Unclassified Intel for Spies?
There’s an App for That
The National Geospatial-Intelligence
Agency (NGA) now delivers unclassified geospatial intelligence (GEOINT)
to verified government users from an
app on tablets and mobile devices.
Tearline, available through the Apple
Store and Google Play, is open to the
intelligence community, U.S. Defense
Department, allies and academic and
private-sector partners sponsored into
the NGA’s system.
Tearline answers intelligence questions using only unclassified tools,
data, information technology and services available in the commercial and
open source world.
NGA’s GEOINT Pathfinder project
developed the app. The shell is distributed by the app stores, but from
that point, users need credentials to
access secure servers. Because security clearances were not a prerequisite
for joining Pathfinder, the team was
able to use diverse talent pools to create Tearline. For example, an intern
from Thomas Jefferson High School
for Science and Technology, located
in Northern Virginia near the NGA’s
headquarters, coded the Android app.
Interested parties from the Defense
Department, intelligence community
and partner nations can email oss@
nga.mil for log-in instructions.
The U.S. Department of Homeland
Security’s Science and Technology
Directorate (S&T) will be taking a malware detection technology called Hyperion to the commercial marketplace.
Hyperion, initially developed by the
Department of Energy’s Oak Ridge
National Laboratory, is designed to
spot malicious behavior in software
not previously identified as a threat.
Lenvio, a cybersecurity firm based in
Manassas, Virginia, has licensed the
Through the Transition to Practice
(TTP) program, Hyperion was licensed
nonexclusively by R&K Cyber Solu-
tions in 2015. R&K spun off its Hyper-
ion business to form Lenvio in 2016
to focus on further development and
commercialization. Through this exclu-
sive license, Lenvio will now be able
to position the Hyperion platform as a
competitive product and keep growing
All vendors, contractors, subcontractors, suppliers and service providers using or qualified to use the Navy
Commercial Access Control System
(NCACS) are being transitioned to the
Defense Biometric Identification System (DBIDS). The transition applies to
installations in the continental United
States, Hawaii and Guam.
DBIDS enhances installation security
and communications by updating the
system’s database more frequently with
information about personnel/credential
status, law enforcement warrants, lost or
stolen cards and force-protection conditions. It provides continuous vetting
each time the DBIDS card is scanned at
an installation entry point.
NCACS cardholders must change to
the biometric credentialing system by
July 15 at the local base Visitor Control Center to access naval bases. Providers who do not have an NCACS
card will have up to 180 days to obtain
DBIDS credentials. Individuals with
U.S. Defense Department-approved
sponsorship to conduct business with
the Navy and/or tenant commands
aboard a Navy installation but are not
eligible for a common access card also
can apply for a DBIDS card.
New Cyber Center Synchronizes Service
A new defensive cyberspace operations facility at Joint Base San Antonio
will boost the 35th Intelligence Squadron’s ability to meet growing demands for
analysis of intelligence from multiple sources. Although located in Texas, the
Cyberspace Threat Intelligence Center (CTIC) will aid operations worldwide.
In 2015, the squadron’s support to the defensive cyberspace operations community increased by more than 300 percent, which led to the need for the new
facility, says Lt. Col. Matthew Castillo, USAF, commander, 35th Intelligence
With the new facility and revised staff structure, squadron members can
now synchronize and prioritize intelligence activities. They will be able to
better manage cross-organizational capabilities and information sources,
improving intelligence reporting, Col. Castillo says.