8(A) National Security Showcase

Total Page:16

File Type:pdf, Size:1020Kb

8(A) National Security Showcase 2021 8(a) National Security Showcase Abstract Submissions and Biographical Sketches #8a SHOWCASE PRESENTED BY THANK YOU SUPPORTING ORGANIZATIONS SPONSORS JUNE 2021 Dear Colleagues, Time and again, our community has proven that we are stronger together. Whether collaborating across the public and private sector or between larger and smaller organizations, we understand the value of leveraging diverse perspectives to achieve mission priorities. INSA’s inaugural 8(a) National Security Showcase reflects this commitment to community and collaboration. For two days, June 8-9, we will help foster business partnerships between Intelligence Community (IC) agencies, prime contractors, venture capitalists, and 8(a) businesses. Together, we will build a stronger and more resilient IC. Companies designated under the 8(a) Business Development Program are small businesses principally owned by U.S. citizens who are socially and economically disadvantaged. Nearly 75 companies responded to INSA’s call for applications this spring, describing their innovative national security technologies, applications, or services. Thanks to the efforts of our Selection Committee, we narrowed the field to 24 companies who will showcase their innovations at our two-day program. I extend my deepest thanks to all the people and organizations that contributed to the success of this endeavor. Specifically, INSA’s Foundation (INSF), Technology and Innovation Council, Acquisition Management Council, and the Fort Meade Alliance as well as the National 8(a) Association for their partnership. In the subsequent pages, you will find all the Showcase applications, which include contact information, a description of the company’s experience, and capability overviews for each submission. Additionally, we have marked the 24 finalists who will present at INSA’s 2021 National Security Showcase. I encourage you to use this digital directory (and to share with colleagues!) to learn more about the many innovative capabilities offered by 8(a) companies, make connections, and help drive our national security mission forward. Letitia A. Long Chairman Intelligence and National Security Alliance INTELLIGENCE AND NATIONAL SECURITY ALLIANCE | ARLINGTON, VA 22203 | (703) 224-4672 THANK YOU Thank you to all the INSA members who supported this program! BRITNEY AMBERS JON LOVE PAUL CHI TESS PALAO JOHN FANT VIMESH PATEL TONY FRAZIER MARY QUINN LENORA GANT TERESA SMETZER ALEXIS KOVALCHICK SHAINA TURNER GARY LE HOWARD WEITZNER MAJA LEHNUS MEMBERS 2021 8(a) National Security Showcase | TABLE OF CONTENTS ADVANCED TECHNOLOGY Adaptive JASINT Consulting and 07 Tactics, LLC 19 Technologies, LLC Advent Business 09 Company, Inc. 21 Positive Psyche Biz Corp: NLP Logix 11 Azul Engineering 23 Spathe Systems Steel Point CP2S 13 25 Solutions Technology and geoConvergence, LLC Communication Systems 15 27 (TECOMSYS) z SofTech 17 INA Solutions, Inc. 29 Solutions, Inc. BUSINESS OPERATIONS ARServices, 32 Limited 42 SecureMedy, Inc. 34 Falcon Logic 44 System Thinking & Solutions Nemean Solutions, LLC TeamWorx 36 45 Security 38 RiverTech 47 Xenia Systems, LLC 40 S&K Mission Support (SKMS) 2021 8(a) National Security Showcase | TABLE OF CONTENTS CYBER 50 Aperture 69 FragCity, Inc. 52 Blue Clarity 71 G2IT, LLC 54 Comcentia 73 HighCloud Solutions 56 CyberAdjust 75 Kriaanet, Inc. 58 Def-Logix, Inc. – ENTRAP 77 Lion Federal, LLC 60 Def-Logix, Inc. – SHIMMIX 79 Lock4, LLC Def-Logix, Inc. – NetSecurity Corporation 62 STORM HOPPER 81 Def-Logix, Inc. – Suvi Global Services 64 UNIVERSAL AGENT 83 66 Ethic Tech, LLC 85 ZRS Solutions, LLC 2021 8(a) National Security Showcase | TABLE OF CONTENTS DATA SCIENCE & DATA ANALYTICS JCTM, LLC – Bestica, Inc. Operational Case-based 88 111 Knowledge Graph BluePath Nyla Technology 90 Labs 113 Solutions Blue Sky Innovative Pueo Business Solutions 92 Solutions, LLC 115 BreakForth Solutions RestonLogic, LLC 95 Incorporated (BSi) 117 97 BrightPoint, LLC 119 Secure Innovate Technology Corp Cinteot, Inc. Square Peg 99 121 Technologies Def-Logix, Inc. – TDX International 101 ANSSA 123 103 Echelon Xcelerate, JC, LLC (EXJC) 125 Tigua-JTEK 105 Fantom Corporation 127 VG IT Services 107 ITConcepts, Inc. 129 Wovenware, Inc. 109 JCTM, LLC – Perspective ADVANCED TECHNOLOGIES 2021 