Difference between revisions of "U.S. Department of Homeland Security (DHS)"

From
Jump to: navigation, search
m
m
 
(24 intermediate revisions by the same user not shown)
Line 2: Line 2:
 
|title=PRIMO.ai
 
|title=PRIMO.ai
 
|titlemode=append
 
|titlemode=append
|keywords=artificial, intelligence, machine, learning, models, algorithms, data, singularity, moonshot, Tensorflow, Google, Nvidia, Microsoft, Azure, Amazon, AWS  
+
|keywords=ChatGPT, artificial, intelligence, machine, learning, GPT-4, GPT-5, NLP, NLG, NLC, NLU, models, data, singularity, moonshot, Sentience, AGI, Emergence, Moonshot, Explainable, TensorFlow, Google, Nvidia, Microsoft, Azure, Amazon, AWS, Hugging Face, OpenAI, Tensorflow, OpenAI, Google, Nvidia, Microsoft, Azure, Amazon, AWS, Meta, LLM, metaverse, assistants, agents, digital twin, IoT, Transhumanism, Immersive Reality, Generative AI, Conversational AI, Perplexity, Bing, You, Bard, Ernie, prompt Engineering LangChain, Video/Image, Vision, End-to-End Speech, Synthesize Speech, Speech Recognition, Stanford, MIT |description=Helpful resources for your journey with artificial intelligence; videos, articles, techniques, courses, profiles, and tools
|description=Helpful resources for your journey with artificial intelligence; videos, articles, techniques, courses, profiles, and tools  
+
 
 +
<!-- Google tag (gtag.js) -->
 +
<script async src="https://www.googletagmanager.com/gtag/js?id=G-4GCWLBVJ7T"></script>
 +
<script>
 +
  window.dataLayer = window.dataLayer || [];
 +
  function gtag(){dataLayer.push(arguments);}
 +
  gtag('js', new Date());
 +
 
 +
  gtag('config', 'G-4GCWLBVJ7T');
 +
</script>
 
}}
 
}}
[https://www.youtube.com/results?search_query=cybersecurity+security+NIST+DHS+Homeland+artificial+intelligence Youtube search...]
+
[https://www.youtube.com/results?search_query=DHS+Department+Homeland+Security+Cybersecurity+AI  YouTube]
[https://www.google.com/search?q=cybersecurity+security+NIST+DHS+Homeland+artificial+intelligence ...Google search]
+
[https://www.quora.com/search?q=DHS%20Department%20Homeland%20Security%20Cybersecurity%20AI ... Quora]
 +
[https://www.google.com/search?q=DHS+Department+Homeland+Security+Cybersecurity+AI ...Google search]
 +
[https://news.google.com/search?q=DHS+Department+Homeland+Security+Cybersecurity+AI ...Google News]
 +
[https://www.bing.com/news/search?q=DHS+Department+Homeland+Security+Cybersecurity+AI&qft=interval%3d%228%22 ...Bing News]
  
* [[Case Studies]]
+
* [[Cybersecurity]] ... [[Open-Source Intelligence - OSINT |OSINT]] ... [[Cybersecurity Frameworks, Architectures & Roadmaps | Frameworks]] ... [[Cybersecurity References|References]] ... [[Offense - Adversarial Threats/Attacks| Offense]] ... [[National Institute of Standards and Technology (NIST)|NIST]] ... [[U.S. Department of Homeland Security (DHS)| DHS]] ... [[Screening; Passenger, Luggage, & Cargo|Screening]] ... [[Law Enforcement]] ... [[Government Services|Government]] ... [[Defense]] ... [[Joint Capabilities Integration and Development System (JCIDS)#Cybersecurity & Acquisition Lifecycle Integration| Lifecycle Integration]] ... [[Cybersecurity Companies/Products|Products]] ... [[Cybersecurity: Evaluating & Selling|Evaluating]]
** [[Risk, Compliance and Regulation]]
+
* [[Risk, Compliance and Regulation]]  ... [[Ethics]]  ... [[Privacy]]  ... [[Law]]  ... [[AI Governance]] ... [[AI Verification and Validation]]
*** [[Cybersecurity]]
 
