Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

CIA Invests In Semantic Search, Wireless Networking

In-Q-Tel is partnering with NetBase and Connectify to make semantic search and virtual VPN technology available to the U.S. intelligence community.

Government Innovators
Slideshow: Government Innovators
(clickimage for larger view and for full slideshow)
The CIA is investing in next-generation search and remote wireless networking technologies that will enhance the technological capability of the U.S. intelligence community.

In-Q-Tel, a CIA-based nonprofit that identifies emerging technologies, is partnering with NetBase and Connectify to add semantic search and technology that turns PCs into Wi-Fi networks, respectively, to the cache of technologies available to intelligence agencies.

NetBase offers software as a service that can search by sentence to identify contextual meanings of words, and organize searches in the context of a specific set of questions relevant to a discipline or a particular audience, according to In-Q-Tel. This type of search is seen as a game changer for how people search for information, although it is used alongside rather than to replace conventional search methods.

The CIA and other intelligence agencies can use NetBase's technology to streamline how they search for information internally, according to In-Q-Tel. They also can integrate it into existing search techniques already used by the intelligence community to add a new layer of search capability for the agencies and partners that need to access intelligence information.

[ The CIA needs all the tech help it can get. Read LulzSec Claims Credit For CIA Site Takedown. ]

Philadelphia-based Connectify will leverage an In-Q-Tel's investment to further develop its virtual VPN software, which allows users to turn PCs into secure Wi-Fi hotspots with one click, according to the nonprofit.

Once a PC is enabled as a Connectify Hotspot, other users with security access to it can leverage the connection from laptops, tablets, or smartphones while working remotely or traveling, according to In-Q-Tel.

In-Q-Tel's interest in helping Connectify further develop its technology comes after it already has garnered great interest by private-sector companies, said In-Q-Tel CTO William Strecker in a statement.

The CIA launched In-Q-Tel in 1999 as an independent entity to find useful new technologies to support the intelligence community's mission. The nonprofit has made a flurry of investments lately, including partnerships with vendors that provide computer-screen security, cloud computing-based storage and secure virtualization technology.

The vendors, contractors, and other outside parties with which you do business can create a serious security risk. Here's how to keep this threat in check. Also in the new, all-digital issue of Dark Reading: Why focusing solely on your own company's security ignores the bigger picture. Download it now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-34682
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
CVE-2021-31811
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-31812
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.
CVE-2021-32553
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.