Michael Dumont has been assigned as deputy assistant secretary of defense for policy (Afghanistan, Pakistan and Central Asia), Washington D.C.
Recently at the AFCEA International Cyber Security Summit in Bethesda, MD, Army Maj. Gen. John A. Davis, Senior Military Advisor for Cyber to the Under Secretary of Defense, said “Cyber partnerships such as those with the National Security Agency and the Defense Intelligence Agency and external partnerships such as those with industry, international allies and academia represent a transformation in the way DOD approaches cybersecurity.”
For years, the U.S. Defense Department, not surprisingly, took a “do it alone” posture when it came to sharing information and protecting its networks and communication infrastructures from security attacks.
The Johns Hopkins University Applied Physics Laboratory (JHU/APL), Laurel, Md., is being awarded a five-year, sole source, cost-plus-fixed-fee, indefinite-delivery/indefinite-quantity, task order contract for research, development, engineering, and test and evaluation for programs throughout the Defense Department.
On Wednesday, the Defense Department (DOD) issued its long-awaited cloud computing strategy. Officials also announced in a memo from Teri Takai, chief information officer for the DOD, that the Defense Information Systems Agency (DISA) will oversee the new strategy as "enterprise cloud service broker." The designation means that all department components are required to obtain cloud-computing capabilities through DISA or to obtain a waiver from Takai's office as the DOD's designated review authority.
The free DCO Connect app allows U.S. Defense Department personnel and contractors to host and attend meetings from Android devices and tablets. The mobile initiative is an extension of the existing Defense Connect Online (DCO) program, launched in 2007 by Carahsoft Technology Corporation and Adobe to provide Adobe Connect Web conferencing and Cisco XMPP solutions. Currently, more than 650,000 users across the Defense Department use the system, which supports an average of 40 million Web conferencing minutes and 30 million chat messages per month.
The U.S. Defense Department has revamped its Telework Program for the civilian work force. Leaders at each Defense Department component now are required to promote telework within their organizations and to take all possible steps to overcome artificial barriers to program implementation. In addition, they must authorize telework for the maximum number of positions without compromising mission readiness and integrate telework into continuity-of-operations activities. These alterations to the former telework policy evolved out of the Telework Enhancement Act of 2010.
The U.S. Defense Department has awarded $18 million to six programs to reduce the energy demand of future expeditionary outposts. The assistant secretary of defense for operational energy plans and programs will administer the funds, which are granted programs aimed at developing and rapidly transitioning energy technologies for the combat force. Defense Department-led teams representing the military services and the Department of Energy will receive the money but are seeking support and innovation from small businesses.
Teri Takai, the chief information officer (CIO) of the U.S. Defense Department, elucidated the roles of her agency this morning at LandWarNet, explaining that her duties include looking for efficiencies across the department, leading the way for effective spectrum allocation and working with international partners to create standards. Moving forward, the CIO will separate from the Assistant Secretary of Defense for Networks and Information Integration to become its own entity. Takai emphasized the need for an integrated look at technology, not a service by service or combatant command by combatant command approach, later remarking on the importance of standardized environments to effective military operations.
In the midst of a global cyberspace crisis, the U.S. Defense Department faces many hurdles in its effort to protect and defend government computer networks. According to an unclassified version of a previously issued classified report from the U.S. Government Accountability Office (GAO), several cyberspace capability gaps exist. The U.S. Cyber Command is decentralized and spread across various offices, commands, and military services and agencies, which makes the supporting relationships necessary to achieve command and control of cyberspace operations unclear. In response to a major computer infection, the U.S.
The Pentagon has begun to reassign some organizations within the U.S. Joint Forces Command (USJFCOM) as part of its planned shutdown as a four-star combatant command later this summer. Among the organizations reassigned, and their new homes:
The Defense Department's FY 2012 budget proposal features $2.3 billion for improved cyber capabilities, according to figures released this afternoon. Key elements of that funding include $0.5 billion for the Defense Advanced Research Projects Agency (DARPA) to invest in cyber technologies. Funding also will be provided to the Defense Information Systems Agency (DISA) for cyber identity, monitoring and enforcement.
The budget will increase funding for training cyber analysts, for improving Global Information Grid (GIG)-wide situational awareness, for developing pilot programs for supply chain risk management and for improving intrusion detection and analysis.
With the number of acronyms and abbreviations used within the U.S. Defense Department, military documents can quickly become alphabet soup. But apps available for the iPhone or Android can help break down the meaning behind thousands of commonly used terms. Developed by Inner Four Inc., the U.S. Military Acronyms and Abbreviations app for the iPhone and iPod Touch defines terms used by the armed forces in both joint and allied joint operations. It covers current abbreviations and acronyms used by the Defense Department.
In less than 30 days, the U.S. Defense Department will dish out 11 prizes for innovative solutions to real-world challenges facing digital forensics examiners. And it's not too late to join the fight against cyber crime. Submissions for the 2010 Defense Department Cyber Crime Center (DC3) Digital Forensics Challenge will be accepted until November 2.
Part 2 of 2
Defense Department IT budgets are now fully mortgaged to support ongoing operations and maintenance, while most large development funds are still paying for continuation of programs that were started years ago. With regard to the concerns I've raised in my previous post, here are some ideas on what should be done:
First of two parts.
According to Air Force LTG William Lord, 85 percent of cyberoperations are in defense. That being the case, How should the Defense Department protect its network and computer assets? A 2009 RAND Corporation report on cyberdeterrence asserts "...most of the effort to defend systems is inevitably the ambit of everyday system administrators and with the reinforcement of user vigilance." The report also states "...the nuts and bolts of cyberdefense are reasonably well understood."
On the heels of an announcement from U.S. Secretary of Defense Robert M. Gates where he proposed eliminating the positions of assistant secretary of defense for networks and information integration along with the J-6, the push to make the Defense Department more efficient continues. The INVEST Awards contest will reward the 25 best ideas submitted by department employees with cash prizes.
The U.S. Defense Department's hub for all things social media has undergone a serious facelift, complete with tips, tricks and lessons on how to share information responsibly and effectively.
The Social Media Hub was redesigned to help members of the Defense Department community understand what constitutes proper use of Internet-based capabilities. The new site contains learning resources, detailed department policies and procedures, and social media guides for each military service branch.
Gen. Keith Alexander, USA, the head of the new cyber command, stated that the Defense Department needs situational awareness across DOD's networks to protect its cyber defenses: "We do not have a common operating picture for our networks. We need to build that."
The Defense Department is responsible for protecting more than seven million machines, linked in 15,000 networks, with 21 satellite gateways and 20,000 commercial circuits. Unauthorized users probe Defense Department networks 250,000 times an hour, or more than six million times per day, he added.
"The difference there is [that] we don't want to prioritize and think just in terms of 'how do we secure information' without thinking through our real objective of assuring support for DOD missions."--Mark Orndorff, director of the PEO for Mission Assurance and Network Operations, DISA
The U.S. Defense Department has announced its policy on "Responsible and Effective Use of Internet-Based Capabilities"--in less formal words, its social and new media policy. This is the DOD's first official policy on new media. It states that the NIPRNET default will be open access so that all of the DOD can use new and social media. Under this policy, prohibited content sites such as gambling sites will still be blocked, but otherwise there will be open access across the department.