Voice From the Community
Technical Staff, Multimission Cyber Security, Raytheon Intelligence & Space
As a technical staff member subject matter expert, Jess provides nearly 50 years of expertise in systems, software, and whole life engineering. As a systems architect, he has supported several of the largest weapons systems platforms, including the F-35 and B-2. His back-ground in mathematics and physics provides insight into subtle issues related to communications and sensor technologies. He has developed operat-ing systems, compilers, and large-scale systems emulations and is an experi-enced 3-D game developer. He has a foundational patent in distributed trust architecture and collaborated on Trusted Computing Architecture and Intellectual Property Protection techniques. He is an expert in the tools, techniques, and practices of model-based systems engineering using SysML.
The latest releases from the Cybersecurity & Information Systems Information Analysis Center (CSIAC).
Want to be featured in our Digest?
Submit your "Voice From the Community"