Intelligence Community - Federal News Network https://federalnewsnetwork.com Helping feds meet their mission. Tue, 28 May 2024 18:19:35 +0000 en-US hourly 1 https://federalnewsnetwork.com/wp-content/uploads/2017/12/cropped-icon-512x512-1-60x60.png Intelligence Community - Federal News Network https://federalnewsnetwork.com 32 32 State’s OSINT strategy aims to serve diplomats’ demand for unclassified assessments https://federalnewsnetwork.com/inside-ic/2024/05/states-osint-strategy-aims-to-serve-diplomats-demand-for-unclassified-assessments/ https://federalnewsnetwork.com/inside-ic/2024/05/states-osint-strategy-aims-to-serve-diplomats-demand-for-unclassified-assessments/#respond Tue, 28 May 2024 14:38:14 +0000 https://federalnewsnetwork.com/?p=5017523 The Bureau of Intelligence and Research also sees the potential for generative artificial intelligence to better leverage open-source intelligence (OSINT).

The post State’s OSINT strategy aims to serve diplomats’ demand for unclassified assessments first appeared on Federal News Network.

]]>
var config_5017566 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB9585698584.mp3?updated=1716906486"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2024\/02\/Inside-the-IC-3000x3000-podcast-tile-Booz-Allen-150x150.jpg","title":"The State Department has a new OSINT strategy","description":"[hbidcpodcast podcastid='5017566']nnThe State Department\u2019s intelligence arm is vowing to take better advantage of publicly accessible information and commercial data under a new strategy that calls for meeting diplomats' demand for more unclassified assessments.nnState\u2019s Bureau of Intelligence and Research (INR) today released an <a href="https:\/\/www.state.gov\/open-source-intelligence-strategy\/" target="_blank" rel="noopener">\u201cOpen Source Intelligence Strategy\u201d<\/a> to guide its OSINT efforts over the next two years.nnBrett Holmgren, assistant secretary of State for intelligence and research, said the strategy is driven by the need to \u201charness\u201d a growing body of commercially and publicly available information about world events. And it\u2019s also intended to meet the demand inside the State Department for more unclassified assessments that can be accessed securely by diplomats anywhere in the world, Holmgren added.nnIn addition to delivering more timely information to U.S. diplomats,\u00a0 Holmgren said the use of OSINT could also help INR and the State Department expand its partnerships with foreign countries, especially those outside of the "Five Eyes" intelligence-sharing alliance.nn\u201cSo for us, when it comes to the future of OSINT, the stakes could not be higher,\u201d Holmgren said in an interview.nnThe new strategy also comes on the heels of <a href="https:\/\/federalnewsnetwork.com\/inside-ic\/2024\/04\/intel-community-seeks-to-centralize-osint-under-new-strategy\/" target="_blank" rel="noopener">an intelligence community-wide OSINT strategy<\/a> released earlier this spring.nnHolmgren said the bureau\u2019s strategy complements the IC-wide effort, but also reflects INR\u2019s \u201cunique role in the intelligence community as the only element that's focused exclusively on providing intelligence to support American diplomacy,\u201d Holmgren said.nnHe described how State\u2019s analysts have relied on OSINT dating back to World War II, when INR's forerunner, the research and analysis section in the Office of Strategic Services,\u00a0 used news reports, government statistics and economic outlooks to create long-range assessment of the Axis powers.nn\u201cINR\u2019s long standing embrace of OSINT continues to this day where many of our analysts turn to OSINT as their first source of information in the morning, and then they turn to classified cables and intelligence reports to determine what's significant, what warrants an assessment, what needs to be flagged for policymakers,\u201d Holmgren said.nnThe INR unit, a smaller component within the intelligence community, has been feted for its efforts to use OSINT rather than relying on highly classified sources. But Holmgren acknowledged that even INR\u2019s analysts can struggle to produce unclassified assessments based entirely on open-source data.nn\u201cThe challenge is balancing our desire to produce more products at the unclassified level with the need to ensure that these classified insights that our analysts have acquired, due to their access to classified information, is appropriately protected,\u201d Holmgren said.nnThe Bureau of INR is working with the Office of the Director of National Intelligence on policy guidance on the use of OSINT in intelligence reports.nn\u201cI'm confident we'll find a reasonable solution that allows us to better serve our diplomats while still safeguarding that classified information,\u201d Holmgren said.nnThe bureau last year also established an Open Source Coordination Unit<a href="https:\/\/federalnewsnetwork.com\/inside-ic\/2022\/05\/state-department-intelligence-arm-to-set-up-open-source-coordination-office\/" target="_blank" rel="noopener"> to better organize its OSINT efforts.<\/a> After delays due to an initial lack of funding, Holmgren said the new office is now \u201cstaffed and resourced for the long term.\u201dnnThe bureau\u2019s new strategy highlights the importance of training and education on OSINT. \u201cWe are in the process of developing our own internal training that our folks will be able to access later this year,\u201d Holmgren said.nnHe also said ODNI\u2019s forthcoming guidance will be crucial as INR and other intelligence agencies navigate the challenges of ensuring open-source data isn\u2019t tainted by disinformation.nn\u201cThere will be unique differences between some of the OSINT tradecraft, in terms of how people are reviewing information to assess its reliability and credibility, to make sure that we are able to identify and detect and remove disinformation and other things that foreign adversaries may try to inject in the open source space,\u201d Holmgren said. \u201cBut especially when it comes to conducting analysis, there will be many similarities with the existing analytic tradecraft processes and standards.\u201dn<h2>Role for generative AI<\/h2>nThe bureau\u2019s new strategy also calls for investing in OSINT data and tools.nnLike many intelligence agencies, Holmgren said INR has taken advantage of a recent increase in commercially available satellite imagery. The intelligence community famously used such imagery to issue public warnings about Russia\u2019s impending invasion of Ukraine in 2022.nnBut INR\u2019s analysts also rely on foreign leader speeches, panel discussions at conferences, government reports and other data that\u2019s increasingly available over the internet. And in many cases, the relatively small bureau does not have enough analysts to sift through and analyze all that information.nnHolmgren said that\u2019s an area where tools like generative artificial intelligence could help.nn\u201cWe think there's real potential for things like generative AI to really help summarize and synthesize the key takeaways from this growing body of open source information, government information that's out there,\u201d Holmgren said.nnMeanwhile, the intelligence community\u2019s OSINT strategy calls for coordinating open-source data acquisition and expanding the sharing of such data across the IC. Holmgren called that a \u201cgame changer\u201d for smaller components like INR.nn\u201cFrankly, our ability to acquire tools or licenses, in many cases is cost prohibitive for us because we just don't have the resources,\u201d Holmgren said. \u201cAnd so what the DNI is doing on both cataloging the different tools and capabilities that are out there in the first instance, and then figuring out cost efficient ways for the taxpayer to make those available to the rest of the intelligence community is going to allow smaller agencies like us to take advantage of things that right now, for the most part, only bigger agencies can afford to acquire and deploy at scale.\u201dn<h2>Mobile capabilities in development<\/h2>nOne of INR\u2019s major priorities during Holmgren\u2019s tenure has been IT modernization. In addition to moving into <a href="https:\/\/federalnewsnetwork.com\/ask-the-cio\/2023\/08\/new-top-secret-cloud-strategy-underpins-state-dept-bureaus-modernization-efforts\/" target="_blank" rel="noopener">top-secret cloud environments<\/a>, INR has also sought to expand access to its unclassified work through new digital platforms.nnLast year, the bureau <a href="https:\/\/statemag.state.gov\/2023\/10\/1023itn01\/" target="_blank" rel="noopener">released \u201cTempo,\u201d<\/a> an internal website on the State Department\u2019s unclassified network. Holmgren said ambassadors and diplomats around the world can use Tempo to access a variety of unclassified INR products, including foreign public opinion polling data, humanitarian graphics and maps and analytical summaries.nnHolmgren said INR is now developing a mobile application so State Department employees can access Tempo from their phones, wherever they might be in the world.nn\u201cIn the future, what I believe will be essential to INR\u2019s relevance and our ability to engage more with our customers, but also do enable intelligence diplomacy in a more consistent way, will be sharing unclassified level assessments based entirely on open source data, but still enriched with the expert analysis and expert insights that our analysts possess.\u201d"}};

The State Department’s intelligence arm is vowing to take better advantage of publicly accessible information and commercial data under a new strategy that calls for meeting diplomats’ demand for more unclassified assessments.

State’s Bureau of Intelligence and Research (INR) today released an “Open Source Intelligence Strategy” to guide its OSINT efforts over the next two years.

Brett Holmgren, assistant secretary of State for intelligence and research, said the strategy is driven by the need to “harness” a growing body of commercially and publicly available information about world events. And it’s also intended to meet the demand inside the State Department for more unclassified assessments that can be accessed securely by diplomats anywhere in the world, Holmgren added.

In addition to delivering more timely information to U.S. diplomats,  Holmgren said the use of OSINT could also help INR and the State Department expand its partnerships with foreign countries, especially those outside of the “Five Eyes” intelligence-sharing alliance.

“So for us, when it comes to the future of OSINT, the stakes could not be higher,” Holmgren said in an interview.

The new strategy also comes on the heels of an intelligence community-wide OSINT strategy released earlier this spring.

Holmgren said the bureau’s strategy complements the IC-wide effort, but also reflects INR’s “unique role in the intelligence community as the only element that’s focused exclusively on providing intelligence to support American diplomacy,” Holmgren said.

He described how State’s analysts have relied on OSINT dating back to World War II, when INR’s forerunner, the research and analysis section in the Office of Strategic Services,  used news reports, government statistics and economic outlooks to create long-range assessment of the Axis powers.

“INR’s long standing embrace of OSINT continues to this day where many of our analysts turn to OSINT as their first source of information in the morning, and then they turn to classified cables and intelligence reports to determine what’s significant, what warrants an assessment, what needs to be flagged for policymakers,” Holmgren said.

The INR unit, a smaller component within the intelligence community, has been feted for its efforts to use OSINT rather than relying on highly classified sources. But Holmgren acknowledged that even INR’s analysts can struggle to produce unclassified assessments based entirely on open-source data.

“The challenge is balancing our desire to produce more products at the unclassified level with the need to ensure that these classified insights that our analysts have acquired, due to their access to classified information, is appropriately protected,” Holmgren said.

The Bureau of INR is working with the Office of the Director of National Intelligence on policy guidance on the use of OSINT in intelligence reports.

“I’m confident we’ll find a reasonable solution that allows us to better serve our diplomats while still safeguarding that classified information,” Holmgren said.

The bureau last year also established an Open Source Coordination Unit to better organize its OSINT efforts. After delays due to an initial lack of funding, Holmgren said the new office is now “staffed and resourced for the long term.”

The bureau’s new strategy highlights the importance of training and education on OSINT. “We are in the process of developing our own internal training that our folks will be able to access later this year,” Holmgren said.

He also said ODNI’s forthcoming guidance will be crucial as INR and other intelligence agencies navigate the challenges of ensuring open-source data isn’t tainted by disinformation.

“There will be unique differences between some of the OSINT tradecraft, in terms of how people are reviewing information to assess its reliability and credibility, to make sure that we are able to identify and detect and remove disinformation and other things that foreign adversaries may try to inject in the open source space,” Holmgren said. “But especially when it comes to conducting analysis, there will be many similarities with the existing analytic tradecraft processes and standards.”

Role for generative AI

The bureau’s new strategy also calls for investing in OSINT data and tools.

Like many intelligence agencies, Holmgren said INR has taken advantage of a recent increase in commercially available satellite imagery. The intelligence community famously used such imagery to issue public warnings about Russia’s impending invasion of Ukraine in 2022.

But INR’s analysts also rely on foreign leader speeches, panel discussions at conferences, government reports and other data that’s increasingly available over the internet. And in many cases, the relatively small bureau does not have enough analysts to sift through and analyze all that information.

Holmgren said that’s an area where tools like generative artificial intelligence could help.

“We think there’s real potential for things like generative AI to really help summarize and synthesize the key takeaways from this growing body of open source information, government information that’s out there,” Holmgren said.

Meanwhile, the intelligence community’s OSINT strategy calls for coordinating open-source data acquisition and expanding the sharing of such data across the IC. Holmgren called that a “game changer” for smaller components like INR.

“Frankly, our ability to acquire tools or licenses, in many cases is cost prohibitive for us because we just don’t have the resources,” Holmgren said. “And so what the DNI is doing on both cataloging the different tools and capabilities that are out there in the first instance, and then figuring out cost efficient ways for the taxpayer to make those available to the rest of the intelligence community is going to allow smaller agencies like us to take advantage of things that right now, for the most part, only bigger agencies can afford to acquire and deploy at scale.”

Mobile capabilities in development

One of INR’s major priorities during Holmgren’s tenure has been IT modernization. In addition to moving into top-secret cloud environments, INR has also sought to expand access to its unclassified work through new digital platforms.

Last year, the bureau released “Tempo,” an internal website on the State Department’s unclassified network. Holmgren said ambassadors and diplomats around the world can use Tempo to access a variety of unclassified INR products, including foreign public opinion polling data, humanitarian graphics and maps and analytical summaries.

Holmgren said INR is now developing a mobile application so State Department employees can access Tempo from their phones, wherever they might be in the world.

“In the future, what I believe will be essential to INR’s relevance and our ability to engage more with our customers, but also do enable intelligence diplomacy in a more consistent way, will be sharing unclassified level assessments based entirely on open source data, but still enriched with the expert analysis and expert insights that our analysts possess.”

The post State’s OSINT strategy aims to serve diplomats’ demand for unclassified assessments first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/inside-ic/2024/05/states-osint-strategy-aims-to-serve-diplomats-demand-for-unclassified-assessments/feed/ 0
‘Data literate workforce’ is critical to DIA’s future https://federalnewsnetwork.com/big-data/2024/05/dia-building-data-literate-workforce-to-harness-osint/ https://federalnewsnetwork.com/big-data/2024/05/dia-building-data-literate-workforce-to-harness-osint/#respond Wed, 01 May 2024 21:41:28 +0000 https://federalnewsnetwork.com/?p=4984642 The DIA deputy director for global integration says middle management is preventing the intelligence community from harnessing more advanced data analysis.

The post ‘Data literate workforce’ is critical to DIA’s future first appeared on Federal News Network.

]]>
The Defense Intelligence Agency is using more open-source data than ever before, but one of its top leaders says DIA is aiming to create a “data-literate” workforce to analyze the growing hoard of information.

Greg Ryckman, DIA’s deputy director for global integration, said the agency’s open-source collection efforts have expanded massively over the last two decades. DIA is charged with analyzing foreign defense and military capabilities.

“When I joined the intelligence community 20-plus years ago, open source was that salt you sprinkled on your meal — at some point, you kind of set up a source on top of it,” Ryckman said during a webinar hosted by the Intelligence and National Security Alliance. “And today, open source is 85% to 90% of what we’re looking at. It’s now the main course.”

Ryckman’s comments dovetail with a new open source intelligence strategy released by the Office of the Director of National Intelligence and the CIA earlier this spring. The goal under the strategy is for agencies to use OSINT as a “first resort” source of information. It also calls for building up a cadre of OSINT professionals.

DIA leads the military’s use of open-source data. Ryckman said one of the problems DIA has encountered with OSINT is the number of personnel needed to sift through public and commercially available data to find useful information.

“When I was the director for analysis, one of the things that I struggled with is I had a lot of analysts who, because of the dependence on open source and how much they used it, found themselves being open source collection experts, not necessarily all source analysts,” Ryckman said.

DIA recently established an Open-Source Intelligence Integration Center. The agency now has a new job specialty specifically focused on open source collection.

“That collection discipline for open source is a big shift and one we’re working toward,” Ryckman said.

But DIA is still confronting the challenge of processing, exploiting and disseminating the increasing amount of available data.

“If you’d asked me 10 years ago what our biggest challenge analytically is, I might have said, ‘We need more information and data,’” he said. “Now I will tell you that our analysts are just overwhelmed by stuff that’s coming in.”

Ryckman said DIA is focused on creating a “data-literate workforce.” But he acknowledged the agency’s technology and culture can still pose challenges for data savvy employees.

“One thing I’ve certainly seen as well bring people in that are very data literate, and they get in our system, and they find out the system’s not data friendly,” Ryckman said. “And then they get very frustrated. So we have got to figure out how to not only have that literate workforce, but empower them to do their thing.”

The new OSINT strategy calls for expanding open-source data sharing and developing more sophisticated tools to better exploit information. The intelligence community’s 2023 data strategy has also sparked efforts to recruit data-savvy employees and use more advanced technologies, including automation and artificial intelligence.

Ryckman said DIA is getting to a point where machines and analysts can work on a problem simultaneously. “There are some tools that we built that are now delivering automated analysis based on algorithms that we’ve vetted and validated, and they’re producing products that have met a threshold to be able to say, “This meets a confidence level,’” he said. “That’s the tip of the iceberg.”

But he added that “bureaucracy” is preventing the intelligence community from moving forward with some of those new initiatives.

“If I was a young analyst, or somebody thinking about doing this for a living, I would expect the intelligence community and DIA to create an environment in which I am leveraging all these new capabilities and tools,” Ryckman said. “We have to get people in that more mid-level to senior level to embrace that as much as some of our youngsters coming in.”

The post ‘Data literate workforce’ is critical to DIA’s future first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/big-data/2024/05/dia-building-data-literate-workforce-to-harness-osint/feed/ 0
CISA makes significant progress deploying EDR tools on agency systems https://federalnewsnetwork.com/federal-newscast/2024/05/cisa-makes-significant-progress-deploying-edr-tools-on-agency-systems/ https://federalnewsnetwork.com/federal-newscast/2024/05/cisa-makes-significant-progress-deploying-edr-tools-on-agency-systems/#respond Wed, 01 May 2024 14:28:18 +0000 https://federalnewsnetwork.com/?p=4983780 CISA Director Jen Easterly said her agency has completed EDR deployments at eight federal agencies, with five more in progress.

The post CISA makes significant progress deploying EDR tools on agency systems first appeared on Federal News Network.

