Cyber Operations

July 17, 2013
George I. Seffers

Booz Allen Hamilton Inc., McLean, Va.; CACI Technologies Inc., Chantilly, Va.; Computer Sciences Corp., Falls Church, Va.; General Dynamics One Source LLC, Fairfax, Va.; Honeywell Technology Solutions Inc., Columbia, Md.; Engility Corp., Mount Laurel, N.J.; Lockheed Martin Services Inc., Gaithersburg, Md.; Science Applications International Corp., McLean, Va.; Scientific Research Corp., Atlanta, Ga.; Secure Mission Solutions, Fairfax, Va.; STG Inc., Reston, Va.; Systems Research and Applications Corp., Fairfax, Va.; and URS Federal Services Inc., Germantown, Md., are each being awarded an i

March 28, 2012
By George Seffers

Panelists at TechNet Land Forces Southwest offered ideas for attracting, training and retaining cyber warriors. Ideas included bringing more women into cyber, simplifying the process for current soldiers who want to transition, and increasing opportunities for career and leadership development.

December 2011
By Rita Boland, SIGNAL Magazine

Earlier this year, the U.S. Air Force Portal was spoofed, causing a ripple of concern through the service branch. Nearly identical to the real site, the fake one aimed to fool people into entering their log-ins and passwords so the information could be captured by illicit sources. Such scams are on the rise across the Internet, and the U.S. Defense Department is not immune to the threat. But in a government department known for passing orders from the top down, the only way to secure the networks is through awareness at the lowest level.

December 2011
By Max Cacas, SIGNAL Magazine

As more complicated networks develop and deploy unique and expanded capabilities, protecting U.S. cyber infrastructure grows more challenging. The Department of Homeland Security’s National Protection and Programs Directorate is responsible for defending the nation’s commercial and private networks. But with the complexity of these products, the directorate’s success increasingly depends both on sharing responsibilities among government organizations and between government and industry.

December 2011
By George I. Seffers, SIGNAL Magazine

Evolving technologies such as mobile devices, cloud computing and steganography present challenges for those tasked with finding digital evidence of a crime. But the cyber forensics field also is evolving, and experts in industry and government are finding innovative tools for overcoming the obstacles.

August 1, 2011
By Rachel Eisenhower

The U.S. Defense Department faces many hurdles in its effort to protect and defend government computer networks. According to an unclassified version of a previously issued classified report from the U.S. Government Accountability Office (GAO), several cyberspace capability gaps exist.

May 2010
By Robert K. Ackerman, SIGNAL Magazine

The U.S. Navy already is encountering unexpected changes following the consolidation of its N-2 and N-6 organizations. The effects of the merger already are leaving their mark on the organization itself along with the rest of the service. Budgetary planners effectively are defining the new organization’s campaign plan for the next few years. And, new technologies have leaped to the top of the Navy’s priority list.

January 29, 2010

Although the U.S. Navy has been in the cyber arena for many years, today the service officially moved into the operational cyber domain as Vice Adm. Barry McCullough, USN, took command of the U.S. Fleet Cyber Command/U.S. 10th Fleet.

March 4, 2009
By Beverly Schaeffer

The networked world is beginning to discover that sharing is not always beneficial. Marauders always have been the bane of cyberspace, but now a new set of threats has emerged to imperil more than just the usual targets. Ordinary citizens now are menaced by sophisticated organizations seeking to damage society or to loot it of its funds-or both. And, as always, the network-centric military is under assault by increasingly frequent and effective cyberagents operating under foreign government control.

March 2009
By Rita Boland

The dark-hearted members of the human race have found ways to exploit innovations for their own selfish means throughout time. Now, with the ever-growing global dependence on computer networks, criminals are finding new ways to disrupt lives in the real world through enterprise in the cyber one. The U.S. Department of Justice and its allies have adapted their methods and techniques over the past decade and continue to adjust to prevent the morphing illegal activities in cyberspace, whether the computer crime itself is the full intent or only part of a larger scheme.

March 2009
By Henry S. Kenyon

Modeling initiatives and new research into predictive systems are required to thwart the increasingly aggressive, ever-evolving cyberattacks on both equipment and data. These efforts are part of the recommendations of a recent report by the U.S. Department of Energy that calls for a more scientific approach to cybersecurity. The report criticized U.S. government and private organizations for relying on outdated forms of cyberdefense that are a step behind the latest threats.

March 2009
By Maryann Lawlor

The next “shot heard ’round the world” may turn out to be the surreptitious movement of millions of bits and bytes careening through cyberspace. Suspicions already surround the cyberactivity that took place in the weeks before Russia launched a conventional military attack against Georgia last year. And in May 2007, the removal of a bronze statue of a World-War-II-era Soviet soldier from a park in Estonia resulted not in riots in the streets but rather in what has been described as the first war in cyberspace. These incidents may indicate how adversaries—and the United States military—could deploy cyberweapons as the first line of offense prior to traditional kinetic activity.