cyber

August 22, 2019
By George I. Seffers
Maj. Gen. Neil Hersey, USA, commander, of the U.S. Army Cyber Center of Excellence and Fort Gordon, speaks at TechNet Augusta. Photo by Michael Carpenter

Maj. Gen. Neil Hersey, USA, commander, of the U.S. Army Cyber Center of Excellence and Fort Gordon, said the center could potentially change its name, but that in many ways it already operates as an information warfare center of excellence.

The change—if it happens—would follow the lead of the Army Cyber Command. Lt. Gen. Stephen Fogarty, USA, who leads Army Cyber Command, has been pushing to change the name to Army Information Warfare Operations Command. The service’s centers of excellence fall under the U.S. Army Training and Doctrine Command (TRADOC).

August 20, 2019
By George I. Seffers
A DISA panel discusses how the agency is delivering capabilities to warfighters at AFCEA TechNet Augusta. Photo by Michael Carpenter

The Defense Information Systems Agency (DISA) continues to add capabilities available to warfighters and to the broader Defense Department community.

The agency has created a lot of buzz in recent months with a number of initiatives involving cloud capabilities, mobility and biometrics. Officials serving on a DISA panel continued that trend at the AFCEA TechNet Augusta 2019 conference in Augusta, Georgia.

August 21, 2019
By Beverly M. Cooper
The AFCEA Women’s program convened a panel of cyber experts that included (r-l) moderator Col. Laurie Moe Buckhout, USA (Ret.), Corvus Group LLC; Gisele Bennett, Florida Institute of Technology;  DeEtte Gray, CACI International Inc.; Nancy Kreidler, director, cybersecurity and information, assurance, Army CIO/G-6; and Annette Redmond, acting deputy assistant secretary for intelligence policy and coordination, Bureau of Intelligence and Research, Department of State. Photo by Michael Carpenter

Data is a strategic asset, but the human factor is the greatest unsolved issue in cybersecurity. Much progress has been made in securing technology, but today, it is not just the technology but also how you factor in human behavior. Security is not just about protecting the widget or fixing the algorithm because you must factor in behavior and external sources as well.

A panel of five women, all whom have excelled in cyber-related careers, took on some of cyber’s most pressing issues at TechNet Augusta.

August 20, 2019
By Beverly M. Cooper
Lt. Gen. Stephen Fogarty, USA, commanding general, U.S. Army Cyber Command, sketches a graphic to detail his talk during AFCEA TechNet Augusta. Photo by Michael Carpenter

Today’s military operates in a congested and contested cyber environment, and to have the advantage over its adversaries, the military must be able to integrate a variety of cyber-connected elements. Keeping the advantage depends on the ability to balance the level of precision required, to operate with speed, to accept nonconventional means and to tolerate less-than-perfect solutions. In an environment just short of war, there is no place for bureaucracy.

June 1, 2019
By Maj. Ryan Kenny, USA
Credit: Shuttersotck/metamorworks

In the cyber realm, organizations need the means to rapidly identify emerging threats, immediately respond to mitigate risk, and systematically learn from these encounters—just as the immune system responds to a virus.

A single tool, process or team cannot deliver true cybersecurity. Collecting, analyzing and disseminating intelligence requires a converged organization that fuses expertise across domains. As adversaries possessing sophisticated expertise and considerable resources target multiple attack vectors—cyber, electromagnetic and physical, for example—cyber leaders must develop teams and systematic processes to rapidly transform analysis into action.

August 8, 2019
 

Data Link Solutions LLC, Cedar Rapids, Iowa, is awarded a maximum potential value $75,000,000 modification to a previously awarded indefinite-delivery/indefinite-quantity multiple award contract (N00039-15-D-0042) for the Block Upgrade II retrofit of Multifunctional Information Distribution System (MIDS) low volume terminals.  The terminals provide secure, high-capacity, jam-resistant, digital data and voice communications capability for Navy, Air Force and Army platforms, and for Foreign Military Sales customers. Work will be performed in Wayne, New Jersey (50%); and Cedar Rapids, Iowa (50%), and is expected to be completed by December 2026.  No funding is being obligated at the time of award.  Funds will be obligated as individual deli

August 2, 2019
 
Credit: Shutterstock/jijomathaidesigners

There was massive technological growth in 2018; things like artificial intelligence and blockchain have gained much support recently. IT departments often enable improved efficiency and security in their organizations by adopting emerging technologies, but that's only if they have the freedom to do so. A few years ago, IT had very less influence over business decisions, but now times are changing: IT is gaining an increased role in business decisions with implementation of cloud computing, data centres and enterprise mobility.

