Intelligence Agency Backs Start-Up Spy Apps

Setting: A high-tech military facility just outside of Washington, DC, the headquarters of the Defense Intelligence Agency, or DIA. Anshuman Roy, the president and founder of Rhombus, a data analytics company, is in a large open space outfitted with computers, whiteboards, and cameras.

It looks a bit like a young hacker space of the sort that began popping up in San Francisco in 2007 and, before that, in Europe.  

Roy stands in front of a digital projection of a map of Syria. Green and red areas show where his proprietary neural network has determined that unrest or violence is likely imminent. Analysts at DIA can use the tool to look at “precursors to instability,” he explains to a small audience.

The analysts can refine the results by adding or subtracting variables, local economic factors, ethnic and religious makeup, even fresh water availability or food price inflation. This, he explains, is a huge improvement over previous models that relied on just four variables computed by humans. Rhombus’s cloud-based neural net can draw in much more information to help analysts make better predictions.
“It doesn’t give directions. It suggests to help override cognitive bias,” he says.

The audience is made up of analysts from DIA along with one or two folks from other intelligence agencies with three-letter names. A representative from a combatant command is taking part via videochat. The main customers are the DIA analysts. They’re the ones who asked for a tool like the one Roy is pitching, and they’ll evaluate if it’s a good fit for what they do.

All of this is part of a new approach to acquisition and software development called iHUB. DIA stood it up in September but has only recently begun to talk about it with a few journalists.

Here’s how it works: DIA acquisition folks go out and talk to analysts working different types of missions (or mission elements, as the agency calls them), looking for their thoughts about what sort of software would help them do their job better.

The innovation division, headed by Al Bolden, turns the analysts’ thoughts into more formal requests posted to the agency’s Needopedia platform, a sort of Craigslist for spy stuff open to cleared vendors, academics, and the like.

Companies can respond to the query with in a two-page white paper outlining on how they would tackle the problem. If the analyst who put out the request likes the paper, the inventor comes in to demo in the iHUB room face-to-face.

During DIA’s second industry outreach event for iHUB, April 12-13, 18 firms debuted a range of products to do technology forecasting, instant translation, and big data analysis on everything from countries to individuals.

Analysts can choose the ones that they like and DIA can fund a limited pilot on the spot. The analyst and contractor then work together to craft a bespoke solution to the analyst’s problem the same way that big companies hire developers to craft apps to fill their needs.

iHUB was established by Lt. Gen. Vincent Stewart, who took over DIA after Michael Flynn was fired. Bolden, the chief innovation officer, says that agency is constructing a larger room upstairs with a more finished, start-up-made-good feel.

DIA’s iHUB is, of course, just the latest in the many workarounds to the way the Defense Department typically acquires products, which can take years to move through the bureaucratic layers. The Rapid Innovation Fund is another, as is, to a certain extent, the Defense Innovation Unit Experimental, or DIUx.Thanks to iHUB, Bolden says, it now takes no more than 88 days to get a request on Needopedia under contract.

www.defenseone.com

You Might Also Read:

The Next Big Conflict Will Turn On Artificial Intelligence:

Cyber War Calls For A New Look US Soldier:

Modern Fiction: A Novel Is Required Reading At The Pentagon:

US DoD Signals Silicon Valley's Importance in CyberWar:

 

« Google Acts Against Fake News
Cyber Should Be Standalone Insurance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Miller Group

Miller Group

Miller Group is an IT managed service provider. We proactively monitor and manage your entire business computer network. Services include backup & recovery and cyber security.

edgescan

edgescan

edgescan is a cloud-based continuous vulnerability management and penetration testing solution.

APrivacy

APrivacy

APrivacy provides information and communication security products for the financial services industry.

Institute for Cyber Security Innovation - Royal Holloway

Institute for Cyber Security Innovation - Royal Holloway

The Institute for Cyber Security Innovation aims to bring together Academia, Industry and Government to be a catalyst for applied research and innovation in cyber security policy and solutions.

CyberGreen Institute

CyberGreen Institute

The CyberGreen Institute is a global non-profit and collaborative organization conducting activities focused on helping to improve the health of the global Cyber Ecosystem.

Brainloop

Brainloop

Brainloop's security architecture enables you to work on and distribute strictly confidential documents both within and beyond the firewall.

Zymbit

Zymbit

Zymbit provides hardware security modules (HSM) for IoT devices, including Raspberry Pi and other single board computers.

Shift5

Shift5

Shift5 focus on securing operational technology (OT) by building best-in-class, dual-use products serving military and commercial entities.

Barikat Cyber Security

Barikat Cyber Security

Barikat is a provider of information security solution and services including security analysis and compliance, security testing, managed security services, incident response and training.

Active Countermeasures

Active Countermeasures

Active Countermeasures believe in giving back to the security community. We do this through free training, thought leadership, and both open source and affordable commercial tools.

Swiss It Security Group

Swiss It Security Group

Swiss It Security Group offers clients complete IT security concepts based on innovative solutions and technology, with a focus on protection, detection and defence.

ACSG Corp

ACSG Corp

ACSG Corp is a Critical Infrastructure Protection Company with a multi-disciplinary focus on building analytics software for various industry sectors.

DeNexus

DeNexus

DeNexus is the leading provider of cyber risk modeling for industrial networks. Our Mission is to build the Global Standard for Industrial Cyber Risk Quantification.

Seemplicity

Seemplicity

Seemplicity revolutionizes the way security teams work by automating, optimizing and scaling all risk reduction workflows in one workspace.

Ampcus Cyber

Ampcus Cyber

Ampcus Cyber specialize in providing comprehensive security solutions and services that are tailored to safeguard our clients' networks, infrastructure, and valuable assets.

CyberTest

CyberTest

CyberTest offers cybersecurity consulting and penetration testing services that helps organizations and businesses securing their assets.