Even as he was saying his farewells, now-former Defense Secretary Robert Gates apparently had a change of heart about moving responsibility for the Pentagon’s computer networks from the Defense Department Chief Information Officer (CIO) and the Defense Information Systems Agency (DISA) into the newly established U.S. Cyber Command (CYBERCOM).
Malware threats for mobile and messaging environments are increasing quickly, evolving in sophistication and functionality at a pace that eclipses PC-based malware, according to a report by McAfee Labs. Malicious programs for Android have become especially prevalent; historically, only two other operating systems have more malware.
Integrating the network and defending it against cyberattacks are among the top priorities in the new Defense Information Systems Agency (DISA) 2011-2012 Campaign Plan. The plan, released this morning, focuses on requirements and opportunities facing the information agency.
Digital-data investigators have a new tool in their arsenals as they try to capture bad guys' information before they can harm others. The device enables immediate, on-scene triage of devices, eliminating the need to send equipment back to a laboratory while saving precious time and resources.
The U.S. Army is introducing its first fully immersive virtual simulation program for dismounted soldiers and small tactical units. The Dismounted Soldier Training System will provide virtual environments for soldiers to increase combat preparedness and reduce traditional training expenses. And the system’s advanced graphics and tools utilize video game elements and skills already familiar to young soldiers.
At a time when almost all of government is being squeezed by efforts to lower spending, a new report from a congressional watchdog agency strongly suggests that the Defense Department needs to do a better job of managing its intelligence, surveillance and reconnaissance (ISR) systems. "Intelligence, Surveillance and Reconnaissance: Actions Are Needed to Increase Integration and Efficiencies of DOD's ISR Enterprise," (GAO 11-465) warns that the department must improve its control over disparate ISR efforts if it is to provide effective ISR support to the force.
As chat capabilities threaten to overtake voice radio as the preferred means of communication on the battlefield, military officials in Afghanistan are countering the proliferation of chat rooms available on the coalition network. Chat capabilities offer several advantages over voice communications, according to military officials in Afghanistan. But thousands of chat rooms available to warfighters have proven to be too much of a good thing.
A series of raids, both CONUS and OCONUS, on the hideouts of known cyber criminals has resulted in the discovery of a number of information documents. These documents indicated that the cyber crime and terrorism communities have ceased global operations involving the exploitation of unsecured wireless networks. But don't let that fool you.