]]>
var config_4983776 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB8929258417.mp3?updated=1714564208"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2018\/12\/FedNewscast1500-150x150.jpg","title":"CISA makes significant progress deploying Endpoint Detection and Response tools on agency systems","description":"[hbidcpodcast podcastid='4983776']nn[federal_newscast]"}};
  • The Cybersecurity and Infrastructure Security Agency is making progress toward deploying, onto agency systems, Endpoint Detection and Response (EDR) tools. CISA Director Jen Easterly said her agency has completed EDR deployments at eight federal agencies, with five more in progress. In testimony before the House Appropriations Committee yesterday, Easterly said the EDR tools allow CISA to identify cyber attacks on agency networks within minutes. Within just the last six months, Easterly said the cyber agency has detected more than 1,900 threats on federal networks using the new tools.
    (Witness testimony of Jen Easterly - House Appropriations Committee homeland security subcommittee)
  • The Defense Innovation Unit has a new deputy director of commercial operations. In her new role, Liz Young McNally will oversee commercial operations at DIU, including the National Security Innovation Network and the National Security Innovation Capital initiative. She will work closely with the Office of Strategic Capital and the Office of Industrial Base Policy. This new position is key to executing DIU’s new strategy to scale commercial technology across the DoD.
  • After the White House’s return-to-office push, agencies are most of the way there, but frustrations are still brewing in Congress. House Republicans are urging further in-person presence of federal employees. Currently, agencies are about 80% in compliance with a White House goal for feds to spend half their work hours in the office. But Oversight committee members said the Biden administration’s 50% target does not take things far enough. They are raising concerns about the costs of office space, and delays in federal services. In response, Office of Management and Budget Deputy Director for Management Jason Miller told lawmakers he is still focused on reaching full compliance with the 50% in-office target. “We expect agencies to completely follow through on their implementation, and we’ll hold them accountable for that,” Miller said. OMB has not given agencies a specific deadline for those return-to-office plans.
  • Virginia lawmakers are demanding more transparency from the Postal Service, after seeing persistent mail delays. Sen. Mark Warner (D-Va.) said Postmaster General Louis DeJoy is apologizing for mail delays following the rollout of a Regional Processing and Distribution Center in Richmond, Virgina. It is a huge facility where USPS sorts mail and packages going to other regions. USPS said it is the first of about 60 such sites it plans to open. But Richmond got only about 65% of first-class mail delivered on time after USPS opened this facility. That is about 20 points lower than before this change. Warner said USPS needs to do a better job training employees at the new facility and expects performance to improve. “I do think if this reform is successfully implemented, we will see better service,” Warner said.
  • The Cybersecurity and Infrastructure Security Agency has 30 days to establish or designate an office of the national coordinator to serve as the single point of contact for sector risk management agencies, like the departments of Energy or Health and Human Services, across the government. This is one of 13 short- or long-term deadlines detailed in a new National Security Memo signed by President Joe Biden yesterday. The memo reasserts and expands CISA's role in protecting the 16 critical infrastructure sectors like telecommunications, finance and electricity. It also further encourages the intelligence community to share more threat intelligence with critical infrastructure operators. The National Security Memo updates a 2013 memo signed by then-President Barack Obama.
  • The Defense Department Cyber Service Academy (DoD CSA) has officially merged with what was the DoD Cyber Scholarship Program. This merger will allow the DoD’s Office of the Chief Information Officer to better allocate scholarship funds. It will also enable the office to streamline its administrative processes. The academy, which is currently selecting candidates for 2024, pays education expenses for students who want to study cybersecurity in return for a commitment to work at the DoD. The program was established in 2023 to help DoD recruit and retain cyber and IT talent.
  • The General Services Administration, colloquially known as the federal government's landlord, is moving ahead with plans to get rid of underutilized office space. The Treasury Department’s Bureau of the Fiscal Service is moving out of its current space in the Liberty Loan Building and relocating to the U.S. Mint headquarters. GSA plans to sell or dispose of the Liberty Loan Building, which would eliminate 141,000 sq. ft. of office space and save about $15 million it would have otherwise spent to maintain the building. GSA is looking to "right size" federal office space, now that many federal employees are on a hybrid work schedule.
  • The Biden administration said it is making progress on early-career hiring efforts. After pushing agencies to boost internship opportunities, the Office of Management and Budget said the number of federal interns increased 33% in just one year. And OMB official Jason Miller told House lawmakers this week that internships may see even more growth. With a recent update to the Pathways Program, the administration is eyeing more paid internships as a way to open doors to more diverse candidates.
    (Hearing with the Office of Management and Budget - House Oversight and Accountability Committee)
  • The lead cyber office at the Energy Department said artificial intelligence poses both risks and opportunities for the nation’s energy infrastructure. That is according to a new assessment from DOE’s Office of Cybersecurity, Energy Security, and Emergency Response (CESER). CESER said the benefits of AI for the energy sector include use cases such as predictive maintenance and better system planning. But introducing AI to energy systems also brings with it the potential for unintentional failure modes, adversarial attacks and other challenges. CESER said it will host listening sessions on AI with members of the energy sector, such as oil and gas companies, this summer.

The post CISA makes significant progress deploying EDR tools on agency systems first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/federal-newscast/2024/05/cisa-makes-significant-progress-deploying-edr-tools-on-agency-systems/feed/ 0
Intel community seeks to centralize OSINT under new strategy https://federalnewsnetwork.com/inside-ic/2024/04/intel-community-seeks-to-centralize-osint-under-new-strategy/ https://federalnewsnetwork.com/inside-ic/2024/04/intel-community-seeks-to-centralize-osint-under-new-strategy/#respond Wed, 24 Apr 2024 21:55:19 +0000 https://federalnewsnetwork.com/?p=4975829 The intelligence community's new OSINT strategy puts a premium on using open-source data, as opposed to highly secretive sources and and methods.

The post Intel community seeks to centralize OSINT under new strategy first appeared on Federal News Network.

]]>
var config_4975623 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB9376958679.mp3?updated=1713985935"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2024\/02\/Inside-the-IC-3000x3000-podcast-tile-Booz-Allen-150x150.jpg","title":"Inside the IC’s new open source intelligence strategy","description":"[hbidcpodcast podcastid='4975623']nnWith social media feeds and data brokers awash in valuable intel, leaders of the top U.S. intelligence agencies have signed onto a plan to centralize open source intelligence (OSINT).nnThe <a href="https:\/\/www.dni.gov\/files\/ODNI\/documents\/IC_OSINT_Strategy.pdf" target="_blank" rel="noopener">new OSINT strategy,<\/a> signed out by Director of National Intelligence Avril Haines and CIA Director William Burns last month, aims to make open-source an \u201cthe INT of first resort.\u201d Those words, in the title of the strategy, are a tacit recognition that spy agencies have traditionally favored gaining intelligence from highly secretive sources \u2014 such as human intelligence, spy satellites, and electronic signals \u2014 rather than open-source data.nnOSINT isn\u2019t new. Spy agencies have been gathering newspaper clips and other public materials for as long as they\u2019ve been in existence.nnBut Jason Barrett, the OSINT executive at the Office of the Director of National Intelligence, said the IC is reaching an \u201cinflection point." The strategy acknowledges the explosion of public and commercial data available over the internet, as well as the ability to organize and analyze that information using technology like AI.nn\u201cUltimately, we are hearing more and more from our colleagues, from different parts of the national intelligence enterprise, whether it's different IC elements or different national intelligence managers, about the need for more information in this space,\u201d Barrett said on Inside the IC.nnIntelligence community officials have been considering the place of OSINT for several years, <a href="https:\/\/federalnewsnetwork.com\/inside-ic\/2022\/04\/intel-community-weighs-role-of-open-source-intelligence-amid-ukraine-conflict\/" target="_blank" rel="noopener">especially since Russia\u2019s invasion of Ukraine.<\/a> Officials have acknowledged the value of OSINT, <a href="https:\/\/federalnewsnetwork.com\/intelligence-community\/2023\/08\/intel-agencies-just-scratching-the-surface-on-open-source-initiatives\/" target="_blank" rel="noopener">while struggling<\/a> to standardize open source tradecraft across agencies.nnIn addition to making OSINT a primary source, one of the major goals of the new strategy is coordinating the acquisition and sharing of open source data. It calls for establishing a \u201ca centralized, multi-domain data catalog to enhance transparency\u201d for both publicly available information and commercially available data.nn\u201cAll members of the IC should be able to discover IC-acquired open source data and community OSINT reporting, while adhering to security and classification requirements,\u201d the document states.nnSome organizations within intelligence agencies have focused more on OSINT in recent years. But Barrett acknowledged those efforts have been mostly disparate and uncoordinated.nn\u201cThe problem is that it has been disaggregated. It's been ad hoc, and it is been decentralized to the point of being difficult to manage,\u201d Barrett said.n<h2>CIA OSINT efforts<\/h2>nOne of the major focal points for OSINT has been the CIA\u2019s open source enterprise. Randy Nixon, the director of the OSE, said the organization hosts a lot of the IC\u2019s open source data, as well as the unclassified IT infrastructure and technology used across the intelligence community.nn\u201cThis strategy makes sure that we all stay on task, and that we don't fall into the trap of only thinking about our own agency,\u201d Nixon said. \u201cWe remain focused on what we're doing as a shared community.\u201dnnAnd he highlighted how in the past, multiple IC agencies may have been purchasing the same open-source data sets due to a lack of coordination.nn\u201cWe have to make sure we have the right tradecraft in our contracts, where we purchase once, share across the entire community,\u201d Nixon said.nnNixon also chairs the National Open Source Committee, an IC-panel that will oversee much of the strategy\u2019s implementation. He said the technology and tradecraft subcommittee is working to expand a shared internal website for OSINT tradecraft notes and best practices. And the management subcommittee plans to release quarterly highlights of newly available OSINT data.nnMeanwhile, the open source committee is also working to document technology gaps for harnessing OSINT. Officials believe the use of AI and machine learning will be crucial to harness open-source data. They say those tools will be easier to adopt on unclassified networks used to host open-source data, as opposed to more restrictive classified networks.nn\u201cI think the combination of tools and capabilities that our leading edge OSINT practitioners are developing is going to not just serve them, but it's going to truly benefit the entire IC in ways that are hard for some people to really imagine right now,\u201d Barrett said.nnODNI is also close to releasing a framework for obtaining commercially available information. That follows <a href="https:\/\/www.wyden.senate.gov\/imo\/media\/doc\/signed_wyden_letter_to_dni_re_nsa_purchase_of_domestic_metadata_and_ftc_order_on_data_brokers_with_attachments.pdf" target="_blank" rel="noopener">concerns<\/a> about the IC\u2019s purchase of commercial datasets that sometimes includes information about Americans.nnThe governance framework will lay out how the IC will \u201caccess, acquire and oversee commercially available information, and it covers privacy rights, it covers legal analysis, it covers a number of different components,\u201d Barrett said.nn\u201cSo it is critical to us to get this right,\u201d he continued. \u201cSo that we can build trust with the American people and with others. We feel like the work that we're doing in the open source intelligence space has a huge amount of potential there to build that trust further, because we can be more transparent in the work that we're doing. It can help drive relationships and not just in providing decision advantage, but in supporting diplomacy efforts and partnering more with industry.\u201dnn "}};

With social media feeds and data brokers awash in valuable intel, leaders of the top U.S. intelligence agencies have signed onto a plan to centralize open source intelligence (OSINT).

The new OSINT strategy, signed out by Director of National Intelligence Avril Haines and CIA Director William Burns last month, aims to make open-source an “the INT of first resort.” Those words, in the title of the strategy, are a tacit recognition that spy agencies have traditionally favored gaining intelligence from highly secretive sources — such as human intelligence, spy satellites, and electronic signals — rather than open-source data.

OSINT isn’t new. Spy agencies have been gathering newspaper clips and other public materials for as long as they’ve been in existence.

But Jason Barrett, the OSINT executive at the Office of the Director of National Intelligence, said the IC is reaching an “inflection point.” The strategy acknowledges the explosion of public and commercial data available over the internet, as well as the ability to organize and analyze that information using technology like AI.

“Ultimately, we are hearing more and more from our colleagues, from different parts of the national intelligence enterprise, whether it’s different IC elements or different national intelligence managers, about the need for more information in this space,” Barrett said on Inside the IC.

Intelligence community officials have been considering the place of OSINT for several years, especially since Russia’s invasion of Ukraine. Officials have acknowledged the value of OSINT, while struggling to standardize open source tradecraft across agencies.

In addition to making OSINT a primary source, one of the major goals of the new strategy is coordinating the acquisition and sharing of open source data. It calls for establishing a “a centralized, multi-domain data catalog to enhance transparency” for both publicly available information and commercially available data.

“All members of the IC should be able to discover IC-acquired open source data and community OSINT reporting, while adhering to security and classification requirements,” the document states.

Some organizations within intelligence agencies have focused more on OSINT in recent years. But Barrett acknowledged those efforts have been mostly disparate and uncoordinated.

“The problem is that it has been disaggregated. It’s been ad hoc, and it is been decentralized to the point of being difficult to manage,” Barrett said.

CIA OSINT efforts

One of the major focal points for OSINT has been the CIA’s open source enterprise. Randy Nixon, the director of the OSE, said the organization hosts a lot of the IC’s open source data, as well as the unclassified IT infrastructure and technology used across the intelligence community.

“This strategy makes sure that we all stay on task, and that we don’t fall into the trap of only thinking about our own agency,” Nixon said. “We remain focused on what we’re doing as a shared community.”

And he highlighted how in the past, multiple IC agencies may have been purchasing the same open-source data sets due to a lack of coordination.

“We have to make sure we have the right tradecraft in our contracts, where we purchase once, share across the entire community,” Nixon said.

Nixon also chairs the National Open Source Committee, an IC-panel that will oversee much of the strategy’s implementation. He said the technology and tradecraft subcommittee is working to expand a shared internal website for OSINT tradecraft notes and best practices. And the management subcommittee plans to release quarterly highlights of newly available OSINT data.

Meanwhile, the open source committee is also working to document technology gaps for harnessing OSINT. Officials believe the use of AI and machine learning will be crucial to harness open-source data. They say those tools will be easier to adopt on unclassified networks used to host open-source data, as opposed to more restrictive classified networks.

“I think the combination of tools and capabilities that our leading edge OSINT practitioners are developing is going to not just serve them, but it’s going to truly benefit the entire IC in ways that are hard for some people to really imagine right now,” Barrett said.

ODNI is also close to releasing a framework for obtaining commercially available information. That follows concerns about the IC’s purchase of commercial datasets that sometimes includes information about Americans.

The governance framework will lay out how the IC will “access, acquire and oversee commercially available information, and it covers privacy rights, it covers legal analysis, it covers a number of different components,” Barrett said.

“So it is critical to us to get this right,” he continued. “So that we can build trust with the American people and with others. We feel like the work that we’re doing in the open source intelligence space has a huge amount of potential there to build that trust further, because we can be more transparent in the work that we’re doing. It can help drive relationships and not just in providing decision advantage, but in supporting diplomacy efforts and partnering more with industry.”

 

The post Intel community seeks to centralize OSINT under new strategy first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/inside-ic/2024/04/intel-community-seeks-to-centralize-osint-under-new-strategy/feed/ 0
New DCSA director sees a data-driven future for security clearances and more https://federalnewsnetwork.com/defense-news/2024/04/new-dcsa-director-sees-a-data-driven-future-for-security-clearances-and-more/ https://federalnewsnetwork.com/defense-news/2024/04/new-dcsa-director-sees-a-data-driven-future-for-security-clearances-and-more/#respond Fri, 19 Apr 2024 15:45:04 +0000 https://federalnewsnetwork.com/?p=4969196 David Cattler, a longtime intelligence official, sees a range of both near- and long-term priorities in his new role as director at DCSA.

The post New DCSA director sees a data-driven future for security clearances and more first appeared on Federal News Network.

]]>
var config_4969306 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB3993736758.mp3?updated=1713542186"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2023\/12\/3000x3000_Federal-Drive-GEHA-150x150.jpg","title":"New DCSA director sees a data-driven future for security clearances and more","description":"[hbidcpodcast podcastid='4969306']nnThe Defense Counterintelligence and Security Agency\u2019s new director wants to get DCSA\u2019s critical next-generation background investigations IT system back on track, while he also keeps an eye toward the \u201cdata-centric\u201d future at the security agency.nnIn his first interview since taking over as DCSA director in late March, David Cattler discussed his initial thoughts and priorities for the agency\u2019s vast mission. Cattler has extensive experience throughout the intelligence community. He most recently served as NATO\u2019s top intelligence and security official.nnNow he directs an agency with 15,000 employees in 172 locations across the country. It conducts 95% of federal background investigations \u2014 some 2.6 million cases annually \u2014 while also overseeing the security of 12,000 classified contractor facilities. And the agency also manages key counterintelligence and insider threat programs.nn\u201cThis is an agency that's just really big and has a huge security mission for the nation,\u201d Cattler said.nnHe called DCSA\u2019s <a href="https:\/\/federalnewsnetwork.com\/hiring-retention\/2023\/04\/this-would-be-wild-officials-lay-out-ambitious-goals-for-federal-employee-vetting\/" target="_blank" rel="noopener">personnel vetting mission<\/a> a \u201ctremendous responsibility.\u201d The agency\u2019s background investigations apparatus collects reams of personal information on millions of Americans seeking to obtain or keep a security clearance every year.<img class=" wp-image-4969250 alignleft" src="https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2024\/04\/david_m_cattler-scaled.jpg" alt="David Cattler" width="298" height="386" \/>nn\u201cThe first task is to really be sure that people know who we are, and what we're doing and why we're doing it and that we do it well, and that we're responsible about the protection of that critical data,\u201d Cattler said. \u201cI know that I would not want all the material that the government has collected on me to determine that I'm trustworthy, to be made available to anybody that wishes to exploit it for one reason or another. So I think that's a really serious commitment that we've taken up.\u201dnnIt\u2019s been five years since DCSA was established with the merger of the Defense Security Service and the Office of Personal Management\u2019s National Background Investigations Bureau, along with similar organizations.nnThe focus for <a href="https:\/\/federalnewsnetwork.com\/contractsawards\/2020\/02\/progress-on-security-clearance-backlog-is-real-but-federal-contractors-still-seeking-end-to-end-solutions\/" target="_blank" rel="noopener">the first couple years of DCSA\u2019s existence<\/a> was largely on stabilizing the background investigations backlog and integrating the various missions under one house.\u00a0 DCSA is now playing a crucial role in modernizing the federal government\u2019s personnel vetting process, in addition to its other day-to-day responsibilities.nn\u201cWe're now at a point where we're pretty close to full performance, but we need to really be sure that we're there,\u201d Cattler said. \u201cAnd I think for me that's a good strategic goal right in the beginning.\u201dnnHe\u2019s also challenging his team to look at the \u201cfar future\u201d for DCSA, which Cattler called a \u201cdata-centric agency.\u201dn<h2>NBIS delays<\/h2>nBut for now, one of the most pressing items for the Cattler is getting the National Background Investigation Services (NBIS) program back on track.nnDCSA is developing the IT system to replace multiple legacy background investigations systems. Once fully deployed, DCSA <a href="https:\/\/www.dcsa.mil\/Systems-Applications\/National-Background-Investigation-Services-NBIS\/" target="_blank" rel="noopener">says <\/a>NBIS will provide a \u201cone-stop-shop IT system,\u201d with <a href="https:\/\/federalnewsnetwork.com\/inside-ic\/2022\/08\/dcsa-opens-front-door-to-next-gen-background-investigation-system\/" target="_blank" rel="noopener">security clearance applications,<\/a> case management capabilities, records of security clearance decisions, continuous vetting data, and more.nnBut the program is facing major schedule, cost and performance challenges. DCSA recently initiated a \u201crecovery plan\u201d for NBIS, according to the latest <a href="https:\/\/assets.performance.gov\/files\/Personnel_Vetting_QPR_FY24_Q2.pdf" target="_blank" rel="noopener">update<\/a> on Performance.gov. The agency had been working to decommission the legacy IT systems at the end of 2024, but that schedule is now at risk. As part of the recovery plan, DCSA is developing an \u201cupdated NBIS roadmap.\u201dnnCattler said he\u2019s already spent a lot of time reviewing the NBIS program. DCSA also recently hired <a href="https:\/\/www.dcsa.mil\/About-Us\/News\/Article\/Article\/3700697\/agency-names-new-nbis-program-manager\/" target="_blank" rel="noopener">a new program manager<\/a> and <a href="https:\/\/www.dcsa.mil\/About-Us\/News\/Article\/Article\/3737416\/dcsa-names-next-program-executive-officer\/" target="_blank" rel="noopener">a new program executive officer<\/a> to oversee the program.nn\u201cWe're at a period now, especially since I'm new, but there was an ongoing effort already to take a look at, where are we in terms of the expertise?\u201d Cattler said. \u201cDo we have the right people inside and outside? We're taking a hard look at the contractual framework. What are the requirements? What's the timeline and what's the cost? And then finally, to make sure that we have the right people in the right places in the right structures for oversight.\u201dnnThe software system is crucial to the governmentwide \u201cTrusted Workforce 2.0\u201d initiative to modernize personnel vetting. Many of the initiative\u2019s milestones, such as expanding continuous vetting and streamlining the different types of background investigation, are contingent on the successful development of NBIS.nn\u201cWe\u2019re looking at it very, very closely, and diligently, and we're going to manage it with proper accountability and oversight,\u201d Cattler said.n<h2>DCSA a \u2018data-centric\u2019 agency<\/h2>nThe successful development of technologies like NBIS are also key to what Cattler sees as the \u201cfar future\u201d for DCSA.nn\u201cThe question I'm asking the leadership team and the workforce more broadly, is, what does the nature of the work environment for us look like in 2040?\u201d Cattler said.nnHe\u2019s particularly focused on how using data could streamline everything from DCSA\u2019s security clearance investigations to industrial security reviews.nn\u201cIn addition to being a security services provider, we are a data-centric agency,\u201d Cattler said. \u201cWe do have that tremendous amount of information that we maintain, and all these very unique relationships with certainly the defense industry, but also all across government. And one of the central questions I'm asking is, are we wringing all the potential value out of that pool of data today? And what else can we do?\u201dnnThe agency is already starting to harness more data and automation. It\u2019s <a href="https:\/\/federalnewsnetwork.com\/workforce\/2023\/10\/continuous-vetting-procedures-will-soon-apply-to-more-feds-governmentwide\/" target="_blank" rel="noopener">continuous vetting system,<\/a> for instance, provides automatic alerts from local law enforcement databases when a clearance holder is arrested.nnBut Cattler sees the potential for DCSA to use data to better predict security and counterintelligence threats before they come to fruition. As a longtime intelligence analyst, Cattler said he views it as an \u201cindications and warning\u201d problem.nn\u201cI am certain that there are even today more tools that we could be using . . . that would have application to our work to more easily manage and curate the current dataset,\u201d Cattler said. \u201cWe have to take advantage of even new datasets that could give us different signatures. All with the mindset that what we want is the earliest possible identification of a potential issue for personnel security, industrial security, or a counterintelligence [or] insider threat problem. So that ideally, you can take an affirmative intervention early and prevent a problem from manifesting.\u201dnnHe suggested better data and AI tools could also help identify threat trends or even assist with background investigator training.nn\u201cAlready in 19 days, I've come into contact with a great number of people inside government, outside government, who are that smart, who do have those connections, who have equal passion for the work and were saying, \u2018Let's get together and talk about it,\u2019\u201d Cattler said. \u201cBecause they're very excited about what that future could be as is our team within DCSA.\u201d"}};

The Defense Counterintelligence and Security Agency’s new director wants to get DCSA’s critical next-generation background investigations IT system back on track, while he also keeps an eye toward the “data-centric” future at the security agency.

