CYBERSECURITY

& Information Systems Digest

11 OCTOBER 2022

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

NSA Announces Date of the National Cryptologic Museum Grand Opening

FORT MEADE, Md. — The National Security Agency (NSA) is pleased to announce the Grand Opening of the National Cryptologic Museum. As NSA’s principal gateway to the public, the newly renovated museum will provide a unique opportunity to engage with cryptologic history in fresh and innovative ways – transporting visitors on a journey from the…

Read More...

Featured Notable Technical Inquiry

Security-Conscious Password Behavior From the End-User’s Perspective

Even though technical solutions for security problems are widespread, there are no adequate security measures against precarious user behavior.  Even if hashing and encrypting are used correctly in masking the passwords, attackers can bypass these strong points by going for the weakest link.  Most likely, this will happen through sharing a password, using an already leaked password, or creating a feasibly guessable password (Olmstead and…

Learn More

UPCOMING WEBINAR

What is the status of agentic artificial intelligence systems in the Defense Department?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking information on agentic artificial intelligence systems being implemented within the U.S. Department of Defense. CSIAC is looking to understand the current state of knowledge regarding the design, capabilities, deployment, and oversight of these systems. ‎ If you have expertise or points of contact related to…

Read More...
training flyer

Cyber Training Range Course

COURSE REGISTRATION TO INCLUDE THE WAITLIST IS NOW COMPLETELY FULL. CSIAC is pleased to announce it is partnering with the Defense Acquisition University to offer the federal government and their contractors a Cyber Training Range (CTR) course from July 22 to July 24, 2025. This FREE, virtual, instructor-led training course provides hands-on laboratory exploration of…

Read More...

What collaboration and survey tools are accessible to CAC and non-CAC team members?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking information on collaboration and survey tools accessible to common access card (CAC) and non-CAC team members.  This includes identifying tools that support secure document sharing, real-time collaboration, and survey distribution for mixed access teams. Examples of interest include SurveyMonkey, Zoho, and Notion. The goal…

Read More...

Are there any secured options for domains or applications to serve as a CUI data repository/processing node for programming tools?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking to identify secure options for domains or applications to serve as a closed data repository that can be used to develop analysis programs from deposited data and as a data library capable of handling controlled unclassified information (CUI). Commercial and noncommercial solutions that can…

Read More...
A quantum chip developed by Oak Ridge National Laboratory scientists could help move a quantum internet closer to reality. Credit: Getty Images

ORNL Entanglement Study Connects Quantum Essentials on New Chip

Quantum information scientists at the Department of Energy’s Oak Ridge National Laboratory successfully demonstrated a device that combines key quantum photonic capabilities on a single chip for the first time. The study published in Optica Quantum focused on a type of quantum computing that relies on light particles, or photons, to build qubits and to…

Read More...
rainbow-colored wave signs

Ending Generational Delays in Next Generation Wireless With End-Gen

Waveforms like Wi-Fi, 4G/5G, and Bluetooth satisfy the general population’s basic wireless communication and information sharing needs, but the static nature of these fixed waveforms is vulnerable to instability. Decades often pass between updated versions of wireless protocols. The ability to quickly conduct point-to-point communications across dynamic environments – from secure facilities to “the wild”…

Read More...
Army Specialist Dayanna Guapisaca navigates a virtual bridge erector boat through a simulation.

With Enhanced Software, ERDC Helps Army Boat Pilots Train for the Real Thing

For the first time, U.S. Army Engineer Research and Development Center (ERDC) personnel are working with Army boat pilots to enhance virtual reality and simulation software to take training and mission planning for critical river crossings to the next level. Recently, soldiers with the 74th Multi-Role Bridging Company at Fort Cavazos, Texas, spent three days…

Read More...
In the AI Village at DEF CON 32, DARPA and SemaFor performers demonstrated detection technologies that can help people defend against threats posed by deepfakes. Source: DARPA

Furthering Deepfake Defenses

DARPA has entered a cooperative research and development agreement with the Digital Safety Research Institute (DSRI) of UL Research Institutes to continue advancing the research of detection, attribution, and characterization of AI-generated media. The threat of manipulated media – audio, images, video, and text – has grown recently as automated manipulation technologies become more accessible,…

Read More...
graphic of soldiers walking toward a mountain in the background with digital lines going past them

ARCYBER Data Management and Analytics Directorate

FORT EISENHOWER, GA – Army Cyber Command (ARCYBER), the Army’s premier force for data-centric operations, is committed to implementing the Army’s Data Management and Analytics Strategy. In May 2024, Lt. Gen. Maria Barrett, Commanding General of ARCYBER, appointed Deputy to the Commanding General Jeff Jones as the Command Chief Data and Analytics Officer (C2DAO). In…

Read More...

NIST Finalizes Guidelines for Evaluating “Differential Privacy” Guarantees to De-identify Data

How can we glean useful insights from databases containing confidential information while protecting the privacy of the individuals whose data is contained within? Differential privacy, a way of defining privacy in a mathematically rigorous manner, can help strike this balance. Newly updated guidelines from the National Institute of Standards and Technology (NIST) are intended to…

Read More...

UPCOMING EVENTS

2025 Department of the Air Force Modeling & Simulation (M&S) Summit

The goal of the M&S Summit is to gather U.S. Air Force and Space Force M&S experts to learn about new M&S initiatives and techniques, network across military services and with industry experts, and hear…

Smart Cities Connect Spring Conference & Expo

Smart cities have evolved from a futuristic vision into a tangible reality, creating a fundamental impact for people and the planet. From pilot projects that showcase innovative technologies to enduring infrastructure investments, smart city solutions…

Voice From the Community

David, Michael 3_cropped select
Michael David

Ph.D.

Dr. David has served on the faculty of the National Intelligence University’s (NIU’s) School of Science and Technology Intelligence since February 2014. He teaches courses on cyber intelligence and information operations. He has a Ph.D. from Kyushu University, an M.S. from the University of Southern California, and a B.S. in industrial engineering from Lehigh University. Dr. David’s research emphasis is on cyber-physical systems, with a focus on hardware and software supply chain security.

Want to be featured in our Digest?

Submit your "Voice From the Community"