** [[Government Services]]
 
*** [[Government Services#Department of Homeland Security (DHS)| Department of Homeland Security (DHS)]]
 
** [[Defense]]
 
* [[Capabilities]]
 
* [[Cybersecurity References]]
 
* [[Offense - Adversarial Threats/Attacks]]
 
* [[Cybersecurity Frameworks, Architectures & Roadmaps]]
 
* [[Cybersecurity Companies/Products]]
 
 
* [[Radial Basis Function Network (RBFN)]]
 
* [[Radial Basis Function Network (RBFN)]]
* [[Quantum#Quantum Cryptographic Technology| Quantum Cryptographic Technology]]
+
* [[First Responder]]
* [[Time]]
+
* [[Smart Cities]]
* [https://www.fedramp.gov/nist-publications/ Federal Risk and Authorization Management Program (FedRAMP) | NIST]
+
* [[Time]] ... [[Causation vs. Correlation#Retrocausality| Retrocausality]] ... [[Quantum#Delayed Choice Quantum Eraser|Delayed Choice Quantum Eraser]] ... [[Quantum]]
* [https://www.nist.gov/cyberframework Cybersecurity Framework | NIST]
+
** [[Time#Positioning, Navigation and Timing (PNT)|Positioning, Navigation and Timing (PNT)]]
 +
*** [https://www.dhs.gov/science-and-technology/pnt-program  Science and Technology (S&T) Positioning, Navigation, and Timing (PNT) Program]
 +
**** [https://www.dhs.gov/publication/st-resilient-pnt-conformance-framework  Science and Technology (S&T) Resilient Positioning, Navigation, and Timing (PNT) Conformance Framework]  
 
* [https://www.dhs.gov/using-cybersecurity-framework Using the Cybersecurity Framework | DHS]
 
* [https://www.dhs.gov/using-cybersecurity-framework Using the Cybersecurity Framework | DHS]
 
* [https://www.dhs.gov/sites/default/files/publications/DHS-Cybersecurity-Strategy_1.pdf Cybersecurity Strategy .pdf | DHS]
 
* [https://www.dhs.gov/sites/default/files/publications/DHS-Cybersecurity-Strategy_1.pdf Cybersecurity Strategy .pdf | DHS]
Line 30: Line 35:
 
* [https://www.nextgov.com/cybersecurity/2018/11/pentagon-researchers-test-worst-case-scenario-attack-us-power-grid/152803/ Pentagon Researchers Test 'Worst-Case Scenario' Attack on U.S. Power Grid | Defense Advanced Research Projects Agency - Nextgov]
 
* [https://www.nextgov.com/cybersecurity/2018/11/pentagon-researchers-test-worst-case-scenario-attack-us-power-grid/152803/ Pentagon Researchers Test 'Worst-Case Scenario' Attack on U.S. Power Grid | Defense Advanced Research Projects Agency - Nextgov]
 
* [https://www.nextgov.com/topic/election-security Election Security | Nextgov]
 
* [https://www.nextgov.com/topic/election-security Election Security | Nextgov]
* [https://www.nist.gov/itl/ai-risk-management-framework  AI Risk Management Framework (AI RMF 1.0 | NIST]
 
* [https://www.nist.gov/news-events/news/2023/02/nist-selects-lightweight-cryptography-algorithms-protect-small-devices NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices | Chad Boutin - NIST] ... The algorithms are designed to protect data created and transmitted by the Internet of Things and other small electronics. The winner, a group of cryptographic algorithms called <b>Ascon</b>, will be published as NIST’s lightweight cryptography standard later in 2023
 
