Secret Service provided only 1 text on Jan. 6 Capitol attack after phone factory resets

The Secret Service provided a single text message in response to the Department of Homeland Security inspector general’s request for all exchanges from 24 personnel in the lead up and immediate aftermath of the Jan. 6, 2021, U.S. Capitol attack, according to a letter obtained by CNN.

Inspector General Joseph Cuffari requested texts between Dec. 7, 2020, and Jan. 8, 2021, in June 2021, Secret Service Assistant Director Ron Rowe wrote the House select committee investigating the attack in the letter, which doesn’t identify the 24 employees.

Secret Service Communications Chief Anthony Guglielmi stated on July 14 the agency lost employees’ texts when it began resetting mobile devices to factory settings in January 2021, ahead of a planned “system migration,” while denying they were “maliciously deleted.”

The lone text message provided was from U.S. Capitol Police Chief Steven Sund to former Secret Service Uniformed Division Chief Thomas Sullivan requesting aid on Jan. 6, 2021. No texts the inspector general sought were lost during the migration to Microsoft’s mobile device management system, Intune, according to Rowe’s letter.

Factory resets are avoidable during such migrations however, and explanations of how the texts were erased have varied, reported Kim Zetter on Wednesday.

Now the Jan. 6 committee wants proof the Secret Service secured and performed forensics on the phones in question to verify Secret Service’s assertion the replacement was simply coincidental.

While Guglielmi held the Secret Service is “fully cooperating” with the DHS inspector general — and the agency provided an initial collection of hundreds of thousands of documents, policies, radio communications, emails, briefings and interviews — the Office of Inspector General has stated access was neither appropriate nor timely due to attorney review.

The Secret Service left it to employees to back up phone records when Congress sent a preservation and production request on Jan. 16, 2021, ahead of the three-month phone replacement that began Jan. 27, 2021. The agency sent personnel a guide on backing up phone content ahead of replacement, but it’s unclear how many employees followed the guidance or why there wasn’t an automated collection system in place — given the Secret Service’s record retention requirements, Zetter reported.

Rowe wrote the Secret Service continues to assess whether any relevant texts were lost and if they’re recoverable, an unlikely prospect without cutting-edge decryption technology, Zetter reported. The Secret Service is also interviewing the 24 employees to see if they stored messages elsewhere.

Air Force outgoing commander says department’s information warfare command must scale

The key to maintaining initial successes in the vision of the Air Force’s first information warfare command in reducing stovepipes and achieving outcomes is being able to scale in the future, its outgoing commander said.

Regarding what’s next for 16th Air Force, “much of it has to do with our ability to scale and to meet the just ever increasing demand for what our airmen bring as they generate insights, as they produce outcomes every day as part of various campaigns, but also how they are preparing for operations against our pacing threat,” Lt. Gen. Timothy Haugh, told reporters ahead of the July 21 change of command ceremony. “That ability to scale to meet that diversity is that really the long term challenge for 16th Air Force, while the team has realized over the last three years that initial task to be able to integrate these capabilities.”

Haugh heads to U.S. Cyber Command to serve as its deputy commander while Lt. Gen. (Sel) Kevin Kennedy will take the reins of 16th Air Force, which serves as the service component for Cyber Command and NSA.

The vision for creating 16th Air Force in 2019 was breaking down the silos that existed between cyber, intelligence, surveillance and reconnaissance, electromagnetic spectrum operations and information operations by converging them to better serve combatant commander needs.

“They’ll go to war with the Air Force built by chief 21 … Today’s ceremony is a significant contribution to this moral obligation; ensuring we continue to fly, fight and win in air, space and cyberspace, now and into the future,” then-Gen. David Goldfein, the 21st chief of staff of the Air Force said at the 16th Air Force activation ceremony in 2019 regarding his vision for the command. “By combining the disciplines of cyber operations, ISR, electronic warfare, information operations, under a single command, we’ll remove walls and stovepipes.”

Haugh, as its first commander, said he’s proud of the progress the team has made in delivering outcomes for mission partners and creating the synergies and convergence. They need to continue to build upon these frameworks and scale in order to maintain that convergence to beat back adversaries in an ever dynamic information warfare environment.

One such area includes tightening the convergence of cyber and electromagnetic spectrum operations.

“That is an area where our service is talking about it, it’s an area Congress is interested in and now we think we can inform some of that based off of the expertise we have within our various wings,” Haugh said. “What we really want to capitalize on is the talent that brings unique expertise. That’s part of the magic of bringing 16th Air Force together is the Air Force set out and said that one of the things that we will invest in is how do we more effectively use the electromagnetic spectrum.”

