Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
CSA: Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations Graphic

Iranian Cyber Actors Access Critical Infrastructure Networks

FORT MEADE, Md. – The National Security Agency (NSA) is joining the Federal Bureau of Investigation (FBI), the Cybersecurity and…

DARPA’s Provably Weird Network Deployment and Detection (PWND2) logo with network connection graphics

A New Kind of Hidden Networking Science

Authoritarian regimes are increasingly able to monitor and target internet communications, leaving many people in those countries unable to communicate…

cyber red X

CISA and FBI Release Product Security Bad Practices for Public Comment

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released the Product Security Bad…

green outlines of circles interconnected with green squares

Army Announces Effort to Help Small Business Meet Cybersecurity Requirements

The Defense Department is actively working on plans to build cybersecurity requirements for the defense industrial base into defense contracts…

DHS Artificial Intelligence Roadmap 2024. Photo credit: DHS.

Feature Article: Leveraging AI to Enhance the Nation’s Cybersecurity

When you hear about AI in the news, it sounds as if the robots of science fiction will be taking…

Shown is a T-45C prototype mixed reality cockpit view. Note: Dials, displays, and out-of-the-cockpit view are virtual images while the cockpit panels and buttons are seen in the “real world” via a video pass-through camera.

Project Link: New T-45 Mixed Reality Trainer Improves Readiness

NAVAL AIR SYSTEMS COMMAND, Patuxent River, Md. – The Naval Aviation Training Systems and Ranges Program Office (PMA-205) and the…

Soldiers from the 94th Army Air and Missile Defense Command, track an unmanned aerial systems (UAS) threat during a scenario as part of Black Dart 18 on Muscatatuck Urban Training Center, Indiana.

Cloud-Based Intel Tool AIDP Rolls Out to Army Units Globally

U.S. Army intelligence units around the world are receiving the Army Intelligence Data Platform (AIDP), enabling soldiers the ability to…

The U.S. Army Research Laboratory uses the “Shaker” to conduct experiments in multiaxial vibrations and develop technology to mitigate the danger it could cause to vehicles and structures, Sept. 26, 2019.

DoD Simplifies Process for Defense Contractors to Comply With Cybersecurity Rules

The Defense Department released for public inspection the final cybersecurity maturity model certification program rule. The rule includes changes which…

graphic of a computer screen with dials on it

A Relevance Model for Threat-Centric Ranking of Cybersecurity Vulnerabilities

The relentless process of tracking and remediating vulnerabilities is a top concern for cybersecurity professionals. The key challenge is trying to identify a remediation scheme specific to in-house, organizational objectives. Without a strategy, the result is a patchwork of fixes applied to a tide of vulnerabilities, any one of which could be the point of failure in an otherwise formidable defense. Given that few vulnerabilities are a focus of real-world attacks, a practical remediation strategy is to identify vulnerabilities likely to be exploited and focus efforts toward remediating those vulnerabilities first.

digital image of king chess piece with binary digits on it

Transforming Military Leadership and Organizational Health With Artificial Intelligence

Artificial intelligence (AI) fuels not only the technological advancements in our businesses and homes but also redefines the operational frameworks of governments, military, and the broader societal constructs. The essence of this transformative power, however, finds its most compelling narrative in leadership and organizational health, where machine learning (ML), a subset of AI, plays a pivotal role. AI/ML can be used to support leaders in their efforts to manage and monitor initiatives and drive decisions. ML algorithms using continuous data collection activities can assist and support organization’s leaders through understanding if implemented initiatives are impacting operations by improving staff cross-collaboration and productivity while improving product and service innovation. Using predictive analytics to analyze trending data to predict future outcomes, leaders can determine if staying the course or pivoting in a certain direction is needed.

graphic of 4 pillars/columns

Development, Test, and Evaluation of Small-Scale Artificial Intelligence Models

As data becomes more commoditized across all echelons of the U.S. Department of Defense, developing artificial intelligence/machine-learning (AI/ML) solutions allows for advanced data analysis and processing. However, these solutions require intimate knowledge of the relevant data as well as robust test and evaluation (T&E) procedures to ensure performance and trustworthiness. This article presents a case study and recommendations for developing and evaluating small-scale AI solutions. The model automates an acoustic event location system.

two artificial intelligence heads, one red, one blue, looking at each other

Artificial Intelligence as a Force Multiplier in U.S. Military Information Campaigns

Military commanders have used information throughout warfare to influence, mislead, disrupt, or otherwise affect the enemy’s decision-making and capabilities. This article discusses the history of information operations (IOs) and enduring importance of incorporating actions in the information environment in military strategy.