In his first interview since taking over as DCSA director in late March, David Cattler discussed his initial thoughts and priorities for the agency’s vast mission. Cattler has extensive experience throughout the intelligence community. He most recently served as NATO’s top intelligence and security official.

Now he directs an agency with 15,000 employees in 172 locations across the country. It conducts 95% of federal background investigations — some 2.6 million cases annually — while also overseeing the security of 12,000 classified contractor facilities. And the agency also manages key counterintelligence and insider threat programs.

“This is an agency that’s just really big and has a huge security mission for the nation,” Cattler said.

He called DCSA’s personnel vetting mission a “tremendous responsibility.” The agency’s background investigations apparatus collects reams of personal information on millions of Americans seeking to obtain or keep a security clearance every year.David Cattler

“The first task is to really be sure that people know who we are, and what we’re doing and why we’re doing it and that we do it well, and that we’re responsible about the protection of that critical data,” Cattler said. “I know that I would not want all the material that the government has collected on me to determine that I’m trustworthy, to be made available to anybody that wishes to exploit it for one reason or another. So I think that’s a really serious commitment that we’ve taken up.”

It’s been five years since DCSA was established with the merger of the Defense Security Service and the Office of Personal Management’s National Background Investigations Bureau, along with similar organizations.

The focus for the first couple years of DCSA’s existence was largely on stabilizing the background investigations backlog and integrating the various missions under one house.  DCSA is now playing a crucial role in modernizing the federal government’s personnel vetting process, in addition to its other day-to-day responsibilities.

“We’re now at a point where we’re pretty close to full performance, but we need to really be sure that we’re there,” Cattler said. “And I think for me that’s a good strategic goal right in the beginning.”

He’s also challenging his team to look at the “far future” for DCSA, which Cattler called a “data-centric agency.”

NBIS delays

But for now, one of the most pressing items for the Cattler is getting the National Background Investigation Services (NBIS) program back on track.

DCSA is developing the IT system to replace multiple legacy background investigations systems. Once fully deployed, DCSA says NBIS will provide a “one-stop-shop IT system,” with security clearance applications, case management capabilities, records of security clearance decisions, continuous vetting data, and more.

But the program is facing major schedule, cost and performance challenges. DCSA recently initiated a “recovery plan” for NBIS, according to the latest update on Performance.gov. The agency had been working to decommission the legacy IT systems at the end of 2024, but that schedule is now at risk. As part of the recovery plan, DCSA is developing an “updated NBIS roadmap.”

Cattler said he’s already spent a lot of time reviewing the NBIS program. DCSA also recently hired a new program manager and a new program executive officer to oversee the program.

“We’re at a period now, especially since I’m new, but there was an ongoing effort already to take a look at, where are we in terms of the expertise?” Cattler said. “Do we have the right people inside and outside? We’re taking a hard look at the contractual framework. What are the requirements? What’s the timeline and what’s the cost? And then finally, to make sure that we have the right people in the right places in the right structures for oversight.”

The software system is crucial to the governmentwide “Trusted Workforce 2.0” initiative to modernize personnel vetting. Many of the initiative’s milestones, such as expanding continuous vetting and streamlining the different types of background investigation, are contingent on the successful development of NBIS.

“We’re looking at it very, very closely, and diligently, and we’re going to manage it with proper accountability and oversight,” Cattler said.

DCSA a ‘data-centric’ agency

The successful development of technologies like NBIS are also key to what Cattler sees as the “far future” for DCSA.

“The question I’m asking the leadership team and the workforce more broadly, is, what does the nature of the work environment for us look like in 2040?” Cattler said.

He’s particularly focused on how using data could streamline everything from DCSA’s security clearance investigations to industrial security reviews.

“In addition to being a security services provider, we are a data-centric agency,” Cattler said. “We do have that tremendous amount of information that we maintain, and all these very unique relationships with certainly the defense industry, but also all across government. And one of the central questions I’m asking is, are we wringing all the potential value out of that pool of data today? And what else can we do?”

The agency is already starting to harness more data and automation. It’s continuous vetting system, for instance, provides automatic alerts from local law enforcement databases when a clearance holder is arrested.

But Cattler sees the potential for DCSA to use data to better predict security and counterintelligence threats before they come to fruition. As a longtime intelligence analyst, Cattler said he views it as an “indications and warning” problem.

“I am certain that there are even today more tools that we could be using . . . that would have application to our work to more easily manage and curate the current dataset,” Cattler said. “We have to take advantage of even new datasets that could give us different signatures. All with the mindset that what we want is the earliest possible identification of a potential issue for personnel security, industrial security, or a counterintelligence [or] insider threat problem. So that ideally, you can take an affirmative intervention early and prevent a problem from manifesting.”

He suggested better data and AI tools could also help identify threat trends or even assist with background investigator training.

“Already in 19 days, I’ve come into contact with a great number of people inside government, outside government, who are that smart, who do have those connections, who have equal passion for the work and were saying, ‘Let’s get together and talk about it,’” Cattler said. “Because they’re very excited about what that future could be as is our team within DCSA.”

The post New DCSA director sees a data-driven future for security clearances and more first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/defense-news/2024/04/new-dcsa-director-sees-a-data-driven-future-for-security-clearances-and-more/feed/ 0
S&T official picked to lead intelligence community’s AI work https://federalnewsnetwork.com/artificial-intelligence/2024/04/intelligence-community-gets-a-chief-ai-officer/ https://federalnewsnetwork.com/artificial-intelligence/2024/04/intelligence-community-gets-a-chief-ai-officer/#respond Thu, 04 Apr 2024 16:45:22 +0000 https://federalnewsnetwork.com/?p=4950308 The appointment of a chief AI officer comes as the IC looks to safely adopt large language models and other technologies.

The post S&T official picked to lead intelligence community’s AI work first appeared on Federal News Network.

]]>
var config_4957168 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB3900842332.mp3?updated=1712753853"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2023\/12\/3000x3000_Federal-Drive-GEHA-150x150.jpg","title":"Intelligence community gets a chief AI officer","description":"[hbidcpodcast podcastid='4957168']nnThe top U.S. spy office has tapped a research official to spearhead the intelligence community\u2019s work on AI.nnJohn Beieler, who serves as Director of National Intelligence Avril Haines\u2019 top science and technology advisor, has been named chief artificial intelligence officer at the Office of the Director of National Intelligence. Beieler confirmed his additional role during a speech today at an event hosted by the Intelligence and National Security Alliance in Arlington, Va.nnBeieler now leads a council of chief AI officers from the 18 elements of the intelligence community, including the CIA, the National Security Agency and the Defense Intelligence Agency. He said the council, which reports directly to Haines, has been meeting every two weeks for the last two months.nn\u201cWhat we're focusing on as a group is AI governance,\u201d Beieler said.nnHe said the group is writing the first IC-wide directive on AI. It will describe what intelligence agencies need to do to deploy AI and machine learning.nn\u201cThings like documentation, standards, [application programing interfaces], what sort of data documentation needs to happen, how all these things fit together, the responsible adoption, ongoing monitoring,\u201d Beieler said, describing what goes into the directive. \u201cThe responsibility of an individual developer, the responsibility of management and leadership. We\u2019re really focusing on that responsible, ethical adoption.\u201dnnHe added that the directive will also lay out civil liberties and privacy protections that need to be included in the algorithms developed by the intelligence community.nnThe new AI council is also leading an update to ODNI\u2019s AI strategy.nn\u201cWe want to make sure that we have that one consolidated viewpoint of, what do we think is important for AI and the IC, to drive some of those resource conversations,\u201d Beieler said.nnConcerned with rapid advances in AI by China and other countries, lawmakers have also urged the intelligence community to prioritize the adoption of AI, with safeguards.nnThe Fiscal 2024 National Defense Authorization Act directs the DNI to establish new policies \u201cfor the acquisition, adoption, development, use, coordination, and maintenance of artificial intelligence capabilities,\u201d including minimum guidelines for the performance of AI models used by spy agencies.nnBeieler has a background in data science and machine learning. Prior to joining ODNI in 2019, he led research programs on human language technology, machine learning and vulnerabilities in AI at the Intelligence Advanced Research Projects Agency.nnAt ODNI, he has also helped lead the intelligence community\u2019s <a href="https:\/\/federalnewsnetwork.com\/technology-main\/2021\/01\/intelligence-communitys-three-as-of-digital-transformation-augmentation-ai-and-automation\/" target="_blank" rel="noopener">Augmenting Intelligence using Machines<\/a> or \u201cAIM\u201d strategy. With many intel agencies dealing with a deluge of data, the goal of AIM has been to coordinate the adoption of AI and automation across spy agencies.nnWhile spy agencies have used forms of artificial intelligence and machine learning for decades, the emergence of widely available large language models like ChatGPT has added both new considerations and renewed urgency to the AI race.nn\u201cA lot of this is focused on making sure that folks that are using these tools understand them,\u201d Beieler said.nnODNI has already funded various training and upskilling programs across intelligence agencies. And he acknowledged the challenges with generative AI and other large language models, such as hallucination errors, copyright issues, and privacy concerns.nn\u201cGetting analysts, collectors and the broad base of the IC workforce familiar with these things, so they understand some of these failure modes, but doing that in such a way that they don't immediately write off the technology,\u201d Beieler said. \u201cThat's the tricky part in upskilling across the workforce.\u201dnnWith just a handful of companies -- rather than government labs or academia -- developing the so-called advanced <a href="https:\/\/openai.com\/blog\/frontier-model-forum" target="_blank" rel="noopener">\u201cfrontier AI models,\u201d<\/a> Beieler acknowledged the intelligence community finds itself in a unique \u201cLLM moment.\u201dnnHe said it will be crucial to test and evaluate the models for different failure modes. He added that the IC isn\u2019t interested in just \u201cbuying a widget\u201d from companies, but partnering with industry and academia test and evaluate how AI will impact the world of intelligence.nn\u201cThat doesn't mean that we won't have humans. In fact, I think it might mean that we have more humans, but again, is what is the role?\u201d Beieler said. \u201cWhat is that teaming, what is that partnership, and how do we work? And how do we put some of those guardrails in so that analysts understand and collectors understand some of these models that they're working with.\u201d"}};

The top U.S. spy office has tapped a research official to spearhead the intelligence community’s work on AI.

John Beieler, who serves as Director of National Intelligence Avril Haines’ top science and technology advisor, has been named chief artificial intelligence officer at the Office of the Director of National Intelligence. Beieler confirmed his additional role during a speech today at an event hosted by the Intelligence and National Security Alliance in Arlington, Va.

Beieler now leads a council of chief AI officers from the 18 elements of the intelligence community, including the CIA, the National Security Agency and the Defense Intelligence Agency. He said the council, which reports directly to Haines, has been meeting every two weeks for the last two months.

“What we’re focusing on as a group is AI governance,” Beieler said.

He said the group is writing the first IC-wide directive on AI. It will describe what intelligence agencies need to do to deploy AI and machine learning.

“Things like documentation, standards, [application programing interfaces], what sort of data documentation needs to happen, how all these things fit together, the responsible adoption, ongoing monitoring,” Beieler said, describing what goes into the directive. “The responsibility of an individual developer, the responsibility of management and leadership. We’re really focusing on that responsible, ethical adoption.”

He added that the directive will also lay out civil liberties and privacy protections that need to be included in the algorithms developed by the intelligence community.

The new AI council is also leading an update to ODNI’s AI strategy.

“We want to make sure that we have that one consolidated viewpoint of, what do we think is important for AI and the IC, to drive some of those resource conversations,” Beieler said.

Concerned with rapid advances in AI by China and other countries, lawmakers have also urged the intelligence community to prioritize the adoption of AI, with safeguards.

The Fiscal 2024 National Defense Authorization Act directs the DNI to establish new policies “for the acquisition, adoption, development, use, coordination, and maintenance of artificial intelligence capabilities,” including minimum guidelines for the performance of AI models used by spy agencies.

Beieler has a background in data science and machine learning. Prior to joining ODNI in 2019, he led research programs on human language technology, machine learning and vulnerabilities in AI at the Intelligence Advanced Research Projects Agency.

At ODNI, he has also helped lead the intelligence community’s Augmenting Intelligence using Machines or “AIM” strategy. With many intel agencies dealing with a deluge of data, the goal of AIM has been to coordinate the adoption of AI and automation across spy agencies.

While spy agencies have used forms of artificial intelligence and machine learning for decades, the emergence of widely available large language models like ChatGPT has added both new considerations and renewed urgency to the AI race.

“A lot of this is focused on making sure that folks that are using these tools understand them,” Beieler said.

ODNI has already funded various training and upskilling programs across intelligence agencies. And he acknowledged the challenges with generative AI and other large language models, such as hallucination errors, copyright issues, and privacy concerns.

“Getting analysts, collectors and the broad base of the IC workforce familiar with these things, so they understand some of these failure modes, but doing that in such a way that they don’t immediately write off the technology,” Beieler said. “That’s the tricky part in upskilling across the workforce.”

With just a handful of companies — rather than government labs or academia — developing the so-called advanced “frontier AI models,” Beieler acknowledged the intelligence community finds itself in a unique “LLM moment.”

He said it will be crucial to test and evaluate the models for different failure modes. He added that the IC isn’t interested in just “buying a widget” from companies, but partnering with industry and academia test and evaluate how AI will impact the world of intelligence.

“That doesn’t mean that we won’t have humans. In fact, I think it might mean that we have more humans, but again, is what is the role?” Beieler said. “What is that teaming, what is that partnership, and how do we work? And how do we put some of those guardrails in so that analysts understand and collectors understand some of these models that they’re working with.”

The post S&T official picked to lead intelligence community’s AI work first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/artificial-intelligence/2024/04/intelligence-community-gets-a-chief-ai-officer/feed/ 0
A joint business venture to help maintain national security in space https://federalnewsnetwork.com/space-hour/2024/03/a-joint-business-venture-to-help-maintain-national-security-in-space/ https://federalnewsnetwork.com/space-hour/2024/03/a-joint-business-venture-to-help-maintain-national-security-in-space/#respond Fri, 29 Mar 2024 22:55:37 +0000 https://federalnewsnetwork.com/?p=4904322 Space Hour's Eric White speaks with Matt Kuta from Voyager Space about a joint venture it's entering to improve national security in space.

The post A joint business venture to help maintain national security in space first appeared on Federal News Network.