8(a) National Security Showcase #8a SHOWCASE The Intelligence and National Security Alliance 8(a) National Security Submission Deadline: 9:00 am ET on Friday, April 9 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary. N Company Details S S Company Name: Adaptive Tactics, LLC Website URL: https://AdaptiveTactics.com/ Mailing Address: 5692 John Givens RD Attach a cover page to your application that inlcudes: Crestview FL 32539 My company is an SBA 8(a) certified small business: Yes No Date Certified: 03/10/2014 Primary Point of Contact Name: Shane Cornell Title: President Organization: Adaptive Tactics Email: [email protected] Phone: 850-800-6006 Government Contracting Experience In the fields below, please indicate whether your organization has contracted with either federal or state agencies (in the past five years). Previous experience as a: Prime Subcontractor Other If permitted, which agencies/primes did you support? NAVSEA, AFMC, SAIC, Army, Air Force, Marines, TSA If applicable, identify classified level: TS/SCI TS S If permitted, location of contracting experience (e.g. D.C., Denver, Huntsville, San Antonio, St. Louis): San Diego, CA Naval Base; Tinker AFB; (key team members at TS/SCI level for IC in Virginia) Ft Polk LA, Moody AFB, Eglin AFB, Egg Harbor NJ @INSAlliance www.INSAonline.org BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 7 Submission Description Describe the national security related technology, application, or service you wish to showcase for this event with an emphasis on what makes it innovative (150 words). Adaptive Tactics LLC implements Adaptive Intelligence [AI] solutions that apply adaptive models & algorithms to solve hard multi-source physical & cyber intelligence, surveillance, & reconnaissance (ISR) problems. Our team of signal processing, machine intelligence, data science, software, & data engineers provide the ideal combination of skills to solve ISR problems and support their integration. Our software & methods lead the way to the 24 capabilities beyond current second wave of machine intelligence (2MI) methods, which employ static models & algorithms. 2MI is insufficient for complex intelligence problems where the context, adversarial operations, & composition of problems is continually changing. Our enhanced decision-making capabilities are augmented by revealing meaningful patterns in data; while providing transparency that enables humans to understand the basis of recommendations. We want to apply our third & fourth wave of machine intelligence (3MI & 4MI) methods to intelligence community (IC) problems, with a focus on mission relevant data summarization. We have previously demonstrated in Navy and Air Force contracts that this results in three orders of magnitude less data (i.e., 2000X compression) without loss of mission relevant information. Discuss how your technology, application, or service advances the national security mission. Possible mission focus areas include artificial intelligence/machine learning, cybersecurity, high-performance computing, sensors, emerging technologies, language services, and IT services (150 words). Our software & methods advance national security by implementing adaptive intelligence (AI) to provide more robust, higher fidelity, & explainable machine intelligence for physical & cyber intelligence applications. Our distributed compute implementation is designed for hybrid cloud or high-performance compute platforms to process huge volumes of multi-source data from sensors, legacy systems, or human observations. Our live introspection of normalized data ontologies provides deeper understanding of data statistical change over time that is then used to dynamically adapt models & algorithms to maintain robust performance. We believe that current static models & algorithms poorly effect reality over time, due to changing context. By eliminating black-box solutions, we provide deeper insight into the validity of models & algorithms that are underpin machine intelligence applications. In addition, by more effectively summarizing the mission relevant activity, we make it easier for both humans and machines to understand what is actually happening in a complex system and where to look next to resolve issues. Presenter(s) Biographical Information With this application, please include a professional CV (no more than one page) of the