White House reportedly aims to double AI research budget to $2B

White House | February 08, 2020

The White House is pushing to dedicate an additional billion dollars to fund artificial intelligence research, effectively doubling the budget for that purpose outside of Defense Department spending, Reuters reported today, citing people briefed on the plan. Investment in quantum computing would also receive a major boost. The 2021 budget proposal would reportedly increase AI R&D funding to nearly $2 billion, and quantum to about $860 million, over the next two years. The U.S. is engaged in what some describe as a “race” with China in the field of AI, though unlike most races this one has no real finish line. Instead, any serious lead means opportunities in business and military applications that may grow to become the next globe-spanning monopoly, a la Google or Facebook — which themselves, as quasi-sovereign powers, invest heavily in the field for their own purposes.

Spotlight

The Patent Public Advisory Committee (PPAC or Committee) thanks the United States Patent and Trademark Office (USPTO or Office), and in particular, Deputy Under Secretary Michelle Lee, for the assistance and positive atmosphere enabling our committee to interact effectively and efficiently with the employees of the USPTO. Throughout the year, all personnel of the USPTO provided unfettered access to the information requested by the PPAC in the role as advisors. They regularly provided detailed information allowing us to better understand the complex issues facing the USPTO and permitted constructive discussions of options, constraints, and upcoming initiatives for our consideration and comment. The PPAC thanks all of the employees of the USPTO for their assistance over this year and for the efforts made by all to improve the system and provide a world class patent office. The leadership at the USPTO has consistently demonstrated a commitment to excellence throughout all of our interactions and we commend their efforts to continually provide better service, quality, information, and interactions with the public. This positive atmosphere translated to more productive interactions with the PPAC and the public in numerous venues. The USPTO continued to demonstrate transparency by holding public meetings and issuing requests for comment on various proposed changes, actions which can only provide better results. We are grateful to the management of the USPTO and the examiners’ union, POPA, for the assistance we have received in fulfilling our roles as members of the PPAC. We look forward to our continuing interactions with the USPTO. FY 2014 was a year of recovery from the budget cuts stemming from sequestration in FY 2013, resulting in delays to projects and improvements. The USPTO has made excellent progress during FY 2014, accomplishing improvements in a number of areas, largely due to increased access to fees compared to FY 2013. Sequestration in FY 2013 had necessitated significant cuts in the IT initiatives and hiring, but during FY 2014, these projects were begun again to continue the critical IT initiatives and pendency reduction efforts targeted by the USPTO.