]]>
var config_4903866 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB6259647579.mp3?updated=1709045607"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2021\/10\/TheSpaceHourGraphicFINAL300x300Podcast-150x150.jpg","title":"A joint business venture to help maintain national security in space","description":"[hbidcpodcast podcastid='4903866']nnTwo commercial space companies have agreed to work together on enhancing national security capabilities in the commercial space domain. <a href="https:\/\/voyagerspace.com\/press-releases\/voyager-space-and-palantir-join-forces-to-advance-national-security-capabilities-in-commercial-space\/">Voyager Space and Palantir<\/a> are using their abilities to help support and protect new technologies to be used on the International Space Station, and the soon to come Starlab commercial space station. I wanted to find out more about what this agreement means and get an overview of those involved, so I spoke to Matt Kuta, Co-Founder, President and Chief Operating Officer of Voyager Space.nn<em><strong>Interview Transcript:\u00a0<\/strong><\/em>n<blockquote><strong>Matt Kuta <\/strong>Voyager Space and Palantir are both Denver based companies. And Voyager, we're a space technology company, largest commercial user in the world of the International Space Station. Notably, we've also are prime contractor to build through a public private partnership the replacement of the International Space Station, owned by private industry. And when we think through a space station and, the platform, there's a lot of data that is generated in space, structured and unstructured data. And for lack of a better analogy, the ability to send all of that data down the pipes are restricted to pipes are kind of clogged. It's very difficult to send all the data down to Earth to transmit it. So when you think about how do we capitalize on all this data that is, generated on a space station that's privately owned, and then think through the concept of maybe computing on the edge, or you're using a company like Palantir, and they're proving credibility and capability of artificial intelligence and machine learning to basically kind of transmit down to the customer, the end user, the answer or and a few options of answers for them to then go use however the customer might need. That's how you kind of arrive at this really unique partnership with Palantir and Voyager space, where Palantir is not in the business of building space station. Voyager is. At the same point Voyager is not in the business of, creating from scratch in organic AI machine learning capability. So that's kind of, how it came about.nn<strong>Eric White <\/strong>So when you say AI and the machine learning capability, you primarily mean creating a mechanism that can take all of the vast amounts of data that, you know, whatever machine you have up in space right now is gathering at all times and being able to do what with it, break it down, or just categorize it in a way that's actually useful because it's a lot it is a lot of data, as you mentioned.nn<strong>Matt Kuta <\/strong>Right? Yeah, it's a little bit of both. I, I actually turn out to say it's a little bit of what the customer needs. Right. So, some customers might say, hey, here's our constraints and our, our desired outcomes and send me the answer like it's maybe it's to track, certain things in the ocean or something like that, or send something down to a warfighter on the battlefield. And it's a very precise solution we're delivering to a customer. But it can also be to your other point, hey, you know, we have all this data. Here's more curated assemblage or smorgasbord, if you will, of options for you to kind of go and use. But the bottom line is, how do we leverage a space station's higher power supply computing on the edge to partner with a company like Palantir to send a much more concise, user friendly answer versus giant packets of data that, might not be able to all complete and be able to be transmitted down to Earth.nn<strong>Eric White <\/strong>And so let's focus back on those said customers. Who might that be? Would that be government agencies, I imagine, and maybe some other entities that could find that data useful. Who are you looking to work with? And what are the fruits of the labor going to look like?nn<strong>Matt Kuta <\/strong>Yeah. Well, I say, as I mentioned today, Voyager is the largest commercial user of the International Space Station. As a matter of fact, Voyager and Palantir have actually already worked on a joint proposal to a Department of Defense customer already. So, they think to replace that ISS. It's a spectrum of it's a continuation of stuff we're already doing today and what will occur in the future, if you think to those customers, certainly national security customers. But, given the future space station called Star Lab will be a commercial station, it can certainly also be both national security and commercial use. So, example could be maybe in Star Lab, we're serving, a DoD customer, for example, maybe like United States Navy or something like that to help support naval assets. But we think through a commercial application. Maybe there's some, tangential or direct application of helping a commercial company with our shipping vessels. Something like that.nn<strong>Eric White <\/strong>Got it. We're speaking with Matt Kuta. He is the president of Voyager Space. And so, as you talk about these national security implications, you know, just from a person who covers this, beat, and sees the amount of business that these commercial space companies have been doing with defense entities all over the world really, that amount of work together has exploded. And it's part of the importance, you know, in defense industry and Defense agencies seeing the importance in space. But can you talk about a little bit about that and how, you know, how much more are you working with, government entities for national security purposes?nn<strong>Matt Kuta <\/strong>Yeah. Well, it's a bad a bad use of the word when talking to a space guy about the industry exploding. oh. Yeah.nn<strong>Eric White <\/strong>Sorry. We're full of puns here at Space Hour.nn<strong>Matt Kuta <\/strong>Right, right. But when you think through rapidly growing, if you will. Yeah, it's really exciting time to be in a space, sector. Commercial space sector. You know, just a couple things. One, the I'll call it the national security apparatus is in this transition. And what you know it won't happen completely for many reasons. But it's in this transition where instead of the U.S. government owning some of these hard assets, government owned, government operated for decades, they're seeing how efficient the private sector can be and looking to capitalize on that efficiency, both in the capital markets, that innovation nimbleness speed to execution and completion, and have the ability to buy it as a service. You know, we talked about the space station. You know, the International Space Station today is owned by the government. It's really five space agencies, five kind of government entities. It's NASA, the European Space Agency, Roscosmos, JASA, the Japanese space Agency, and the Canadian Space Agency. It's effectively owned and capitalized by those five entities. And when the International Space Station is deorbited in 2030, which is publicly announced, the United States government will never own another low-Earth orbit space station. It will be owned by private industry. That's what we're working on. And when it is in orbit, the industry will own it. And then the customers governmental customers like NASA, ESA, national security customers, commercial customers like pharmaceutical companies, life science companies or basically build a microgravity laboratory. We'll use it as a customer. And it's an infrastructure investment. And there's a precedent for this. If you go back in time to the late 1990s, early 2000s, and you ask yourself, well, who owned the space shuttle with the wings, you know, come in and land? That was the government. Government owned that NASA. And then, early 2000s around 2006 seven, the US government ended the space shuttle program. And so, we have to privatize it. And at a time, two companies want a public private partnership contract called a Space Act agreement. One was Orbital Sciences is with now orbital ATK, owned by Northrop Grumman. They built a Cygnus resupply vehicle down to about two dozen times to the ISS. And the second company was a four-year-old SpaceX. It had never launched a rocket. And fast forward 15-20 years, if you ask anybody, well, who owns SpaceX, who owns the rockets? No one says the government. They say, well, the company does, the investors do. And then the customer, the government, venture capital backed satellite companies, tourist, whoever pay SpaceX as a customer to launch their payload and they charge margin. You're seeing it you being used in applications like in the in the Ukraine conflict with Russia and Planet and Max are you know, governments are buying imagery from commercial companies now. So, there's lots of exciting, you know, developments in us.nn<strong>Eric White <\/strong>And talking a little bit about the past, before I talk about the future, I'd like to get a little bit more into Voyager's past itself. You've mentioned a couple times now on how you're the biggest commercial user of the ISS. How did you all get to this point? And, you know, where did you all start? Where did you all actually start out?nn<strong>Matt Kuta <\/strong>Yeah. So, over the last few years, Voyager has been basically vertically integrating core parts of the space station supply chain in anticipation that the US government was going to look to deorbit the ISS and privatized ISS. Over the last couple of years, Voyager has a series of seven acquisitions as part of our space station supply chain, strategy. And so, Voyager itself, the company is, just over four years old, the underlying operating history of Voyager, it goes back, you know, about 20 to 30 years.nn<strong>Eric White <\/strong>And so now, towards the future, what is it looking like? You know, you just spoke a little bit about how you're preparing for that deorbit of the ISS. But, you know, as this moves forward, do you all see you yourselves going into other areas of space acquisition or, you know, working in other sectors as you increase, you know, in the national security realm as well?nn<strong>Matt Kuta <\/strong>Certainly. I mean, as I mentioned, we do a lot of work on the ISS today. We do a lot of work, in communications. I think, we have around over 4 million space flight hours in communication technology and in orbit. I think we have about 450 assets in space today. So, when you think through space station and the space station replacement, that's, a very marquee program. It's very exciting. It is a strategic asset. It's a demonstration of sovereignty in orbit, to the to the United States and our allies. But at the same point, there's a lot of other exciting, opportunities both within space sector that Voyager, you know, is already capitalize on. And we'll continue to we're very excited about the continued development of cislunar infrastructure, basically the place between Leo and in the moon, a lot of, for lack of a better word. Railroad tracks need to be laid between, the Earth and the moon. There's a lot of stuff happening on the moon. So, I think there's a lot of opportunity here or there over the next, you know, 10 to 20 years. And, of course, always, close to home. And Leo is kind of the government agencies have ceded through, you know, ceding investment, if you will. The lower Earth orbit, geography, and economy, they've been working on it for 70 years. And what you're seeing in the last ten years is a slow transition, where now NASA and the government can free up budget dollars to go deeper into space. As they hand the baton and the keys to private industry for the stuff closer to home, in low-Earth orbit.nn<strong>Eric White <\/strong>Matt Kuta is the co-founder, president, and chief operating officer at Voyager Space. Find the rest of this interview at our website at Federal News network.com. Search the Space Hour.<\/blockquote>"}};

Two commercial space companies have agreed to work together on enhancing national security capabilities in the commercial space domain. Voyager Space and Palantir are using their abilities to help support and protect new technologies to be used on the International Space Station, and the soon to come Starlab commercial space station. I wanted to find out more about what this agreement means and get an overview of those involved, so I spoke to Matt Kuta, Co-Founder, President and Chief Operating Officer of Voyager Space.

Interview Transcript: 

Matt Kuta Voyager Space and Palantir are both Denver based companies. And Voyager, we’re a space technology company, largest commercial user in the world of the International Space Station. Notably, we’ve also are prime contractor to build through a public private partnership the replacement of the International Space Station, owned by private industry. And when we think through a space station and, the platform, there’s a lot of data that is generated in space, structured and unstructured data. And for lack of a better analogy, the ability to send all of that data down the pipes are restricted to pipes are kind of clogged. It’s very difficult to send all the data down to Earth to transmit it. So when you think about how do we capitalize on all this data that is, generated on a space station that’s privately owned, and then think through the concept of maybe computing on the edge, or you’re using a company like Palantir, and they’re proving credibility and capability of artificial intelligence and machine learning to basically kind of transmit down to the customer, the end user, the answer or and a few options of answers for them to then go use however the customer might need. That’s how you kind of arrive at this really unique partnership with Palantir and Voyager space, where Palantir is not in the business of building space station. Voyager is. At the same point Voyager is not in the business of, creating from scratch in organic AI machine learning capability. So that’s kind of, how it came about.

Eric White So when you say AI and the machine learning capability, you primarily mean creating a mechanism that can take all of the vast amounts of data that, you know, whatever machine you have up in space right now is gathering at all times and being able to do what with it, break it down, or just categorize it in a way that’s actually useful because it’s a lot it is a lot of data, as you mentioned.

Matt Kuta Right? Yeah, it’s a little bit of both. I, I actually turn out to say it’s a little bit of what the customer needs. Right. So, some customers might say, hey, here’s our constraints and our, our desired outcomes and send me the answer like it’s maybe it’s to track, certain things in the ocean or something like that, or send something down to a warfighter on the battlefield. And it’s a very precise solution we’re delivering to a customer. But it can also be to your other point, hey, you know, we have all this data. Here’s more curated assemblage or smorgasbord, if you will, of options for you to kind of go and use. But the bottom line is, how do we leverage a space station’s higher power supply computing on the edge to partner with a company like Palantir to send a much more concise, user friendly answer versus giant packets of data that, might not be able to all complete and be able to be transmitted down to Earth.

Eric White And so let’s focus back on those said customers. Who might that be? Would that be government agencies, I imagine, and maybe some other entities that could find that data useful. Who are you looking to work with? And what are the fruits of the labor going to look like?

Matt Kuta Yeah. Well, I say, as I mentioned today, Voyager is the largest commercial user of the International Space Station. As a matter of fact, Voyager and Palantir have actually already worked on a joint proposal to a Department of Defense customer already. So, they think to replace that ISS. It’s a spectrum of it’s a continuation of stuff we’re already doing today and what will occur in the future, if you think to those customers, certainly national security customers. But, given the future space station called Star Lab will be a commercial station, it can certainly also be both national security and commercial use. So, example could be maybe in Star Lab, we’re serving, a DoD customer, for example, maybe like United States Navy or something like that to help support naval assets. But we think through a commercial application. Maybe there’s some, tangential or direct application of helping a commercial company with our shipping vessels. Something like that.

Eric White Got it. We’re speaking with Matt Kuta. He is the president of Voyager Space. And so, as you talk about these national security implications, you know, just from a person who covers this, beat, and sees the amount of business that these commercial space companies have been doing with defense entities all over the world really, that amount of work together has exploded. And it’s part of the importance, you know, in defense industry and Defense agencies seeing the importance in space. But can you talk about a little bit about that and how, you know, how much more are you working with, government entities for national security purposes?

Matt Kuta Yeah. Well, it’s a bad a bad use of the word when talking to a space guy about the industry exploding. oh. Yeah.

Eric White Sorry. We’re full of puns here at Space Hour.

Matt Kuta Right, right. But when you think through rapidly growing, if you will. Yeah, it’s really exciting time to be in a space, sector. Commercial space sector. You know, just a couple things. One, the I’ll call it the national security apparatus is in this transition. And what you know it won’t happen completely for many reasons. But it’s in this transition where instead of the U.S. government owning some of these hard assets, government owned, government operated for decades, they’re seeing how efficient the private sector can be and looking to capitalize on that efficiency, both in the capital markets, that innovation nimbleness speed to execution and completion, and have the ability to buy it as a service. You know, we talked about the space station. You know, the International Space Station today is owned by the government. It’s really five space agencies, five kind of government entities. It’s NASA, the European Space Agency, Roscosmos, JASA, the Japanese space Agency, and the Canadian Space Agency. It’s effectively owned and capitalized by those five entities. And when the International Space Station is deorbited in 2030, which is publicly announced, the United States government will never own another low-Earth orbit space station. It will be owned by private industry. That’s what we’re working on. And when it is in orbit, the industry will own it. And then the customers governmental customers like NASA, ESA, national security customers, commercial customers like pharmaceutical companies, life science companies or basically build a microgravity laboratory. We’ll use it as a customer. And it’s an infrastructure investment. And there’s a precedent for this. If you go back in time to the late 1990s, early 2000s, and you ask yourself, well, who owned the space shuttle with the wings, you know, come in and land? That was the government. Government owned that NASA. And then, early 2000s around 2006 seven, the US government ended the space shuttle program. And so, we have to privatize it. And at a time, two companies want a public private partnership contract called a Space Act agreement. One was Orbital Sciences is with now orbital ATK, owned by Northrop Grumman. They built a Cygnus resupply vehicle down to about two dozen times to the ISS. And the second company was a four-year-old SpaceX. It had never launched a rocket. And fast forward 15-20 years, if you ask anybody, well, who owns SpaceX, who owns the rockets? No one says the government. They say, well, the company does, the investors do. And then the customer, the government, venture capital backed satellite companies, tourist, whoever pay SpaceX as a customer to launch their payload and they charge margin. You’re seeing it you being used in applications like in the in the Ukraine conflict with Russia and Planet and Max are you know, governments are buying imagery from commercial companies now. So, there’s lots of exciting, you know, developments in us.

Eric White And talking a little bit about the past, before I talk about the future, I’d like to get a little bit more into Voyager’s past itself. You’ve mentioned a couple times now on how you’re the biggest commercial user of the ISS. How did you all get to this point? And, you know, where did you all start? Where did you all actually start out?

Matt Kuta Yeah. So, over the last few years, Voyager has been basically vertically integrating core parts of the space station supply chain in anticipation that the US government was going to look to deorbit the ISS and privatized ISS. Over the last couple of years, Voyager has a series of seven acquisitions as part of our space station supply chain, strategy. And so, Voyager itself, the company is, just over four years old, the underlying operating history of Voyager, it goes back, you know, about 20 to 30 years.

Eric White And so now, towards the future, what is it looking like? You know, you just spoke a little bit about how you’re preparing for that deorbit of the ISS. But, you know, as this moves forward, do you all see you yourselves going into other areas of space acquisition or, you know, working in other sectors as you increase, you know, in the national security realm as well?

Matt Kuta Certainly. I mean, as I mentioned, we do a lot of work on the ISS today. We do a lot of work, in communications. I think, we have around over 4 million space flight hours in communication technology and in orbit. I think we have about 450 assets in space today. So, when you think through space station and the space station replacement, that’s, a very marquee program. It’s very exciting. It is a strategic asset. It’s a demonstration of sovereignty in orbit, to the to the United States and our allies. But at the same point, there’s a lot of other exciting, opportunities both within space sector that Voyager, you know, is already capitalize on. And we’ll continue to we’re very excited about the continued development of cislunar infrastructure, basically the place between Leo and in the moon, a lot of, for lack of a better word. Railroad tracks need to be laid between, the Earth and the moon. There’s a lot of stuff happening on the moon. So, I think there’s a lot of opportunity here or there over the next, you know, 10 to 20 years. And, of course, always, close to home. And Leo is kind of the government agencies have ceded through, you know, ceding investment, if you will. The lower Earth orbit, geography, and economy, they’ve been working on it for 70 years. And what you’re seeing in the last ten years is a slow transition, where now NASA and the government can free up budget dollars to go deeper into space. As they hand the baton and the keys to private industry for the stuff closer to home, in low-Earth orbit.

Eric White Matt Kuta is the co-founder, president, and chief operating officer at Voyager Space. Find the rest of this interview at our website at Federal News network.com. Search the Space Hour.

The post A joint business venture to help maintain national security in space first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/space-hour/2024/03/a-joint-business-venture-to-help-maintain-national-security-in-space/feed/ 0
How well does the U.S. work with its allies when it comes to space? https://federalnewsnetwork.com/space-hour/2024/03/how-well-does-the-u-s-work-with-its-allies-when-it-comes-to-space/ https://federalnewsnetwork.com/space-hour/2024/03/how-well-does-the-u-s-work-with-its-allies-when-it-comes-to-space/#respond Tue, 26 Mar 2024 21:37:45 +0000 https://federalnewsnetwork.com/?p=4904281 I speak with Bruce McClintock, Senior Policy Researcher and lead of RAND's Space Enterprise Initiative, about how well the U.S. is working with it's allies.

The post How well does the U.S. work with its allies when it comes to space? first appeared on Federal News Network.

