Honeywell Technology Solutions Inc., Columbia, Md., is being awarded a not to exceed $14,240,320 indefinite-delivery/indefinite-quantity contract with firm-fixed-price provisions for continuation of technical and analytical support services for the Office of Compliance and Assessment.
The task of protecting U.S. military cyber assets is increasing in complexity as new capabilities come to dominate communications and networking. Planners must implement security measures that do not hinder the new technologies introduced to the force.
That challenge was in a cyber fireside chat that opened the final day of AFCEA/USNI West 2013 in San Diego. Robert J. Carey, deputy chief information officer for the U.S. Defense Department, noted that one key tasking is to protect the mobile devices that now are proliferating in the force.
The U.S. Cyber Command force is likely to increase to 14,000 people over the next few years as the command trains experts and disperses them where they will be needed, according to its deputy commander. Lt. Gen. Jon M. Davis, USMC, told the audience at a morning fireside chat beginning the last day of AFCEA/USNI West 2013 that the command already has an assigned force of 6,000 as it ramps up to carry out its dynamic mission.
SIX3 Advanced Systems Inc., Dulles, Va., is being awarded a $7,035,000 contract modification for establishment of program requirements and milestones for Cyber Fast Track Commercial Agreements. The location of the performance is Dulles, Va. Work is expected to be completed by Jan. 18, 2014. The contracting activity is the Air Force Research Laboratory, Rome, N.Y.
The Department of Homeland Security Science and Technology Directorate (DHS S&T) has awarded 34 contracts to 29 academic and research organizations for research and development of solutions to cyber security challenges.
The U.S. Air Force is polishing its magnifying glass to find usable information in amongst overwhelming stacks of data.
Lockheed Martin has announced that the company has been selected to deliver a full range of technical, functional, and managerial support to the Department of Defense Cyber Crime Center (DC3) to help thwart cyber criminals. DC3 assists in the investigation of criminal, counterintelligence and counterterrorism matters, as well as cyber security support to Defense Industrial Base partners.
When the hacker activist group Anonymous broke into Booz Allen Hamilton's networks and stole thousands of email addresses, the company was embarrassed, and that's exactly what Anonymous wanted, said Joseph Mahaffee, the company's chief information officer.
The NATO Consultation, Command and Control Agency announced today the award of the agency's largest cyber defense contract to date. The approximate 58 million Euro NATO Computer Incident Response Capability, Full Operational Capability contract was awarded to a Finmeccanica, Rome, Italy, and Northrop Grumman Corporation, Falls Church, Virginia. The contractor team will provide security on NATO's networks and protect over 22,000 NATO military and civilians employees enhancing NATO's cyber defense infrastructure and its ability to support member states.
Amazing anecdotes kept the audience entertained during the lunch session at the AFCEA International Homeland Security Conference. The experts were speaking about a serious subject: cyberwar. But the stories about their hands-on experience in learning how to fight cyberwars, how they've fought cyberthreats and what they believe is needed to prepare future cyberwarriors kept conference attendees enthralled.
The Air Force and Arlington County, Virginia, are taking preventative measures against hackers such as the ones that recently attacked Sony, costing them over $170 million. It's not just money at risk for government networks, however.
Creating a national strategy for deterring cyber attacks faces difficult challenges, according to Gen. Keith Alexander, USA, U.S. Cyber Command commander and director of the National Security Agency.
The Defense Department's FY 2012 budget proposal features $2.3 billion for improved cyber capabilities, according to figures released this afternoon. Key elements of that funding include $0.5 billion for the Defense Advanced Research Projects Agency (DARPA) to invest in cyber technologies. Funding also will be provided to the Defense Information Systems Agency (DISA) for cyber identity, monitoring and enforcement.
University Multispectral Laboratory, Oklahoma State University, Stillwater, Oklahoma, is being awarded a potential $39 million contract modification to provide support services, which include identification, analysis, selection, testing and evaluation of solutions to warfighter requirements for command, control, communications, computer, cyber, intelligence, surveillance, and reconnaissance/chemical, biological, radiological, nuclear and explosive sensors and sensor-related technology.
Point One, Arlington, Virginia, was recently awarded a $68 million contract for cyber analytical information technology services. Work is to be performed in Fort Meade, Maryland, with an estimated completion date of Sept. 29, 2015.Virginia Contracting Activity is the contracting activity.
Not everyone can step into the cockpit of an aircraft, but training allows U.S. Air Force officers and airmen from all backgrounds to get on the Internet and defend threatened networks.
In less than 30 days, the Defense Department will dish out 11 prizes for innovative solutions to real-world challenges facing digital forensics examiners. And it's not too late to join the fight against cyber crime. Submissions for the 2010 Defense Department Cyber Crime Center (DC3) Digital Forensics Challenge will be accepted until November 2.
This month, Linton Wells II drew his inspiration for Mission Assurance Moves to the Fore in Cyberspace from Deputy Secretary of Defense William J. Lynn III's recently published article, Defending a New Domain: The Pentagon's Cyberstrategy. Wells summarizes Lynn's strategy points, noting that taken on a whole they have a broader implication than just cyberdefense. It has more to do with mission assurance, he says. But he has a number of concerns, among them: how will the new cyberstrategy be implemented? And how can the private sector do a better job of meeting its requirements?