
Percipient AI CEO Balan Ayyar on the real world application of AI to critical missions
Balan Ayyar is the Founder and CEO of Percipient.ai, a Silicon Valley based artificial intelligence firm focused on delivering products and solutions for the most pressing intelligence and national security challenges.
Percipient.ai is headquartered in Santa Clara, CA, with offices in Reston, VA.
In this OODAcon discussion Balan describes his approach to how to apply AI to some of the nation’s most significant/serious issues.

The Nevernight Connection – The FBI’s Short Film on Cyber Espionage
Just in time for Security Awareness Month, the FBI has released a short film dramatizing the risk of cyber espionage. Inspired by the case of former CIA officer Kevin Mallory—the professionally produced film details the fictional account of a former U.S. Intelligence Community official who was targeted by China via a fake profile on a professional networking site and recruited to turn over classified information before being arrested.

Cybersecurity Expert Admits to Espionage and International Kidnapping Charges
A long-standing cybersecurity professional Elizabeth Jo Shirley, of Hedgesville, West Virginia, has admitted to unlawfully retaining a document containing national defense information and committing international parental kidnapping, the Department of Justice announced. Shirley attempted to sell classified information from the National Security Agency to the Russian government. Shirley previously had

Secret Service Warns of “Massive” Unemployment Fraud
The U.S. Secret Service has issued an alert regarding large-scale unemployment fraud relating to the Covid-19 crisis and targeting state unemployment insurance programs.

DHS Warns that Conspiracy Theories Are Inciting Attacks Against Communications Infrastructure
The Department of Homeland Security has issued an intelligence alert highlight the threat to communication infrastructures posed by conspiracy theories linking 5G technology to Covid-19. The alert highlights that DHS expects the attacks to increase as the disease spreads to include attacks against telecommunication industry workers.
Developments in cyber espionage tool looks to exfil from air-gapped networks
The cyber espionage framework looks to collect and exfiltrate information, even from air-gapped networks according to research by cybersecurity firm ESET. The framework, which has been in development since 2019, has been dubbed Ramsay and exploits several vulnerabilities and includes capabilities that appear to still be in development and could
Inventory of hacked servers for sale on cybercrime forum exceeds 43,000
Recent cyber intelligence reporting has revealed that the MagBo portal, which sells cyberattackers access to previously compromised servers, is now listing an inventory of 43,000 hacked servers. The portal provides access to hacked servers, with some belonging to local and state government, hospitals, and financial organizations and has firmly established
Law firm hackers double ransom and claim to have material on President Trump
The cybercrime group REvil has doubled the extortion ransom against compromised law firm Grubman, Shire, Meiselas and Sacks. The law firm represents clients such as Lady Gaga, Drake, Elton John, Madonna, Robert De Niro, LeBron James, The Weeknd, and Priyanka Chopra. Despite the fact that President Trump was not a
Cisco and Palo Alto Networks appliances impacted by Kerberos authentication bypass
A high risk authentication bypass vulnerability was found to impact a wide variety of Cisco and Palo Alto Networks devices. The issue was the result of an error in the implementation of the Kerberos protocol that could allow an attacker to get administrative control over the devices and execute a
Utah Says No to Apple/Google COVID-19 Tracing; Debuts Startup App
A new startup company called Twenty Holding has developed an app called “Healthy Together” that will aid in contact tracing for the Coronavirus in Utah. Healthy Together uses location data that includes GPS, cell tower triangulation, and bluetooth to distinguish users and Coronavirus transmission zones. Contact tracers can use the