August 1, 2019
By Robert K. Ackerman
Soldiers analyze network data during a cyber academy class at Fort Bragg, North Carolina. The project manager, defensive cyber operations (PM DCO), is working to boost Army cyber capabilities while shortening the training time line to empower more soldiers for the cyber defense mission. U.S. Army photo

Speed is of the essence as the U.S. Army works earnestly with industry to equip the force with the latest tools to combat cyber attacks. Yet rapid acquisition must be weighed against wasteful haste as the service aims to deliver combat-effective capabilities without breaking stride.

These capabilities include a revamped tool suite, a portable cyber defense system and advanced cyber situational awareness. At the forefront of these efforts is the project manager, defensive cyber operations (PM DCO), part of the Army’s Program Executive Office Enterprise Information Systems.

August 1, 2019
By Robert K. Ackerman
The amphibious assault ship USS Boxer anchors off the coast of Phuket, Thailand. The U.S. Indo-Pacific Command is advancing the quality of technology in multinational training exercises, so allies and partners can interoperate in cyber the way they might have to in regional operations. U.S. Navy photo

The U.S. Indo-Pacific Command is incorporating new cyber technologies and standards as it strives for greater interoperability among a growing number of allies and potential partners. This increased reliance on cyber is viewed by command leadership as essential for maintaining effective military capabilities in the face of a growing kinetic and cyber presence by diverse adversaries.

August 1, 2019
By Chief Warrant Officer 2 Cory Jodon, USA
Spc. Dillon Anton, USA, and Spc. Matthew Perry, USA, 601st Aviation Support Battalion, 1st Infantry Division, Combat Aviation Brigade, set up and validate a Combat Service Support Very Small Aperture Terminal (CSS-VSAT) in preparation of Combined Support Exercise at Storck Barracks, Germany.

For more than a decade, the U.S. Army has been improving the Logistics Information Systems Network, which is specifically designed to sustain and maintain warfighters deployed across the globe. However, although the technology has far exceeded the service’s goals, today’s management practices are almost identical to those used when the network was created in 2004. With the increase in cybersecurity policies and advances in capabilities, the need for highly trained, designated network and systems administration personnel has become abundantly clear, and the requirement for better management processes even more evident.

July 24, 2019
By Robert K. Ackerman
The National Security Agency (NSA) has created a new Cybersecurity Directorate to improve cyber partnerships and increase intelligence coordination.

The National Security Agency (NSA) is launching its new Cybersecurity Directorate with a promise of “opening the door to partners and customers on a wide variety of cybersecurity efforts,” according to an agency statement. These partners will include established government allies in the cyber domain such as the U.S. Cyber Command, the Department of Homeland Security and the FBI. The directorate also is promising to share information better with its customers to help them defend against malicious cyber activity.

July 23, 2019
 

Frontier Technology Inc., Beavercreek, Ohio, has been awarded a $47,246,679 cost-plus-fixed-fee contract for supporting the enterprise ground system and defensive cyber operations. The contract award provides for cross-domain solutions, design, integration and rapid delivery team services. Work will be performed in Colorado Springs, Colorado; Beverly, Massachusetts; and Los Angeles, California, and is expected to be completed by July 19, 2024. Fiscal year 2019 research and development funds in the amount of $1,876,545 are being obligated at the time of award. The contract was the result of a sole-source acquisition.

July 15, 2019
Posted by: George I. Seffers
Using the Army’s cyber-enabled Counter-Unmanned Aerial System, soldiers were able to detect and counter small drones during training. Credit: U.S. Army

Soldiers with the 3rd Brigade Combat Team, 1st Cavalry Division (3/1 CD) recently tried out a cyber-based prototype that complements electronic warfare systems designed to combat enemy drones, the Army has revealed in an online article.

Using the Army's enhanced cyber-enabled Counter-Unmanned Aerial System (C-UAS) capability, soldiers were able to detect and counter common, small drones during their training. The new prototype alerted soldiers to the presence of a drone and provided a means to target it, for protection across the brigade.