]]>
var config_4903867 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB4439632942.mp3?updated=1709045167"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2021\/10\/TheSpaceHourGraphicFINAL300x300Podcast-150x150.jpg","title":"How well does the U.S. work with its allies when it comes to space?","description":"[hbidcpodcast podcastid='4903867']nnWe all share life on this big blue rock, and we all share the space around it as well. So in order to get the most out of it from a business and defense aspect, the U.S. is going to need allies. So how are the relationships between the U.S. and strategic partners when it comes to space-related goals? The <a href="https:\/\/www.rand.org\/pubs\/research_briefs\/RBA1739-1.html">RAND Corporation was recently tasked with looking into that very topic<\/a>. To learn more about what that research found, I got the chance to speak with Bruce McClintock, Senior Policy Researcher and lead of RAND's Space Enterprise Initiative.nn<em><strong>Interview Transcript:\u00a0<\/strong><\/em>n<blockquote><strong>Bruce McClintock <\/strong>So in about the 2022-time frame. Lieutenant General Whiting and he was at the time was in Space Operations Command commander, a Beatles commander in United States Space Force, asked Rand to take a close look at how the US was currently cooperating with select allies on space operations matters and where they're all ..... those relationships. So that was very active in the project in that time.nn<strong>Eric White <\/strong>All right. And so, in looking through that, you know, what entities did you speak with, and how did you go about trying to find out those answers for them?nn<strong>Bruce McClintock <\/strong>So we used a very rigorous approach where the project started off by. Well, throughout the course of the project, we conducted over 140 interviews with more than 115 people that represented 24 different organizations. And those organizations included representatives from select allied countries, NATO Space Center, ..., Space Command headquarters, EUCOM headquarters, several Department of Air Force organizations all the way up to senior policy level. And then below, on top of those interviews, we actually conducted 13 different site visits, to include visits to the United Kingdom, Germany, France, Canada, and then several U.S. military networks. In conjunction with all that, we then analyzed close to 200 different documents, ranging from U.S. policy documents to plans for space operations to country specific documents. So, it's a pretty rigorous, very holistic approach to conducting the research for the project.nn<strong>Eric White <\/strong>All right. And so, then the next question is what some of your findings were. So, let's go through it. You did a lot of site visits. You talked to a lot of allies. When it comes to space and U.S. space policy, you know, what were some of the concerns that that you were hearing from counterparts in other governments?nn<strong>Bruce McClintock <\/strong>So one of the most common things that we heard from counterparts in other governments are what they often euphemistically referred to as the gap, or the policy or practice gap, if you will. And what they mean by that is that the U.S. was often cited as being very much publicly committed to integrating allies in the space activities and operations. But at the end of the day, in many cases didn't deliver at the level where it was stated publicly.nn<strong>Eric White <\/strong>Were there any, you know, examples of this that you can give me that were brought up? And, you know, I don't need you to go through the litany of, of any policy failures, but just an example of what they meant by that.nn<strong>Bruce McClintock <\/strong>Sure. So, you know, one of the most frequent, especially in interviews with specific allies, one of the most frequent examples that we would encounter once the failure of the US in many cases to fully include exchange officers from other countries in space related discussions or activities. And I think it's an important distinction here. In the U.S. parlance, there are two types of foreign officers involved in activities. There are liaison officers, which are officers that represent the interests of their country, but their liaison with the United States. So, it'll be a representative of their foreign country that might be assigned to the US or another nation as a liaison. On the other hand, there are exchange officers which are intended to be a foreign national that are embedded in the US positions of filling US roles and responsibilities. And often what we heard was that means these allies will put into exchange ops or billets. And were told they were going to be doing a specific job in support of US national interests. Often weren't given access to information that was necessary to perform the job that they were posted to. But that's just one example. There were many others, but that's not that was a very common.nn<strong>Eric White <\/strong>Yeah. This comes down to you know, disclosure policies. I mean, the U.S. works in many arenas with its allies, whether it be, you know, on the waters or even in ground operations or anything like that. My question is, why is space such a vexing problem for when it comes to what information we can disclose to our allies and what we can't? What exactly are the hurdles? Or, you know, is it just, you know, bureaucratic? Oh. I'm sorry. You know, you should have access to this, but you for some reason, don't.nn<strong>Bruce McClintock <\/strong>So I think it's a combination of at the highest level and it\u2019s just an evolution, based on information sharing between two different major departments in the U.S.. So that's Department of Defense and intelligence community. At that very high level, even though their guidance flowed originally from the same executive order, they've both taken different approaches to that kind of process for information sharing. And then it does flow down because of that high level disconnect between those two organizations. It does flow down to lower levels, where there are essentially bureaucratic impediments that could be overcome, but there's not necessarily motivation to overcome those impediments that exist.nn<strong>Eric White <\/strong>Yeah. And what were some of the solutions that you all garnered? And then we can also get into some of the other, other aspects of this report. But as far as that solutions go. What is the idea there of, you know, making sure that everybody is at least on the same page when it comes to information sharing?nn<strong>Bruce McClintock <\/strong>So one of the one of the very high-level things we recommended was that we thought there should be a deputy secretary defense level coordination effort with the ODNI. Obviously, director of National intelligence that really spanned that divide between DoD policies. And what is generally referred to as the ICC, the intelligence community policy on information sharing. And that that would be a very high-level effort, a working group if you will, that we thought would take a couple of years, but we thought we could be that high level because there are still disagreements within DoD components and uncertainty about their own internal DoD roles and responsibilities. So, because of those two aspects, we recommended a very high-level working group billet.nn<strong>Eric White <\/strong>We're talking here with, Bruce McClintock. He's a senior policy researcher at the Rand Corporation and also the lead of the Rand Corporation Space Enterprise Initiative. So, let's get a little bit more holistic here. What is the optimal amount of coordination that needs to happen between the U.S. government and its allies when it comes to space? What would be the ideal situation there?nn<strong>Bruce McClintock <\/strong>I'd say before we get into the actual optimal level of involvement, I think the first step to the United States is just come up with a coherent holistic policy on involving our allies, and that doesn't exist right now. That contributes somewhat to the capacity do gap problem. Some of the outstanding options, and one of the things that we would say more about holistic approach is it's not every ally is going to be treated the same way. Right. So, this isn't about opening the floodgates that we will and sharing everything with every ally. There needs to be a thoughtful approach to how much we're going to share with people allies. But the US need to be clear upfront about mutual relationship levels so that that's point one. I would note on that. Once you have decided on those different levels. And by the way, this is what this is a relationship that goes two ways. There are different allies that want different levels of interaction with the United States. Not every ally wants to be fully integrated with beyond states in terms of space operation. And that's, of course, their national sovereign right. So, both sides need to be clear with each other. Once you establish those different relationship level expectations by ally, then you set up a U.S. structure that addresses those different levels. And the U.S. has made some progress in this area. Some of that starts with just basic information exchange and information sharing at the fully unclassified level. So, this is not always about having a very highly qualified conversation. That makes sense.nn<strong>Eric White <\/strong>Yeah it does. And you know, not to be you know, two to our own horn or anything. We've got a pretty good space program especially you know; we've got the Space Force that now is doing its own thing. What exactly does the U.S. need or rely on its allies? You know, the major allies out there? You know, since their space programs may not be as advanced, what exactly are is the U.S. getting from these, allies in the space arena?nn<strong>Bruce McClintock <\/strong>Two broad terms to describe what the advantages to working with allies, because the US don't have a very robust, very strong space program when you speak about national security in general. But the first thing I would talk about is coverage of sector one, diversity. And there are other aspects that we could talk about later in life. So, the coverage thing, I think, is the one that is arguably the most important commercial quality, because space is not just about putting things on orbit, it's also about being able to detect, characterize and track things that are on it. And that requires geographic locations across the globe. Right. So, we've been doing a little use of the parameter space power. Now we need geographic access to other territories to be able to improve our space situational awareness network and also our space domain awareness infrastructure. And the same is true for potential future adversaries like China. Like, so we're out pursuing locations to be in the satellite tracking territory and not China. So that's one very obvious example. It's the information sharing like space situational awareness, which is the most fully developed program in the U.S.\u00a0 The U.S. has a large number of agreements signed with other nations and other entities or SSA Galaxy. So that goes to the coverage piece. But there's also value in diversity and space capabilities. Things like things that are on orbit but also ground stations become more vulnerable to threats. It's good to have a diverse set of resources available.nn<strong>Eric White <\/strong>Are there other areas. And you talked a little bit about it as far as intelligence sharing and coordinating with ODNI, are there other areas where the U.S. government works with its allies, you know, in other arenas that these space policy folks can draw from and see? Okay, so that's how they do it. You know, maybe we can apply that idea when it comes to, coordination on the space end when you're up, up higher a little bit.nn<strong>Bruce McClintock <\/strong>So for our research, we took a pretty close look at a couple of other domains to draw lessons in best practices from those other domains. And the first area that we looked at in particular was nuclear weapons cooperation. For a couple of reasons. We thought that would be an interesting case. First of all, nuclear weapons will probably be most carefully guarded about capabilities, most sensitive, even more so than space capabilities. And so, we wanted to see if there was even any potential share at that level. And there was, in the mid-1950s, we had the United States had exceptional capabilities in that domain, but the Soviet Union was a threat to us. And so, the United States worked closely with the United Kingdom to come up with, neutral .... That were related to nuclear weapons. There was some level of data sharing between the United States and United Kingdom. And there was other, information exchange and coordination that, was important if you consider to be best practices. We also looked at, special operations, any newer area where there has been much touting about being able to cooperate with allies and share information in a way that hasn't been demonstrated yet in inspection of it. So those are two areas that we looked at. Looked at the two others, two clearly are in charge and sharing opinions, see, and the three primary areas limiting jamming.nn<strong>Eric White <\/strong>All right. And so yeah, there's really nothing more that you can say about what's at stake when you talk about nuclear weapons, but what's at stake when it comes to space. And, you know, if we don't get this right as far as working and we're getting the most that we can out of these relationships with our allies in that domain.nn<strong>Bruce McClintock <\/strong>I think it, I'll start at the lowest level of what's at stake. It's just a reduction in efficiency. And by that, I mean, in some cases, if allies feel like they can't depend on the US to share important national security related information about space, then these allies that have significantly more limited resources than the United States has, they feel obligated to invest in their own capabilities for things as simple as space situational awareness, which I talked about earlier, whereas we had a much more robust information sharing, relationship where it was maybe not fully reciprocal, but it share the pieces of information that they could invest, that those resources in other aspects of space security that could be to the benefit of the U.S. So that's one example. It's reduced efficiency if we just don't cooperate as well with our closest allies. If you move up the scale in terms of the significance of the impact, the adverse impact. If we don't, find ways to become allied by design. There are things like reduced trust and willingness to depend on the United States in times of crisis when it comes to space. So those are now obviously more extreme, but they are package, and I don't feel like they could count on the United States to share information when the quote unquote chips are down. Then they sometimes say, well, we need to figure out ways to be not only independent but have our own capability. And then there's less of a need for them to turn to the US on geopolitical policy decisions.nn<strong>Eric White <\/strong>Wrapping up here, I'll give you a chance to say anything else on this topic that you think is important for the conversation. But if you could run through also just, you know, some of the other recommendations that you all made, based on what you found in, you know, talking and also what did DoD have to say about this? I guess we could actually ask them and include them in this.nn<strong>Bruce McClintock <\/strong>Yeah. So I would say as far as what the DoD has to say about this, first of all, you know, I applaud the Department of Defense, starting with, Gerald Whiting for taking an interest in this topic and asking somebody like Rand to look at it because they knew that they were going to get an independent, objective and rigorous analysis of the problem. That we weren't going to just tell them what they wanted to hear. So not only by initiating process, but then listening to throughout the course of the last couple of years and they provided preliminary insights and recommendations on our final findings and recommendations. I want to applaud, you know, the Department of Defense for being so willing to listen, because it's not always easy to listen to something that might be tough love. They're not telling you exactly what you want to hear. And in that vein, I think over the last couple of years, the Department of Defense has taken on some of the recommendation, not all of them by any means, but that's their prerogative. But they have done things like made expanded the interaction with allies in select venues. So, they have grown and see SPO initiatives that combined space operations in which, you know, that used to be seven nations, it now 10. They're working on our international space cooperation strategy that was informed by this Rand research. And it'll also want to applaud a recent announcement from OSD, where they signed a memo that removes a lot of the legacy classification barriers that have inhibited the United States' ability to collaborate across the U.S. and with allies. Now, that's a direct example of a recommendation we made, not necessarily because of the Rand report, but in line with the Rand report's findings and recommendations that the department backs. So, there been great steps taken. There's a lot more to be done.nn<strong>Eric White <\/strong>Bruce McClintock is senior policy researcher and lead of the Space Enterprise Initiative at the Rand Corporation. There is indeed more to the interview. You can find it along with a link to the report at Federal News network.com, or wherever you get your podcasts. Coming up next. Governments aren't the only ones joining forces to improve national security in space. Some commercial entities are as well. This is the space our on federal news network returning after this break I'm Eric White.<\/blockquote>"}};

We all share life on this big blue rock, and we all share the space around it as well. So in order to get the most out of it from a business and defense aspect, the U.S. is going to need allies. So how are the relationships between the U.S. and strategic partners when it comes to space-related goals? The RAND Corporation was recently tasked with looking into that very topic. To learn more about what that research found, I got the chance to speak with Bruce McClintock, Senior Policy Researcher and lead of RAND’s Space Enterprise Initiative.

Interview Transcript: 

Bruce McClintock So in about the 2022-time frame. Lieutenant General Whiting and he was at the time was in Space Operations Command commander, a Beatles commander in United States Space Force, asked Rand to take a close look at how the US was currently cooperating with select allies on space operations matters and where they’re all ….. those relationships. So that was very active in the project in that time.

Eric White All right. And so, in looking through that, you know, what entities did you speak with, and how did you go about trying to find out those answers for them?

Bruce McClintock So we used a very rigorous approach where the project started off by. Well, throughout the course of the project, we conducted over 140 interviews with more than 115 people that represented 24 different organizations. And those organizations included representatives from select allied countries, NATO Space Center, …, Space Command headquarters, EUCOM headquarters, several Department of Air Force organizations all the way up to senior policy level. And then below, on top of those interviews, we actually conducted 13 different site visits, to include visits to the United Kingdom, Germany, France, Canada, and then several U.S. military networks. In conjunction with all that, we then analyzed close to 200 different documents, ranging from U.S. policy documents to plans for space operations to country specific documents. So, it’s a pretty rigorous, very holistic approach to conducting the research for the project.

Eric White All right. And so, then the next question is what some of your findings were. So, let’s go through it. You did a lot of site visits. You talked to a lot of allies. When it comes to space and U.S. space policy, you know, what were some of the concerns that that you were hearing from counterparts in other governments?

Bruce McClintock So one of the most common things that we heard from counterparts in other governments are what they often euphemistically referred to as the gap, or the policy or practice gap, if you will. And what they mean by that is that the U.S. was often cited as being very much publicly committed to integrating allies in the space activities and operations. But at the end of the day, in many cases didn’t deliver at the level where it was stated publicly.

Eric White Were there any, you know, examples of this that you can give me that were brought up? And, you know, I don’t need you to go through the litany of, of any policy failures, but just an example of what they meant by that.

Bruce McClintock Sure. So, you know, one of the most frequent, especially in interviews with specific allies, one of the most frequent examples that we would encounter once the failure of the US in many cases to fully include exchange officers from other countries in space related discussions or activities. And I think it’s an important distinction here. In the U.S. parlance, there are two types of foreign officers involved in activities. There are liaison officers, which are officers that represent the interests of their country, but their liaison with the United States. So, it’ll be a representative of their foreign country that might be assigned to the US or another nation as a liaison. On the other hand, there are exchange officers which are intended to be a foreign national that are embedded in the US positions of filling US roles and responsibilities. And often what we heard was that means these allies will put into exchange ops or billets. And were told they were going to be doing a specific job in support of US national interests. Often weren’t given access to information that was necessary to perform the job that they were posted to. But that’s just one example. There were many others, but that’s not that was a very common.

Eric White Yeah. This comes down to you know, disclosure policies. I mean, the U.S. works in many arenas with its allies, whether it be, you know, on the waters or even in ground operations or anything like that. My question is, why is space such a vexing problem for when it comes to what information we can disclose to our allies and what we can’t? What exactly are the hurdles? Or, you know, is it just, you know, bureaucratic? Oh. I’m sorry. You know, you should have access to this, but you for some reason, don’t.

Bruce McClintock So I think it’s a combination of at the highest level and it’s just an evolution, based on information sharing between two different major departments in the U.S.. So that’s Department of Defense and intelligence community. At that very high level, even though their guidance flowed originally from the same executive order, they’ve both taken different approaches to that kind of process for information sharing. And then it does flow down because of that high level disconnect between those two organizations. It does flow down to lower levels, where there are essentially bureaucratic impediments that could be overcome, but there’s not necessarily motivation to overcome those impediments that exist.

Eric White Yeah. And what were some of the solutions that you all garnered? And then we can also get into some of the other, other aspects of this report. But as far as that solutions go. What is the idea there of, you know, making sure that everybody is at least on the same page when it comes to information sharing?

Bruce McClintock So one of the one of the very high-level things we recommended was that we thought there should be a deputy secretary defense level coordination effort with the ODNI. Obviously, director of National intelligence that really spanned that divide between DoD policies. And what is generally referred to as the ICC, the intelligence community policy on information sharing. And that that would be a very high-level effort, a working group if you will, that we thought would take a couple of years, but we thought we could be that high level because there are still disagreements within DoD components and uncertainty about their own internal DoD roles and responsibilities. So, because of those two aspects, we recommended a very high-level working group billet.

Eric White We’re talking here with, Bruce McClintock. He’s a senior policy researcher at the Rand Corporation and also the lead of the Rand Corporation Space Enterprise Initiative. So, let’s get a little bit more holistic here. What is the optimal amount of coordination that needs to happen between the U.S. government and its allies when it comes to space? What would be the ideal situation there?

Bruce McClintock I’d say before we get into the actual optimal level of involvement, I think the first step to the United States is just come up with a coherent holistic policy on involving our allies, and that doesn’t exist right now. That contributes somewhat to the capacity do gap problem. Some of the outstanding options, and one of the things that we would say more about holistic approach is it’s not every ally is going to be treated the same way. Right. So, this isn’t about opening the floodgates that we will and sharing everything with every ally. There needs to be a thoughtful approach to how much we’re going to share with people allies. But the US need to be clear upfront about mutual relationship levels so that that’s point one. I would note on that. Once you have decided on those different levels. And by the way, this is what this is a relationship that goes two ways. There are different allies that want different levels of interaction with the United States. Not every ally wants to be fully integrated with beyond states in terms of space operation. And that’s, of course, their national sovereign right. So, both sides need to be clear with each other. Once you establish those different relationship level expectations by ally, then you set up a U.S. structure that addresses those different levels. And the U.S. has made some progress in this area. Some of that starts with just basic information exchange and information sharing at the fully unclassified level. So, this is not always about having a very highly qualified conversation. That makes sense.

Eric White Yeah it does. And you know, not to be you know, two to our own horn or anything. We’ve got a pretty good space program especially you know; we’ve got the Space Force that now is doing its own thing. What exactly does the U.S. need or rely on its allies? You know, the major allies out there? You know, since their space programs may not be as advanced, what exactly are is the U.S. getting from these, allies in the space arena?

Bruce McClintock Two broad terms to describe what the advantages to working with allies, because the US don’t have a very robust, very strong space program when you speak about national security in general. But the first thing I would talk about is coverage of sector one, diversity. And there are other aspects that we could talk about later in life. So, the coverage thing, I think, is the one that is arguably the most important commercial quality, because space is not just about putting things on orbit, it’s also about being able to detect, characterize and track things that are on it. And that requires geographic locations across the globe. Right. So, we’ve been doing a little use of the parameter space power. Now we need geographic access to other territories to be able to improve our space situational awareness network and also our space domain awareness infrastructure. And the same is true for potential future adversaries like China. Like, so we’re out pursuing locations to be in the satellite tracking territory and not China. So that’s one very obvious example. It’s the information sharing like space situational awareness, which is the most fully developed program in the U.S.  The U.S. has a large number of agreements signed with other nations and other entities or SSA Galaxy. So that goes to the coverage piece. But there’s also value in diversity and space capabilities. Things like things that are on orbit but also ground stations become more vulnerable to threats. It’s good to have a diverse set of resources available.

Eric White Are there other areas. And you talked a little bit about it as far as intelligence sharing and coordinating with ODNI, are there other areas where the U.S. government works with its allies, you know, in other arenas that these space policy folks can draw from and see? Okay, so that’s how they do it. You know, maybe we can apply that idea when it comes to, coordination on the space end when you’re up, up higher a little bit.

Bruce McClintock So for our research, we took a pretty close look at a couple of other domains to draw lessons in best practices from those other domains. And the first area that we looked at in particular was nuclear weapons cooperation. For a couple of reasons. We thought that would be an interesting case. First of all, nuclear weapons will probably be most carefully guarded about capabilities, most sensitive, even more so than space capabilities. And so, we wanted to see if there was even any potential share at that level. And there was, in the mid-1950s, we had the United States had exceptional capabilities in that domain, but the Soviet Union was a threat to us. And so, the United States worked closely with the United Kingdom to come up with, neutral …. That were related to nuclear weapons. There was some level of data sharing between the United States and United Kingdom. And there was other, information exchange and coordination that, was important if you consider to be best practices. We also looked at, special operations, any newer area where there has been much touting about being able to cooperate with allies and share information in a way that hasn’t been demonstrated yet in inspection of it. So those are two areas that we looked at. Looked at the two others, two clearly are in charge and sharing opinions, see, and the three primary areas limiting jamming.

Eric White All right. And so yeah, there’s really nothing more that you can say about what’s at stake when you talk about nuclear weapons, but what’s at stake when it comes to space. And, you know, if we don’t get this right as far as working and we’re getting the most that we can out of these relationships with our allies in that domain.

Bruce McClintock I think it, I’ll start at the lowest level of what’s at stake. It’s just a reduction in efficiency. And by that, I mean, in some cases, if allies feel like they can’t depend on the US to share important national security related information about space, then these allies that have significantly more limited resources than the United States has, they feel obligated to invest in their own capabilities for things as simple as space situational awareness, which I talked about earlier, whereas we had a much more robust information sharing, relationship where it was maybe not fully reciprocal, but it share the pieces of information that they could invest, that those resources in other aspects of space security that could be to the benefit of the U.S. So that’s one example. It’s reduced efficiency if we just don’t cooperate as well with our closest allies. If you move up the scale in terms of the significance of the impact, the adverse impact. If we don’t, find ways to become allied by design. There are things like reduced trust and willingness to depend on the United States in times of crisis when it comes to space. So those are now obviously more extreme, but they are package, and I don’t feel like they could count on the United States to share information when the quote unquote chips are down. Then they sometimes say, well, we need to figure out ways to be not only independent but have our own capability. And then there’s less of a need for them to turn to the US on geopolitical policy decisions.

Eric White Wrapping up here, I’ll give you a chance to say anything else on this topic that you think is important for the conversation. But if you could run through also just, you know, some of the other recommendations that you all made, based on what you found in, you know, talking and also what did DoD have to say about this? I guess we could actually ask them and include them in this.

Bruce McClintock Yeah. So I would say as far as what the DoD has to say about this, first of all, you know, I applaud the Department of Defense, starting with, Gerald Whiting for taking an interest in this topic and asking somebody like Rand to look at it because they knew that they were going to get an independent, objective and rigorous analysis of the problem. That we weren’t going to just tell them what they wanted to hear. So not only by initiating process, but then listening to throughout the course of the last couple of years and they provided preliminary insights and recommendations on our final findings and recommendations. I want to applaud, you know, the Department of Defense for being so willing to listen, because it’s not always easy to listen to something that might be tough love. They’re not telling you exactly what you want to hear. And in that vein, I think over the last couple of years, the Department of Defense has taken on some of the recommendation, not all of them by any means, but that’s their prerogative. But they have done things like made expanded the interaction with allies in select venues. So, they have grown and see SPO initiatives that combined space operations in which, you know, that used to be seven nations, it now 10. They’re working on our international space cooperation strategy that was informed by this Rand research. And it’ll also want to applaud a recent announcement from OSD, where they signed a memo that removes a lot of the legacy classification barriers that have inhibited the United States’ ability to collaborate across the U.S. and with allies. Now, that’s a direct example of a recommendation we made, not necessarily because of the Rand report, but in line with the Rand report’s findings and recommendations that the department backs. So, there been great steps taken. There’s a lot more to be done.

Eric White Bruce McClintock is senior policy researcher and lead of the Space Enterprise Initiative at the Rand Corporation. There is indeed more to the interview. You can find it along with a link to the report at Federal News network.com, or wherever you get your podcasts. Coming up next. Governments aren’t the only ones joining forces to improve national security in space. Some commercial entities are as well. This is the space our on federal news network returning after this break I’m Eric White.