 
* [https://airc.nist.gov/Home NIST Launches New Trustworthy and Responsible AI Resource Center: Includes First Version of AI Risk Management Framework Playbook]  
 
* [https://airc.nist.gov/Home NIST Launches New Trustworthy and Responsible AI Resource Center: Includes First Version of AI Risk Management Framework Playbook]  
 +
* U.S. Department of Homeland Security [https://www.dhs.gov/sites/default/files/publications/Artificial%20Intelligence%20Whitepaper%202017_508%20FINAL_2.pdf Artificial Intelligence White Paper | Science and Technology Advisory Committee (HSSTAC): Quadrennial Homeland Security Review Subcommittee], 10 Mar 2017
 +
* U.S. Department of Homeland Security [https://info.publicintelligence.net/OCIA-ArtificialIntelligence.pdf Narrative Analysis: Artificial Intelligence  | National Protection and Programs Directorate - Office of Cyber and Infrastructure Analysis], July 2017
 +
* [https://emerj.com/ai-sector-overviews/artificial-intelligence-homeland-security/ AI at the US Department of Homeland Security – Current Projects | Millicent Abadicio -  Emerj], April 16, 2019
 +
* [[Lie Detection]]
 +
** [https://governmentciomedia.com/ai-lie-detectors-could-soon-police-borders AI Lie Detectors Could Soon Police the Borders | Kevin McCaney - governmentCIO], December 18, 2018
 +
* [https://www.governmentciomedia.com/homeland-securitys-new-approach-cyber-risk-management Homeland Security's New Approach to Cyber Risk Management | Amanda Ziadeh - governmentCIO], June 15, 2018
 +
* [https://www.governmentciomedia.com/homeland-securitys-ai-journey-starts-trusting-its-data Homeland Security's AI Journey Starts with Trusting its Data | Amanda Ziadeh - governmentCIO], June 27, 2018
 +
* [https://www.vox.com/recode/2019/5/16/18511583/smart-border-wall-drones-sensors-ai The “smarter” wall: how drones, sensors, and AI are patrolling the border | Shirin Ghaffary - Vox]
 +
** [[Autonomous Drones]]
 +
* [https://www.dhs.gov/science-and-technology/news/2019/10/09/news-release-dhs-st-awards-colorado-start-147k DHS S&T Awards Colorado Start-up $147K for Intelligent Counting and Measuring Platform] [https://kickview.com/ KickView] kvSonata will perform real-time analysis of queue lengths and wait times in the international customs processing areas of airports.
 +
* [[Enterprise Architecture (EA)#Tailoring|Tailoring]] Enterprise Architecture at DHS U.S. CIS
 +
* [https://www.dhs.gov/news/2023/09/14/dhs-announces-new-policies-and-measures-promoting-responsible-use-artificial DHS Announces New Policies and Measures Promoting Responsible Use of Artificial Intelligence | DHS] ... DHS Adds 'Chief AI Officer' Title for CIO Eric Hysen, Sets AI Policy
  
