Cyber

June 1, 2013
By Max Cacas

The U.S. Air Force’s migration to a new enterprise network known as AFNET will be at least two years late in completion because the project turned out to be more complicated than planners anticipated.

June 1, 2013
By Rita Boland

The U.S. Transportation Command has taken a novel approach to its Joint Cyber Center, reflecting the unusual needs of this organization that plays a role across U.S. military operations. Officials have found their decisions, such as uniting disparate experts in a single physical location, help save resources while increasing cooperation with the many industry partners that have integral roles in the efforts to keep supplies and people moving.

June 1, 2013
By Max Cacas

The U.S. Army is making its facility at West Point the focus of a joint program with the other services, industry and academia, devoted to sharing advanced cybertraining and research. Training in the new cyber realm includes not only basic best practices concerning passwords and mobile device security but also advanced training in the latest network management protocols and technology for members of the Army’s Signal Corps.

June 1, 2013
By Robert K. Ackerman
Fig. 1 [circuit-traces-640.jpg]: Cyberspace is the new invasion route for marauders to attack the nation’s critical infrastructure, and that potential threat now is increasing to the point of likelihood.

Digital marauders have set their sights on the critical infrastructure and are likely to strike soon with major effect. Several different elements of the infrastructure are vulnerable to attack by all manner of cyberspace players ranging from malevolent individuals to hostile nation-states.

June 1, 2013
By Robert K. Ackerman
U.S. Air Force personnel conduct cyber operations in an exercise at Joint Base San Antonio-Lackland. The Air Force is looking to restructure both its cyber organization and its cyber operations to account for changes in the virtual domain.

Roles are changing as the service reshapes its digital future.

The U.S. Air Force is subjecting itself to a cyber reality check with an eye toward restructuring the discipline both operationally and organizationally. A working group is parsing the service’s activities in this domain, and this effort involves interaction with the other services as well as the commercial sector.

May 15, 2013
By Maryann Lawlor

It’s time for military leaders, and yes, even members of the intelligence community, to come out from behind the curtain. They not only need to share with the public what networks and radios and tanks and guns mean to a warfighter’s safety but also what they mean to global security.

May 3, 2013
by Max Cacas

A government-wide task force led by NIST is out with the latest catalog of security and privacy controls for federal information systems, including some new thinking when it comes to addressing insider threats that go beyond technology.

May 1, 2013

The National Institute of Standards and Technology (NIST) has released the most comprehensive update to the government’s computer security guide since 2005. The fourth revision of “Security and Privacy Controls for Federal information Systems and Organizations” (SP 800-53) addresses issues such as mobile and cloud computing, applications security, supply chain risks and privacy concerns.

May 1, 2013
By Max Cacas
NATO coalition participants in CWIX 2012 man the Land Component Room at the Joint Forces Training Center in Bydgosczc, Poland. The facility will again host CWIX 2013 next month. (NATO Photo)

A military exercise designed to refine and improve the way coalition partners share vital information will, for the first time, include the network that is supporting troops in Afghanistan. Scheduled to take place in Poland next month, the event will feature military command and control communications experts from NATO, partner organizations and nations who share the goal of rigorously testing communications interoperability among coalition members.

April 15, 2013

SANS NetWars, an interactive security challenge, gives participants the chance to compete while earning continuing education units (CEUs) to help sustain certifications. The event will take place May 15 and 16, 2013, at the Virginia Beach Convention Center during AFCEA’s East: Joint Warfighting event.

April 4, 2013
By Robert K. Ackerman

Future conflicts likely will be fought in degraded information technology environments, which will require the U.S. Navy to develop and exploit new capabilities to continue to operate in contested cyberspace. Technologies such as a flexible information grid, assured timing services and directed energy weapons must be part of the naval information system arsenal if the sea service is to maintain information dominance through the year 2028.

April 1, 2013
By Kent R. Schneider

Those of us who have been involved with government information technology (IT) for some time clearly remember the many efforts to improve IT acquisition. All certainly remember Vivek Kundra’s IT Management Reform Program, the 25-point plan. Most would agree that progress has been made, but some would argue—correctly I believe—that work remains to be done.

April 1, 2013
By Robert K. Ackerman
The U.S. Army is striving to develop a multifunction electronic warfare, or MFEW, system that will provide a defensive electronic attack capability.

Melding the disciplines of spectrum combat will enable greater flexibility and more capabilities.

The growth in battlefield electronics has spurred a corresponding growth in electronic warfare. In the same manner that innovative technologies have spawned new capabilities, electronic warfare is becoming more complex as planners look to incorporate new systems into the battlespace.

April 1, 2013
By Rita Boland
The U.S. Marine Corps is developing a private cloud computing environment to provide better information services to the tactical edge. Here, communicators set up a Support Wide Area Network System during a training exercise.

As they put the necessary pieces in place, Marines are mindful of tight resources and are seeking help from industry.

For the past year, U.S. Marine Corps technical personnel have been implementing a strategy to develop a private cloud. The initiative supports the vision of the commandant while seeking to offer better services to troops in disadvantaged areas of the battlefield.

March 26, 2013
By Max Cacas

One of the U.S. Defense Department’s top information technology officials says work is beginning on a multiaward contract for commercial cloud computing services, but the official says he has no timeline or total value for the business.

March 25, 2013

The malware that infiltrated computer systems across South Korea’s banking and television broadcast industries on March 20 shares similarities with the Shamoon program used last year to wipe clean the hard drives of 30,000 Saudi Aramco workstations, according to experts at General Dynamics Fidelis Cybersecurity Solutions. Investigators at the company’s newly-opened cyber forensics laboratory in Columbia, Maryland, say the malware is not a Shamoon variant, but that the two programs share some characteristics.

March 20, 2013
By George I. Seffers

The U.S. National Nuclear Security Administration (NNSA) began working on its Yourcloud solution about two years ago and expects to have the cloud computing solution in place by year's end. You can read more about this in "U.S. Nuclear Agency Enhances Cybersecurity With Cloud Computing
." 

March 5, 2013
By Robert K. Ackerman

The United States quickly must adopt a segmented approach to its military forces to ensure that key elements can survive a comprehensive cyber attack, according to a recently released Defense Science Board (DSB) Task Force on Resilient Military Systems. This approach entails a risk reduction strategy that combines deterrence, refocused intelligence capabilities and improved cyber defense.

March 4, 2013

Despite continued budget crunching, U.S. Defense Department officials are continuing to implement a three-phase plan to equip the department’s 600,000 mobile-device users with secure classified and protected unclassified mobile solutions that leverage commercial products. In conjunction with the Defense Information Systems Agency, the department’s chief information officer is establishing a basic multivendor mobility capability with the Defense Department for assessment.

March 1, 2013
George I. Seffers

Homeland Security Conference 2013 Show Daily, Day 3

Although many in government are moving as quickly as possible to adopt new technologies, such as cloud computing and mobile devices, individual agencies still face cultural challenges that sometimes prevent them from moving forward, according to officials speaking as part of the Chief Information Officer Council at the AFCEA Homeland Security conference in Washington, D.C.

Pages