The post How well does the U.S. work with its allies when it comes to space? first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/space-hour/2024/03/how-well-does-the-u-s-work-with-its-allies-when-it-comes-to-space/feed/ 0
NSA women leaders find opportunities to ‘drive change and mission’ https://federalnewsnetwork.com/inside-ic/2024/03/nsa-women-leaders-find-opportunities-to-drive-change-and-mission/ https://federalnewsnetwork.com/inside-ic/2024/03/nsa-women-leaders-find-opportunities-to-drive-change-and-mission/#respond Mon, 25 Mar 2024 20:58:53 +0000 https://federalnewsnetwork.com/?p=4939004 Three women leaders at the NSA share their stories and highlight how the agency is aiming to become a better employer for everyone, including women.

The post NSA women leaders find opportunities to ‘drive change and mission’ first appeared on Federal News Network.

]]>
var config_4925070 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB8375153074.mp3?updated=1710372922"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2024\/02\/Inside-the-IC-3000x3000-podcast-tile-Booz-Allen-150x150.jpg","title":"The women leading at the NSA","description":"[hbidcpodcast podcastid='4925070']nnWomen make up about 40% of the intelligence community\u2019s workforce, a percentage that ranks behind both federal workforce and civilian labor benchmarks.nnThat\u2019s according to the latest demographics <a href="https:\/\/www.dni.gov\/index.php\/newsroom\/press-releases\/press-releases-2023\/3740-odni-releases-intelligence-community-annual-demographic-report-for-fiscal-year-2022" target="_blank" rel="noopener">report<\/a> from the Office of the Director of National Intelligence. And women are even more underrepresented in the leadership ranks throughout the IC.nnBut agencies aren\u2019t ignoring the issue. The National Security Agency\u2019s \u201cFuture Ready Workforce\u201d initiative has already led to several changes that will likely make the NSA a more attractive employer for all employees, including women. And the NSA is also investing in education and other programs that encourage girls to get involved in STEM.nn<a href="https:\/\/federalnewsnetwork.com\/shows\/inside-the-ic-podcast\/" target="_blank" rel="noopener"><em><strong>Inside the IC<\/strong><\/em><\/a> spoke with three women leaders at the NSA about the past, present and future for women at the agency. They are <strong>Morgan Adamski,<\/strong> chief of the NSA\u2019s Cybersecurity Collaboration Center; <strong>Kristina Walter,<\/strong> director of the NSA\u2019s Future Ready Workforce Initiative; and <strong>Tahira Mammen,<\/strong> acting chief of the AI Security Center, which is housed within the Cybersecurity Collaboration Center.nn<strong><em>This interview transcript has been edited for length and clarity:\u00a0<\/em><\/strong>nn<strong>Justin Doubleday <\/strong>I'd love just to kick off by asking any of you to reflect on the role that women have played at NSA, historically, maybe some of the challenges and how we got to where we are today?nn<strong>Kristina Walter <\/strong>I think the NSA is a unique space in that we do have a history of women being involved in the cryptologic mission. So we think of Elizabeth Friedman, and a lot of cryptographers that have contributed to the National Security Agency's mission from World War Two, when we're talking about codebreaking.nnAnd so a lot of us can see that in the day to day. We have a lot of strong women leaders here. But I think we face the same challenges that any organization does, especially a predominantly military organization, where we're still working through the balance of women being visible and at the table. And I think what we found is, we need to be inclusive of that environment. Women have a lot to offer in that space.nnAnd so what systems can we put in place to just be inclusive of everybody's thoughts and ideas and really bring that diverse perspective in? And so that's really what we're trying to achieve, as we move into this new era of rapidly evolving technology changes, rapid competition for talent that we haven't had to face before. So how can we be really an attractive employer for all people, including women?nn<strong>Justin Doubleday <\/strong>Morgan, there's this overlap between the challenges that women face in the intelligence community but then also in the cybersecurity field. I think maybe the numbers are even worse writ large across the cybersecurity field.nn<strong>Morgan Adamski <\/strong>There's definitely a really strong focus right now on getting more women involved in cybersecurity, more women involved in STEM roles. And I think that's really important. Just because when you have diverse opinions, diverse backgrounds, whether you're male or female, they, however you want to describe yourself, it's really important that we have those conversations. In cybersecurity, you need innovation and unique solutions to complex problems. And that means you have to approach that in many different ways. And so you have to have a lot of different people at the table to have that discussion.nnKristina talked about some of the things we're doing at the agency in focusing on people. The cybersecurity community, and NSA historically, has been involved in strong technical backgrounds. That's what we do here. And so the same challenges you see on getting more women in STEM is how we try to encourage and recruit more women in NSA. It has to go hand in hand.nn<strong>Justin Doubleday <\/strong>Tahira, AI is one of the newer fields, depending on how you define it. Are you seeing any specific challenges in that field kind of pour over from maybe the legacy STEM challenges that we've seen? How are you confronting this as a woman in the AI field, a leader in the AI field?nn<strong>Tahira Mammen <\/strong>I'll start by saying that we have many brilliant women at NSA who are experts in AI. I think one of the challenges in the AI or cybersecurity space, in these deeply technical fields, right, is making sure that when we think about women -- how to help women advance, how to help women with mentorship \u2014 sometimes there's a lot of focus on \u201cwomen helping women,\u201d which is very important.nnBut there's a critical role for allies who are different than you. So as Morgan was saying, I believe that a diverse group makes the best decisions. And that's also true in helping people rise up through the ranks. And so while and all the women at this table are definitely committed to helping women, I just want to emphasize how important it is that men also see their role in helping bring the diverse voices to the table.nn<strong>Justin Doubleday <\/strong>If you look at some of the data from the ODNI demographics report, it shows this consistent trend where women and men start out at the same at the GS-10 level. It\u2019s 50\/50, almost. And then, as you go up, that gap widens where we get up to GS-15, and it's 65% men 35% women. And it's just this widening gap as you go up. You all have become leaders in this space. Do you want to share maybe how you've gotten to where you are? Maybe any specific challenges that you'd be willing to share today?nn<strong>Morgan Adamski <\/strong>When you talk about the intelligence community, you talk about NSA, you talk about cybersecurity, They're all fast-paced, unique environments. And part of that requirement is being in an office for a certain amount of hours a day. And for those of us who do have families or children, you're trying to balance that in your head of how do I continue to succeed at mission and deliver outcomes, while also not having \u201cmom guilt,\u201d because you can't pick your kids up at a certain point in the day. And that's difficult for people to balance.nnThat flexibility, whether you're male or female, especially for some of the newer generations, is really critical to having happiness at work. And so I think that for me in particular, I don't necessarily think about work-life balance, as others might. I think about it as prioritization. What is the most important thing that I need to do today for my family, for my work? And then I execute that prioritization, and then that prioritization may change the next day. It\u2019s constantly a trade off, and you have to determine what's going to be the most valuable on any given circumstance.nn<strong>Kristina Walter <\/strong>I think what we've seen is because women sometimes feel like they can't achieve that balance, they self select out. So when you look at trends of women kind of growing, they think, "I could never handle that, or I've never seen another woman who is working at the senior executive level, because you can't maintain that balance."nnAnd I 100% agree with Morgan's perspective of, balance is hard. I'm good at compartmentalization. So when I'm home, I'm 100% home. When I am at work, I'm 100% at work. Building the support system around you to do that is important. I think showing women that it's achievable, and then putting policies in place to help it are really helpful. So things like paid parental leave, where we've rolled that out at NSA. Phased parental return, so you don't have to come back immediately, and you can phase that in.nnHow do we look at the policies that can help women think, \u201cThis isn't too overwhelming, it isn't too hard\u201d\u2014 or anybody who's balancing challenges \u2014 and \u201cI can continue to grow in my career here and not self select out,\u201d is really what we're looking to reinforce.nn<strong>Tahira Mammen <\/strong>I think that encouraging women to take up space, to use their voice, to voice the solution to a problem they've identified. I think everyone in work or in life, you can say, \u201cOkay, this is really a problem. And it bothers me.\u201d And for my personal path, most of my success has come from being able to identify a problem, really advocate for being allowed to fix it, and then doing that work.nnAnd then when you do it, people say, \u201cWow, okay, look at what you were able to do. Let's give you a harder problem.\u201d And that is what rising has looked like throughout my career. And I think a space where, if you're taking a step back, as Morgan and Christina, were saying, you miss the opportunity to do work that you're passionate about that also helps your career.nn<strong>Justin Doubleday <\/strong>Is there specific data you can share about the NSA? Are there any specific trends that you're seeing in terms of the share of women at the NSA, the share of women in the leadership ranks?nn<strong>Kristina Walter <\/strong>We set goals every year for our hiring to reach about 40% women where we've been able to meet or exceed that over the last several years. And we want to be reflective of society. So recognizing across the board that we are bringing in people that reflect the American people, since that's who we serve.nnAnd so those are the trends and we see that we\u2019re consistent, but we want to make sure, digging into the data, that that\u2019s across all skill sets. We're looking at the technical skill sets, the STEM roles. Maybe there's a smaller pool, and we're really targeting those. So we're doing a lot of recruitment and engagement, targeting female schools and underrepresented populations, and making sure that those folks see themselves at NSA.nnAnd I think what we found is when we start in college level, we're too late. And so engaging at that K-12 level. We run GenCyber camps, we're really trying to expose younger students to STEM, cybersecurity and federal service. And so we've seen great success in that space. I talked to a recent student of Stanford, who said, \u201cI was first exposed to cybersecurity at an NSA GenCyber camp. And that's what made me pursue this path of participating in other events.\u201d And making sure that we're out in the community so that girls at the young age can see where they're going, and then we can make sure that those girls follow through and then commit to the agency with our relevant programs.nnThere are benefits and negatives to working in a classified environment. One of the benefits is that balance. You come in and you work in a secure environment. And you can work on really hard problems that you can't do anywhere else here. But then you can also leave that job when you leave and you can't bring work home in certain spaces, and have that balance. And so we do try to make sure people are aware of the opportunities that are here, so that we can hit our hiring goals related to female and minority hiring and all the different objectives that we set every year.nn<strong>Morgan Adamski <\/strong>One thing I'd like to highlight is just the focus that the NSA\u2019s Cybersecurity Directorate has taken on really promoting, advocating and recruiting women into the cybersecurity mission. I'm proud of the fact that the Cybersecurity Collaboration Center is over 55% female. That's great in the cybersecurity arena. It is just kind of the way we formed.nnBut we also spend a lot of time trying to invest in things like women-in-cybersecurity conferences, recruiting from the right schools. We recently hosted a women's cybersecurity event here where we brought in students from different colleges. We talked about the entirety of the NSA mission. We talked about recruitment and how they could join. And trying to do those very concentrated efforts on, how do we encourage more women to get into the cybersecurity field.nn<strong>Tahira Mammen <\/strong>Women are not a monolith. Women come in so many different, diverse experiences. And so at the agency, we have employee resource groups that are employee-led organizations that do some of that work I was talking about before. Identifying issues or challenges within their demographic, and then seeking to improve the culture for everybody.nAnd so on the inside, especially in my experience, through the employee resource groups, we're working on building the culture when people come in the door, then they find their place, they find their mentors, they find opportunity to drive change and mission.nn<strong>Justin Doubleday <\/strong>This is a somewhat nebulous question, but what do you view the future for this issue. With some of the changes you're making now, 10or 20 years down the line, do you have a sense of where this is going in terms of securing a better place for woman at the NSA and the IC?nn<strong>Kristina Walter <\/strong>Fundamentally, what we're trying to do is think about all of our employees and what they need. And there's talent out there, a lot of which is women. And so we want to take advantage of all the talent. We want women to feel like there's a place for them here and a space for them at the table.nnI think when you look at the leadership teams at the National Security Agency, it's an exciting time, because you can really see yourself there right now, both in the established leadership, but also the up-and-coming leaders. And so I think the more we can share that with the public and make sure that they see that there's a space for them here, and then just make it easier for them to come in and stay. One of the best parts about the National Security Agency, talking about my experience, is you can reinvent yourself. You can join different career fields. You can explore lots of options, and so enabling our whole workforce to do that is important and that will inherently benefit the women that are coming into the agency as well."}};

Women make up about 40% of the intelligence community’s workforce, a percentage that ranks behind both federal workforce and civilian labor benchmarks.

That’s according to the latest demographics report from the Office of the Director of National Intelligence. And women are even more underrepresented in the leadership ranks throughout the IC.

But agencies aren’t ignoring the issue. The National Security Agency’s “Future Ready Workforce” initiative has already led to several changes that will likely make the NSA a more attractive employer for all employees, including women. And the NSA is also investing in education and other programs that encourage girls to get involved in STEM.

Inside the IC spoke with three women leaders at the NSA about the past, present and future for women at the agency. They are Morgan Adamski, chief of the NSA’s Cybersecurity Collaboration Center; Kristina Walter, director of the NSA’s Future Ready Workforce Initiative; and Tahira Mammen, acting chief of the AI Security Center, which is housed within the Cybersecurity Collaboration Center.

This interview transcript has been edited for length and clarity: 

Justin Doubleday I’d love just to kick off by asking any of you to reflect on the role that women have played at NSA, historically, maybe some of the challenges and how we got to where we are today?

Kristina Walter I think the NSA is a unique space in that we do have a history of women being involved in the cryptologic mission. So we think of Elizabeth Friedman, and a lot of cryptographers that have contributed to the National Security Agency’s mission from World War Two, when we’re talking about codebreaking.

And so a lot of us can see that in the day to day. We have a lot of strong women leaders here. But I think we face the same challenges that any organization does, especially a predominantly military organization, where we’re still working through the balance of women being visible and at the table. And I think what we found is, we need to be inclusive of that environment. Women have a lot to offer in that space.

And so what systems can we put in place to just be inclusive of everybody’s thoughts and ideas and really bring that diverse perspective in? And so that’s really what we’re trying to achieve, as we move into this new era of rapidly evolving technology changes, rapid competition for talent that we haven’t had to face before. So how can we be really an attractive employer for all people, including women?

Justin Doubleday Morgan, there’s this overlap between the challenges that women face in the intelligence community but then also in the cybersecurity field. I think maybe the numbers are even worse writ large across the cybersecurity field.

Morgan Adamski There’s definitely a really strong focus right now on getting more women involved in cybersecurity, more women involved in STEM roles. And I think that’s really important. Just because when you have diverse opinions, diverse backgrounds, whether you’re male or female, they, however you want to describe yourself, it’s really important that we have those conversations. In cybersecurity, you need innovation and unique solutions to complex problems. And that means you have to approach that in many different ways. And so you have to have a lot of different people at the table to have that discussion.

Kristina talked about some of the things we’re doing at the agency in focusing on people. The cybersecurity community, and NSA historically, has been involved in strong technical backgrounds. That’s what we do here. And so the same challenges you see on getting more women in STEM is how we try to encourage and recruit more women in NSA. It has to go hand in hand.

Justin Doubleday Tahira, AI is one of the newer fields, depending on how you define it. Are you seeing any specific challenges in that field kind of pour over from maybe the legacy STEM challenges that we’ve seen? How are you confronting this as a woman in the AI field, a leader in the AI field?

Tahira Mammen I’ll start by saying that we have many brilliant women at NSA who are experts in AI. I think one of the challenges in the AI or cybersecurity space, in these deeply technical fields, right, is making sure that when we think about women — how to help women advance, how to help women with mentorship — sometimes there’s a lot of focus on “women helping women,” which is very important.

But there’s a critical role for allies who are different than you. So as Morgan was saying, I believe that a diverse group makes the best decisions. And that’s also true in helping people rise up through the ranks. And so while and all the women at this table are definitely committed to helping women, I just want to emphasize how important it is that men also see their role in helping bring the diverse voices to the table.

Justin Doubleday If you look at some of the data from the ODNI demographics report, it shows this consistent trend where women and men start out at the same at the GS-10 level. It’s 50/50, almost. And then, as you go up, that gap widens where we get up to GS-15, and it’s 65% men 35% women. And it’s just this widening gap as you go up. You all have become leaders in this space. Do you want to share maybe how you’ve gotten to where you are? Maybe any specific challenges that you’d be willing to share today?

Morgan Adamski When you talk about the intelligence community, you talk about NSA, you talk about cybersecurity, They’re all fast-paced, unique environments. And part of that requirement is being in an office for a certain amount of hours a day. And for those of us who do have families or children, you’re trying to balance that in your head of how do I continue to succeed at mission and deliver outcomes, while also not having “mom guilt,” because you can’t pick your kids up at a certain point in the day. And that’s difficult for people to balance.

That flexibility, whether you’re male or female, especially for some of the newer generations, is really critical to having happiness at work. And so I think that for me in particular, I don’t necessarily think about work-life balance, as others might. I think about it as prioritization. What is the most important thing that I need to do today for my family, for my work? And then I execute that prioritization, and then that prioritization may change the next day. It’s constantly a trade off, and you have to determine what’s going to be the most valuable on any given circumstance.

Kristina Walter I think what we’ve seen is because women sometimes feel like they can’t achieve that balance, they self select out. So when you look at trends of women kind of growing, they think, “I could never handle that, or I’ve never seen another woman who is working at the senior executive level, because you can’t maintain that balance.”

And I 100% agree with Morgan’s perspective of, balance is hard. I’m good at compartmentalization. So when I’m home, I’m 100% home. When I am at work, I’m 100% at work. Building the support system around you to do that is important. I think showing women that it’s achievable, and then putting policies in place to help it are really helpful. So things like paid parental leave, where we’ve rolled that out at NSA. Phased parental return, so you don’t have to come back immediately, and you can phase that in.

How do we look at the policies that can help women think, “This isn’t too overwhelming, it isn’t too hard”— or anybody who’s balancing challenges — and “I can continue to grow in my career here and not self select out,” is really what we’re looking to reinforce.

Tahira Mammen I think that encouraging women to take up space, to use their voice, to voice the solution to a problem they’ve identified. I think everyone in work or in life, you can say, “Okay, this is really a problem. And it bothers me.” And for my personal path, most of my success has come from being able to identify a problem, really advocate for being allowed to fix it, and then doing that work.

And then when you do it, people say, “Wow, okay, look at what you were able to do. Let’s give you a harder problem.” And that is what rising has looked like throughout my career. And I think a space where, if you’re taking a step back, as Morgan and Christina, were saying, you miss the opportunity to do work that you’re passionate about that also helps your career.

Justin Doubleday Is there specific data you can share about the NSA? Are there any specific trends that you’re seeing in terms of the share of women at the NSA, the share of women in the leadership ranks?

Kristina Walter We set goals every year for our hiring to reach about 40% women where we’ve been able to meet or exceed that over the last several years. And we want to be reflective of society. So recognizing across the board that we are bringing in people that reflect the American people, since that’s who we serve.

And so those are the trends and we see that we’re consistent, but we want to make sure, digging into the data, that that’s across all skill sets. We’re looking at the technical skill sets, the STEM roles. Maybe there’s a smaller pool, and we’re really targeting those. So we’re doing a lot of recruitment and engagement, targeting female schools and underrepresented populations, and making sure that those folks see themselves at NSA.

And I think what we found is when we start in college level, we’re too late. And so engaging at that K-12 level. We run GenCyber camps, we’re really trying to expose younger students to STEM, cybersecurity and federal service. And so we’ve seen great success in that space. I talked to a recent student of Stanford, who said, “I was first exposed to cybersecurity at an NSA GenCyber camp. And that’s what made me pursue this path of participating in other events.” And making sure that we’re out in the community so that girls at the young age can see where they’re going, and then we can make sure that those girls follow through and then commit to the agency with our relevant programs.

There are benefits and negatives to working in a classified environment. One of the benefits is that balance. You come in and you work in a secure environment. And you can work on really hard problems that you can’t do anywhere else here. But then you can also leave that job when you leave and you can’t bring work home in certain spaces, and have that balance. And so we do try to make sure people are aware of the opportunities that are here, so that we can hit our hiring goals related to female and minority hiring and all the different objectives that we set every year.

