& Information Systems Digest


CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.


Mobile Application Single Sign-on for First Responders: Final Guide Published

On-demand access to public safety data is critical to ensuring that public safety and first responder (PSFR) personnel can deliver the proper care and support during an emergency. This necessitates heavy reliance on mobile platforms while in the field, which may be used to access sensitive information. However, complex authentication requirements can hinder the process…


Featured Notable Technical Inquiry

Graph Nueral Networks

Researchers at ORNL Demonstrate Scalability of GNNs on World’s Most Powerful Computing Systems

Solving today’s most complex scientific challenges often means tracing links between hundreds, thousands, or even millions of variables. The larger the scientific dataset, the more complex these connections become. With experiments generating petabytes and even exabytes of data over time, tracking the connections in processes such as drug discovery, materials development, or cybersecurity can be a Herculean task. Thankfully, with the advent of artificial intelligence,…

Learn More
A graphic shows the watch floor of Navy Fleet Cyber Command.

US Can Respond Decisively to Cyber Threat Posed by China

The cyber challenge posed by China is unlike any challenge ever faced by the US and its allies, said the Commander of United States Cyber Command. Speaking yesterday before the House Select Committee on the Chinese Communist Party, Army Gen. Paul M. Nakasone told lawmakers that cyber actors in China have used malware to hold at risk critical U.S. infrastructure, such as systems that provide…

Learn More
Students from UCSD visit March ARB to help incorporate Artificial Intelligence into MQ-9 Platform

Battle Looming Between AI and Counter-AI, Says Official

The Defense Department is just at the start of using artificial intelligence. “Peer competitors are as well,” said Jude R. Sunderbruch, Executive Director of the DoD Cyber Crime Center, who spoke today at the Google Defense Forum. Sunderbruch predicted that in the future, there will be a battle between AI and counter-AI, which will lead to the question:  “What is the truth in front of…

Learn More
Transport Layer Security 1.3

New NCCoE Guide Helps Major Industries Observe Incoming Data While Using Latest Internet Security Protocol

Companies in major industries such as finance and health care must follow best practices for monitoring incoming data for cyberattacks. The latest internet security protocol, known as TLS 1.3, provides state-of-the-art protection but complicates the performance of these required data audits. The National Institute of Standards and Technology (NIST) has released a practice guide describing methods that are intended to help these industries implement TLS…

Learn More

U.S. and International Partners Publish Cybersecurity Advisory on People’s Republic of China State-Sponsored Hacking of U.S. Critical Infrastructure

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Federal Bureau of Investigation (FBI), along with key U.S. and international government agencies, published a Joint Cybersecurity Advisory today on malicious activity by a People’s Republic of China (PRC) state-sponsored cyber actor, known as Volt Typhoon, to compromise critical infrastructure and associated actions that should be urgently undertaken by all organizations. CISA…

Learn More
Stony Brook Quantum Information Laboratory

SBU Research Team Takes Major Step Toward a Functioning Quantum Internet

A team of Stony Brook University physicists and their collaborators have taken a significant step toward the building of a quantum internet testbed by demonstrating a foundational quantum network measurement that employs room-temperature quantum memories. Their findings are described in a paper published in the Nature journal Quantum Information. Research with quantum computing and quantum networks is taking place around the world in the hopes of developing a…

Learn More
AFWERX Autonomy Prime partners demonstrate autonomous flight capabilities, make history at AGILE FLAG

AFWERX Autonomy Prime Partners Demonstrate Autonomous Flight Capabilities, Make History at AGILE FLAG

SACRAMENTO, Calif. (AFRL) – AFWERX Autonomy Prime partner Xwing Inc. made history by flying the first autonomous logistics mission as part of the U.S. Air Force exercise AGILE FLAG 24-1 at McClellan Airfield in Sacramento, California, Jan. 26, 2024. The flight was one of several autonomous demonstrations conducted during the exercise by Autonomy Prime partners Reliable Robotics and Xwing between Jan. 26 and Feb. 1,…

Learn More
GEN Nakasone and Lt Gen Haugh

Senate Votes to Confirm Lt. Gen. Timothy Haugh to Lead CYBERCOM and NSA/CSS

FORT MEADE, Md. — The U.S. Senate voted to confirm President Joseph R. Biden, Jr.’s nomination of U.S. Air Force Lt. Gen. Timothy D. Haugh to the rank of General and to assume the duties as the Commander, U.S. Cyber Command (CYBERCOM), Director, National Security Agency (NSA)/Chief, Central Security Service (CSS). Lt. Gen. Haugh is scheduled to assume his new role following a change-of-command ceremony…

Learn More

What software/middleware creates virtual and constructive cyber effects in live, virtual, and constructive testing and training events?

Learn More
Guaranteeing AI Robustness against Deception (GARD)

Counter-AI Offensive Tools and Techniques

The Cybersecurity & Information Systems Information Analysis Center performed open-source research and obtained white papers and reports from numerous sources to include the Defense Technical Information Center Research and Engineering Gateway and Elsevier’s ScienceDirect.  Overall, the research shows that the best way to counter artificial intelligence (AI) offensive tools is with AI defensive tools.  The resulting research is described in detail.  This TI response report…

Learn More


CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Network Survivability Assessment Methodology

Hosted by: Philip Payne

September 22, 2021 12:00 pm


Network Survivability Assessment Methodology

This presentation describes a network survivability assessment methodology for Cyber-Electromagnetic Activities teams to identify cyber threats early in the acquisition cycle. The U.S. Department of Defense Acquisition Process begins with a Material Solution Analysis (MSA) and culminates with operations and support.  An Analysis of Alternatives (AoA) takes place after all potential solutions are examined to…



Rocky Mountain Cyberspace Symposium (RMCS24)

The Rocky Mountain Chapter of AFCEA hosts an annual forum for industry, academia, and government to discuss and propose solutions to the challenges of cybersecurity, community cyber readiness, and homeland defense facing our nation. The…

Fifth Post Quantum Cryptography (PQC) Standardization Conference

The National Institute of Standards and Technology (NIST) plans to hold the 5th NIST PQC Standardization Conference from April 10-12, 2024, in Rockville, Maryland. The purpose of the conference is to discuss various aspects of…

Advantage DoD 2024: Defense Data & AI Symposium

Advantage DoD 2024:  Defense Data & Artificial Intelligence (AI) Symposium is a three-day cyber and modeling-focused symposium. Key topics include generative AI, large language models, data and analytics, enablers (such as tools for small businesses,…

Voice From the Community

Jess Irwin

Technical Staff, Multimission Cyber Security, Raytheon Intelligence & Space

As a technical staff member subject matter expert, Jess provides nearly 50 years of expertise in systems, software, and whole life engineering. As a systems architect, he has supported several of the largest weapons systems platforms, including the F-35 and B-2. His back-ground in mathematics and physics provides insight into subtle issues related to communications and sensor technologies. He has developed operat-ing systems, compilers, and large-scale systems emulations and is an experi-enced 3-D game developer. He has a foundational patent in distributed trust architecture and collaborated on Trusted Computing Architecture and Intellectual Property Protection techniques. He is an expert in the tools, techniques, and practices of model-based systems engineering using SysML.

Want to be featured in our Digest?

Submit your "Voice From the Community"