Other News
GOVERNMENT BUSINESS

Inmarsat Government LAISR Wins 2022 MSUA Satellite Mobile Innovation Award

Inmarsat Governmen | March 23, 2022

Inmarsat Government, the leading provider of secure, global, mission-critical telecommunications to the U.S. government, is the recipient of a 2022 Satellite Mobile Innovation Award from the Mobile Satellite User Association (MSUA). The company was honored in the “Aerospace Mobile Innovation” category for its L-Band Airborne Intelligence, Surveillance and Reconnaissance (LAISR) service. This year’s recognition marks the sixth time in seven years that Inmarsat was selected as a winner of this prestigious award. LAISR joins Inmarsat’s Arctic payloads – GX10A & GX10B – Global Xpress, LACE II, L-TAC and WiSL in the list of the company’s innovations that MSUA has recognized with this prestigious award. Inmarsat Government, a wholly owned subsidiary of Inmarsat, developed the LAISR capability in response to U.S. government requirements for cost-effective high-speed beyond line-of-sight (BLOS) global connectivity for small-aperture aero platforms. With LAISR, airborne users can receive and return large quantities of video and sensor data at rates as high as 3 Mbps, while simultaneously maintaining the reliability, ease of use and low cost of adoption that is provided by the ELERA worldwide space and ground network. LAISR is delivered via low-profile, small form-factor ultralightweight terminals that maximize aviation platform range and reduce signatures. The compact size and low weight of these terminals make them ideal for smaller Unmanned Aerial Systems (UAS). Inmarsat’s team prides itself on delivering innovative solutions that meet our customers current and future needs – and LAISR is a testament to our commitment to the U.S. government market. Every innovation is designed with our customers and their missions in mind so that they can operate with confidence.” Steve Gizinski, President, Inmarsat Government About Inmarsat Government The U.S. government has relied on and trusted Inmarsat satellite services since 1979. Inmarsat Government continues to deliver the world’s most advanced global, mobile satellite communication services to U.S. defense, intelligence, homeland security, public safety and civilian agencies, with highly reliable, secure and affordable connectivity. Built with government users in mind, Inmarsat Government provides resilient, flexible capabilities to complement government satellite resources, anytime, anywhere. Leveraging an industry-leading scalable multiband network infrastructure, Inmarsat Government offers a suite of managed network services and end-to-end communication solutions to support users on land, at sea and in the air, even in the world's most remote regions. Headquartered in Reston, VA, Inmarsat Government is a wholly-owned subsidiary of Inmarsat Group Holdings Limited. About Inmarsat Inmarsat is the world leader in global, mobile satellite communications. It owns and operates the world’s most diverse global portfolio of mobile telecommunications satellite networks, and holds a multi-layered, global spectrum portfolio, covering L-band, Ka-band and S-band, enabling unparalleled breadth and diversity in the solutions it provides. Inmarsat’s long-established global distribution network includes not only the world’s leading channel partners but also its own strong direct retail capabilities, enabling end to end customer service assurance. The company has an unrivalled track record of operating the world’s most reliable global mobile satellite telecommunications networks, sustaining business and mission critical safety & operational applications for more than 40 years. It is also a major driving force behind technological innovation in mobile satellite communications, sustaining its leadership through a substantial investment and a powerful network of technology and manufacturing partners. Inmarsat operates across a diversified portfolio of sectors with the financial resources to fund its business strategy and holds leading positions in the Maritime, Government, Aviation and Enterprise satcoms markets, operating consistently as a trusted, responsive and high-quality partner to its customers across the globe.

Read More

CYBERSECURITY

CISA, FBI, NSA, and International Partners issue advisory on Demonstrated Threats and Capabilities of Russian State-Sponsored and Cyber Criminal