main presenter and a co-presenter, if applicable. Evaluation Criteria Applications will be evaluated based on innovation and advancement of the national security mission. Application Submission Please send your completed application and accompanying documentation to [email protected]. Submission Deadline: 9:00 am ET on Friday, April 9 Questions? Contact us at [email protected] @INSAlliance www.INSAonline.org BACK TO TOC Intelligence and National Security Alliance | INSAonline.org | @INSAlliance | 8 The Intelligence and National Security Alliance 8(a) National Security Submission Deadline: Wednesday, March 31, 2021 Please Note: Only 8(a) businesses are eligble to participate. Additionally, all submissions must be unclassified and nonproprietary. Company Details Company Name:
Recommended publications
  • Universal GEOINT Credentialing Christopher K
    GEOINT ESSENTIAL BODY OF KNOWLEDGE Transparent Transportable TransIndustry USGIF is a 501(c)(3) non-lobbying, nonprofit educational foundation dedicated to promoting the geospatial intelligence tradecraft and developing a stronger community of interest between Government, Industry, Academia, and Professional Organizations. Almost 500 students Twelve Accredited Geospatial have graduated from Intelligence Certificate Programs Northeastern West Point USGIF-accredited Penn State U. of Utah programs with George Mason UM Columbia Air Force GEOINT Certificates. Redlands Academy Fayetteville State USC UT Dallas U. of South Carolina Did you know USGIF offers hundreds of hours of training, education, and professional development opportunities throughout the year? in Scholarships $792K awarded since 2004 u S gif Monograph Serie S V o L u M e 1 USGIF in 2014 published the Human Geography monograph as a community resource. Socio-Cultural Dynamics and USGIF is developing the first GEOGRAPHYChallenges to Global Security Darryl G. Murdock, Robert R. Tomes and Universal GEOINT Credentialing Christopher K. Tucker, editors Program to bolster profesional development in the GEOINT tradecraft. USGIF produces the GEOINT Symposium, the largest intelligence event in the world. Sustaining Member 240 Organizations TEN YEARS Launched in 2012 as USGIF’s first official print magazine. GEOINT ESSENTIAL BODY OF KNOWLEDGE SECTION I The GEOINT Essential Body of Knowledge �� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � 3 Transparency and Transportability
    [Show full text]
  • From Air, Sea, and Space, Geospatial Technology Is Helping Nations Monitor One of Their Biggest and Most Understated Threats: the Open Ocean
    » CARDILLO AND LONG Q&A » FUTURE GEOINT LEADERS » SMALLSAT WORKING GROUP 2014 ISSUE 4 THE OFFICIAL MAGAZINE OF THE UNITED STATES GEOSPATIAL INTELLIGENCE FOUNDATION WATCHING THE 2014 USGIF MEMBERSHIP DIRECTORY WATERFrom air, sea, and space, geospatial technology is helping nations monitor one of their biggest and most understated threats: the open ocean. © DLR e.V. 2014 and © Airbus 2014 DS/© DLR Infoterra e.V. GmbH 2014 WorldDEMTM Reaching New Heights The new standard of global elevation models with pole-to-pole coverage, unrivalled accuracy and unique quality to support your critical missions. www.geo-airbusds.com/worlddem CONTENTS 2014 ISSUE 4 The USS Antietam (CG 54), the USS O’Kane (DDG 77) and the USS John C. Stennis (CVN 74) steam through the Gulf of Oman. As part of the John C. Stennis Carrier Strike Group, these ships are on regularly scheduled deployments in support of Maritime Operations, set- ting the conditions for security and stability, as well as complementing counterterrorism and security efforts to regional nations. PHOTO COURTESY OF U.S. NAVAL FORCES CENTRAL COMMAND/U.S. 5TH FLEET 5TH COMMAND/U.S. CENTRAL FORCES NAVAL U.S. OF COURTESY PHOTO 02 | VANTAGE POINT Features 12 | ELEVATE Tackling the challenge of Fayetteville State University accelerating innovation. builds GEOINT curriculum. 16 | WATCHING THE WATER From air, sea, and space, geospatial technology 14 | COMMON GROUND 04 | LETTERS is helping nations monitor one of their biggest USGIF stands up SmallSat Trajectory readers offer Working Group. feedback on recent features and most understated threats: the open ocean. and the tablet app. By Matt Alderton 32 | MEMBERSHIP PULSE Ball Aerospace offers 06 | INTSIDER 22 | CONVEYING CONSEQUENCE capabilities for an integrated SkyTruth and the GEOINT enterprise.