The Air Force has created a combined detachment between the 55th Wing and the 67th Cyberspace Wing.  

“We’re at the point now that we’ve allowed them to come together as part of our weapons and tactics conferences to see what are the things that we should be investing in that would allow them to collaborate and to produce outcomes,” Haugh said. “We have established a combined detachment between the two wings to allow them to bring that expertise together. I’m excited. We’ll see where they take that in the future, but we see based off of how cyber continues to have increasing reliance on the spectrum and then where are our adversaries go, we wanted to make sure that we’re bringing together the right expertise to innovate as that dynamic changes.”

Another area Haugh said they’re looking to scale is information operations planning.

“The growth of IO planning and the necessary role that information plays as a joint function inside the Department of Defense, that conversation of what is the role of units as components, what’s the role of our service, how do we support the combatant commands we’re aligned with, all of that does take additional capacity to ensure that we’re aligned with what it looks like in the information environment for those various commanders,” he said.

In the last two years, the Air Force has created the first initial skills training course for its information operations personnel, 14F. While this force is small, plans are to grow it to around 500 in the future.

How the services grows the capacity across all its disciplines at the right level is a balancing act, Haugh said, and they’re partnering with Air Combat Command and the combatant commands to make sure they get it right as 16th Air Force has been developing new tactics as it matures.

Partnerships

One of the areas Haugh said he underestimated upon leading this new organization was the opportunities for partnerships across the military, federal government and international sphere.

“What we found as a component to EUCOM, that when we talked with Naval Forces Europe, or U.S. Army Europe, or U.S. Air Forces Europe or an element of NATO, they all were really fast to say we see what capabilities you provide, how can we enable your outcomes, how can you partner with us,” he said. “The other element of partnership is our international partnerships and whether that’s helping a nation grow capacity or to partner with another nation, others to very large willingness encouraged by U.S. Cyber Command for us to partner with any number of nations that are trying to grow cyber capacity or share interests with the outcomes we’re trying to achieve.”

Part of this partnership with other combatant commands stem from the growth and maturity of what’s know as Cyber Operations-Integrated Planning Elements.

16th Air Force, as the service component to Cyber Command, provides cyber forces and support to European Command, Strategic Command, Transportation Command and Space Command. This is done through a construct known as Joint Force Headquarters-Cyber (JFHQ-C), which provides planning, targeting, intelligence and cyber capabilities to the combatant commands to which they’re assigned. The heads of the four service cyber components also lead their respective JFHQ-Cs and oversee the cyber teams that conduct operations for the combatant commands.

The Cyber Operations-Integrated Planning Elements act as an extension of the JFHQ-Cs where cyber planners, not actual operators, are physically embedded within various staff sections at the combatant commands to provide expertise on how cyber can be incorporated into their operations.

“The ability for us to be a component in San Antonio connected simultaneously to European Command, Strategic Command, Space Command and providing a CO-IPE to TRANSCOM, without that team integrated in that combatant command staff, it would be very challenging to make sure that we’re meeting their demands,” Haugh said. “The maturity of the CO-IPEs as an element that can do cyberspace planning, intelligence development and targeting has been just absolutely essential to the maturation of Cyber Command and of the components, 16th Air Force included.”

Across the federal government, Haugh discussed the work done with the Department of Homeland Security and the FBI in sharing information to protect elections from foreign interference.

“As we look at the core mission of 16th Air Force, it’s a straightforward role that we have, which is to stop foreign interference in our electoral process. We’re proud to be on that team with all of our interagency partners for the role that our airmen play,” he said. “It also is exciting when you see the work that is going for alignment across how we’re approaching it, from the national cyber director to CISA to the FBI foreign influence task force, the role that NSA and Cyber Command play with the Department of Justice and then we’re contributing to that broader team. It’s powerful.”

Following the Russian operations in the 2020 election, which saw how adept they were in information warfare and how difficult those operations were to thwart, Haugh and his team have lauded the approach of exposing adversary activity to disrupt their operations in the information environment.

In the past, this has been done through the posting of malware samples to the public resource VirusTotal. Malware samples discovered in the course of operations by the Cyber National Mission Force are posted to the site to inform network owners. It also helps antivirus organizations of the strains build patches against that code and helps identify the enemies’ tools being used in ongoing campaigns.