CISA | April 22, 2022

The Cybersecurity and Infrastructure Security Agency (CISA), along with the Federal Bureau of Investigation (FBI), National Security Agency (NSA), Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security (CCCS), National Cyber Security Centre New Zealand (NZ NCSC), and the United Kingdom’s National Cyber Security Centre (NCSC-UK) and National Crime Agency (NCA), with contributions from industry members of the Joint Cyber Defense Collaborative, issued a joint Cybersecurity Advisory on Russian state-sponsored and criminal cyber threats to critical infrastructure that could impact organizations both within and beyond Ukraine. It is the most comprehensive view of the cyber threat posed by Russia to critical infrastructure released by government cyber experts since the invasion of Ukraine in February. The advisory provides technical details on malicious cyber operations by actors from the Russian Federal Security Service (FSB), Russian Foreign Intelligence Service (SVR), Russian General Staff Main Intelligence Directorate (GRU), and Russian Ministry of Defense, Central Scientific Institute of Chemistry and Mechanics. It also includes details on Russian-aligned cyber threat groups and cybercrime groups. Some of these cybercrime groups have recently publicly pledged support for the Russian government and have threatened to conduct cyber operations in retaliation for perceived cyber offensives against Russia or against countries or organizations providing materiel support to Ukraine. The advisory recommends several immediate actions for all organizations to take to protect their networks, which include: Prioritize patching of known exploited vulnerabilities; Enforce multifactor authentication; Monitor remote desktop protocol (RDP); and Provide end-user awareness and training We know that malicious cyber activity is part of the Russian playbook. We also know that the Russian government is exploring options for potential cyberattacks against U.S. critical infrastructure. Today’s cybersecurity advisory released jointly by CISA and our interagency and international partners reinforces the demonstrated threat and capability of Russian state-sponsored and Russian aligned cyber-criminal groups to our Homeland. We urge all organizations to review the guidance in this advisory shields-up for continually updated information on how to protect yourself and your business.” Jen Easterly, CISA Director "The FBI is focused on exposing and disrupting malicious cyber activity by Russia against our allies and our own networks," said Bryan Vorndran, FBI Cyber Division Assistant Director. "We are working alongside our federal and international partners to quickly share information that helps private industry as well as the public to better protect and defend their systems from these threats. We will continue to investigate these malicious threat actors through our unique authorities and hold them accountable for their actions.” “Threats to critical infrastructure remain very real," said Rob Joyce, NSA Cybersecurity Director. "The Russia situation means you must invest and take action.” “Recent intelligence and historic instances of destructive cyber attacks indicate now is the time for organisations to improve their cyber security posture,” said Abigail Bradshaw, Head, Australian Cyber Security Centre. “In particular, critical infrastructure organisations should act now to raise defences, not wait until being attacked. The ACSC stands ready to support its critical infrastructure partners in responding to the threats we face - by raising their awareness of the threat, sharing indicators of compromise, and providing technical mitigation advice.” “Russia has significant cyber capabilities and a demonstrated history of using them irresponsibly, and state-sponsored malicious cyber activity is a real risk to organizations around the world,” said Sami Khoury, Head, Canadian Centre for Cyber Security. “By joining alongside our partners in releasing today’s joint advisory, the Communications Security Establishment and its Canadian Centre for Cyber Security continue to support making threat information more publicly available, while providing specific advice and guidance to help protect against these kinds of risks.” “We are currently seeing an increased potential for cyber-attacks on critical infrastructures which may have a serious impact, even for countries and organisations not directly targeted,” said Lisa Fong, Director of New Zealand’s National Cyber Security Centre. “Organisations should take the opportunity to consider their security posture, understand their critical systems and risks – including across their supply chain – and exercise readiness. This joint advisory with our partners provides organisations with important information which will help them to build their cyber resilience by identifying and mitigating risks they face.” “In this period of heightened cyber threat, it has never been more important to plan and invest in longer-lasting security measures,” said Lindy Cameron, NCSC CEO. “It is vital that all organisations accelerate plans to raise their overall cyber resilience, particularly those defending our most critical assets. The NCSC continues to collaborate with our international and law enforcement partners to provide organisations with timely actionable advice to give them the best chance of preventing cyber-attacks, wherever they come from.” “Cyber attacks have evolved and increased in scale and severity over recent years, with the criminal groups behind them targeting the critical infrastructure of countries around the world,” said Rob Jones, NCA Director General for Cyber. “The NCA leads the UK law enforcement response to this threat, working with a range of international partners to investigate cyber criminals and disrupt the services they rely on. It is vital that organisations help bolster this response by enhancing cyber resilience and reporting any incidents of cyber crime to the authorities, to allow timely mitigation of further attacks.” Because evolving intelligence indicates that the Russian government is exploring options for potential cyberattacks, the cybersecurity authorities are providing this robust advisory with several resources and mitigations that can help the cybersecurity community protect against possible cyber threats from these adversarial groups. Executives, leaders, and network defenders are urged to implement recommendations to prepare for and mitigate the varied cyber threats listed in the Cybersecurity Advisory here. All organizations should share information about incidents and unusual cyber activity with their respective cybersecurity authorities. When cyber incidents are reported quickly, it can contribute to stopping further attacks. About CISA As the nation’s cyber defense agency, the Cybersecurity and Infrastructure Security Agency (CISA) leads the national effort to understand, manage, and reduce risk to the digital and physical infrastructure Americans rely on every hour of every day.

