b'Protecting U.S. Dams As more American sectors seek to protect themselves from malware, many are turning to INLs cybersecurity experts for help. One example is the U.S. Bureau of Reclamation, which wanted a network traffic monitoring and analysis tool for the dams and reservoirs categorized as critical infrastructure across the West. INL developed the Malcolm software as an enterprise-class, scalable, operational technology solution. The network traffic analysis tool provides a variety of options for deployment and configuration suitable for use in the field as well as in the lab. INL, in conjunction with the U.S. Department of Homeland Security, released Malcolm as an open-source project on INLs GitHub website.Securing Wireless Systems Many wireless systems are poorly secured and unmonitored, allowing hackers to pull data from them or even gain control without detection. Yet wireless devices are often found in critical infrastructure systems such as the electric power grid, oil and gas pipelines, or manufacturing facilities, which could be impacted by interference or a malicious attack via a wireless connected device. INLs Wireless radio Frequency signal Identification and protocol Reverse EngineeringWiFIREis based on the simple acknowledgement that you must know what is going on around you in order to protect your wireless communications activities. In short, WiFIRE is radar for your wireless network. The technology won an R&D 100 Award in 2019. 25'