Officials also have noted, in hypothetical examples, how various elements across the cyber and ISR realm, which now all exist under a single command creating a faster and more streamlined unity of effort, could work together to disclose the location of enemy missile batteries in the lead up to destructive action.

“It’s been successful. The ability to expose adversaries in a way that allows others to also become aware of that is a powerful concept,” Haugh said. “That exposure in and of itself isn’t something that that produces an outcome that deters an adversary, but it does impose costs. Those things are areas that we believe have to be part of any campaign, which is to expose the adversary and ensure that as we push things into the information environment, the Department of Defense operates in truth.”

Senate wants tighter cyber-electronic warfare integration, clarity on organizations for cyber ops

The Senate Armed Services Committee wants a strategy and more coherent integration of cyber and electronic warfare effects in military operations.

A provision in the committee’s version of the fiscal 2023 National Defense Authorization Act is requiring the Department of Defense to develop a strategy for “converged cyber and electronic warfare conducted by and through deployed military and intelligence assets operating in the radiofrequency domain to provide strategic, operational and tactical effects in support of combatant commanders.”

The committee passed its version of the bill June 16 but did not release the text until July 18.

There are significant similarities between cyberspace effects and electronic warfare, especially in the tactical sphere of battle. Some services, namely the Army, but the Marine Corps as well, have developed tactically focused forces to exploit these capabilities and similarities, primarily through what are known as radio-frequency effects.

This is essentially cyber effects that exploit Wi-Fi or other wireless electronic systems using proximal or close access forces. Contrast that with what U.S. Cyber Command does primarily, which is Internet-Protocol based cyber operations, conducted remotely.

While authorities to conduct cyber operations are notoriously onerous and held at the top levels of government, these more proximal effects conducted through radio-frequency require fewer levels of approval.

In fact, in a report accompanying the SASC’s bill language, the committee noted these “service retained” forces, a distinction from the cyber mission force, which each service presents to and is owned by Cyber Command.

“The committee believes it is essential for the Department to determine its requirements and roles for what are referred to as ‘service-retained’ cyber forces for both defensive and offensive support to combatant commands,” the report said. “The committee expects that these service-retained forces would become part of the personnel rotation through elements of the Cyberspace Operations Forces for career progression. These forces would also fulfill critical roles in protecting deployed and often disconnected weapons systems and platforms and supporting offensive cyber operations executed by military units and systems.”

The bill wants the DOD to develop recommendations regarding command and control, deconfliction and coordination relationships and processes between combatant commanders and the Cyber Command regarding tactical cyber operations and converged cyber and electronic warfare operations conducted prior to and during armed conflict.

Additionally, it charges DOD with developing requirements for service-retained tactical cyber forces for offensive and defensive missions.

As these capabilities and forces mature, it is expected that these proximal forces could actually gain accesses and pass that off to high end Cyber Command operators remotely to exploit. In fact, Cyber Command has budgeted for electronic warfare capabilities, requesting $16.7 million for tools to “adapt EW technology and cyber-peculiar capabilities to gain aces to targeted enemy forces,” according to budget documents.

The Army has created the 915th Cyber Warfare Battalion, which will ultimately encompass a total of 12 expeditionary cyber and electromagnetic activities teams, or ECT, by 2026 that will help plan tactical cyber operations for commanders and conduct missions in coordination with deployed forces.

The Marine Corps, for its part, has also developed tactical cyber forces within its Marine Expeditionary Force Information Groups (MIGs), which integrate electronic warfare with intelligence, communications, military information support operations, space, cyber and communication strategy to provide MEF commanders with an information advantage.

Optimizing Cyber Command

The bill also revisits questions from a previous NDAA regarding how elements under Cyber Command are organized, citing dissatisfaction that the DOD did not address several of the elements required.

Specifically, the committee wants a study to determine the optimal strategy for structuring and manning elements of the various Joint Force Headquarters-Cyber (JFHQ-C), Joint Mission Operations Centers, Cyber Operations-Integrated Planning Elements and Joint Cyber Centers.

The services do not own offensive teams. Instead, these teams work through several organizations, each formally known as Joint Force Headquarters-Cyber, which in turn provide planning, targeting, intelligence and cyber capabilities to the combatant commands to which they’re assigned. The heads of the four service cyber components also lead their respective JFHQ-C. These organizations oversee combat mission teams and combat support teams.

The Joint Mission Operations Centers are actually where the JFHQ-C commands and controls and executes cyber operations.