Morgan Adamski One thing I’d like to highlight is just the focus that the NSA’s Cybersecurity Directorate has taken on really promoting, advocating and recruiting women into the cybersecurity mission. I’m proud of the fact that the Cybersecurity Collaboration Center is over 55% female. That’s great in the cybersecurity arena. It is just kind of the way we formed.

But we also spend a lot of time trying to invest in things like women-in-cybersecurity conferences, recruiting from the right schools. We recently hosted a women’s cybersecurity event here where we brought in students from different colleges. We talked about the entirety of the NSA mission. We talked about recruitment and how they could join. And trying to do those very concentrated efforts on, how do we encourage more women to get into the cybersecurity field.

Tahira Mammen Women are not a monolith. Women come in so many different, diverse experiences. And so at the agency, we have employee resource groups that are employee-led organizations that do some of that work I was talking about before. Identifying issues or challenges within their demographic, and then seeking to improve the culture for everybody.
And so on the inside, especially in my experience, through the employee resource groups, we’re working on building the culture when people come in the door, then they find their place, they find their mentors, they find opportunity to drive change and mission.

Justin Doubleday This is a somewhat nebulous question, but what do you view the future for this issue. With some of the changes you’re making now, 10or 20 years down the line, do you have a sense of where this is going in terms of securing a better place for woman at the NSA and the IC?

Kristina Walter Fundamentally, what we’re trying to do is think about all of our employees and what they need. And there’s talent out there, a lot of which is women. And so we want to take advantage of all the talent. We want women to feel like there’s a place for them here and a space for them at the table.

I think when you look at the leadership teams at the National Security Agency, it’s an exciting time, because you can really see yourself there right now, both in the established leadership, but also the up-and-coming leaders. And so I think the more we can share that with the public and make sure that they see that there’s a space for them here, and then just make it easier for them to come in and stay. One of the best parts about the National Security Agency, talking about my experience, is you can reinvent yourself. You can join different career fields. You can explore lots of options, and so enabling our whole workforce to do that is important and that will inherently benefit the women that are coming into the agency as well.

The post NSA women leaders find opportunities to ‘drive change and mission’ first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/inside-ic/2024/03/nsa-women-leaders-find-opportunities-to-drive-change-and-mission/feed/ 0
Multimodal geospatial data – Shrinking time from acquisition to actionable insights https://federalnewsnetwork.com/commentary/2024/03/multimodal-geospatial-data-shrinking-time-from-acquisition-to-actionable-insights/ https://federalnewsnetwork.com/commentary/2024/03/multimodal-geospatial-data-shrinking-time-from-acquisition-to-actionable-insights/#respond Wed, 13 Mar 2024 20:03:52 +0000 https://federalnewsnetwork.com/?p=4924638 Why is geospatial data performance (fast query time) such an obstacle? Various types of geospatial data are often kept in purpose-built data silos.

The post Multimodal geospatial data – Shrinking time from acquisition to actionable insights first appeared on Federal News Network.

]]>
Disputes and conflicts abroad call for rigorous contingency planning on the part of U.S. defense and intelligence operations. Part of this preparation involves having an accurate, up-to-the-minute intelligence from multiple geospatial modalities.

Geospatial knowledge has always been core to military intelligence, but its highly dynamic nature makes it vital to collapse the time window between data capture, and analysis and dissemination. Today, this latency is growing more pronounced as data volume, variety and speed grow at a mind-boggling rate. Such cumbersome access to information leads to slower, less accurate decision-making, which can negatively impact geo-intelligence.

Why is geospatial data performance (fast query time) such an obstacle? Various types of geospatial data are often kept in purpose-built data silos. Not having all this data in one place is a major impediment, forcing geospatial analysts to resort to inefficient, time-consuming and cumbersome methods to consolidate and analyze data in aggregate, where it becomes inherently richer.

Any single dataset only gives a finite amount of information that is used for a limited number of purposes. Integrating and linking these datasets is the key to unlocking valuable insights that lead to better decision-making. Spatial overlays – or the joining and viewing together of separate datasets sharing all or part of the same area – are an example. In a defense context, this ability to view data in aggregate via superimposing may translate into increased situational awareness, such as mapping terrain and the movement of people to identify hotspots for illegal border crossings or drug trafficking.

Traditionally, data analysts have had to download multiple file formats and develop their processing pipelines to synthesize and enrich data in this way. Before starting a processing task, an analyst had to search various databases to find the needed data and then download this complex data in multiple formats as inputs into a processing pipeline, with each input requiring its own API. In a defense example, target detection using hyperspectral data requires a custom processing pipeline incorporating aerial imagery for context and possibly point clouds for advanced 3D visualization.

Naturally, this convoluted approach hinders the ability to do rapid data processing spanning multiple sources. There isn’t a single, consolidated place for all geospatial analytics and machine learning, preventing deeper data contextualization.

Rapid processing from multiple data sources is the key to achieving this integrated information richness that supports more informed decision-making. Beyond basic data access and capture, this type of analysis adds even more complexity because heterogeneous tools are used to analyze each data type. For example, currently, advanced imagery analytics require custom tools with limited API integration. Imagine the power that could be unleashed if a single API optimized data access and could integrate all of these tools.

Finally, today’s geospatial analysts face restrictive computing limitations, given that data and compute are largely kept separate. Analysts often have to take the time to spin up clusters, which is outside of their core competency and can slow down time to insights even further. Advances in serverless architectures can eradicate this problem, allowing developers to spin up or down as many applications as they want, as frequently as possible, without concerns about hardware availability.

Any industry relying on geospatial data needs a new approach, one that is capable of delivering insights in minutes as opposed to days or weeks. This can be achieved through:

  • A single platform to support all data types – there needs to be an efficient and unified method to store and analyze all geospatial data and derivative results.
  • Distributed and highly scalable computing that allows geospatial analysts to fully embrace the cloud to run any pipeline at scale without having to initiate and activate clusters.
  • Finally, all of this needs to be accomplished while protecting sensitive information and ensuring data integrity. There should be compliant and isolated on-premises capabilities to ensure compliance with data sovereignty requirements for both your mission and partners.

Geospatial knowledge continues to offer a deep well of insights that are used for the betterment of defense and intelligence operations and, at a higher level, human society. However, the volume, variety, and velocity of this data require a new approach to manage it cohesively since current methods are too fragmented. Doing so will be the key to maximizing the power of geospatial information in the coming years, hopefully transforming data into life-changing intelligence within increasingly short timespans.

Norman Barker is vice president of geospatial at TileDB.

The post Multimodal geospatial data – Shrinking time from acquisition to actionable insights first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/commentary/2024/03/multimodal-geospatial-data-shrinking-time-from-acquisition-to-actionable-insights/feed/ 0
Report card shows shortcomings in how DoD oversees intelligence https://federalnewsnetwork.com/agency-oversight/2024/03/report-card-shows-shortcomings-in-how-dod-oversees-intelligence/ https://federalnewsnetwork.com/agency-oversight/2024/03/report-card-shows-shortcomings-in-how-dod-oversees-intelligence/#respond Wed, 06 Mar 2024 20:58:55 +0000 https://federalnewsnetwork.com/?p=4915656 The Defense Department operates a slew of intelligence activities and programs. It even has a senior intelligence oversight official, who has come up with more

The post Report card shows shortcomings in how DoD oversees intelligence first appeared on Federal News Network.

]]>
var config_4915052 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB2109945040.mp3?updated=1709730222"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2023\/12\/3000x3000_Federal-Drive-GEHA-150x150.jpg","title":"Report card shows shortcomings in how DoD oversees intelligence","description":"[hbidcpodcast podcastid='4915052']nnThe Defense Department operates a slew of intelligence activities and programs. It even has a senior intelligence oversight official, who has come up with more than 100 recommendations over the last five years. But the <a href="https:\/\/www.gao.gov\/"><em><strong>Government Accountability Office<\/strong><\/em><\/a> (GAO) has some recommendations of its own for the oversight official. <a href="https:\/\/federalnewsnetwork.com\/category\/temin\/tom-temin-federal-drive\/"><em><strong>The Federal Drive with Tom Temin<\/strong><\/em><\/a> got the details from GAO's Director of Defense Capabilities and Management, Alissa Czyz.nn<em><strong>Interview Transcript:\u00a0<\/strong><\/em>n<blockquote><strong>Tom Temin <\/strong>So we have oversight of overseers here. You might say, with respect to the defense intelligence activities and just sort out for us what activities belong to the Defense Department in the gigantic intelligence apparatus.nn<strong>Alissa Czyz <\/strong>The <a href="https:\/\/www.defense.gov\/"><em><strong>Department of Defense<\/strong><\/em><\/a> oversees 26 components that do intelligence or intelligence related activities. This is like National Security Agency. The military services each have their own intelligence department's director of intelligence. Those types of things. This is not the broader CIA, FBI, the broader intelligence community. So, DoD has its own intelligence components.nn<strong>Tom Temin <\/strong>Right. So, it's a wonder they only had a couple of hundred recommendations for all of these 26 activities. But what were you looking at here to see whether those capabilities were responding to the Defense Department's own overseer or whether the overseer was overseeing properly?nn<strong>Alissa Czyz <\/strong>Right. It's what you said at the beginning, Tom. So, we were asked to look at the roles and responsibilities of the DoD senior intelligence oversight official, or they call it SIO for short, of course, because DoD has lots of acronyms. So, this office is responsible for conducting oversight of those 26 components within the Department of Defense that do intelligence or intelligence related activities, right. They want to make sure that they're following proper policies and procedures. They're following the letter of the law. You're carrying out those activities in a way that is proper and professional. So, they have a very important responsibility. They work, you know, in tandem with other DoD offices that provide oversight, like the inspector general's office and the general counsel, but they play an important role in overseeing these defense components.nn<strong>Tom Temin <\/strong>And how big is the silo operation? I mean, like the defense IG's office is a couple of thousand people.nn<strong>Alissa Czyz <\/strong>Right? It's a pretty small office, actually. It's only, you know, a handful of individuals. And the senior intelligence oversight official who also has a direct line to the secretary of Defense if needed. So, they don't have a lot of resources, but they do have a very important role to play, and they can kind of partner with other offices if needed. But what they've been doing over the last several years that's really important for the Department of Defense, is doing these inspections of these DoD components that do intelligence or intelligence related activities. So, they've been going every 3 to 5 years out to different components, and they check and see if they're making sure that they're doing their intelligence activities in accordance with policies and procedures. And they've provided a lot of value in doing those inspections of the components. They've made recommendations hundreds, as you mentioned over the years, to these components. So, they're small shop, but they have a lot of important responsibilities.nn<strong>Tom Temin <\/strong>And just out of curiosity, when they make a visit to look at something invisible, which is the intellectual activity of gathering intelligence, that sounds like more of an interview situation. What is it they can audit and look at?nn<strong>Alissa Czyz <\/strong>Right. So, they do look at the components, own policies and procedures, what types of activities they've been carrying out, what types of training they provide, their personnel. They do interviews as well. They have kind of a checklist of things that they look for when they go out and do these visits. And in addition to those inspections, they do their own training for those components and for others in DoD. So, they provide that important resource as well.nn<strong>Tom Temin <\/strong>Yeah. The question is what they tell people they do at cocktail parties, I guess we're speaking with Alissa Czyz. She's director of defense capabilities and management at the Government Accountability Office. And you found some risks, though, that have been entailed, even though they are pretty diligent about conducting these activities. What are some of the risks you identified?nn<strong>Alissa Czyz <\/strong>Yeah. So, as I mentioned, they have been very active in doing inspections of these defense components. Their work over a five-year period that we looked at resulted in almost 300 recommendations for improvements to those components. The issue that we found were a few things. One, that they were not tracking the status of those recommendations. So, I'm from GAO. We make a lot of recommendations to executive branch agencies, and we follow up on our recommendations. We ask those agencies how they have implemented those. And that's a really important part of the process. Right. So, all of these hundreds of recommendations, they didn't have a good process in place to track whether those prior recommendations had been implemented. That was one issue, and we made a recommendation to make sure that they were tracking the progress. And they could do that in a number of ways. Right. They could require the components to report on their progress. So, there are some kind of low resource ways that they could implement that. One of the other big issues that we found that was a risk where they have actually decided to halt doing these inspections of defense components. So, in 2020, they decided to give it away from this and instead do these, what they call topic assessments. So instead of going out to one component and conducting a thorough inspection of that component, they are looking at topic areas like counter drug analytics support for example. And so, they are looking at all of the components that play a role in that particular topic. So, they are kind of hitting a larger swath of components by doing these topic assessments. But as we pointed out their component individual inspections had resulted in hundreds of recommendations over the year. So, we did see a lot of risk in that decision to halt those. Sure. We got feedback from some of the components to that. We're worried about that as well.nn<strong>Tom Temin <\/strong>And did they halt them because of pandemic? Because they didn't want to go see people in person or it was hard to travel.nn<strong>Alissa Czyz <\/strong>They decided that doing these topic assessments would kind of get at a larger group of components at one time. And we see merit to that, definitely. But what we found was that they didn't assess the risk of stopping those individual inspections. So really what happens by not doing those individual inspections is that DoD is relying on the component itself to inspect itself, right. Some of these components are pretty, you know, experienced and have the resources to do that oversight of themselves. Others, like Space Force, is pretty new. I mean, they don't have the experience. And there's also some question of, you know, having an independent office come in and do an evaluation can provide a lot of benefits, too. So, we made a recommendation that they assess the risks of stopping those inspections as they move toward these topic assessments.nn<strong>Tom Temin <\/strong>And then you also found that when they do the topic assessments, they weren't fully developed with respect to what it is they were going to find out about them, the criteria.nn<strong>Alissa Czyz <\/strong>Right. So again, we're GAO. Right. So, we have a lot of processes that we follow and such as the inspector general standards that we use to conduct our audits. And the IG does as well. And we found that the SIO did not have all of these standards in place. So, we identified 22 standards that were relevant to their topic assessments. These are things like having a quality control system in place, or making sure you're documenting evidence, or making sure the folks that are doing the investigations don't have a conflict of interest. Those types of things. So, we identified 22 standards that would be important for their work. They had implemented many of them, but not all of them. So, we made a recommendation. An example would be that one about the independence of investigators. They did not have a process in place to assure that their investigators were independent. So, we made that recommendation to implement all 22 standards as they adopt this topic assessment process and evaluate the risks of stopping the inspections.nn<strong>Tom Temin <\/strong>Right. But you didn't quite go as far as to say you should go back to doing those inspections.nn<strong>Alissa Czyz <\/strong>I mean, they have the ability to start those inspections. And we also, you know, acknowledge that, you know, they want to make their own decisions on how they're going to conduct their oversight. But, you know, a risk analysis we think is prudent, right. Those inspections provided a lot of benefit. So, taking a look at those, and if there are gaps that exist, by stopping those inspections, by doing some type of analysis like that, they could take steps to mitigate those risks.nn<strong>Tom Temin <\/strong>And the SIO office generally agreed with what you came up with.nn<strong>Alissa Czyz <\/strong>They did they agreed on the 22 standards, they thought, but maybe not all of them were applicable. We strongly believe that all of them are applicable. We actually operate under those standards. The IG does as well. They're broad. They're not overly prescriptive. So, we do reiterate that we think that they should adopt all of them. But they did generally agree with all of the recommendations.<\/blockquote>"}};

The Defense Department operates a slew of intelligence activities and programs. It even has a senior intelligence oversight official, who has come up with more than 100 recommendations over the last five years. But the Government Accountability Office (GAO) has some recommendations of its own for the oversight official. The Federal Drive with Tom Temin got the details from GAO’s Director of Defense Capabilities and Management, Alissa Czyz.

Interview Transcript: 

Tom Temin So we have oversight of overseers here. You might say, with respect to the defense intelligence activities and just sort out for us what activities belong to the Defense Department in the gigantic intelligence apparatus.

Alissa Czyz The Department of Defense oversees 26 components that do intelligence or intelligence related activities. This is like National Security Agency. The military services each have their own intelligence department’s director of intelligence. Those types of things. This is not the broader CIA, FBI, the broader intelligence community. So, DoD has its own intelligence components.

Tom Temin Right. So, it’s a wonder they only had a couple of hundred recommendations for all of these 26 activities. But what were you looking at here to see whether those capabilities were responding to the Defense Department’s own overseer or whether the overseer was overseeing properly?

Alissa Czyz Right. It’s what you said at the beginning, Tom. So, we were asked to look at the roles and responsibilities of the DoD senior intelligence oversight official, or they call it SIO for short, of course, because DoD has lots of acronyms. So, this office is responsible for conducting oversight of those 26 components within the Department of Defense that do intelligence or intelligence related activities, right. They want to make sure that they’re following proper policies and procedures. They’re following the letter of the law. You’re carrying out those activities in a way that is proper and professional. So, they have a very important responsibility. They work, you know, in tandem with other DoD offices that provide oversight, like the inspector general’s office and the general counsel, but they play an important role in overseeing these defense components.

Tom Temin And how big is the silo operation? I mean, like the defense IG’s office is a couple of thousand people.

Alissa Czyz Right? It’s a pretty small office, actually. It’s only, you know, a handful of individuals. And the senior intelligence oversight official who also has a direct line to the secretary of Defense if needed. So, they don’t have a lot of resources, but they do have a very important role to play, and they can kind of partner with other offices if needed. But what they’ve been doing over the last several years that’s really important for the Department of Defense, is doing these inspections of these DoD components that do intelligence or intelligence related activities. So, they’ve been going every 3 to 5 years out to different components, and they check and see if they’re making sure that they’re doing their intelligence activities in accordance with policies and procedures. And they’ve provided a lot of value in doing those inspections of the components. They’ve made recommendations hundreds, as you mentioned over the years, to these components. So, they’re small shop, but they have a lot of important responsibilities.

Tom Temin And just out of curiosity, when they make a visit to look at something invisible, which is the intellectual activity of gathering intelligence, that sounds like more of an interview situation. What is it they can audit and look at?

Alissa Czyz Right. So, they do look at the components, own policies and procedures, what types of activities they’ve been carrying out, what types of training they provide, their personnel. They do interviews as well. They have kind of a checklist of things that they look for when they go out and do these visits. And in addition to those inspections, they do their own training for those components and for others in DoD. So, they provide that important resource as well.

Tom Temin Yeah. The question is what they tell people they do at cocktail parties, I guess we’re speaking with Alissa Czyz. She’s director of defense capabilities and management at the Government Accountability Office. And you found some risks, though, that have been entailed, even though they are pretty diligent about conducting these activities. What are some of the risks you identified?

Alissa Czyz Yeah. So, as I mentioned, they have been very active in doing inspections of these defense components. Their work over a five-year period that we looked at resulted in almost 300 recommendations for improvements to those components. The issue that we found were a few things. One, that they were not tracking the status of those recommendations. So, I’m from GAO. We make a lot of recommendations to executive branch agencies, and we follow up on our recommendations. We ask those agencies how they have implemented those. And that’s a really important part of the process. Right. So, all of these hundreds of recommendations, they didn’t have a good process in place to track whether those prior recommendations had been implemented. That was one issue, and we made a recommendation to make sure that they were tracking the progress. And they could do that in a number of ways. Right. They could require the components to report on their progress. So, there are some kind of low resource ways that they could implement that. One of the other big issues that we found that was a risk where they have actually decided to halt doing these inspections of defense components. So, in 2020, they decided to give it away from this and instead do these, what they call topic assessments. So instead of going out to one component and conducting a thorough inspection of that component, they are looking at topic areas like counter drug analytics support for example. And so, they are looking at all of the components that play a role in that particular topic. So, they are kind of hitting a larger swath of components by doing these topic assessments. But as we pointed out their component individual inspections had resulted in hundreds of recommendations over the year. So, we did see a lot of risk in that decision to halt those. Sure. We got feedback from some of the components to that. We’re worried about that as well.

Tom Temin And did they halt them because of pandemic? Because they didn’t want to go see people in person or it was hard to travel.

