Cindy Moran, former director for network services at the Defense Information Systems Agency (DISA), told the audience at the AFCEA TechNet Asia-Pacific conference in Honolulu that it is time to build networks for maximum performance and to find other ways to build in security.
The SIGNAL Blog
U.S. military and civilian experts on protecting critical infrastructure control systems debated whether a cyber attack on common information systems or on industrial control systems would be more deadly in response to an audience question at the AFCEA TechNet Asia-Pacific conference in Honolulu.
Operating in a relatively new operations domain, cyber fighters are coping with a wide range of challenges, including lack of training and still-to-be-defined policies, doctrines and authorities. Speaking at AFCEA TechNet Asia-Pacific, a panel of cyber experts agreed that the authorities to conduct cyber operations—along with policies, doctrine, tactics, techniques and procedures—still need to be defined even as technology advances rapidly.
Trust—or a lack thereof—is one of the biggest impediments to information sharing among coalitions and partner nations, according to a panel of experts speaking at the AFCEA TechNet conference in Honolulu. Randy Cieslak, chief information officer for the U.S. Pacific Command, led the panel. He described cyber as a two-edged sword available to both good guys and bad.
To obtain mission success, the U.S. military must maintain an emphasis on distributed operations that rely heavily on technological capabilities offered through cyberspace, said Brig. Gen. Brian Cavanaugh, USMC, deputy commander, U.S. Marine Forces, Pacific, during AFCEA TechNet Asia-Pacific 2016.
The good news, according to Rear Adm. Phillip Sawyer, USN, deputy commander, U.S. Pacific Fleet, is there is little likelihood the U.S. will go to war with China, Russia, North Korea or Iran, the country’s top four nation-state adversaries. Furthermore, ISIL will not be able to hold onto its territories. On the other hand, North Korea is utterly unpredictable and ISIL will probably rebuild somewhere else.
Lockheed Martin Rotary and Mission Systems out of Manassas, Virginia, received a $125,185,446 cost-plus-incentive-fee and cost reimbursement modification to a previously awarded contract for Acoustic-Rapid commercial-off-the-shelf (COTS) Insertion (A-RCI) systems engineering and technical support. The company will perform engineering services to continue the development and production of COTS Insertion A-RCI sonar systems that integrate and improve towed array, hull array, sphere array and other ship sensor processing, through rapid insertion of hardware and software. About 95 percent of the work will be performed in Manassas, Virginia with the rest in Syracuse, New York, and is expected to be completed by December 2017.
Critical Infrastructure Security and Resilience month serves as a reminder to not only understand, but appreciate, the various critical infrastructure sectors that play vital roles in the national and economic security of the United States. How can networking capabilities within these sectors improve? How can innovation continue? One key approach is to address the vast complexities of the networks, guest blogger David Young writes.
The dependence on connectivity for critical services between government branch offices and data centers is increasing the need for networks to have improved reliability, scalability and flexibility. A solution brief provides more information on how to keep distributed organizations up and running.
An impression exists among senior U.S. government officials that moving C4ISR systems into the cloud is overhyped. They question whether the migration would improve operational effectiveness. The answer is yes, and its time has come, writes Ralph Wade, a vice president within Booz Allen Hamilton’s Strategic Innovation Group with a focus on digital solutions/C4ISR across government and military organizations.