The Cyber Operations-Integrated Planning Element were created as a means of better integrating cyber operations into the overall planning process. Cyber planners, not actual operators, are physically embedded within various staff sections at the combatant commands to provide expertise on how cyber can be incorporated into their operations.

The Joint Cyber Centers are where combatant commands oversee all aspects of cyberspace operations.

The study must include:

The fiscal 2020 NDAA included a nearly identical provision.

However, Congress doesn’t appear satisfied with the information it was provided.

“The committee is frustrated that the previous report on this topic, as required by section 1656 of the National Defense Authorization Act for Fiscal Year 2020 (Public Law 116-92), did not address many of the required elements,” the committee notes in the report accompanying the bill. “The committee encourages the Department to fully address all of the elements required by this study and to provide robust recommendations on an optimal strategy for providing cyber support to the geographic combatant commands.”

Electronic warfare ‘keeps me up at night’: undersecretary of the Army

While not explicitly one of the Army’s key top named priorities, electronic warfare is something that keeps the service’s number two “up at night.”

“It is something that definitely keeps me up at night,” Gabe Camarillo, the undersecretary of the Army told reporters following his participation in an event at the Association of the U.S. Army Wednesday. “I’ve been concerned about the EW and electronic protection capabilities in the Army since I was in [ the office of the Assistant Secretary of the Army for Acquisition, Logistics and Technology] back in the early part of last decade.”

Russian activities in Ukraine over the last several years, to include its current invasion, underscored for the Army the importance of electromagnetic spectrum operations, whether it’s reducing the signature of its command posts to avoid detection, resilient communications from jamming or jamming enemy systems to achieve superiority on the battlefield.

At the end of the Cold War, the Army divested much of its electronic warfare inventory. During counter-insurgency fights of the last 20 years, the Army used blunt jamming tools to thwart improvised explosive devices, which, in turn, inadvertently jammed friendly systems.

“We’ve made the shift since the emphasis on counterterrorism and the [improvised explosive devices], to having fielded EW and electronic protection capabilities that are really more tailored to where the threat is, which is significant against the pacing threat of China and then of course, elsewhere in the globe,” Camarillo said. “There is a need for continued investment, we do have programs in place that are looking at both mounted and dismounted EW capabilities that are progressing very, very well. But I think there continue to be some areas where there are gaps and I think we need to stay ahead of the of the threat curve. That is something that I am very concerned about.”

While the Army is heavily investing in its electronic warfare force, growing it by three-fold, it still has yet to field any offensive program of record jammers.

The first such program – the Terrestrial Layer System-Brigade Combat Team, an integrated signals intelligence, cyber and electronic warfare system on a Stryker – is slated to field to units in fiscal 2022.

The Army is also developing an aerial system called the Multi-Function Electronic Warfare-Air Large, a pod mounted to an MQ-1C Gray Eagle drone. The system is capable of serving as the first brigade-organic airborne electronic attack asset, and providing limited cyberattacks.

In terms of dismounted systems, Army leadership in the past has discussed the continued use of VROD and VMAX, the former surveys the field from an electromagnetic perspective, and the latter provides a limited electronic attack capability. These were quick reaction systems developed to address capability gaps in Europe as opposed to programs of record.

Camarillo cited the Army’s Multi-Domain Task Forces as concrete examples of forces to address the electronic warfare challenge. These units are meant to be in constant contact with adversaries during the so-called competition phase of conflict and exist at higher echelons.

“As an Army, what we have done to help address that is just organizationally by creating the Multi-Domain Task Force’s giving them the responsibility for handling some of that offensive EW and managing some of those electronic protection capabilities as well,” he said. “We continue to, obviously field the MDTFs and I think the capabilities that they employ is something that we need to continue to put emphasis on.”

Camarillo added that Army Futures Command will focus on systems not just fielding today, but down the road, which will include electronic warfare systems for the Multi-Domain Task Forces.

George Mason experts urge DOD to improve how it uses data from tech consortia

Senior Pentagon leaders have repeatedly emphasized their intent to use data as a strategic asset — but according to a new study shared exclusively with FedScoop this week, the department could benefit from more effective use of data collected through partnerships with tech consortia.

In a study by George Mason University’s Center for Government Contracting on Wednesday, experts argue that consortia are playing a pivotal role in high-profile and other Defense Department acquisition efforts, and particularly those associated with other transaction authorities (OTAs).  

