The Department of Defense (DoD) on Tuesday released a justification and approval (J&A) document that says DoD is expanding the scope of the contract for its Electronic Health Record (EHR) system known as MHS Genesis. The document says that the contract must be expanded to achieve “a single standard baseline solution” with the new Department of Veterans Affairs EHR and also to incorporate the U.S. Coast Guard into the DoD EHR. […]

Congress, in its conference report for the National Defense Authorization Act for FY 2019 released earlier this week, is demanding more transparency from the Pentagon regarding the agency’s Joint Enterprise Defense Infrastructure (JEDI) cloud contract. […]

The Department of Defense is taking a more concerted approach to the development and use of artificial intelligence (AI) by bringing AI projects under one roof and emphasizing the importance of working with industry and academia. At the same time, DoD is also recognizing that it needs to give ethics a seat at the table. […]

After the National Defense Authorization Act (NDAA) for FY 2019 cleared a major hurdle late yesterday with the release of a conference report that reconciles differences between House and Senate versions of the bills, techies across the Federal government are finding that IT modernization and innovation amendments for the Pentagon fared well in the legislation. […]

The National Defense Authorization Act (NDAA) for FY 2019 took a big step toward passage with the release of the conference report late yesterday that unifies House and Senate NDAA legislation and places in sharp focus concerns about growing cyber and electronic warfare threats and ways that the United States should address them. […]

A new Defense Department (DoD) Risk Management Framework (RMF) – due to be delivered to agency leaders in roughly seven weeks – will have strong implications for the way the department’s cybersecurity professionals perform their tasks, according to John Bergin, IT and Business System Reform Lead at DoD. […]

It’s the Monday after a 6-goal barnburner in the World Cup final, a torrential downpour trophy ceremony, and we’ve now entered the era of existential dread for the world’s soccer fans. Reality sets in. It’s four years until the world’s biggest sporting event comes back around. […]

The term “information warfare” might call to mind Russian trolls exploiting social media, but there has always been a lot more to it than disinformation campaigns on Twitter, or for that matter the airborne propaganda leaflets or Tokyo Roses of wars gone by. Information warfare, or IW, is a key element of every military operation. It spans cyberspace and the electromagnetic spectrum, involving communications of all kinds such as Global Positioning System readings and satellite operations, as well as economic transactions, every level of surveillance, and old-school radio and TV. […]

Alexander Kott, chief scientist at the U.S. Army Research Laboratory, said Wednesday at the Defense Systems Summit that creating artificial intelligence (AI) and machine learning (ML) solutions for complex battlefield environments requires different prioritization than commercial solutions, and offered four tips for defense organizations looking to implement. […]

Department of Defense (DoD) Chief Information Officer Dana Deasy said today at the Defense Systems Summit that he has identified four “key strategic areas” that will work to support the National Defense Strategy (NDS). Those four areas – cloud, artificial intelligence, C3 (command, control, and communications), and cybersecurity – are organized not in order of importance, but rather “order of integration,” Deasy said, with each of the priorities flowing from the prior one. […]

Paul Craft, director of operations at the Joint Force Headquarters Department of Defense Information Network (JFHQ-DoDIN), spoke today at the Defense Systems Summit about how his relatively new component of U.S. Cyber Command is now tasked with operating and securing the entirety of DoD’s sprawling IT network infrastructure and has undertaken a complete restructuring of network operations for all of DoD. […]

Dana Deasy, chief information officer at the Department of Defense (DoD), said today at the Defense Systems Summit that he would not commit to an official release date for the finalized request for proposal (RFP) for DoD’s Joint Enterprise Defense Infrastructure (JEDI) cloud contract. […]

Even as Apple went public yesterday with a new mobile device operating system intended to close security loopholes that law enforcement agencies were using to access locked devices, one digital forensics firm said it found a workaround to bypass the new security features for a cost of about forty bucks. […]

The White House isn’t doing enough to address in a public forum a range of artificial intelligence issues and needs to institute a public process to seek comments on AI-related issues, said a group of six industry groups and more than 80 individuals from academia and the private sector in a July 4 letter to the White House Office of Science and Technology Policy (OSTP). […]

The Department of Homeland Security (DHS) is piloting a new artificial intelligence (AI) initiative with Canada’s Department of National Defense that kicked off today and aims to provide first responders and paramedics with information to help make potential life-saving decisions in the field. […]

To celebrate Independence Day, the Department of Defense (DoD) released its Digital Engineering Strategy on Wednesday. The strategy “promotes the use of digital representations of systems and components and the use of digital artifacts to design and sustain national defense systems,” DoD said. […]

The potential of artificial intelligence opens up the abundant future of game-changing machine-based applications in science, medicine, national defense, business, and just about every other area. But getting there while maintaining the U.S. lead in AI research and development will hinge on two old-school constants of innovation: money and people. […]

Amid growing fears of large-scale cyberattacks–ranging from attacks on infrastructure, to cyber espionage that threatens national security, to a “terabyte of death”–Congressional lawmakers are calling for a more clearly defined strategy for responding to such attacks. […]

The National Defense Authorization Act (NDAA) for FY2019 will head into conference next week when legislators return from the Fourth of July recess. The $700+ billion must-pass defense spending bill has been approved in both the House and Senate, and now the two chambers must come together to reconcile differences in the legislation and re-vote the unified bill before it can land on President Trump’s desk for signing. […]

Leaders in the Federal intelligence community, speaking last Tuesday at Defense One’s Tech Summit, said that their agencies are using vast stores of data, machine learning, and neural networks to go beyond simple fact-finding, to now radically re-envision how the intelligence community acts on credible information. But with these advances in technology come thorny new ethical and procedural questions, those officials said. […]

With cybersecurity threats on the rise, most recently seen in a Chinese hack of a Navy contractor, the Department of Defense is taking new steps to ensure security, in part by putting more of the onus on contractors. […]

Categories