    [Show full text]
  • Overhead Surveillance
    Confrontation or Collaboration? Congress and the Intelligence Community Overhead Surveillance Eric Rosenbach and Aki J. Peritz Overhead Surveillance One of the primary methods the U.S. uses to gather vital national security information is through air- and space-based platforms, collectively known as “overhead surveillance.” This memorandum provides an overview of overhead surveillance systems, the agencies involved in gathering and analyzing overhead surveillance, and the costs and benefits of this form of intelligence collection. What is Overhead Surveillance? “Overhead surveillance” describes a means to gather information about people and places from above the Earth’s surface. These collection systems gather imagery intelligence (IMINT), signals intelligence (SIGINT) and measurement and signature intelligence (MASINT). Today, overhead surveillance includes: • Space-based systems, such as satellites. • Aerial collection platforms that range from large manned aircraft to small unmanned aerial vehicles (UAVs). A Brief History of Overhead Surveillance Intelligence, surveillance and reconnaissance platforms, collectively known as ISR, date back to the 1790s when the French military used observation balloons to oversee battlefields and gain tactical advantage over their adversaries. Almost all WWI and WWII belligerents used aerial surveillance to gain intelligence on enemy lines, fortifications and troop movements. Following WWII, the U.S. further refined airborne and space-based reconnaissance platforms for use against the Soviet Union. Manned reconnaissance missions, however, were risky and could lead to potentially embarrassing outcomes; the 1960 U-2 incident was perhaps the most widely publicized case of the risks associated with this form of airborne surveillance. Since the end of the Cold War, overhead surveillance technology has evolved significantly, greatly expanding the amount of information that the policymaker and the warfighter can use to make critical, time-sensitive decisions.
    [Show full text]
  • Unmanned Systems Sentinel
    Unmanned Systems Sentinel All opinions expressed within this newsletter are those of the respective author or authors and do not represent the official policy or positions of the Naval Postgraduate School, the United States Navy, or any other government entity. Approved for public release; distribution is unlimited. Thanks to Robin Alexander, Mark Rindler and Marcy Huber for providing several of the below articles. 22 MAY 2016 Please keep in mind that in most instances the below summaries are excerpts from the original article. The full articles can be viewed at the accompanying hyper-links. The inclusion of these links does not represent an endorsement of the organization, service, or product. Immediately below are this edition’s highlights with links to the respective articles: NAVY/USMC: AeroVironment details Blackwing UAS (Navy to Deploy Submarine-Launched Drones) Navy Researchers to Test UAV Swarming Technology this Summer USN Expects More Development of Stingray Timeline This Year ARMY: US Army Special Operations Has Big Appetite for ISR – UAS Army tests prepare for all-domain warfare US Army tests GBSAA system Army Mulls Hybrid Electric for Next Gen Drones USAF: USAF’s Small UAS roadmap calls for swarming ‘kamikaze’ drones USAF to go small on UAS NATIONAL AIR SPACE: California has the Most Drones in US (Excellent tables and illustrations) FAA Expands Drone Detection Pathfinder Initiative FAA Key Initiatives – UAS FAA Releases Drone Registration Location Data FAA and FBI Test Drone Detection A Look Back at April Drone Law Developments:
    [Show full text]
  • Download File
    Remote Controlled Restraint The Effect of Remote Warfighting Technology on Crisis Escalation Erik Lin-Greenberg Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2019 © 2019 Erik Lin-Greenberg All rights reserved ABSTRACT Remote Controlled Restraint: The Effect of Remote Warfighting Technology on Crisis Escalation Erik Lin-Greenberg How do technologies that remove warfighters from the front lines affect the frequency and intensity of military confrontations between states? Many scholars and policymakers fear that weapons that reduce the risks and costs of war – in blood and treasure – will lead states to resort to force more frequently during crises, destabilizing the international security environment. These concerns have featured prominently in debates surrounding the proliferation and use of remote warfighting technologies, such as drones. This project sets out to evaluate whether and how drones affect crisis escalation. Specifically, do drones allow decisionmakers to deploy military forces more frequently during interstate crises? Once deployed, how do these systems affect escalation dynamics? I argue that drones can help control escalation, raising questions about scholarly theories that suggest the world is more dangerous and less stable when technology makes conflict cheaper and less risky. At the core of this project is a theory of technology-enabled escalation control. The central argument is that technologies like drones that remove friendly forces from the battlefield may lead states to use force more frequently, but decrease the likelihood of escalation when used in lieu of inhabited platforms. More specifically, these technologies lower the political barriers to initiating military operations during crises, primarily by eliminating the risk of friendly force casualties and the associated domestic political consequences for launching military operations.