A consortium typically refers to a group of entities that forms an agreement to cooperate on hard-to-solve problems and achieve common objectives.

But the new research also suggests that DOD must improve how it captures and uses data to fully harness the value of such cadres. 

“It is my sense that the data is not strategically being used on an enterprise level at DOD [regarding consortia]. So, while there may very well be pockets of places that have data on these contracts, or those contracts, or this consortia — or even this area, right, — it is not flowing up in a constantly comprehensive way. That’s step one,” Moshe Schwartz told FedScoop. “And step two, it’s not then being used to inform decision-making.”

Schwartz, a procurement expert who previously served as Executive Director of the congressionally mandated Advisory Panel on Streamlining and Codifying Acquisition Regulations, is now President of Etherton & Associates. He and Stephanie Halcrow — an external advisor to the Department of Defense’s Acquisition Innovation Research Center, senior fellow at GMU’s Center for Government contracting and former Professional Staff Member on the House Armed Services Committee (HASC) — provided FedScoop with a first look at this new research they co-authored, ahead of its publication. 

Halcrow noted that during her time as a Congressional staffer, she had so many questions about the process and impact of consortia that seemingly didn’t have answers. “So I thought, this is the report that we want to write that I always wanted to read when I was on the committee,” she said.

In their study, the officials identified 42 consortia supporting agreements, as of May 2022. Of those groups, 38 support the DOD, and four are working with other federal agencies — and 12 of the overall 42 contributed data that informed the experts’ review. 

“I think the biggest challenge that we found in writing this report was getting access to the data to support our findings,” Halcrow explained. “The data exists — but it is not publicly accessible in an easy way.”

Despite that issue, the report incorporates a complete history of the Pentagon’s work with consortia, how the group’s are typically composed and insights into some of the technologies they’ve recently enabled for national security purposes. Three specific use cases depicting consortia-enabled technological innovation are also included. 

In one, DOD used its existing relationship with a medical defense consortium to solicit advanced research and manufacturing of 100 million doses of a vaccine to combat COVID-19. 

“That is so much bigger than DOD, but without the consortia it would never have happened,” Halcrow said.

Ultimately, Halcrow and Schwartz found that consortia bolster engagements between government and non-federal players, expand the defense industrial base — and, in some circumstances, they can significantly speed up acquisition timeliness and promote innovation. 

The co-authors conclude the report by providing seven specific recommendations to improve how DOD benefits from consortia going forward. At the top of that list is their suggestion associated with that gap in data: “improve visibility and transparency.” 

“Part of the conversation around consortia and OTs has been about a lack of transparency and lack of visibility — and one of the questions was, ‘is it that there is no data?’” Schwartz said. But the research showed that “by and large, that data is there and people are generally willing to share it, particularly on the industry side,” he added, “so, let’s see what we can start exposing.”

Among other recommendations, the co-authors also suggested that DOD avoid additional regulatory burdens that could limit consortia, and focus on improving technology transition.

The two are planning an event at George Mason University soon to highlight their findings for the public.

“We would love to talk to as many people about it as possible — be they DOD, industry, academia, Congressional staff, or agencies — because we believe this is an important issue that all of them are interested in,” Schwartz said. “We would love to, I think, do more work in this area both in other events, as well as possibly a follow-on report. So, we’re already talking about that amongst ourselves and seeing if there are opportunities there.”

US, UK governments offer $1.6M for tech that trains AI while preserving privacy

The U.S. and U.K. governments launched a competition series Wednesday offering $1.6 million in prize money for developing privacy-enhancing technologies allowing artificial intelligence models to be trained with sensitive data safely.

Entrants will create federated learning solutions that prevent organizations’ raw data from being revealed, shared or combined as it’s used to train AI improving financial crime detection, forecasting a person’s risk of infection during a pandemic, or both.

The series was announced in 2021 at the Summit for Democracy, which will showcase winning solutions in the financial crime and public health emergency tracks, or generalized solutions, when President Biden convenes it in early 2023.

“This important initiative reflects our common purpose of developing technologies and driving innovation in a manner that reinforces our commitment to and expression of democratic values and the fundamental right to privacy,” said Alondra Nelson, outgoing director of the White House Office of Science and Technology Policy, in the announcement.

The financial crime prevention track is aimed at the problem of international money laundering — a $2 trillion-a-year challenge, according to U.N. estimates — and will supply entrants with realistic but synthetic global transaction data created by financial messaging service SWIFT. Solutions should preserve privacy while facilitating information sharing and collaborative analytics to detect anomalous payments.

