The U.S. Cyber Challenge's (USCC's) Security Treasure Hunt wrapped up last week after more than a month of participation by students in three states. The event aimed to identify potential cybersecurity professionals through an online competition that presented players with a target system containing security vulnerabilities to assess and fix. Now, event coordinators are assessing results to determine who will win free trips to cyber camps this summer to advance and prove their skills further.
The U.S. Defense Department has developed an information assurance policy chart in an attempt to pull together the department’s diverse information assurance policies under a single umbrella document. The web-based chart provides hyperlinks directly to policies so that a user can identify and trace their origins as well as track changes that occur.
A package of sensors, software and navigation equipment will soon permit U.S. Army ground robots, trucks and armored vehicles to move around a battlefield with minimal human supervision. The Autonomous Navigation System (ANS) allows robots to perceive and follow paths and other vehicles. The system recently completed its critical design review and is now moving on to the prototype fabrication stage.
While they await the U.S. Senate’s decision about assigning Lt. Gen. Keith B. Alexander, USA, as commander of the U.S. Cyber Command (CYBERCOM), military members of the new sub-unified command are poising their fingers above computer keyboards ready to begin their mission. Decisions already have been made about which joint commands to disestablish and merge and where the command’s headquarters will be: Fort George G. Meade, Maryland, some 1,177 miles away from U.S. Strategic Command (STRATCOM), its host unified command. While the date of initial operational capability is nebulous, full operational capability (FOC) is scheduled to occur on October 1, 2010. If confirmed, Gen. Alexander will serve as both the director of the National Security Agency and CYBERCOM’s commander.
Even as government 2.0 advocates hailed the U.S. Defense Department's newly framed social media policy upon its announcement, questions persisted over the value of such a policy in the wake of cybersecurity threats. But Sumit Agarwal, who was named deputy assistant secretary of defense (public affairs) for outreach and social media in January, says that with so many people using social media on their own, enforcing a closed posture on these tools may be as ill-advised as not doing so.
The U.S. Army has unveiled to the public a new robot that aids troops in their fight against improvised explosive devices (IEDs). Intended to attach to more than 8,000 other robotic assets already deployed in the field, Tanglefoot employs simple tools to clear routes that military members must traverse. Developers of this new machine believe its capabilities will help save lives by improving the security of roadways and by keeping soldiers away from explosives during the detection and disarming processes.
A recently released publication is designed to help facilitate information sharing across civilian and military organizations in the U.S. Government. Produced as a joint effort by the National Institute of Standards and Technology (NIST), the Defense Department and the U.S. intelligence community, the document creates a common information security framework for the federal government and the contractors who support it.
Multinational operational commands in Afghanistan and the NATO Consultation, Command and Control Agency (NC3A) are shaping their requirements to upgrade the International Force Tracking System (IFTS). Although not finalized, one new requirement calls for a system capacity increase of at least 500 percent. Accomplishing this task will involve configuration and software changes and will likely include replacing certain components to facilitate capacity growth.
According to André Regtien, principal scientist, NATO NC3A, currently the priority is both to boost capacity and improve responsiveness, for example through reduced and distance-sensitive refresh rates and reduced latency. After the requirements have been approved, the IFTS upgrade should be able to deliver these enhancements in the near future, he says.
The IFTS serves as an interoperability hub for the multinational coalition systems in place in Afghanistan. It receives and distributes tracking information to and from other national force tracking systems and boosts the effectiveness of Afghanistan’s systems.
The U.S. Army has announced the Apps for the Army (A4A) challenge, a three-month outreach to the service’s active duty, National Guard and civilian employees that will award as much as $2,000 to the top entries.
The Defense Information Systems Agency (DISA) has released its 2010 Campaign Plan. Although designated as this year’s plan, the document actually lays the groundwork for DISA activities that will take place during the next two to five years. While it may appear ambitious, the agency’s officials believe that it is absolutely necessary to reach beyond DISA’s grasp as it heads into the future.