It is not surprising that cybersecurity would dominate the discussion on the second day of the AFCEA Homeland Security Conference in Washington, D.C. But the depth and breadth and variety of topics surrounding cybersecurity and information protection in all its forms indicates the degree to which the information security mission has engulfed every department and agency at all levels of government.
Following the terrorist attacks on September 11, 2001, government agencies came under widespread criticism for failing to share information and "connect the dots." By contrast, law enforcement agencies were almost universally praised following the Boston Marathon bombing and the shooting at the Navy Yard in Washington, D.C., both of which took place last year.
The U.S. Customs and Border Protection (CBP) agency is only interested in mobile communication if it allows the agency to perform functions it could not perform otherwise, Mark Borkowski, component acquisition executive and assistant commissioner with the CBP Office of Technology Innovation and Acquisition, told the audience at the AFCEA Homeland Security Conference in Washington, D.C., on Monday.
The real challenge to keeping the homeland secure is dealing with the world's increasing complexity, Adm. Thad Allen, USCG, (Ret.), executive vice president of Booz Allen Hamilton, told the audience at the AFCEA Homeland Security Conference in Washington, D.C., on Monday during his luncheon keynote address.
Homeland Security Conference Show Daily, Day 1
Information sharing and interoperability have come a long way since the terrorist attacks of September 11, 2001, but challenges still remain, agreed speakers and panelists on the first day of the AFCEA Homeland Security Conference in Washington, D.C.
Engineering Services Network (ESN) Inc., Arlington, Va., announced recently that it has won a $700,000 contract to support the 99th Communication Squadron at Nellis Air Force Base, NV. The contract is being managed by the 38th Cyberspace Engineering Installation Group (38 CEIG) at Tinker Air Force Base, OK. Under the contract, ESN will support moving the 99th Communication Squadron into a new communications facility. The company will move all aspects of the Nellis AFN Network Control Center into a new building.
U.S. Secret Service officials are establishing two new cybercrime task forces—in Cincinnati and Denver—that will enhance the agency’s ability to detect and investigate information technology-related crimes, including credit card theft, attacks on the banking and finance infrastructure and identity fraud.
Europe’s defense markets have been contracting for the past decade because of the continent’s financial crisis and national priorities shifting away from military spending. But while fewer tanks and fighter jets are being acquired, money is being spent on modernizing computers and communications equipment—a trend that will continue into the foreseeable future, according to an industry analyst.
Booz Allen Hamilton Inc., McLean, Va., is being awarded $12,502,113 for task order NS27 under a previously awarded cost-plus-fixed-fee, six-month bridge contract (N00178-04-D-4024) for program management office support for the Program Executive Office Enterprise Information Systems, Naval Enterprise Networks (NEN) office. Services being acquired are program management, financial management and administrative services in support of the NEN program office.
U.S. Navy officials expect to award a full-deployment contract for a new shipboard network this spring, and they plan to install the system on nine ships this year. The network provides commonality across the fleet, replacing multiple aging networks, improving interoperability and driving down costs. The Common Afloat Networks and Enterprise Services (CANES) program represents a new business model for delivering capability to the fleet, Navy officials say. The program consolidates five legacy networks into one, which enhances operational effectiveness and provides better quality of life for deployed sailors.
For years, the U.S. Navy built its force around the concept of network-centric operations. Now that it has some of the most advanced information technology capabilities in the military realm, the U.S. Pacific Fleet must re-learn how to operate without them in a disconnected, intermittent, low-bandwidth (DIL) environment.
With the new Joint Information Environment looming as the basis for networking across the force, planners must consider how to add coalition allies and nontraditional partners. Establishing communities of interest may be the answer.
Future defense information technology is likely to focus on a set of services instead of specific elements. Accordingly, bidders likely will consist of industry teams bringing diverse expertise to the acquisition table.
Cyber has provided the means for rapidly assembling and operating military coalitions in the post-Cold-War era. Now, the very nature of the domain may require coalitions to save it from a growing menu of threats. These threats can range from annoying hackers to organized crime to malicious nation-states and even geopolitical movements to restrict the flow of ideas. While the panoply of perils is diverse, the actions to defend against them may have to spring from the well of government and organizational cooperation.
South Korea didn't merely react when it suffered two extensive cyber attacks earlier this year. It established a national cyber policy and formed a government/military/commercial partnership to protect against future intrusions.
The best intentions among international cyber experts may be foiled simply because they don't understand each other's cultural differences. Priorities and even the way of thinking can inhibit progress without cyber experts even realizing it.
The national laws that ensure freedom in modern democracies are preventing effective international cybersecurity measures. Hackers hide behind borders as they ply their malice around the world, and authorities are hard-pressed to reach them.
Maintaining Internet security--and ensuring its continued freedom--likely will depend on like-minded nations forming coalitions that help formulate international regulations and rules of governance.
The networking assembled for the emergency Philippine typhoon response broke new ground in connectivity among governments and relief organizations. However, it also opened the door to sabotage by cybermarauders.
Australia has implemented a cybersecurity policy that brings together government and industry to secure the domain nationally. The country recently elevated cybersecurity as a major priority for national security, and in 2009, it established a Cyber Security Operations Center (CSOC).