Entrants in the track will be afforded the opportunity to engage with international regulators: the Financial Crimes Enforcement Network and the U.K.‘s Financial Conduct Authority, Information Commissioner’s Office, and National Economic Crime Centre.

The pandemic response track is intended to strengthen global readiness for current and future disease outbreaks by providing entrants with a synthetic, regional population dataset from the University of Virginia’s Biocomplexity Institute in designing secure infection risk forecasting solutions.

Entrants in the track will be able to contact the Centers for Disease Control and Prevention and the U.K.’s National Health Service and Data and Analytics Research Environments.

“Building on decades of [National Science Foundation] research investment in the field, these prize challenges will accelerate the translation of game-changing privacy-enhancing technologies,” said Sethuraman Panchanathan, NSF director, in a statement. “In this way, these prize challenges … illustrate the synergy of foundational research and translational activities in moving research to practice.”

ATARC announces 2 labs to spur government adoption of modern credentials

The Advanced Technology Academic Research Center announced two public-private laboratories around identity management Tuesday to hasten government adoption of more easily distributable, modern credentials.

ATARC’s Digital Mobile Credentials Lab will showcase six use cases where devices serve as identifiers to access buildings and workstations, while an Identity Management Working Group lab will have vendors demonstrate the feasibility of a Derived Fast Identity Online 2 (FIDO2) Credential (DFC).

Personal Identity Verification (PIV) cards and Common Access Cards (CACs) became the standard at agencies around the turn of the millennium, but such physical credentials proved hard to disburse with the onset of the pandemic and remote work.

“Identity management is one of the five main pillars of zero trust,” Tom Suder, ATARC president, told FedScoop. “But we’ve seen during the pandemic that it’s really a challenge.”

Like its Zero Trust Lab launched in September, ATARC’s new labs are focused on generating more government-specific use cases.

The onboarding of enumerators for the decennial census creates tremendous demand for credentials, as does the Federal Emergency Management Agency scaling its workforce during disasters. Mobile phones the government typically issues to employees present an opportunity for a post-PIV and CAC environment, Suder said.

ATARC established a memorandum of understanding with General Services Administration for the Digital Mobile Credentials Lab, after the agency brought the use case of its USAccess shared service, which provides PIV cards across more than 110 agencies.

Among the technologies the lab will showcase are Public Key Infrastructure (PKI) and FIDO2 credentials; physical access control and logical access control system (PACS/LACS) technical architectures; and identity, credential and access management (ICAM) solutions.

The six use cases are:

Likely a partly physical, partly virtual lab, it will feature some of the same companies as the Zero Trust Lab, and a “fairly immediate” launch is expected, Suder said.

Meanwhile the DFC Lab came out of a recently published Identity Management Working Group white paper, which requested demos proving the feasibility of agencies issuing and managing FIDO2 hardware tokens tied to existing physical credentials. 

FIDO2 lets users authenticate using mobile devices, so they no longer need their PIV cards or CACs on them at all times. What’s more, the DFC would be transferable if an employee switched agencies.

“These controls are established practices that minimize the risk of impersonation and allow for managing which resources an end user can interact with while leveraging a DFC,” the white paper reads. “Currently, no such guidance exists for the issuance and management of FIDO2 credentials, and enterprise use of these credentials has been limited for this reason.”

GDIT hires Robert Morse to beef up federal judiciary IT team 

General Dynamics Information Technology (GDIT) announced Tuesday it has hired Robert Morse as a senior solutions architect responsible for IT services related to its federal judiciary business.

Morse has over 30 years of experience in the federal government IT organizations in the executive and judicial branches, including most recently as the director of the Office of IT Services at the National Institutes of Health (NIH).

Prior to NIH, Morse for 15 years held multiple senior leadership roles at the Administrative Office of the U.S. Courts, including serving as the executive in charge of the federal judiciary’s cloud computing program. 

“Bob has extensive expertise developing innovative software products, applications and service offerings for various federal agencies,” said John Ludecke, vice president and general manager, Federal Civilian Agencies at GDIT. “His technical and business management skills will be critical in providing better, faster and more efficient IT services to the judiciary.”

Morse began his career as an active-duty officer in the U.S. Navy in the nuclear power program and holds bachelor’s and master’s degrees in mathematics from the University of Maine. 