    [Show full text]
  • Perspectives and Opportunities in Intelligence for U.S. Leaders
    Perspective EXPERT INSIGHTS ON A TIMELY POLICY ISSUE September 2018 CORTNEY WEINBAUM, JOHN V. PARACHINI, RICHARD S. GIRVEN, MICHAEL H. DECKER, RICHARD C. BAFFA Perspectives and Opportunities in Intelligence for U.S. Leaders C O R P O R A T I O N Contents 1. Introduction ................................................................................................. 1 2. Reconstituting Strategic Warning for the Digital Age .................................5 3. Unifying Tasking, Collection, Processing, Exploitation, and Dissemination (TCPED) Across the U.S. Intelligence Community ...............16 4. Managing Security as an Enterprise .........................................................25 5. Better Utilizing Publicly Available Information ..........................................31 6. Surging Intelligence in an Unpredictable World .......................................44 7. Conclusion .................................................................................................56 Abbreviations ................................................................................................57 References ....................................................................................................58 Acknowledgments ........................................................................................64 About the Authors .........................................................................................64 The RAND Corporation is a research organization that develops solutions to public policy challenges to help make
    [Show full text]
  • Bottom Line up Front Trends & Issues GEOSPATIAL INTELLIGENCE A
    GEOSPATIAL INTELLIGENCE A REVOLUTION IS UNDERWAY JUNE 2015 Bottom Line Up Front In the not-too-distant past, imaging from space was the sole provenance of governments, and governments were also the primary drivers of geospatial demand and innovation; however, with the proliferation of technology, the commercial world is now taking a more prominent role in both, shifting the focus from intelligence to information. Today the commercial world is taking notice of the competitive advantage that geospatial information can create for businesses, and the lifestyle impact that it can have on everyday consumers. This recognition has caused the demand for geospatial information to grow exponentially from both government and commercial consumers. But, importantly, the change has also started to shift where innovations are born. “Non-traditional” companies, such as Google and Amazon, and new entrants are bringing a revolution through new talent, ideas, innovations, and applications to the geospatial marketplace. Trends & Issues GEOSPATIAL CAPABILITIES PROLIFERATE, GOING MAINSTREAM As technologies advance and accessibility improves, the impact of and demand for geospatial intelligence has increased significantly over the last decades. Geospatial information is going mainstream and that has caused a paradigm shift where vt innovation is born. In the future, look for the government to rely more heavily on “non-traditional” companies for leap ahead capabilities. TECHNOLOGY MATURITY EXPANDS MARKET, CREATING DEMAND Precision GPS, advanced algorithms, mobile computing, big data analytics and cloud computing are just some of the recent technological developments that have allowed geospatial data to accelerate in value. As new applications for location-based services and location-based intelligence are developed, demand will grow in both the government and commercial markets.
