Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Cyber

Cyber Command Redefines the Art

June 1, 2013
By Robert K. Ackerman

The U.S. Cyber Command is developing a strategy that acknowledges the convergence of network systems by empowering a similar convergence of military disciplines to help place U.S. cyberspace operators on a level field with their malevolent counterparts. This strategy acknowledges that the structure of the cyberforce has not kept pace with technology developments. As all types of information management—networking, communications and data storage—became digitized, previously disparate disciplines assumed greater commonality. With more common aspects, these disciplines share similar vulnerabilities as well as potential solutions.

The Biggest Threat Today

June 1, 2013
By Kent R. Schneider

U.S. Director of National Intelligence Lt. Gen. James R. Clapper, USAF (Ret.), recently testified in Congress that cyber attacks have become the greatest single threat facing the United States. He went on to say the threat is particularly acute for the nation’s critical infrastructure and reminded Congress that the majority of critical infrastructure in the United States is privately owned.

The European Union Internal Security Plan, written in 2011 and updated annually, makes the same assertion: cyber security has become the greatest vulnerability for the European Union and its member nations.

Cybersecurity has become so important because the range of threats includes recreational hackers, hacktivists, cyber criminals, terrorists, and state or state-sponsored actors. The targets include government networks, systems, applications and data as well as those of industry and private citizens. At the same time, the tools available to bad actors are diverse, sophisticated and inexpensive or free—and easy to obtain on the Internet.

If you have not visited a cyber laboratory recently, I encourage you to do so. Should you have doubted the seriousness of the threat, such a visit will make a believer of you. Many of AFCEA’s member companies have good laboratories; the iCollege at the National Defense University has a great set of laboratories specific to various types of systems; and the National Police Academy in Prague, Czech Republic, has done some amazing work in computer forensics that will open your eyes. In addition, the NATO Cyber Center of Excellence in Tallinn, Estonia, was developed to support a multinational approach to cybersecurity.

Cybersecurity--
Everybody's Doing It

June 1, 2013
By George I. Seffers

With attacks on critical data increasing in numbers, intensity and sophistication, securing networks is becoming a global effort while fostering greater information sharing among agencies, governments and the public and private sectors. The future of cybersecurity offers greater opportunities for industry and greater cooperation on national security and critical infrastructure protection, say executives at some of the largest U.S. defense companies.

The Best Laid Plans Fly Awry

June 1, 2013
By Max Cacas

The U.S. Air Force’s migration to a new enterprise network known as AFNET will be at least two years late in completion because the project turned out to be more complicated than planners anticipated.

Command’s Cybersecurity
 Crosses Domains, Directorates

June 1, 2013
By Rita Boland

The U.S. Transportation Command has taken a novel approach to its Joint Cyber Center, reflecting the unusual needs of this organization that plays a role across U.S. military operations. Officials have found their decisions, such as uniting disparate experts in a single physical location, help save resources while increasing cooperation with the many industry partners that have integral roles in the efforts to keep supplies and people moving.

Cyber Train as You Fight

June 1, 2013
By Max Cacas

The U.S. Army is making its facility at West Point the focus of a joint program with the other services, industry and academia, devoted to sharing advanced cybertraining and research. Training in the new cyber realm includes not only basic best practices concerning passwords and mobile device security but also advanced training in the latest network management protocols and technology for members of the Army’s Signal Corps.

Critical Infrastructure Ripe for Attack

June 1, 2013
By Robert K. Ackerman

Digital marauders have set their sights on the critical infrastructure and are likely to strike soon with major effect. Several different elements of the infrastructure are vulnerable to attack by all manner of cyberspace players ranging from malevolent individuals to hostile nation-states.

Air Force Comes to Grips With Cyber

June 1, 2013
By Robert K. Ackerman

Roles are changing as the service reshapes its digital future.

The U.S. Air Force is subjecting itself to a cyber reality check with an eye toward restructuring the discipline both operationally and organizationally. A working group is parsing the service’s activities in this domain, and this effort involves interaction with the other services as well as the commercial sector.

The restructuring drive is being conducted in concert with other Defense Department changes across the realm of cyber activities. For the Air Force, it includes a shift from communications specializations to a cyber emphasis. Disparate disciplines are overlapping and may be combined. Some traditional Air Force career tracks even may serve as a model for training and promoting new cyber experts.

“We are hard at work trying to define what the Air Force future is in cyber,” says Gen. William L. Shelton, USAF, commander of the U.S. Air Force Space Command. “We are pulling the experts together from government and industry, trying to understand what this future looks like—what we need to build to. Rather than being confined by the past, we instead look ahead and try to determine what our cyber future looks like and how we need to posture ourselves to be much better in the cyber domain than we are today.”

The Space Command has the major command responsibilities for both space and cyberspace in the Air Force. This includes serving as core function lead integrator for both domains, so it is taking the lead in setting the scene for the Air Force in cyber.

This scene envisions the operational community being in charge of cyber operations, with the information technology community working on communications issues. A more efficient architecture with greater commercial involvement will enable a more secure mission-assurance focus in how the Air Force carries out its missions, the general suggests.

The Bottom Line: The DOD Must Be a Squeaky Wheel

May 15, 2013
By Maryann Lawlor

It’s time for military leaders, and yes, even members of the intelligence community, to come out from behind the curtain. They not only need to share with the public what networks and radios and tanks and guns mean to a warfighter’s safety but also what they mean to global security.

NIST Releases Latest Catalog of Security and Privacy Controls for Federal Systems

May 3, 2013
by Max Cacas

A government-wide task force led by NIST is out with the latest catalog of security and privacy controls for federal information systems, including some new thinking when it comes to addressing insider threats that go beyond technology.

Pages

Subscribe to RSS - Cyber