His appointment follows that of former federal cyber leader Matt Hayden, who joined the company in May as a vice president of cyber client engagement. He has over 20 years’ experience in cyber technology and policy and was previously assistant secretary for cyber, infrastructure, risk and resilience policy at the Department of Homeland Security.

DARPA launching research project to revolutionize brain injury diagnosis on the battlefield

Serving as a leader in military medicine since the 1990s – including as director of force health protection for U.S. and NATO units in southwestern Afghanistan — Cmdr. Jean-Paul Chretien is familiar with the complex damage that traumatic brain injury (TBI) can cause.

In an interview with FedScoop, the naval medical officer, who now leads a soon-to-launch research project at the Defense Advanced Research Projects Agency (DARPA), explains the threat that this type of injury poses to U.S. military readiness.

“I’ve come to appreciate the challenges that we face with traumatic brain injury (TBI) for service members in training environments and operational settings,” he told this publication.

Chretien is spearheading the department’s New Technology for Non-Invasive Intracranial Pressure Monitoring research project, which is intended to produce a non-invasive device that can capture data and enable health personnel to assess TBI severity accurately in a theater of war, where resources are scarce.  

The impact of this condition is broad, with roughly 450,000 military service members were diagnosed with TBI between 2000 and 2020, including more than 16,000 in 2020, according to the Military Health System. A recent study in the Journal of Head Trauma Rehabilitation also demonstrated that military members with TBI are at markedly increased risk of disability — and those who sustained a concussion while in combat, had lower education and were younger when injured, among other factors — had “very high odds of poor long-term outcome trajectory” from such wounds.

Non-invasive devices DARPA aims to innovate via this fresh program could help improve the outcomes of injured military personnel in future combat environments.

Diagnosis in the field

“One of the most difficult challenges around traumatic brain injury is the early identification of the injury and optimizing treatment, or getting the treatment just right for the patient at a given time,” according to Chretien.

That’s partly because skulls are hard and rigid structures of bone.

“So if someone has a brain injury — they’re exposed to an explosion, or something penetrating the skull — that can cause bleeding within the skull and cause swelling,” Chretien noted. “And those things, they take up space, but there’s no room for the skull to expand.”

Traumatic brain injuries can easily become life threatening. In moderate and severe cases, intracranial pressure elevation from brain swelling or bleeding can cause brain damage or death. 

According to Chretien, faster diagnosis in the field lies at the center of improving the survival chances of patients with such injuries.

“We have a whole range of medical and surgical treatments for bringing the pressure down — but measuring the pressure and monitoring it over time and treatment now requires drilling a hole and inserting a probe,” said Chretien. He added: “So, if we had a way to monitor the pressure inside the skull with no risk, ease-of-use technology, that would really be a gamechanger for care of patients with [TBI]. That would be useful in civilian settings too, but especially in military field settings.”

The DARPA project he leads is focused on finding new technology that could allow medics to immediately identify intracranial pressure, without conducting the invasive diagnostic tests that require a hospital and technical surgical procedures.

As a program manager, he intends to help innovate the development of such a device. It will mark the next project in his expanding portfolio that’s largely focused on military medicine, combat casualty care, and other problems that he’s “most familiar with, and most passionate about trying to solve.” 

The Defense Department invests more than $1 billion annually in small business-made technologies through its Small Business Innovation Research (SBIR) program. Once this new DARPA-led SBIR project opens July 29, small businesses will submit proposals and compete to help develop a device that accurately measures ICP non-invasively, is simple to operate and is suitable for both in-hospital and pre-hospital settings, according to pre-release documents. 

“This is definitely a capability that has been of interest for many years,”  Chretien said. “And this is not to take away from any of the technologies that do exist now or that have been reported in the scientific literature — but there’s nothing available now that meets all the criteria that we would need for use in a field setting.”

In particular, the technology “can’t require the amount of technical skill that you only find in a hospital-based subspecialty,” and must be easy to use in austere or challenging settings, the physician noted. Further, it must provide continuous measurements, not just a spot check on whether a patient’s pressure is high or low, but the ability to show changes over time.

DARPA, by the nature of the agency, takes an experimental approach to solving problems, and in this case Chretien is hoping to be surprised with proposals for ideas that others haven’t thought of before.

“We don’t want to stifle that creativity. We want to encourage it,” Chretien said. “So I can’t predict what will come in.”

An open-ended approach to possibly lifesaving tech

Though he couldn’t be prescriptive about what the resulting technology may look like, Chretien said he “definitely” sees artificial intelligence and machine learning playing a “big part” in the development and application of the envisioned monitors. 