    [Show full text]
  • Overnance & Information Infrastructure
    Price: INR / US$ 150 Subscriber’s 15 copy. Not for Sale Your Geospatial i ndustrY Ma Gazine GEOSPATIALTM WORLD Publication: 10 R.N.I No - UPENG/2010/34153; Registration no: UP/GBD-136/2014-16 FebruaRy 2014 » VOLUme 04» ISSUe 07 | ISSN 2277–3134 www.geospatialworld.net th of every month I Posting: 15 of every month I Posting: th / 20 th of every month OVERNANCE & INFORMATION INFRASTRUCTURE SDI - Quo Vadis? | P. 24 INSPIRE - Towards a Participatory Digital Earth | P. 32 Back to the Future: US NSDI Shows the Way | P. 42 Shaping smart change through Smart Solutions Hexagon operates on the strength of our foundation – best-in-class technologies that produce solutions to transform how critical industries tackle increasingly diffi cult challenges. Built from custom combinations of our geospatial and industrial technologies, Hexagon Smart Solutions support four key areas – safety, infrastructure, resources and manufacturing – helping customers focus on smarter ways to protect and provide for the public, build and maintain industrial facilities, optimise resources and manufacture essentials for everyday life. With decades of experience in the geospatial industry, Hexagon offers a comprehensive geospatial portfolio that captures the constant, real-time changes of our dynamic earth through satellite imagery, terrestrial and aerial photography, remote sensing, CAD and GIS. SAFETY INFRASTRUCTURE RESOURCES MANUFACTURING © Copyright 2014 Hexagon. All rights reserved. IGF Double Ad.indd 2 1/30/2014 9:43:16 AM Modernising the geospatial experience Fusing real-world and digital-world data provides the power of information. Hexagon is at the forefront of this fusion, offering a comprehensive geospatial portfolio that gives customers control of important decision-making processes.
    [Show full text]
  • NATIONAL INTELLIGENCE UNIVERSITY College of Strategic
    NATIONAL INTELLIGENCE UNIVERSITY This Briefing is Classified: College of Strategic Intelligence Academic Program Review MCR 601: Intelligence and the Global Strategic Environment NATIONAL INTELLIGENCE UNIVERSITY DATE National Intelligence University - MSSl/BSI Curriculum Ma Program Learning Outcomes List {see previous slide for full verbiage 2 Please identify the 1. Global I · Strategy 13. IC Strategic 14. Critical and I 5. Leadership 6. Joint and . 0eve 1opment C b. d C . d balance of theory and Secunty d apa 111t1es an reat1ve an lnteragency application in course Environment an . Constraints Thinking Skills Management Environment 1mp 1ementat1on content. Dej!artments Courses Lea rning Outcome Coverage: 3 = Well Covered, 2 = Partially Covered, 1 = Minimally Covered, 0 = Not Covered Theo Totals CSI Program MCR-601 3 1 1 3 1 2 35% 65% 11 Totals Learning Outcome Coverage Level: 3 =Well Covered, 2 =Partially Covered, 1 =Minimally Covered, 0 =Not Covered 11. The course addresses multiple aspects of the Global Strategic Environment from a functional and regional perspective. ustification: . Th e course addresses strategy development and implementation but in an ancillary manner. More so from a development perspective than n implementation manner. Course does not teach intelligence collection or dissemination but analysis is somewhat addressed when discussing complexities associated ith security challenges that defy t raditional intelligence disciplines (e.g., how does the IC address climate change? 2"d and 3rd order analysis nd discussion of unintended consequences related to course equities does occur) . Students must exercise critical thinking skills in each assignment and in classroom discussion . This is minimally covered although some in our ci rcle believe NIPF coverage in the course should elevate this score to a 2 .
    [Show full text]
  • The Australian Intelligence Community
    Tom Nobes | The Emergence and Function of the Australian Intelligence Community The Australian Intelligence Community: Why did the AIC emerge the way it did and how well has it served the nation? TOM NOBES The Australian Intelligence Community (AIC) emerged in the Commonwealth executive branch of state throughout the 20th century, methodically reconfiguring in response to royal commission and government review recommendations. The AIC’s structure continues to be altered today in the face of ‘an increasingly complex security environment’.1 Such reconfiguration has been necessary in order to create a more effective and accountable AIC that serves the executive government by protecting Australian security and safety interests. Today, the AIC agencies work within a largely legislative framework, informed by liberal ends and values that balance individual liberty and privacy against communal security and peace.2 The AIC consists of six agencies today; the Australian Security Intelligence Organisation (ASIO), the Australian Secret Intelligence Organisation (ASIS), the Australian Signals Directorate (ASD), the Defence Intelligence Organisation (DIO), the Australian Geospatial-Intelligence Organisation (AGO) and lastly the Office of National Assessments (ONA).3 This essay will briefly outline the development of the AIC over the last 100 years, and then discuss in detail why it emerged in the way that it did. Particular emphasis will be placed on the changes that occurred as a result of the Royal Commission on Intelligence and Security (1974-1977), the Protective Security Review (1979) and the Royal Commission on Australia’s Security and Intelligence Agencies (1984). The essay will then proceed to analyse the ways in which the AIC has, and hasn’t, served the nation.
