Lt. Gen. Mark Bowman, USA (Ret.), former director of command, control, communications and computers/cyber for the Joint Staff, paints a dire picture of future warfare. The next war, he says, will begin with wave after wave of cyber and electronic warfare attacks that our nation is not prepared for. Although the Army is making strides in training the cyber electromagnetic activities (CEMA) force, the service may not be able to address all scenarios in a training environment.
The Russian Federation forces are using a wide array of cyber and electronic warfare capabilities unlike anything U.S. forces have faced in the past 16 years. Russia uses its sophisticated capabilities to detect, locate and eliminate enemy forces, according to Maj. Gen. Stephen Fogarty, USA, commander, U.S. Army Center of Excellence.
Gen. Fogarty made the comments as the first speaker for AFCEA’s TechNet Augusta conference, Cyber in the Combined Arms Fight, taking place in Augusta, Georgia, August 2-4.
General Dynamics Information Technology, Herndon, Virginia, was awarded a $20,208,718 modification (F405549) to contract W91QUZ-06-D-0012 for command, control, communications and computer information operations and maintenance. Work will be performed in Korea, with an estimated completion date of September 29, 2016. Fiscal 2015 operations and maintenance (Army) funds in the amount of $17 million were obligated at the time of the award. Army Contracting Command, Yongsan, Korea APO AP, is the contracting authority.
New Mexico State University was awarded a $75 million indefinite-delivery/indefinite-quantity cost contract to support the Information Operations Vulnerability/Survivability Assessment program, with an estimated completion date of July 26, 2020. One offer was solicited with one received. Funding and work location will be determined with each order. The Army Contracting Command, Adelphi, Maryland, is the contracting activity (W911QX-15-D-0022)
Some of the hackers who have persistently attacked Lockheed Martin’s networks have “gone quiet” in recent months, officials told reporters yesterday at an Arlington, Virginia, media summit hosted by the company’s recently restructured Defense and Intelligence Solutions division. “We’ve seen a number of the adversaries—I wouldn’t say they’ve disappeared—but they’ve gone quiet,” said Darrell Durst, Lockheed Martin’s vice president, cyber solutions. “I think we have been able to counter a number of the adversaries relative to our networks.”
Lawrence Livermore National Laboratory, Los Alamos National Laboratory and Bechtel BNI are joining forces to a new class of cyberdefense professionals to protect the nation’s critical digital infrastructure. The Bechtel-Lawrence Livermore-Los Alamos Cyber Career Development Program is designed to allow the national labs to recruit and rapidly develop cybersecurity specialists who can guide research at their respective institutions and create solutions that meet the cyberdefense needs of private industry, which owns about 80 percent of the nation’s critical digital infrastructure and assets.
The National Security Agency (NSA) has selected five more schools for the National Centers of Academic Excellence (CAE) in Cyber Operations Program, which is designed to cultivate more U.S. cyber professionals. These schools are now designated as Cyber Operations CAEs for the 2014-2019 academic years:
People with access to privileged data—such as health care records, sensitive company information, intellectual property or personal records—frequently put their organization’s sensitive information at risk, according to a new report by Raytheon Company. The survey report, “Privileged User Abuse & The Insider Threat,” finds that many individuals often are granted access to data and areas of the network not necessary for their roles and responsibilities. Furthermore, 65 percent of survey respondents indicated that curiosity—not job necessity—drives them to access sensitive or confidential data.
Key findings include:
The late Vice Adm. Arthur K. Cebrowski, USN (Ret.), looks over my shoulder as I work in my home office. His picture graced the May 2003 cover of SIGNAL Magazine, highlighting an article Clarence A. Robinson Jr., wrote based on an interview with the admiral. I was lucky enough to escort SIGNAL’s freelance photographer to take the photo of Adm. Cebrowski when he led the charge for change as the director of the U.S. Defense Department’s Office of Force Transformation. I received a cover photo plaque that hangs in my home office for my effort, though it really wasn’t necessary.
The National Weather Service is the granddaddy of open source data, according to Adrian Gardner, chief information officer, Federal Emergency Management Agency (FEMA). And, the National Oceanic and Atmospheric Administration (NOAA) was "into big data before big data was cool," added David McClure, a data asset portfolio analyst within the NOAA Office of the Chief Information Officer. The two officials made their comments during a panel on big data analytics at the AFCEA Homeland Security Conference in Washington, D.C.
The real challenge to keeping the homeland secure is dealing with the world's increasing complexity, Adm. Thad Allen, USCG, (Ret.), executive vice president of Booz Allen Hamilton and former commandant of the U.S. Coast Guard, told the audience at the AFCEA Homeland Security Conference in Washington, D.C., on Monday during his luncheon keynote address.
The U.S. Customs and Border Protection (CBP) agency is only interested in mobile communication if it allows the agency to perform functions it could not perform otherwise, Mark Borkowski, component acquisition executive and assistant commissioner with the CBP Office of Technology Innovation and Acquisition, told the audience at the AFCEA Homeland Security Conference in Washington, D.C., on Monday. "We're not interested in mobility for mobility's sake but because it allows us to do something we haven't done before," Borkowski said, while participating in a panel on mobility and interoperability.
Leonie Industries LLC, Pacific Palisades, Calif., was awarded a $48,852,000 modification to a previously awarded firm-fixed-price, option-filled, multi-year contract for media and marketing services in support of the Information Operations Task Force-Afghanistan. The cumulative total face value of this contract is $173,541,529. Work will be performed in Afghanistan, with an estimated completion date of Feb. 5, 2014. The Army Contracting Command, Rock Island, Ill., is the contracting activity.
The United States will continue to develop a bilateral relationship with China regarding cybersecurity issues. In fact, the two countries will meet again in Washington, D.C., on July 8th, according to Maj. Gen. John Davis, USA, senior military advisor to the undersecretary of defense—policy for cyber, Office of the Secretary of Defense. Gen. Davis, the luncheon keynote speaker on the first day of the July 24-27 AFCEA International Cyber Symposium in Baltimore, said the United States recognizes China as a rising power and a major voice in the cyber arena.
The (ISC)2 Foundation’s information security 2013 scholarship program application process will open on January 1, 2013, and it offers a total of $120,000 in awards to women, graduate students, young professionals and faculty. The foundation will award up to two scholarships totaling $40,000 to women pursuing an education in information security. In addition, it will give seed funding for up to eight grants of $3,000 each to assist graduate students conducting special research. One of the foundation’s other undergraduate scholarship winners will receive the Harold F.
Management Services Group Inc. dba Global Technical Systems, Virginia Beach, Va.; Sentek Consulting Inc.
AT and T, Vienna, Virginia; EWA, Herndon, Virginia; Macaulay Brown, Dayton, Ohio; Northrop Grumman, Chantilly, Virginia; SAIC, McLean, Virginia; SRC Incorporated, Chantilly, Virginia; Scientific Research Company, Atlanta, Georgia; and URS, Germantown, Maryland, are being awarded a firm-fixed-price multiple award contract for professional, technical, and analytical support in the mission areas of information assurance and information operations (IO). Support services include the core capabilities of IO: electronic warfare, computer network operations, psychological operations, military deception, and operations security. The contract includes support for missions, functions, and tasks related to signal intelligence; strategic, operational