The Cyber Edge

The Cyber Edge Home Page

June 1, 2018
By George I. Seffers

When National Science Foundation officials announced in February that three major providers of cloud computing were donating up to $9 million collectively for big data research, they already were looking for ways to broaden the effort to include a wider variety of topics, including cybersecurity. The expansion is intended to benefit both research and education initiatives and is necessary, in part, because the cloud providers now acquire cutting-edge hardware before it is made available to researchers.

June 1, 2018
By Kimberly Underwood
While the U.S. Army is working on significantly upgrading its situational awareness system Blue Force Tracking, in use on more than 98,000 platforms, its cyber situational awareness needs improvement, especially in red and gray zones. Army photo

The U.S. Army’s Communications-Electronics Research, Development and Engineering Center, known as CERDEC, is gearing up to face increasing asymmetrical threats in cyberspace. The center looks to improve cyber operations, information warfare, electronic countermeasures and information security, among other areas. Its efforts are prompted as the military finds itself fighting or preparing to fight more and more in cyberspace, in conjunction with the traditional domains of sea, air, land and space.

June 1, 2018
By Jane Melia
Credit: Den Schrodinger/Shutterstock

The potential geopolitical consequences of quantum communications will result in clear asymmetries in both knowledge and confidentiality of information. Countries whose data can be protected through quantum communication techniques will have a significant information advantage, a situation that would have important, albeit hard to predict, effects on geopolitical developments.

May 8, 2018
By Seli Agbolosu-Amison
Four policies give government agencies they flexibility and authority to limit cyber risks. Credit: katielwhite91/Pixabay

As a result of recent federal legislative and administrative activity, government agencies are expected to launch significant modernizations of their cybersecurity systems, get offensive with hackers and take a more strategic approach to risk. Combined, these policy directives promise to transform our government into a robust digital society, gaining greater resiliency to cyber threats by leveraging opportunities while reinforcing standards and procedures.

Here’s a breakdown of the key components of the four policies:

May 31, 2018
By Paul Parker
After enjoying a period without peers, the U.S. now find itself facing a variety of threats, including Russia, China and terrorist groups. Credit: TheDigitialArtist/Pixabay

The days of the United States’ stature as a force without equal appear to be over. The threat of near-peer competition with increasingly sophisticated adversaries is growing. As Secretary of Defense James Mattis says in the National Defense Strategy, "America has no preordained right to victory on the battlefield."

June 1, 2018
By Kimberly Underwood
Sailors assist with the landing of a Marine Corps CH-53E Super Stallion helicopter on the deck of the U.S. Navy’s USS Wasp assault ship as part of an April certification exercise in the Philippine Sea. In its role of steering the Navy toward the best information technology for the 21st century, the Space and Naval Warfare  Systems Center (SSC) Atlantic is looking at cloud computing systems to support the warfighter. Credit: Petty Officer 3rd Class Levingston Lewis, USN

This month is a crucial time for the U.S. Navy, as far as information technology goes. Its Program Executive Office for Enterprise Information Systems is developing the request for proposal for its Next Generation Enterprise Network Re-compete contract that will provide information technology services, including cloud services, for more than 700,000 Navy and Marine Corps users.

May 30, 2018
By Don Maclean
Although hacking back against cyber criminals may seem morally justifiable, it can quickly spiral out of control. Credit: TheDigitalArtist/Pixabay

Whether a Social Security number from an individual, or financial information from a company, hackers continue to find ways to steal data from millions of Americans. To combat these crimes, the idea of active cyber defense has arisen on Capitol Hill with the introduction of the Active Cyber Defense Certainty (ACDC) Act.

In January, Homeland Security Secretary Kirstjen Nielsen voiced measured support for empowering companies to be more active in their approach to cybersecurity. These active measures would allow companies to access other computer networks in order to thwart cyber attacks, monitor the hackers, collect evidence or destroy stolen files.

May 24, 2018
By Robert K. Ackerman
Credit: fuyu liu/Shutterstock

Domestic cybersecurity has some new potential vulnerabilities to defend, according to the Department of Homeland Security’s (DHS’s) 2018 Cybersecurity Strategy. In addition to conventional concerns such as the water and power grids and the financial sector, the burgeoning number of Internet-connected devices and the global supply chain have emerged as areas that must be protected against a growing threat from a variety of adversaries.

May 17, 2018
Kimberly Underwood
Panelists discuss partnerships in cyber warfare at the AFCEA Defensive Cyber Operations Symposium.

Thoughts by experts about the ability of the military to defend cyberspace are centering around the concept of improved partnerships, which may be outside of the Defense Department’s usual practices. A lot can be gained from the insight of coalition partners and think tanks—wisdom and information that the DOD may not have tapped into, experts said.

May 16, 2018
By Kaitlyn Cotter
Panelists discuss STEM education and training cyber warfighters during a panel at the Defensive Cyber Operations Symposium.

Raising the bar for STEM education comes through practice, competition and a culture shift to help prepare the next generation of defense leaders. It’s less about how many hours of STEM courses or what is the right age to engage kids in STEM and more of a focus on how to create access to opportunities in a way that they can connect with for the long term.

May 16, 2018
by Kimberly Underwood

Faced with unending cyber attacks that are increasing in sophistication and coming from all types of adversaries, the U.S. Army Cyber Center of Excellence is preparing its best defense: cyber operators. With a dedicated section of the Army’s force that focuses only on cyberspace operations, the service must continue to fill the ranks and train cyber operators, said Maj. Gen. John Morrison Jr., USA, commanding general, U.S. Army Cyber Center of Excellence (CoE) and Fort Gordon.

