Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

information operations

Some Cyber Attackers Lie Low

August 14, 2014
By George I. Seffers

Lockheed Martin officials report that some attackers against their networks have disappeared—for now.

U.S. Army Prototypes to Ease Warfighters’ Reliance on GPS

August 7, 2014
By Sandra Jontz

U.S. Army engineers developed technology prototypes aimed at weaning U.S. forces from dependence on GPS systems.

Software Programs Aid Intelligence Analysts In Hunt for the Enemy

July 16, 2014
By Sandra Jontz

Where human analysis might fail in the intelligence community, technological solutions are at the ready to fill the void. Companies are ginning up software programs that can prove to be key for intelligence analysts as they track the bad guys—be they insider threats or an outside enemy.

National Labs and Industry Partner to Train Critical Infrastructure Cybersecurity Specialists

July 14, 2014
By George I. Seffers

Lawrence Livermore National Laboratory and Los Alamos National Laboratory join Bechtel BNI to train a new class of cyberdefense professionals. The program is designed to allow the national labs to recruit and rapidly develop cybersecurity specialists who can guide research at their respective institutions and create solutions that meet the cyberdefense needs of private industry.

Cyber Operations Centers of Academic Excellence List Expands

July 14, 2014
By George I. Seffers

The National Security Agency has added five schools to the National Centers of Academic Excellence in Cyber Operations Program.

Defense Spectrum Community Aims for National Strategy

July 1, 2014
By George I. Seffers

U.S. Defense Department officials intend to complete a departmentwide spectrum strategy road map this month, which will make more frequencies available to warfighters, provide greater flexibility—especially for international operations—and ultimately allow warfighters to conduct their missions more effectively. At the same time, however, some are suggesting a nationwide strategy to allow for more innovative and effective spectrum management and sharing across government and industry.

The Defense Department released its spectrum strategy in February to address the ever-increasing demand for wireless spectrum to achieve national security goals. That strategy largely was written by personnel within the Defense Information Systems Agency (DISA) Defense Spectrum Organization (DSO) in coordination with the office of the chief information officer for the Defense Department. Now, the two offices are working on a road map for implementing the strategy.

Concurrently, some are recommending development of a comprehensive, nationwide strategy for spectrum management affecting the Federal Communications Commission (FCC), the National Telecommunications and Information Administration (NTIA) and all other agencies as well as the commercial sector. “What we have is a spectrum structure within the United States that was first created by the Telecommunications Act of 1934. We have created a pretty rigid system. What we’re pushing for through our spectrum strategy are changes and innovative ways to operate spectrum,” says Stuart Timerman, DSO director. “We would like to see that adopted nationally to have a national spectrum strategy where the FCC, NTIA and all of the federal agencies and commercial industry would plan for the future.”

Insider Threat Survey Reveals Increased Awareness, Little Action

May 20, 2014
By George I. Seffers

Raytheon-commissioned Ponemon Institute Survey: 88 percent believe privileged user abuse will increase.

National Security Agency Program Fills Critical Cyber Skills Gaps

June 1, 2014
By George I. Seffers

The first graduates are emerging from centers of excellence for cyber operations that teach the in-depth computer science and engineering skills necessary to conduct network operations. The program better prepares graduates to defend networks and should reduce the on-the-job training needed for new hires, saving both time and money.

The National Security Agency (NSA) initiated the Centers of Academic Excellence-Cyber Operations (CAE-CO) program in 2012. Eight schools were designated centers of excellence in the first two years with another round of announcements expected in mid-June. Agency officials say they hope eventually to have a total of 20 to 25 schools on the list.

The effort is a deeply technical, interdisciplinary, higher education program firmly grounded in the computer science, computer engineering and electrical engineering disciplines. “We had noticed that a lot of graduates coming out of universities didn’t have quite the same skills that they’ve had in the past,” recalls Steve LaFountain, dean of the College of Cyber, National Cryptologic School, and the distinguished academic chair for information assurance and cyber, NSA. “Some of the skills needed in the cyber operations field, such as low-level programming, deep knowledge of networks and network protocols and understanding of operating systems internals, were starting to become less emphasized by academic programs.”

The change in school curricula is understandable because a lot of jobs today are focused on Web applications and mobile applications and require a different skill set than today’s cyber operations, he adds. “Instead of doing C programming, they’re now doing Java, Perl and Python programming. We decided to create this program and focus the requirements on the skills necessary for cyber operations,” LaFountain explains.

The Bottom Line: JIE Revolutionizes Transformation

May 15, 2014
By Maryann Lawlor

The military’s evolving environment stands on the strong shoulders of the past to reach for the clouds.

Cybersecurity Tentacles Entwine Government

March 11, 2014
By George I. Seffers

It is not surprising that cybersecurity would dominate the discussion on the second day of the AFCEA Homeland Security Conference in Washington, D.C. But the depth and breadth and variety of topics surrounding cybersecurity and information protection in all its forms indicates the degree to which the information security mission has engulfed every department and agency at all levels of government.

Pages

Subscribe to RSS - information operations