Cyber

June 11, 2014
By Rita Boland

The National Institute of Standards and Technology has revised its "Guidelines on Mobile Device Forensics." Released seven years after the original guidance came out, the changes recognize the advances in technology during that time frame.

June 10, 2014
By George I. Seffers

Scientists at the U.S. Army's Research Laboratory have successfully demonstrated information teleportation capabilities in the laboratory using entangled photons.

June 3, 2014
By Sandra Jontz

In the two-year Cyber Grand Challenge, 35 teams will vie for a $2 million grand prize and the honor of trying to devise a fully automated system to defend against cyber attacks.

May 27, 2014
By Beverly Mowery Cooper

Not only is the cost of cyber intrusion severe, the likelihood of it occurring is assured. Cybersecurity defenses must be flexible, innovative and persistent to address an ever-changing threat.

May 20, 2014
By George I. Seffers

Raytheon-commissioned Ponemon Institute Survey: 88 percent believe privileged user abuse will increase.

May 14, 2014
By Robert K. Ackerman

The Joint Information Environment (JIE) will be relying on virtual capabilities to a greater degree as part of several thrusts within the network. Enabling technologies include the cloud and software modernization as planners strive to ensure interoperability and access wherever users may be located.

May 14, 2014
By Robert K. Ackerman

The Joint Information Environment (JIE) seeks to network the entire defense community, but its ability to address customer requirements could run afoul of its original purpose. Many military users have specific needs that must be addressed, so the JIE must meet those requirements without jeopardizing its desired interoperability.

May 14, 2014
By Robert K. Ackerman

A key tenet of the Joint Information Environment (JIE) will be the ability of users to have access to the same information system capabilities regardless of physical location, according to Defense Information System Agency (DISA) officials speaking on the final day of AFCEA’s three-day JIE Mission Partner Symposium.

May 13, 2014
By Robert K. Ackerman

The U.S. Special Operations Command is taking an unconventional approach to equipping its forces for an information environment that does not follow conventional guidelines. The command must provide networking for a theater force that can range from one person up through thousands of people, and it faces diverse mission needs that can require large communications pipes.

May 13, 2014
By Robert K. Ackerman

The Defense Logistics Agency is charging full speed into an infocentric environment that will include mobile technologies, changing the way the agency operates. Part of this effort includes the agency’s own version of the Joint Information Environment, which will help improve interoperability.

May 13, 2014
By Robert K. Ackerman

The U.S. Transportation Command moves more information than it does any physical commodity, and this development has redefined the command's security requirements. These requirements are complicated by the presence of commercial providers whose presence poses potential cyberspace vulnerabilities.

May 13, 2014
By Robert K. Ackerman

Fresh off supporting two overseas wars, the National Guard is planning for a larger role in military activities on the home front. Cyber is one area where the Guard may be serving a key role, officials said during AFCEA’s JIE Mission Partner Symposium.

May 13, 2014
By Robert K. Ackerman

The battle against cybermarauders begins with individual home computers, said Rear Adm. Hank Bond, USN, J-6, U.S. Northern Command (NORTHCOM), and deputy J-3 for cyberspace operations at NORAD, during a panel presentation on the second day of AFCEA's three-day JIE Mission Partner Symposium.

May 12, 2014
By Robert K. Ackerman

The architecture of the Joint Information Environment (JIE) will help the Defense Department deal with the growing insider threat, according to Lt. Gen. Ronnie D. Hawkins Jr., USAF, director of the Defense Information Systems Agency (DISA). He told the audience at AFCEA’s three-day Joint Information Environment Mission Partner Symposium that the move to the cloud will enable better security and prevent the traditional insider threat from menacing valuable data.

May 12, 2014
By Robert K. Ackerman

The Defense Information Systems Agency (DISA) is changing its own internal methods of operation to reflect the direction it is giving the services in the move toward the Joint Information Environment, according to Lt. Gen. Ronnie D. Hawkins Jr., USAF, DISA director, at the Joint Information Environment Mission Partner Symposium.

May 12, 2014
By Robert K. Ackerman

The defense community must move away from email and fully into social media, says the director of the Defense Information System Agency (DISA). Lt. Gen. Ronnie D. Hawkins Jr., USAF, told the audience at AFCEA’s Joint Information Environment Mission Partner Symposium that the defense community must break with the past in digital information technology.

June 1, 2014
By Robert K. Ackerman
A Pleiades satellite image clearly shows buildings, including Olympic venues, in Sochi, Russia. The National Geospatial-Intelligence Agency is employing its own intelligence products to help personnel from other intelligence organizations locate and identify structures worldwide that might be the source of hostile cyber activity.

The borderless world of cybersecurity now is benefitting from geospatial intelligence products. The U.S. National Geospatial-Intelligence Agency has joined the fight against cybermarauders by providing imagery to help cyberwarriors track down online adversaries. Experts defending the United States from cyber attack abroad have a new tool in their kit by being able to see the facility from which digital malefactors are plying their wares.

June 1, 2014
By Rita Boland
Virginia National Guard soldiers from the Fairfax-based Data Processing Unit respond to a simulated cyber attack during a cyberdefense exercise.

Cybersecurity remains a priority for the U.S. Defense Department, with officials protecting resources for it in the face of overall budget constraints. Guidance from the National Defense Authorization Act for Fiscal Year 2014 directs a mission analysis of cybercapabilities not only in the active military, but also across partners, to help forces maintain their edge in protecting the nation.

June 1, 2014
By Rita Boland
Seaman Alex Snyder, USN, right, explains the functions of the helm on the navigation bridge of the aircraft carrier USS George Washington to Maj. Gen. Chen Weizhan, deputy commander of the People’s Liberation Army, Hong Kong Garrison, center, and Col. Li Jiandang, Hong Kong Garrison liaison officer during a distinguished visitor embark.

China and Russia represent two of the most robust, comprehensive concerns to worldwide stability. Almost every major geostrategic threat—cyber attack, nuclear weapons, ballistic missiles, capable military forces, political influence, economic power, sources of and high demand for energy—is resident in those two countries that often find themselves at odds with the United States and its allies.

June 1, 2014
By Robert K. Ackerman
Col. Karlton D. Johnson, USAF, is the U.S. Forces Korea J-6 and senior communicator for U.S. forces in Korea.

A new facility for cybersecurity is allowing U.S. Forces Korea to coordinate efforts with other U.S. commands as well as Republic of Korea civilian government and military forces. The Joint Cyber Center serves as the focal point for increasing international cooperation between U.S. and Korean forces in their defensive measures against increasing cyber aggression from North Korea. It blends activities from the local J-2, J-3 and J-6 along with input from other forces worldwide.

Pages