Read More

GOVERNMENT BUSINESS

Israel's Ministry of Defense Selects Anjuna Security Software to Lockdown Sensitive Data in Public Clouds

Anjuna | February 17, 2022

Anjuna Security Inc., the Confidential Cloud company, today announced that Israel's Ministry of Defense (MOD) has entered into the public cloud for the first time with Anjuna's software, which offers the strongest data security available. With Anjuna Confidential Cloud software, the MOD can leverage Confidential Computing features available in cloud servers that eliminate exposure of data in use to insiders, malicious software and bad actors. Sensitive data and applications remain fully encrypted with Anjuna– without the need for any software modifications–and stay isolated and in full control of the MOD. The decision from the Israeli MOD represents a critical milestone for far greater adoption of the public cloud by organizations in regulated industries or those with highly sensitive data. To date, many companies and government organizations have held back from the public cloud because of security concerns and control issues. The stringent testing and subsequent selection by the MOD signals that with the widely available Confidential Computing technology already in cloud infrastructure and software from Anjuna, the public cloud is now secure enough for organizations with the strictest level of security and regulation. "With Anjuna Confidential Cloud software, we are able to leverage Confidential Computing to achieve public cloud scale, agility and economics and maximum data security immediately, without having to recode or refactor applications," said the Infrastructure Cloud Group Leader for the IMOD. "This will allow us to quickly move important workloads across public clouds without compromising the high level of security necessary to achieve our mission." Confidential Computing is the hardware-based capability that public cloud vendors, including Amazon AWS, Microsoft Azure and Google Cloud, have added to their servers to enable customers to secure data at runtime when it would otherwise be exposed. Protecting data and applications during execution closes a gap that effectively shuts out unauthorized personnel and creates a trusted environment within the public cloud that is under the control of the customer. Israel's MOD, which oversees most of the Israeli security forces and is responsible for the overall security of the Israeli nation, including the Israeli Defense Forces (IDF), assigned a red team to conduct a thorough evaluation of the Anjuna Confidential Cloud software, using compute-intensive AI workloads as the initial application. Test considerations included the ability to secure against rogue or accidental insiders, third parties, criminal hackers and nation-states. The solution also had to be commercially available now, run across multiple cloud platforms and make both migrating applications and administration simple. In addition to fully securing workloads in public clouds without modification, the Anjuna Confidential Cloud software is attractive to the MOD because it provides a single, uniform encryption platform that protects all three states of data: storage, transit and execution. With Anjuna, organizations do not need to rely on the many different encryption schemes for each application and system, which causes undue confusion and complexity. The Confidential Cloud software provides a consistent data perimeter that also eliminates the risk of exposing encryption keys during runtime. "Israel's Ministry of Defense is among the most advanced and stringent security organizations in the world, so it is a tremendous advantage for them to now be able to turn public clouds into fully trusted environments capable of securely processing sensitive data. With Anjuna, it is both feasible and practical to make the public cloud at least as secure as private infrastructure. We are proud to add the IMOD as a customer." Ayal Yogev, co-founder, and CEO of Anjuna Anjuna Confidential Cloud software makes the use of Confidential Computing transparent to applications and operations, enabling their use without modification. It supports all applications, regardless of size or computational task. With Confidential Computing, companies can secure highly sensitive data, such as state secrets, AI code, intelligence and security details, personally identifiable information (PII), financial information and intellectual property. About Anjuna Anjuna Security makes the public cloud secure for business. Software from Anjuna Security effortlessly enables enterprises to safely run even their most sensitive workloads in the public cloud. Unlike complex perimeter security solutions easily breached by insiders and malicious code, Anjuna leverages the strongest hardware-based secure computing technologies available to make the public cloud the safest computing resource available anywhere. Anjuna is based in Palo Alto, California.

Read More

CYBERSECURITY

QuoLab Technologies Announces Partnership With B Technology

QuoLab Technologies | April 18, 2022

QuoLab Technologies, provider of a data-centric security operations platform (SOP), announced its partnership with B Technology, an Austin, Texas-based IT infrastructure and cyber security solutions provider. B Technology will serve as an official reseller of the QuoLab platform, helping the company to extend its reach to both commercial and government entities. Now more than ever, strong security is a requirement for every organization. This partnership will empower us to deliver much-needed collaboration capabilities to more practitioners than ever before. Mirroring our own beliefs, B Technology is acutely focused on helping the people behind the scenes make security a reality for organizations. Together, we can truly be a force for good by putting power back into the hands of those protecting our most vital systems.” Dan Young, CEO of QuoLab As an official reseller, B Technology will offer QuoLab’s platform to its current customer base, including the Department of Defense (DoD), Intelligence, and Civilian Agencies across the Federal Government, as well as all future customers. This is the first partnership of its kind for B Technology, and will open the door to more opportunities for both companies. “Security is a monumental task, and it takes a lot of time and resources to ensure that it’s getting done right,” said Stephanie Miller, President of B Technology. “With QuoLab’s platform, organizations will be able to cut time and costs, freeing individual practitioners up to focus more on the tasks that matter most, while also removing the common roadblocks that have prevented them from fully accomplishing their goals in the past.” This partnership highlights QuoLab’s continued commitment to bringing enhanced security operations capabilities to organizations worldwide, last seen in its partnership with WhoisXML API. In addition to these efforts, QuoLab aims to continue being an innovative force within the industry and will be bringing new capabilities to market, as well as engaging in more reseller partnerships in 2022. About B Technology B Technology is an SBA-Certified Woman-Owned and HUBZone small business leveraging over 20 years of experience in federal government service, contract administration, Command, Control, Communications, Computers, and Information Management (C4IM), and cybersecurity expertise to delivering a broad range of Infrastructure Operations, Cybersecurity, Virtualization, and Cloud Computing services. The company delivers critical communications and network security to customers in the Department of Defense (DoD), Intelligence, and Civilian Agencies across the Federal Government. B Technology is quality and security focused – ISO 9001:2015 and ISO/IEC 27001:2013 certified. About QuoLab Technologies QuoLab Technologies empowers security professionals to analyze, investigate and respond to threats within an integrated ecosystem. The collaborative, data-centric platform merges deep analytics and intuitive workflows, enabling human operators to efficiently deliver on their mission. The company believes that increased focus on cooperation, combined with scalable, distributed data handling and processing techniques is the key to gaining a decisive advantage in the ever-evolving security operations space.

Read More

Spotlight

The Patent Public Advisory Committee (PPAC or Committee) thanks the United States Patent and Trademark Office (USPTO or Office), and in particular, Deputy Under Secretary Michelle Lee, for the assistance and positive atmosphere enabling our committee to interact effectively and efficiently with the employees of the USPTO. Throughout the year, all personnel of the USPTO provided unfettered access to the information requested by the PPAC in the role as advisors. They regularly provided detailed information allowing us to better understand the complex issues facing the USPTO and permitted constructive discussions of options, constraints, and upcoming initiatives for our consideration and comment. The PPAC thanks all of the employees of the USPTO for their assistance over this year and for the efforts made by all to improve the system and provide a world class patent office. The leadership at the USPTO has consistently demonstrated a commitment to excellence throughout all of our interactions and we commend their efforts to continually provide better service, quality, information, and interactions with the public. This positive atmosphere translated to more productive interactions with the PPAC and the public in numerous venues. The USPTO continued to demonstrate transparency by holding public meetings and issuing requests for comment on various proposed changes, actions which can only provide better results. We are grateful to the management of the USPTO and the examiners’ union, POPA, for the assistance we have received in fulfilling our roles as members of the PPAC. We look forward to our continuing interactions with the USPTO. FY 2014 was a year of recovery from the budget cuts stemming from sequestration in FY 2013, resulting in delays to projects and improvements. The USPTO has made excellent progress during FY 2014, accomplishing improvements in a number of areas, largely due to increased access to fees compared to FY 2013. Sequestration in FY 2013 had necessitated significant cuts in the IT initiatives and hiring, but during FY 2014, these projects were begun again to continue the critical IT initiatives and pendency reduction efforts targeted by the USPTO.

Resources