Alissa Czyz They decided that doing these topic assessments would kind of get at a larger group of components at one time. And we see merit to that, definitely. But what we found was that they didn’t assess the risk of stopping those individual inspections. So really what happens by not doing those individual inspections is that DoD is relying on the component itself to inspect itself, right. Some of these components are pretty, you know, experienced and have the resources to do that oversight of themselves. Others, like Space Force, is pretty new. I mean, they don’t have the experience. And there’s also some question of, you know, having an independent office come in and do an evaluation can provide a lot of benefits, too. So, we made a recommendation that they assess the risks of stopping those inspections as they move toward these topic assessments.

Tom Temin And then you also found that when they do the topic assessments, they weren’t fully developed with respect to what it is they were going to find out about them, the criteria.

Alissa Czyz Right. So again, we’re GAO. Right. So, we have a lot of processes that we follow and such as the inspector general standards that we use to conduct our audits. And the IG does as well. And we found that the SIO did not have all of these standards in place. So, we identified 22 standards that were relevant to their topic assessments. These are things like having a quality control system in place, or making sure you’re documenting evidence, or making sure the folks that are doing the investigations don’t have a conflict of interest. Those types of things. So, we identified 22 standards that would be important for their work. They had implemented many of them, but not all of them. So, we made a recommendation. An example would be that one about the independence of investigators. They did not have a process in place to assure that their investigators were independent. So, we made that recommendation to implement all 22 standards as they adopt this topic assessment process and evaluate the risks of stopping the inspections.

Tom Temin Right. But you didn’t quite go as far as to say you should go back to doing those inspections.

Alissa Czyz I mean, they have the ability to start those inspections. And we also, you know, acknowledge that, you know, they want to make their own decisions on how they’re going to conduct their oversight. But, you know, a risk analysis we think is prudent, right. Those inspections provided a lot of benefit. So, taking a look at those, and if there are gaps that exist, by stopping those inspections, by doing some type of analysis like that, they could take steps to mitigate those risks.

Tom Temin And the SIO office generally agreed with what you came up with.

Alissa Czyz They did they agreed on the 22 standards, they thought, but maybe not all of them were applicable. We strongly believe that all of them are applicable. We actually operate under those standards. The IG does as well. They’re broad. They’re not overly prescriptive. So, we do reiterate that we think that they should adopt all of them. But they did generally agree with all of the recommendations.

The post Report card shows shortcomings in how DoD oversees intelligence first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/agency-oversight/2024/03/report-card-shows-shortcomings-in-how-dod-oversees-intelligence/feed/ 0
Biden EO aims to safeguard sensitive data on fed employees, facilities https://federalnewsnetwork.com/cybersecurity/2024/02/biden-eo-aims-to-safeguard-sensitive-data-on-fed-employees-facilities/ https://federalnewsnetwork.com/cybersecurity/2024/02/biden-eo-aims-to-safeguard-sensitive-data-on-fed-employees-facilities/#respond Wed, 28 Feb 2024 23:28:13 +0000 https://federalnewsnetwork.com/?p=4906456 The new EO will target areas like biometrics, geolocation data, personal health information, and other sensitive data.

The post Biden EO aims to safeguard sensitive data on fed employees, facilities first appeared on Federal News Network.

]]>
The Biden administration, as part of a broader data privacy effort, is attempting to curtail foreign adversaries from gathering sensitive data on federal employees and military service members.

The new initiative comes under an executive order President Joe Biden was expected to sign Wednesday. The EO is aimed at protecting Americans’ sensitive data from being accessed by so-called “countries of concern” through data brokerages and other transactions.

Under the EO, the Justice Department will issue regulations around the bulk sale of sensitive data to unfriendly foreign nations, including China, Russia, Iran, North Korea, Cuba, and Venezuela. The EO will specifically highlight geolocation data, personal health data, personal financial data, and biometrics, among other categories.

“Buying data through data brokers is currently legal in the United States,” a senior Biden administration official told reporters on Tuesday. “And that reflects a gap in our national security toolkit that we’re working to fill with this program.”

In a fact sheet, DoJ also described how its program will regulate the sale of “government related data,” regardless of whether it meets the “bulk” thresholds or not.

DoJ’s regulations will focus on sensitive data marketed “as linked or linkable to current or recent former employees or contractors, or former senior officials, of the federal government, including the intelligence community and military.”

The rulemaking will also address government-related locations by focusing on “geolocation data that is linked or linkable to certain sensitive locations within geofenced areas that the department would specify on a public list,” the department said in its factsheet.

Officials have warned for years that foreign adversaries could use commercially available data as an intelligence tool. In a January 2023 white paper, the MITRE Corporation summarized how advertising technology or “adtech” on mobile phones and other devices could be used to target influential individuals for blackmail and coercion, or even physically map and target sensitive sites.

Brandon Pugh, policy director of the R Street Institute’s cybersecurity and emerging threats team, noted members of the military and intelligence professionals face unique threats in the digital age.

“Adversaries have an interest in identifying them, targeting them for blackmail and disinformation, and tracking their movements to and from government facilities for strategic advantage,” Pugh told Federal News Network. “We have seen this play out in the Russia-Ukraine conflict and there is no doubt that countries like China have similar interests.”

Pugh also noted it will be difficult to track when and how sensitive data reaches countries like China and Russia.

“An area that will be tricky to follow and enforce is when data is ‘re-exported,’ where third parties share the data with countries of concern,” he said.

CISA security requirements for sensitive data

While DoJ will play a lead role under the EO with its advanced notice of proposed rulemaking, several other agencies will be involved in advancing the order’s goals to better protect sensitive data

The Cybersecurity and Infrastructure Security Agency, for instance, will establish security requirements for “restricted transactions” that will be allowed to go forward under the EO, so long as they meet certain stipulations.

“These security requirements will be designed to mitigate the risk of access by countries of concern or covered persons and may include cybersecurity measures such as basic organizational cybersecurity posture requirements, physical and logical access controls, data masking and minimization, and the use of privacy-preserving technologies,” the DoJ fact sheet explains.

Pugh said it will be notable to watch “how prescriptive these requirements are, how they are assessed and monitored, and how they might evolve over time.”

“Enhancing baseline cybersecurity has been a priority of the federal government even outside of this executive order as the updated NIST cybersecurity framework from this week conveys,” he added.

Meanwhile, the departments of Defense, Health and Human Services, Veterans Affairs, and the National Science Foundation will “consider taking steps to use their existing grant making and contracting authorities to prohibit federal funding that supports, or to otherwise mitigate, the transfer of sensitive health data and human genomic data to countries of concern and covered persons,” the DoJ fact sheet states.

Biden urges Congress on privacy legislation

The White House acknowledged that while the EO is aimed at protecting American’s sensitive data, it isn’t a substitute for broader privacy actions. Biden is encouraging the Consumer Financial Protection Bureau to take steps to prevent data brokers from “illegally assembling and selling extremely sensitive data, including that of U.S. military personnel,” the White House said.

And Biden is also urging Congress to pass “comprehensive bipartisan privacy legislation, especially to protect the safety of our children.”

In a statement, Sen. Mark Warner (D-Va.) applauded the forthcoming EO. “While I welcome these steps, today’s action does not assuage the need for comprehensive data privacy legislation,” Warner said. “I urge my colleagues to come together on legislation that finally protects Americans’ privacy online.”

Meanwhile, Sen. Ron Wyden (D-Ore.) also praised the White House’s actions, while calling on the Senate to consider his Protecting Americans’ Data from Foreign Surveillance Act of 2023, which could potentially apply to a much broader set of countries than Biden’s EO.

“Authoritarian dictatorships like Saudi Arabia and UAE cannot be trusted with Americans’ personal data, both because they will likely use it to undermine U.S. national security and target U.S. based dissidents, but also because these countries lack effective privacy laws necessary to stop the data from being sold onwards to China,” Wyden said.

The post Biden EO aims to safeguard sensitive data on fed employees, facilities first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/cybersecurity/2024/02/biden-eo-aims-to-safeguard-sensitive-data-on-fed-employees-facilities/feed/ 0
Top DoD intelligence official retiring https://federalnewsnetwork.com/federal-newscast/2024/02/top-dod-intelligence-official-retiring/ https://federalnewsnetwork.com/federal-newscast/2024/02/top-dod-intelligence-official-retiring/#respond Thu, 22 Feb 2024 18:33:35 +0000 https://federalnewsnetwork.com/?p=4898360 Top DoD intelligence official retiring

The post Top DoD intelligence official retiring first appeared on Federal News Network.

]]>
var config_4898350 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB7591685677.mp3?updated=1708606140"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2018\/12\/FedNewscast1500-150x150.jpg","title":"Top DoD intelligence official retiring","description":"[hbidcpodcast podcastid='4898350']nn[federal_newscast]"}};
  • Agencies will soon have free access to a Microsoft feature that could help detect cyber attacks. Starting this month, Microsoft will make advanced logging capabilities available to all federal agencies at no additional charge. The Cybersecurity and Infrastructure Security Agency worked with Microsoft in recent months to make the feature available to the government. Microsoft said it will retain agency network logs for 180 days at no additional charge. Lawmakers have previously criticized Microsoft for profiting off of network logging features that are typically needed to identify cyber incidents.
  • The General Services Administration is starting to research the future of federal telecommunications services. Agencies are still a year or more away from fully transitioning to the Enterprise Infrastructure Solutions or EIS telecommunications vehicle, but that isn't stopping GSA from asking what is next. In a new request for information, GSA is seeking industry feedback as it develops the Next Generation Network Infrastructure strategy and the associated acquisition initiative. The EIS contract expires in July 2032. GSA is seeking answers to 38 questions, covering a host of topics, including what the telecommunications market will look like in the future and a list of services that will no longer be offered in the next 10 to 15 years. Responses to the RFI are due by March 15.
  • The U.S. Special Operations Command is seeking feedback from small businesses. SOCOM is hosting an acquisition executive small-business forum to assess the state of its small business programs. SOCOM wants to better understand the challenges in working with the command. It also wants to hear suggestions on making the process of doing business with the command easier. Participation from a variety of industries is encouraged. In-person attendance is limited to 25 people, and virtual attendance is limited to 150 people. The forum will take place on March 28, right after the conclusion of the small-business boot camp.
  • The Department of Veterans Affairs is looking to manage the size of its largest-ever health care workforce. The Veterans Health Administration (VHA) is taking a more targeted approach to hiring. But it is telling its leaders to rescind tentative or final job offers to candidates only as an “action of last resort.” In cases where it must rescind a job offer, VHA said it will make every effort to place candidates in other jobs at other facilities. VHA now has a record 400,000 employees, after it saw a hiring surge last year. VA’s press secretary said there are no plans for a hiring freeze or reduction in the VA health care workforce.
  • A top Defense Department intelligence official is retiring. Ronald Moultrie will step down from his position as under secretary of defense for intelligence and security at the end of this month. During his time overseeing DoD’s intelligence apparatus, Moultrie was charged with reviewing the military’s security practices in the wake of the Discord leaks. He also testified about military encounters with unidentified aerial phenomena. Moultrie’s government career spans 44 years. He previously served in positions throughout the intelligence community, including as Director of Operations at the National Security Agency.
  • Agency ethics officials are reviewing financial disclosures from federal executives after about 400,000 people submitted their forms last week. The Office of Government Ethics (OGE) said one-in-five civilian executive-branch employees, from about 140 agencies, are required to complete a confidential financial disclosure. OGE said any executive-branch employee, whose duties would affect the financial interests of outside companies or persons, may have been required to file. In the coming weeks, agency ethics officials will review these confidential financial disclosure reports. If they find a potential conflict between the employee’s official duties and a financial interest, they will ask the employee to take action to include everything from selling a holding, resigning from an outside job or avoiding certain government work. OGE said these efforts are vital to protecting the integrity of government programs and operations.
  • Taxpayers in a dozen states may soon get the chance to try out a free, online tax-filing platform that is run by the IRS. The agency said it has completed internal testing of what is called its "Direct File" system, and will allow more taxpayers to use it to file their federal tax returns. The IRS said it will accept new users for short, unannounced windows of time, to manage the amount of traffic on the Direct File platform. The agency is generally limiting testing to taxpayers who live in states without an income tax.
    ( - IRS)
  • The U.S. Central Command is paving its own data narrative. CENTCOM is about to release its data strategy. While the command relied on the work of the chief digital and artificial intelligence office, it is taking its own approach to the way it governs data. Michael Foster, CENTCOM’s chief data officer, said the strategy will be continuously evolving and adapting over time. The command is using “VAULTIS,” a DoD acronym for data that is visible, accessible, understandable, linked, trustworthy, interoperable and secure as a framework to practically drive their governance processes. Hence, VAULTIS.
    (CENTCOM to release its data strategy - Federal News Network)

The post Top DoD intelligence official retiring first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/federal-newscast/2024/02/top-dod-intelligence-official-retiring/feed/ 0
NSA cyber official retiring https://federalnewsnetwork.com/federal-newscast/2024/02/nsa-cyber-official-retiring/ https://federalnewsnetwork.com/federal-newscast/2024/02/nsa-cyber-official-retiring/#respond Wed, 21 Feb 2024 12:40:36 +0000 https://federalnewsnetwork.com/?p=4896903 One of the National Security Agency’s top cyber officials is stepping down this spring. Rob Joyce, NSA director of cybersecurity, will retire on March 31.

The post NSA cyber official retiring first appeared on Federal News Network.

]]>
var config_4896896 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB8435072196.mp3?updated=1708516164"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2018\/12\/FedNewscast1500-150x150.jpg","title":"NSA cyber official retiring","description":"[hbidcpodcast podcastid='4896896']nn[federal_newscast]"}};
  • As Congress works on the next military budget, some are asking President Joe Biden to focus on the well-being of service members and their families. Lawmakers want the White House to prioritize quality of life issues in the fiscal 2025 defense budget request. Rep. Mike Rogers (R-Ala.) and Rep. Adam Smith (D-Wash.), among others, are asking President Joe Biden to focus on housing, compensation, health care and child care as Congress begins to draft the 2025 defense policy bill. President Biden is expected to release his 2025 budget request on March 11, but Congress has yet to pass the fiscal 2024 budget.
  • The Commerce Department is seeking public feedback on the openness of artificial intelligence tools. The National Telecommunications and Information Administration (NTIA) is launching a request for comment, as it looks for more feedback on the benefits and risks of “open-weight” AI systems. AI model weights are a distillation of what an AI model has been trained to understand, and how that model continues to behave. “Responsible AI innovation we know is going to bring enormous benefits to people. It’s going to transform every corner of our economy. But we also know that we will only realize the promise of AI if we also address the serious risks that it raises today," NTIA Administrator Alan Davidson said.
  • One of the National Security Agency’s top cyber officials is stepping down this spring. Rob Joyce, NSA's director of cybersecurity, will retire on March 31. Joyce has served at the agency for 34 years, including a stint as the leader of the Tailored Access Operations unit. Since taking over as head of the Cybersecurity Directorate in 2021, Joyce has led the NSA’s efforts to secure defense contractor and critical infrastructure networks. He will be succeeded by David Luber, the deputy director of the Cybersecurity Directorate.
  • The Agriculture Department is looking for tech talent to improve its level of service to the public. USDA’s Digital Service and its Office of Customer Experience are partnering to launch a Digital Service Fellows Program. The department is looking for fellows to improve its customer experience, procurement and digital-service delivery. USDA is taking fellowship applications through March 4. Once hired, fellows will start a two-year, full-time tour of service, with the option of serving up to four years. The department is offering jobs in Washington, D.C., as well as remote positions.
  • The United States Central Command is moving toward Combined Joint All Domain Command and Control. The command is currently working on building its zero trust environment, with the goal of sharing this environment across a broader set of partners. While the environment is not operational yet, the command expects to be able to add partners and allies to their environment this year. CENTCOM’s Chief Data Officer Michael Foster said the environment needs to encompass all stakeholders, partners and allies for CJADC2 to be fully effective.

The post NSA cyber official retiring first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/federal-newscast/2024/02/nsa-cyber-official-retiring/feed/ 0
FISA amendments must acknowledge critical role OSINT plays in preserving national security https://federalnewsnetwork.com/commentary/2024/02/fisa-amendments-must-acknowledge-critical-role-osint-plays-in-preserving-national-security/ https://federalnewsnetwork.com/commentary/2024/02/fisa-amendments-must-acknowledge-critical-role-osint-plays-in-preserving-national-security/#respond Tue, 20 Feb 2024 18:12:02 +0000 https://federalnewsnetwork.com/?p=4896036 As we approach the April 2024 expiration of Section 702 of the Foreign Intelligence Surveillance Act (FISA), it is heartening to see a robust debate in Congress on how the U.S. government and its commercial…

The post FISA amendments must acknowledge critical role OSINT plays in preserving national security first appeared on Federal News Network.

]]>
As we approach the April 2024 expiration of Section 702 of the Foreign Intelligence Surveillance Act (FISA), it is heartening to see a robust debate in Congress on how the U.S. government and its commercial partners can balance the imperatives of safeguarding the privacy of U.S. citizens with ensuring the physical and cyber security of the nation and our allies.

Threats to American and allied interests worldwide are rising. Against this backdrop, we see it as only good that members of Congress in both parties are recognizing that responsible and compliance-focused American companies – and the innovation and technology they bring – can support national security goals through best-available, trusted open-source intelligence (OSINT). The use of OSINT, composed of both publicly-available information and commercially-available information, has grown dramatically in the past decade, and has become a key tool in supporting national security missions worldwide.

As executives at Flashpoint, a leading American provider of OSINT to governments and global enterprises, protecting civil liberties and securing our nation are not just features of our business. They are fundamental to our mission.

Working side by side with the public sector, we are able to see daily how our focused commercial intelligence, which is produced and curated by hundreds of professional analysts and technologists, helps drive critical missions in protecting people, property and assets. These partners have been able to better inform decisions that ultimately save lives, solve investigations, uncover terrorist plots, apprehend criminals, thwart fraud, and help direct smart international investment. Our company does this while adhering to core principles of privacy and civil liberties, and that is reflected in a thoughtful, deliberate and compliance-first approach to the collection and dissemination of OSINT.

Accordingly, as Congress evaluates amendments to Section 702, we urge a thoughtful, deliberate and transparent process that acknowledges the critical role that OSINT, and the intelligence analysts that drive OSINT collections, play in upholding our national security.

Our adversaries, of course, have no limits in their efforts to undermine the U.S. through mass data thefts and purchasing and scraping of private data on individual Americans and allies. We see elevating risks based on the activities of advanced state-backed threats from Russia, China, Iran, North Korea, Venezuela and networks of proxy actors on every continent, which has led to increased risk and scale of cyber and physical attacks, ranging from ransomware to destructive malware campaigns and threats on critical infrastructure.

It would therefore be devastating to U.S. agencies and our foreign allies not to be able to leverage the data and insight that companies like ours produce responsibly. As a result, while we encourage a nuanced and thoughtful debate around how OSINT can be leveraged in an ethical, privacy-focused way, amendments to Section 702 must not sacrifice the ability of agencies to swiftly and effectively use this data without draconian restrictions.

Fortunately, we need not sacrifice civil liberties and fundamental privacy rights to benefit from the great power and scale of OSINT and commercial intelligence. For example, here at Flashpoint, we take a careful, compliance-first approach to all of our analyst activities, and remain vigilant on how we can support privacy imperatives without sacrificing mission success. These technologies and practices which empower better illumination of hazy threats also empower better protection of civil liberties and privacy. With national security as our shared North Star, we stand ready to support an open, transparent legislative process and engage with government, academia and other stakeholders to arrive at a solution that enlists the full power of American technology while always upholding the standards of American values.

Donald Saelinger is the president of Flashpoint, a U.S.-based risk data and intelligence firm.

Andrew Borene is Flashpoint’s executive director for global security. Based in London, he is a former officer at the National Counterterrorism Center and the Office of the Director of National Intelligence. Previously, he has been an associate deputy general counsel at the Pentagon, and he is a Marine Corps veteran.

The post FISA amendments must acknowledge critical role OSINT plays in preserving national security first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/commentary/2024/02/fisa-amendments-must-acknowledge-critical-role-osint-plays-in-preserving-national-security/feed/ 0