NSA


Improving situational awareness, creating trained cyber teams and building a more defensible architecture are top priorities for NSA and US Cyber Command (USCYBERCOM), according to Col. John Surdu, Military Deputy Chief, Combined Action Group (CAG).

Appearing on today’s Federal Executive Forum on Cybersecurity/Progress & Best Practices – “Defense & Homeland,” Col. Surdu outlined the top 5 priorities that both NSA and USCYBERCOM are pursuing to further advance the nation’s cyber defenses. Keep reading →

The 2012 Army Weapon Systems Handbook is available in a new, easier to access format.

I know, because Terry Edwards, Director of the Army’s System of System’s Engineering (SoSE), asked me to do it, but more to the point, I learned some lessons from the previous version (simpler is better) that I want to share with readers, especially those that want to build their own dashboards.

First some background: “The Army Acquisition Executive has launched a new highly collaborative SoSE campaign aimed at synchronizing development and delivery of technologies across the entire Army systems portfolio, service officials have said.

“Among the effort’s central tenets is a need to align programs more closely and establish an acquisition strategy that draws simultaneously from programs of record (PORs), commercial-off-the-shelf products, and emerging technologies from the Army’s Science and Technology Directorate–all as a way to maximize efficiency across the Army’s developmental spectrum.”

That led to a dashboard which is an important step to implementing Dynamic Case Management, such as Be Informed 4, and Business Events, such as TIBCO Solutions for the Army SOSE.

I first decided what this dashboard should be about: What should be Linked Open Data be like and what should be Structured Data be like. I concluded they should be similar to work done with the CIA World Factbook recently.

This is really important to the Quint (CIA, DIA, NGA, NRO, and NSA). Do not worry about what all those acronyms mean, just that they keep us safe, especially if they all work together “to connect the dots” and connecting the dots involves connecting unstructured and structured data by making unstructured data Linked Open Data as a first step.


Leaving out most of the details, I copied the Army Weapons Systems Manual table of contents to my wiki-scraper tool and gave it well-defined web addresses and drilled down within each item to give it additional well-defined web addresses (not to short and not too long). Boring, but absolutely essential work to succeed. That all goes into a spreadsheet which gets imported to a dashboard tool where the data sets can be sorted, searched, merged, etc. The detailed results are shown elsewhere.

One can go from the DoD System of Systems to the Army Weapons System of Systems to the individual systems. Now what you really want to do is use that to manage an enterprise of 153 weapons systems efficiently and effectively as Terry Edwards described above, in his work which is described further at “Army’s Resource Forest Is Good Metaphor For System Of Systems Approach.” Keep reading →

It is clear to me that the CIA needs big data, like Zettabytes (10 to the 21st power bytes), and the ability to find and connect the “terrorist dots” in it. As of 2009, the entire Internet was estimated to contain close to 500 exabytes which is a half zettabyte.

Recently I have listened to three senior CIA officials — two former and one current — talk about this and the need for data science and data scientists to make sense of it.

Gen. Michael Hayden, former director of the CIA and National Security Agency, and Principle Deputy Director of National Intelligence, and Bob Flores, former chief technology officer at the CIA, spoke about this at the MarkLogic Government Summit; and Gus Hunt, current CTO at CIA, spoke about this at the Amazon Web Services Summit that I wrote about recently.

General Hayden framed the problem as follows: Cold War Era — easy to find the enemy, but hard to stop them (e.g. Soviet tanks in Eastern Germany); versus the Global War on Terrorism — hard to find the terrorist, but easy to stop once their found (e.g. the underwear bomber on the airplane). He said we live in an era where it is not a failure to share data, but with processing the shear volume and variety of data with velocity that is the result of sharing.

He shared his experience meeting with former Egyptian President Mubarak before the recent Arab awakening due to social media that resulted in his overthrow and then meeting with the President of Twitter, Jack Dorsey, whom he asked: How does it feel to overthrow a government–something the CIA, when Hayden was director, was never able to do?

Hayden also said we need tools to predict the future from social media and data scientists to use them.

I told him about my work with Recorded Future that was also the subject of an Breaking Gov story.

Bob Flores, former CIA CTO, said that Recorded Future was a new, fantastic technology and that the old model of collect, winnow, and disseminate fails spectacularly in the big data world we live in now. He used the recent movie “Moneyball” as an example of how the new field of baseball analytics called Sabermetrics has shown there is no more rigorous test (of a business plan) than empirical evidence.

He said that in this time of budget cuts and downsizing the creme will rise to the top (those people and organizations can solve real problems with data) and survive. And Flores agrees with Gen. Hayden that while all budgets are on a downslope (including for defense, intelligence, and cyber), that cyber is on the least down slope of all the rest because it is realized that limiting the analysis of big data would be equivalent to disarmament in the Cold War era.


When the Senate Committee on Homeland Security and Governmental Affairs gathered last week to hear testimony about the state of information sharing across all levels of government, the committee leaders and even some of the expert witnesses pointed to the killings of Osama bin Laden and Anwar al-Awlaki as two examples of how information sharing across federal agency boundaries has improved.

Wrong. Keep reading →

On Capitol Hill, your committee is only as powerful as what it oversees. And with cybersecurity one of the biggest issues going nowadays, lawmakers are falling all over themselves to get a piece of that pie.

Senate Armed Services Committee Ranking Member John McCain (R-AZ) made his play during today’s confirmation hearing for DoD’s new global strategic affairs chief Madelyn Creedon (as reported initially on Breaking Defense. Keep reading →

Page 3 of 3123