Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

signalarticles

Automated Diagnostics and Mitigation Protects Civilian Government Computer Networks

March 1, 2014
By Henry S. Kenyon

A Department of Homeland Security program is automating the cyber attack detection process to manage the bulk of intrusion detection and mitigation work in real time across the entire civilian government. This effort addresses a long-time shortcoming for detecting attacks and intrusions into government computer networks. Traditionally, this activity has been a time-consuming and manpower-intensive process that would take place days or weeks after the incident.

National Security Advances in an Increasingly Connected World

March 1, 2014
By Rita Boland

Homeland security officials are battling privacy and technology issues amid the new social media era that offers both challenges and opportunities. Just as new technologies and information sharing architectures have improved interagency data sharing, new sources of potentially valuable information have emerged to vex planners who must handle technical obstacles and personal rights.

Coast Guard Develops Indigenous Technologies for Cutters

March 1, 2014
By George I. Seffers

By the end of this fiscal year, the next-generation command and control system for much of the cutter fleet should be installed on the U.S. Coast Guard’s 270-foot cutter class, and the system is now being considered for inclusion on 225-foot and 110-foot vessels. The system, called SeaWatch, combines navigational and tactical, optical surveillance and communications into one situational awareness picture; provides commonality across the fleet; and replaces an aging system that has outlived its usefulness.

NATO Focuses on Terrorist Cyber Exploitation

March 1, 2014
By Robert K. Ackerman

NATO’s efforts to defend against terrorism now are focusing on cyberspace as a tool of terrorists instead of merely as a vulnerability for striking at alliance nations and their critical infrastructure. These efforts cover aspects of cyber exploitation that range from understanding terrorists’ behavior to how they might use social media.

After Long Downturn, Hope Emerges for European Defense Sector

March 1, 2014
By Henry S. Kenyon

Europe’s defense markets have been contracting for the past decade because of the continent’s financial crisis and national priorities shifting away from military spending. But while fewer tanks and fighter jets are being acquired, money is being spent on modernizing computers and communications equipment—a trend that will continue into the foreseeable future, according to an industry analyst.

Partnership Promises to Prevent Cloud Computing Problems

March 1, 2014
By George I. Seffers

Software developed by university researchers accurately predicts cloud computing issues before they occur, enhancing reliability; cutting costs; potentially improving cybersecurity; and saving lives on the battlefield.

Resolving the Critical Infrastructure Cybersecurity Puzzle

March 1, 2014
By George Kamis

The nation’s critical infrastructure and industrial-control systems have become such potential high-value targets for terrorists that their vulnerability threatens the fabric of society. And, as they increase in both importance and vulnerability, these systems cannot be protected using conventional information security measures.

The targets are electrical grids, transportation networks, water systems, oil/gas pipeline operations and other vital resources that serve in the interests of the U.S. economy and the public good—not to mention public safety—every day. Concerns are rising about reported increases in compromise incidents within these systems, coupled with advancements in the “sophistication and effectiveness of attack technology,” according to the Government Accountability Office (GAO). The number of incidents reported by federal agencies to the U.S. Computer Emergency Response Team has surged 782 percent from 2006 to 2012, the GAO reports.

Such attacks can “cause major economic losses, contaminate ecological environment and, even more dangerously, claim human lives,” according to a research report from the University of California, Berkeley. And, industrial control systems (ICS) lie at the heart of this vulnerability.

Global events have triggered the cautionary warnings. Among the most notorious was Stuxnet in 2010, which damaged uranium-enrichment centrifuges in Iran by infecting the country’s nuclear ICS network. In 2012, the Shamoon virus attacked Saudi Arabia’s state oil company, Saudi Aramco, replacing crucial system files with an image of a burning U.S. flag and overwriting essential data with what then-U.S. Defense Secretary Leon Panetta described as “garbage data.” Panetta added that the incident was the most destructive attack the business sector has seen to date, as more than 30,000 computers were rendered useless.

Many Needs Vie for Scarce Defense Funding

February 12, 2014
By Robert K. Ackerman

The budget reductions that will be a fact of military life for the foreseeable future promise to impel dramatic changes in force structure and military operations. Ongoing needs such as high technology and overseas commitments offer the possibility of being both challenges and solutions, as planners endeavor to plan around a smaller but, hopefully, more capable force.

Army Integrates Systems Tools Across Network Echelons

February 10, 2014
By Rita Boland

Soldiers are moving away from the programs that developed stovepiped network operations solutions for particular needs and domains, transitioning to integrated capability sets.

DISA Rolls Out Version One of Unclassified Mobility Capability

February 7, 2014
By Henry S. Kenyon

The Defense Information Systems Agency (DISA) has deployed the initial version of its unclassified mobility capability, which will provide military and civilian Defense Department personnel with access to a wide selection of mobile devices, applications and services.

Pages

Subscribe to signalarticles