Acquisition

Army hits reset button on intelligence-sharing system

The next phase of the $5 billion Distributed Common Ground System will likely be open to bidders in fiscal 2016.

Acquisition

Army hits reset button on intelligence-sharing system

The next phase of the $5 billion Distributed Common Ground System will likely be open to bidders in fiscal 2016.

Modernization

Data center innovation: New ways to save energy

Revised thermal standards and an array of cooling techniques promise to reverse the data center power drain.

Cybersecurity

The IC wants a peek at the future of your brain

An IARPA RFI seeks answers on what brain structures could be used to determine future job performance.

Cybersecurity

American privacy values vs. European perceptions

As law enforcement and intelligence agencies struggle to balance security against civil liberties, it's important to distinguish caricature from reality.

Cybersecurity

The IC wants a peek at the future of your brain

An IARPA RFI seeks answers on what brain structures could be used to determine future job performance.

Cybersecurity

'History may be repeating itself' in cyberspace

On the tenth anniversary of the 9/11 report's release, the men who guided the investigation are warning of new threats going unaddressed.

Cybersecurity

Panel recommends NIST declare independence from NSA

"NIST may seek the advice of the NSA on cryptographic matters but it must be in a position to assess it and reject it when warranted,” says a report from the Visiting Committee on Advanced Technology.

Cybersecurity

NSA's Rogers: JIE crucial to cyber defense

The Defense Department's move to a Joint Information Environment can't come soon enough for National Security Agency Director Mike Rogers.

Cybersecurity

Does the intelligence community have a handle on its contractor workforce?

According to a GAO report, intelligence agencies lack an accurate picture of contractors costs and mission.

Cybersecurity

Brennan: Technological change tough for CIA

The CIA director also said that although digital footprints aid in tracking down terrorists, they increase the vulnerability of agents in the field.