July 15, 2019
By Noah Schiffman
The National Security Agency is not to blame for the recent ransomware attack on the city of Baltimore, says Noah Schiffman, KRB chief technology adviser. Credit: Shutterstock/Stephen Finn

The May 7th ransomware attack against Baltimore has crippled much of the local government’s IT infrastructure while holding its network hostage. Not since the March 2018 attacks against Atlanta has a major U.S. city been so digitally impaired.

The subsequent media coverage of Baltimore’s struggle has generated some misplaced criticism of the U.S. government. Initial news reports erroneously claimed that the ransomware leveraged an NSA-developed exploit to compromise Baltimore’s municipal systems. Unfortunately, this snowballed into numerous sources placing blame on the NSA, claiming that they mismanaged their cyber weaponry. 

This is grossly incorrect.

July 5, 2019
 

NCI Information Systems, Reston, Virginia, was awarded a $27,956,232 modification (P00005) to contract W91RUS-18-C-0017 for information technology services for cyber network operations and security support. Work will be performed in Fort Huachuca, Arizona, with an estimated completion date of June 30, 2020. Fiscal year 2018 operations and maintenance, Army funds in the amount of $10,251,101 were obligated at the time of the award. U.S. Army Contracting Command, Aberdeen Proving Ground, Maryland, is the contracting activity.

July 1, 2019
By Robert K. Ackerman
Servicemen participate in a cyber warrior exercise overseas. The U.S. Army’s program executive officer for enterprise information systems (PEO EIS) is striving to speed new software into cyber systems while maintaining effective operations. U.S. Army Reserve photo

The U.S. Army is building a tighter relationship with industry to tap commercial expertise and avoid long procurement delays that often render new information technologies obsolete before they are fielded.

At the heart of this effort is Cherie A. Smith, program executive officer for enterprise information systems (PEO EIS), U.S. Army. After she assumed her position last year, Smith relates, she focused on making promises and seeking help. Since then, she has emphasized a shared relationship with industry.

July 1, 2019
By Robert K. Ackerman
Shutterstock/Kritsana Maimeetook

The fight to secure microelectronic chips is becoming as basic as the chip itself. With chips facing a myriad of threats throughout their life cycle, experts are incorporating security measures into the development of the chip from the foundry to assembly. Other approaches safeguard against threats that could appear as the chip moves through the supply chain. The bottom line for microelectronics security is that necessary measures cannot wait until the device is in the hands of the user.

July 1, 2019
By Kyle Aldrich
Looking Glass stock

Global, asymmetrical threats now dominate attacks on nations and businesses alike, and the enemy is not always immediately knowable, identifiable or even seen. These realities are forcing leaders to invest more resources into analytics, as well as intelligence, surveillance, reconnaissance and other 21st century responses to cyber bombardments today.

July 1, 2019
By Chris Nissen
Bill Bickert, assistant commander for supply chain management policy and performance, Naval Supply Systems Command, visits the command’s Fleet Logistics Center–Jacksonville, Florida, headquarters. Supply chain monitoring software is useful; however, ensuring suppliers are providing clean components is crucially important as well. Photo by Carol Williams

Adversaries are exploiting the inherent vulnerabilities of U.S. military supply chains that involve tens of thousands of private sector providers from all over the globe. Attack operations include stealing valuable technical data; striking critical infrastructure, manufacturing and weapon systems control systems; corrupting the quality and assurance across a broad range of product types and categories; and manipulating software to access connected systems and to degrade systems operation integrity.

July 1, 2019
By Chief Warrant Officer 4 Judy M. Esquibel, USA
Maj. Gen John C. Harris Jr., ANG (c), the adjutant general, Ohio National Guard, observes training while the Cyber Mission Assurance Team (CMAT) conducts network assessments during exercise week of Cyber Shield 19 at Camp Atterbury, Indiana. The National Guard is standing up the teams to help secure the critical infrastructure that services U.S. Defense Department installations. U.S. Army National Guard Photo by Staff Sgt. George B. Davis

As emerging technologies and capabilities permeate and dominate the military and critical infrastructure, a different skill set is required to secure the increasingly complex cyberspace realm. The Internet of Things will be both an asset and a liability in the future when the military incorporates it into operations, and urban environments will complicate these efforts.

Cyber warfare continues to evolve with ever-changing innovation and technology, increasing critical infrastructure defense. In addition, with the onset of smart cities, the U.S. military in general, and the U.S. Army in particular, is exploring gaps in training and education related to operating in dense, super-connected urban areas.

Pages