Risk
9/28/2011
01:23 PM
50%
50%

CIA Invests In Semantic Search, Wireless Networking

In-Q-Tel is partnering with NetBase and Connectify to make semantic search and virtual VPN technology available to the U.S. intelligence community.

Government Innovators
Slideshow: Government Innovators
(clickimage for larger view and for full slideshow)
The CIA is investing in next-generation search and remote wireless networking technologies that will enhance the technological capability of the U.S. intelligence community.

In-Q-Tel, a CIA-based nonprofit that identifies emerging technologies, is partnering with NetBase and Connectify to add semantic search and technology that turns PCs into Wi-Fi networks, respectively, to the cache of technologies available to intelligence agencies.

NetBase offers software as a service that can search by sentence to identify contextual meanings of words, and organize searches in the context of a specific set of questions relevant to a discipline or a particular audience, according to In-Q-Tel. This type of search is seen as a game changer for how people search for information, although it is used alongside rather than to replace conventional search methods.

The CIA and other intelligence agencies can use NetBase's technology to streamline how they search for information internally, according to In-Q-Tel. They also can integrate it into existing search techniques already used by the intelligence community to add a new layer of search capability for the agencies and partners that need to access intelligence information.

[ The CIA needs all the tech help it can get. Read LulzSec Claims Credit For CIA Site Takedown. ]

Philadelphia-based Connectify will leverage an In-Q-Tel's investment to further develop its virtual VPN software, which allows users to turn PCs into secure Wi-Fi hotspots with one click, according to the nonprofit.

Once a PC is enabled as a Connectify Hotspot, other users with security access to it can leverage the connection from laptops, tablets, or smartphones while working remotely or traveling, according to In-Q-Tel.

In-Q-Tel's interest in helping Connectify further develop its technology comes after it already has garnered great interest by private-sector companies, said In-Q-Tel CTO William Strecker in a statement.

The CIA launched In-Q-Tel in 1999 as an independent entity to find useful new technologies to support the intelligence community's mission. The nonprofit has made a flurry of investments lately, including partnerships with vendors that provide computer-screen security, cloud computing-based storage and secure virtualization technology.

The vendors, contractors, and other outside parties with which you do business can create a serious security risk. Here's how to keep this threat in check. Also in the new, all-digital issue of Dark Reading: Why focusing solely on your own company's security ignores the bigger picture. Download it now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4467
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3, does not properly determine scrollbar boundaries during the rendering of FRAME elements, which allows remote attackers to spoof the UI via a crafted web site.

CVE-2014-4476
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulner...

CVE-2014-4477
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulner...

CVE-2014-4479
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulner...

CVE-2014-4480
Published: 2015-01-30
Directory traversal vulnerability in afc in AppleFileConduit in Apple iOS before 8.1.3 and Apple TV before 7.0.3 allows attackers to access unintended filesystem locations by creating a symlink.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.