May 16, 2018
By Beverly Cooper
Credit: Shutterstock

If you think of the cyber threat as Godzilla, you can see the need for a framework that optimizes limited resources. As the beast attacks the building, those individuals located on the ground floor—for example the architects and engineers—worry about being stepped on by its feet. Those on the next floor up, the systems engineers, see the knees and want protection from being kicked. The next level, the incident responders, see the claws and worry about what those claws can do. Higher in the building, the operators see the shoulders and are focused on how big the threat might be based on the shoulder size. The customers at the top only see teeth and flames.

May 15, 2018
By Kimberly Underwood
Anthony Montemarano, executive deputy director, DISA, speaks at the Defensive Cyber Operations Symposium.

As the Department of Defense is working to improve lethality, it is making the transition to fight in the new domain of cyber, according to Anthony Montemarano, executive deputy director, Defense Information Systems Agency (DISA). The key to this evolution is innovation and harnessing emerging technologies to protect and defend the homeland. “We’ve got to get ahead of the adversaries,” he said.

Speaking to a room packed full of industry and government officials on Tuesday at the AFCEA Defensive Cyber Operations Symposium (DCOS) in Baltimore, and in an interview with SIGNAL Magazine, Montemarano called on industry to provide innovation.

May 15, 2018
By Kimberly Underwood
Vice Adm. Nancy Norton, USN, DISA director and commander of JFHQ-DODIN, speaks at the AFCEA Defensive Cyber Operations Symposium.

In her unique, dual-hatted role as director of the Defense Information Systems Agency (DISA) and commander of the Joint Force Headquarters–Department of Defense Information Network (JFHQ-DODIN), Vice Adm. Nancy Norton, USN, is pushing to provide the best communication and information technology capabilities to the Defense Department (DOD).

“Everything we do is to support the warfighter and increase their ability to accomplish their mission,” she said. The admiral was the keynote speaker opening the AFCEA Defensive Cyber Operations Symposium (DCOS) in Baltimore on May 15.

May 1, 2018
By Synlethia Bagwell and Lt. Cameron Woods, USN
Lt. Steven McGhan, USN, demonstrates a gun-augmented reality system at Trident Warrior 2017. In support of the Navy’s Optimized Fleet Response Plan, the Naval Information Warfighting Development Center (NIWDC) uses live, virtual and constructive training capabilities like these to effectively train the fleet. Navy photo by Alan Antczak

The increased sophistication and unpredictability of adversaries’ cyber capabilities and tactics demands improvements in war-fighting readiness by revolutionizing how information warfare is executed in the U.S. Navy’s fleet. To address this challenge, the service is aligning and synchronizing efforts among its various communities and supporting multiple warfare areas with an information-packed warfighting model.

May 1, 2018
By Kimberly Underwood
Credit: JoeBakal/Shutterstock

One does not have to look too far beyond the headlines to see that the battle for world power is playing out in the information space. Free and open democratic societies increasingly are tested by rising autocratic countries employing high technology in information warfare.

For the United States to succeed in this battle, citizens, not just the government, need to be more discerning about information, experts say.

May 1, 2018
By George I. Seffers
An electronic warfare specialist trains on the Versatile Radio Observation and Direction system at Schofield Barracks, Hawaii. Credit: Staff Sgt. Armando R. Limon, USA, 3rd Brigade Combat Team, 25th Infantry Division

After years of lagging behind competitors in the battle for electromagnetic spectrum dominance, the U.S. Army may be catching up with reinforcement from technology researchers. But it may be the application of technology rather than the systems themselves that truly gives the Army an edge.

Service leaders say they lost focus on electronic warfare and information warfare capabilities while preoccupied with the wars in Iraq and Afghanistan, where cutting-edge technologies were not a necessity. Now, they contend, the next war likely will be against a foe capable of formidable offense and defense in the electromagnetic domain.

May 1, 2018
By Robert K. Ackerman
A U.S. Marine uses a radio during a field exercise on the Japanese island of Okinawa. New mobile technologies emerging from industry will be essential for the U.S. military to maintain battlespace supremacy, and the Defense Information Systems Agency (DISA) is striving to incorporate them into the force.

Being able to pace technology is the top challenge facing the Defense Information Systems Agency, according to its director. This activity encompasses both positive pacing, in which the agency takes the lead in incorporating innovative capabilities, and negative pacing, where it responds to the constantly evolving technology-based threat.

Industry plays a significant role in both aspects of pacing. The private sector serves as the font of innovation for new information capabilities sought by agency customers. Similarly, industry must be the primary source of related technologies that help counter the growing threat posed by nation-state and independent adversaries.

May 1, 2018
By George I. Seffers
Credit: Guayo Fuentes/Shutterstock

U.S. Navy personnel with advanced skills in information warfare may be ready to hit the decks and deploy across the fleet by year’s end.

Adding those adept information warriors to the fleet is a top priority for the commander of the Naval Information Warfighting Development Center (NIWDC), which was established about a year ago. Similar to other warfighting development centers, the NIWDC mission includes training and assessing forces in advanced tactics, techniques and procedures at the individual, unit, integrated or advanced and joint levels.

May 1, 2018
By Robert K. Ackerman
An Arkansas Air National Guard technical sergeant works in a cybersecurity incident response training exercise. The Joint Force Headquarters-Department of Defense Information Network (JFHQ-DODIN) is expanding its reach into U.S. Defense Department networks and accelerating the pace of cyber defense as it confronts new challenges from adversaries.

The organization tasked with protecting U.S. Defense Department networks is looking to accelerate its ability to detect and respond to enemy cyber attacks. While detection and response are not new, they have assumed greater importance as cyber attacks are combined with kinetic operations throughout the battlespace.

Pages