  
<youtube>te1drIJAUy0</youtube>
 
<youtube>cvcKRp-E-8o</youtube>
 
<youtube>7ECjQOX2cTw</youtube>
 
 
<youtube>f6Hp5SQFOXw</youtube>
 
<youtube>f6Hp5SQFOXw</youtube>
  
= <span id="Post-Quantum Cryptography (PQC)"></span>Post-Quantum Cryptography (PQC) =
+
{|<!-- T -->
* [[Quantum#Cryptography | Quantum Cryptography]]
+
| valign="top" |
* [https://www.siliconrepublic.com/enterprise/quantum-apocalypse-store-now-decrypt-later-encryption  Quantum apocalypse: Experts warn of ‘store now, decrypt later’ hacks | Leigh McGowran - Silicon Republic]
+
{| class="wikitable" style="width: 550px;"
* [https://www.tripwire.com/state-of-security/impact-quantum-computing-cybersecurity The impact of Quantum Computing on cybersecurity | Forta Tripwire]
+
||
* Post Quantum Solutions
+
<youtube>C1K4uX42TQk</youtube>
** [https://pqshield.com/ PQShield]
+
<b>Teaser for AUDREY Hastings Experiment
** [https://blinkly.com Blinky]
+
</b><br>Assistant for Understanding Data through Reasoning, Extraction, and Synthesis (AUDREY) The sheer volume of data from next-generation communication tools and sensors risks overwhelming or distracting first responders from their critical activities. As a result, first responders may make the wrong decisions, not because they lack relevant data, but because they are unable to quickly extract key insight from this flood of information. Information overload creates obstacles for first responders to perform their duties safely and efficiently. To learn more about AUDREY, visit: https://go.usa.gov/xPPBU
 
+
|}
 
+
|<!-- M -->
<hr><center>
+
| valign="top" |
 
+
{| class="wikitable" style="width: 550px;"
Quantum Apocalypse:  <i>Store Now, Decrypt Later (DNDL)</i> ... stealing data now to decrypt it in future, as quantum computing could render modern encryption methods obsolete
+
||
 
+
<youtube>ZsOnNhDCDd4</youtube>
</center><hr>
+
<b>Local company uses technology to stop bad drones
 
+
</b><br>A local company is using technology to stop drones used by cartels.
 
+
|}
<youtube>XYHmk2tpq1M</youtube>
+
|}<!-- B -->
<youtube>6qD-T1gjtKw</youtube>
 
<youtube>taZfUOpUc6E</youtube>
 
<youtube>-UrdExQW0cs</youtube>
 
 
 
== NIST Standardization process for PQC ==
 
* [https://csrc.nist.gov/projects/post-quantum-cryptography Post-Quantum Cryptography (PQC) | NIST]
 
* NIST winners and will ratify standards in 2024
 
* Multiple global rounds since 2015 led to NIST announcing winners in July 22 - four algorithms:
 
** CRYSTALS-KYBER was chosen by NIST as the new standard for public-key encryption/KEMs
 
** Falcon, CRYSTALS-Dilithium and SPHINCS+ will all be standardized for digital signatures
 
* There are more algorithms under consideration too, so the process continues
 
 
 
 
 
<youtube>s-74kyjIHDU</youtube>
 
<youtube>uE_Y1C4QPU8</youtube>
 
<youtube>XEs5o4AmWgs</youtube>
 
<youtube>j7BTjOE_jtE</youtube>
 
 
 
 
 
=== National Security Agency (NSA) - Cybersecurity ===
 
* [https://cyber.mil/nsa/ National Security Agency (NSA) - Cybersecurity Directorate]
 
* [https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/3148990/nsa-releases-future-quantum-resistant-qr-algorithm-requirements-for-national-se/ Commercial National Security Algorithm (CNSA) Suite 2.0] ... Federal-wide guidance on Cryptography, including PQC
 
** PQC is default from 2025 in Software and Web Browsers
 
** PQC is default from 2026 in Networking
 
** PQC is default from 2027 in Operating Systems
 
** PQC is default from 2030 in Niche Systems
 
** PQC is default for all systems - including legacy systems - by 2033
 

Latest revision as of 13:41, 15 September 2023

YouTube ... Quora ...Google search ...Google News ...Bing News


Teaser for AUDREY Hastings Experiment
Assistant for Understanding Data through Reasoning, Extraction, and Synthesis (AUDREY) The sheer volume of data from next-generation communication tools and sensors risks overwhelming or distracting first responders from their critical activities. As a result, first responders may make the wrong decisions, not because they lack relevant data, but because they are unable to quickly extract key insight from this flood of information. Information overload creates obstacles for first responders to perform their duties safely and efficiently. To learn more about AUDREY, visit: https://go.usa.gov/xPPBU

Local company uses technology to stop bad drones
A local company is using technology to stop drones used by cartels.