Experiments
This section of IDManagement.gov is dedicated to ongoing experiments and research initiated by the GSA Office of Government-wide Policy, Identity Assurance and Trusted Access Division, other agencies, industry and academia partners.
Please reach out to icam@gsa.gov with ideas, questions, and collaboration opportunities for us to consider.
IARPA HIATUS
The HIATUS - Human Interpretable Attribution of Text using Underlying Structure program aims to address various Intelligence Community (IC) and Law Enforcement (LE) needs such as combating sophisticated malicious information campaigns online, addressing counterintelligence risks, and fighting human trafficking and online fraud. It does so by developing novel Artificial Intelligence (AI) systems for attributing document authorship (Who is the author of this text?) in an explainable way (What is the evidence of authorship?), detecting AI-generated text (Was this document written by human or machine?) and protecting author privacy (How do I ensure that my writing is not attributable?).
HIATUS program artifacts such as trainable Dockerized text author attribution/privatization systems, auxiliary data processing and annotation scripts, and datasets are available at no cost to USG agencies and their contractors. Since the program kick-off in 2022, IARPA has successfully transitioned some of these artifacts to several Government agencies.
If your mission relies on determining authorship of text, text privatization or detection of machine-generated text content, please reach out to dni-iarpa-hiatus@iarpa.gov to discuss transition of HIATUS technology. The program is also interested in learning about new use cases.
To learn more about the IARPA HIATUS program and how it works, click the button below.
CDN Paper 1
Content Delivery Networks (CDNs) are integral to modern web infrastructure, offering improved performance, scalability, and security. However, they are often assumed to be infallible, which can cause people to overlook the potential vulnerabilities that cyber actors can exploit to access individual digital profiles, credentials, and sensitive information. In this paper, we examine these assumptions and associated risks.
CDN Paper 2
Content Delivery Networks (CDNs) are critical to ensuring fast and reliable web services. However, their ubiquity and central role in web infrastructure make them attractive targets for attackers. This paper provides a detailed analysis of attack methods, including supply chain attacks, cache poisoning, and DNS spoofing, which can exploit CDNs to spread malicious scripts and compromise digital personas.
Personal Security and Identity Management
Many people inadvertently create a false sense of security, mistaking the feeling of safety for actual security. To truly protect yourself and your loved ones, it’s vital to explore the distinction between feeling secure and being secure. While feeling secure is comforting, genuine security is what ultimately matters. Security can seem overwhelming, but the PDD™ framework simplifies it by providing an organized approach to assess and enhance your security strategy.
Read the Personal Security and Identity Management Paper
Coming Soon
We are continuously adding new content to the Experiments section, the following is a list of whats next.
- Public Identity Best Practices Guide
- Post Quantum Crypto(PQC) and Post Quantum Encryption(PQE) for logical and Physical Access
- Mobile PIV