    [Show full text]
  • Unmanned Aerial Vehicles and Uninhabited Combat Aerial Vehicles
    Defense Science Board Study on Unmanned Aerial Vehicles and Uninhabited Combat Aerial Vehicles February 2004 Office of the Under Secretary of Defense For Acquisition, Technology, and Logistics Washington, D.C. 20301-3140 This report is a product of the Defense Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the Secretary of Defense. Statements, opinions, conclusions and recommendations in this report do not necessarily represent the official position of the Department of Defense. This report is UNCLASSIFIED. OFFICE OF THE SECRETARY OF DEFENSE 3140 DEFENSE PENTAGON WASHINGTON, DC 20301-3140 DEFENSE SCIENCE BOARD MEMORANDUM FOR THE ACTING UNDERSECRETARYOF DEFENSE (ACQillSmON, TECHNOLOGY AND LOGISTICS) SUBJEcr: Reportof the DefenseScience Board Task Force on UnmannedAerial Vehicles and UninhabitedCombat Aerial Vehicles I am pleasedto forward the final report of the DSB Task Force on UnmannedAerial Vehicles (UA V) and UninhabitedCombat Aerial Vehicles (UCA V). This Task Force was tasked to evaluatethe current statusof the UA Vs and UCA Vs and provide recommendationson how to betterintegrate UA Vs and UCA Vs into the force structure. The Task Force concludedit is time for the Departmentof Defenseand the Services move forward and makeUA Vs and UCA Vs an integral part of the force structure,not an "additional asset". To do so requiresappropriate planning, appropriate budgeting, and continuedmanagement attention from the Departmentof Defenseand Serviceleadership. The Task Force's findings and recommendationsfall into eight subjectareas: Introduction of UA Vs into the force structure VA V unit productioncosts UA V mishaprates Communicationsconstraints UA V interoperability and mission management Integrationof UA Vs into national airspace Focustechnology investments Reductionof UA V combatvulnerability I endorseall of the recommendationsof the Task Force and proposethat you review the Task Force Co-Chainnen's letter and the report.
    [Show full text]
  • SSCI 579, Geospatial Intelligence Tradecraft
    SSCI 579, Geospatial Intelligence Tradecraft Syllabus Units: 4 Term — Day — Time: Spring, 2019, Online Location: Online Instructor: COL [R] Steven D. Fleming, Ph.D. Office: AHF B57G Office Hours: Tuesdays 8:00‐9:00 am and Thursdays 9:00- 10:00 am PT, and by appointment at other times. I am always available asynchronously via email. I am also available for synchronous chats via phone, IM text, and audio/video conferences on most days and times by prior arrangement via email. Contact Info: [email protected], 213‐740‐7144 and https://bluejeans.com/2507438970/ Library Help: Andy Rutkowski Office: VKC 36B Office Hours: Tuesdays 10 am-noon and Thursdays 4:30- 5:30 pm PT Contact Info: [email protected], 213-740-6390, http://bit.ly/andyhangout IT Help: Richard Tsung Office: AHF 146 Office Hours: By appointment Contact Info: [email protected], 213‐821‐4415 (office) Syllabus for SSCI 579, Page 1 of 13 Course Scope and Purpose This course is a required capstone for the Graduate Certificate in Geospatial Intelligence and provides students with the requisite knowledge and practical skills to inform effective decision‐making in a variety of human security settings. Threats to human security come in many forms, including military operations, terrorist attacks, genocide, political violence, natural disasters, humanitarian crises, environmental risks, public health issues, and food/resource accessibility challenges. This class leverages a variety of geospatial technologies with intelligence tradecraft to develop intelligence products that support national security, disaster response, and humanitarian relief efforts. The geospatial intelligence approach is often referred to as tasking, collection, processing, exploitation, and dissemination (TCPED), and the results are used to inform and support more effective decision‐making.
    [Show full text]