“One of the ideas that is getting a lot of interest in the critical care community now is the concept of ‘what is the optimal intracranial pressure for a given patient?’” he explained.

Most existing guidelines provide a particular value for clinicians to try to achieve. But an idea that is growing in interest in the field is that perhaps that value may be different for each patient, depending on their physiology or injury patterns. In Chretien’s view, AI and machine learning could play a key role in exploring whether that is the case and if there should be individual specific treatment targets. 

“This technology is not going to tell us what the target is, but it could enable the research that would get us there,” he said. 

Regardless of the approach proposers take, down the line, software and sophisticated analytics may also one day be used to filter out the inevitable noise associated with the devices to establish a clean and clear signal. 

And another possible use for AI and machine learning in this pursuit has to do with monitoring patients with critical illness, Chretien noted. 

“If we have this ability to measure intracranial pressure non-invasively, and we have other continuous measurements to which is common in an intensive care unit, and it’s increasingly possible in les- resourced settings, how do we take all of that information and use it to gain a better understanding of the patient’s current status, and what treatments they need at a given time — and what treatments they may need in the future?” he explained. 

The potential devices could also enable “that data to get a much broader patient population than it is now,” according to Chretien. “So, AI definitely has a role there.”

DARPA projects can take as long as four years to unfold, but Chretien added that the agency is focused on swift development of a device in as quick as two years. The project also requires approved clinical study on living humans, and could culminate in the submission for Food and Drug Administration (FDA) clearance of the produced device. 

“We want to see how well this device performs in actual patients who have brain injury. So, this is not just a development of a device in a lab and some kind of laboratory model, or even an animal model. This is for human patients, and so I think that’s going to give us early indication of whether we have a successful approach here,” Chretien said.

Senate bill to require annual briefing on NSA-CYBERCOM relationship

A Senate committee wants annual briefings on the relationship between U.S. Cyber Command and the National Security Agency, which are currently co-located and have shared resources.

The provision is found in the Senate Armed Services Committee’s version of the fiscal 2023 National Defense Authorization Act, which passed the committee June 16, but language wasn’t released until July 18.

When Cyber Command was initially being built, the Department of Defense co-located it with the NSA as a means to help it grow, relying on the expertise, staff and even tools and infrastructure of the spy agency to get it off and running. The two still share a boss and are co-located, which is referred to as the dual hat.

However, the arrangement has been understood that it would be temporary given the inherently different missions of each organization and potential undue risk to each: NSA charged with foreign intelligence and the Department of Defense with war fighting. Opponents of the arrangement cite the outsized power of one person leading both organizations and relying on intelligence infrastructure and tools, which are meant to stay undetected, for military activity, which typically isn’t, poses risks to such espionage activity.

Those in favor of keeping the arrangement argue that Cyber Command benefits from the tight intelligence linkage and also still isn’t ready to stand on its own.

In a report accompanying the bill, the SASC notes it is “aware that concerns have been raised about whether the dual hat leadership arrangement … adversely impacts either organization. The committee believes that over the last few years, the dual hat leadership arrangement has demonstrated improved effectiveness both in support of military operations and in defense of the Nation. The committee understands that in the cyber domain success depends on speed, agility, and unity of effort, all of which are enhanced with the dual hat relationship.”

Moreover, the committee notes its understanding that having a single individual in charge of both organizations allows them to allocate resources, assess and mitigate risk to provide unity of effort in operations.

“The committee believes that the dual hat relationship ensures a strategic alignment between these organizations and is essential to the Nation’s success in strategic competition,” it said in the report.

In the 2016 annual defense policy bill, Congress outlined a series of metrics for the Pentagon to meet in order to split the two organizations. Those metrics were then tweaked in the 2017 policy bill adding more restrictions necessary to split the dual hat. They included that each organization have robust command and control systems for planning, deconflicting and executing military cyber operations and national intelligence operations as well as ensuring tools and weapons used in cyber operations are sufficient for achieving required effects. It also sought to ensure that Cyber Command can acquire or develop these tools, weapons, and accesses.

Gen. Paul Nakasone, who leads both organizations, testified before Congress in March that his organizations are still working towards meeting those metrics.

He said Cyber Command and NSA’s requirements continue to grow and that dependencies between the two entities, such as shared infrastructure, have decreased.

The briefing to the committee required by the bill, which must still be approved by the full Senate and then reconciled with the House version, must include: