Cyber

August 1, 2017
U.S. Air Force students use a tablet for training and education. The Defense Information Systems Agency is supplying tablets to senior leaders under the one-year pilot program.

The Defense Information Systems Agency is expanding its offerings under the Department of Defense Mobility Classified Capability-Secret (DMCC-S) Program through a new pilot program that puts 8-inch tablet computers into the hands of designated senior leaders across the department.

The pilot expands the DMCC-S' support for smartphones and acknowledges the need to enable leaders to work with classified data in a mobile environment just as they would in an office. 

August 1, 2017
By Lt. Gen. Robert M. Shea, USMC (Ret.)

Possessing the ultimate weapon, the infantryman, the U.S. Army now is marching foursquare into cyberspace and electronic warfare operations. It is doing so not as a latecomer to the digital fight, but as one of the thought-leading pioneers in a rapidly expanding, cohesive domain.

The ground service, along with the other services, is integrating cyber, electronic warfare (EW) and other elements of information warfare into combat operations to more effectively assimilate information age technology. The effects of cyber and EW can move at the speed of light. They can enable or inhibit each other depending on how they are used, so it is only natural that these aspects of warfighting are tightly bound.

August 1, 2017
By Don Maclean

Cybersecurity is a human problem. Bad people use good technology for the worst purposes. Good people sometimes simply make mistakes or take inappropriate shortcuts. In the unfolding, complex cyber ecosystem, nowhere does human meet machine more directly than with identity and access management, or IAM.

Yet this direct connection is fraught with risk. Everyone must log in, but no one wants a lengthy process. Consequently, the more that IAM is automated, the more that people—who pose the weakest link in the cyber realm—are removed from the equation. Herein lies the problem: The easier processes become for users, the more complicated processes become for systems themselves.

August 1, 2017
By Robert K. Ackerman
A soldier with the 780th Military Intelligence Brigade sets up cyber tools at the National Training Center as part of the U.S. Army’s cyber electromagnetic activities (CEMA) initiative led by Army Cyber Command. The service is consolidating electronic warfare and cyber training and operations at Fort Gordon, Georgia, facilities to integrate all aspects of the disciplines.

The U.S. Army is consolidating major electronics disciplines in an approach that brings education and operations under a single umbrella. This confluence extends to physical plants as well as organizational charts. For example, the Cyber Center of Excellence at Fort Gordon, Georgia, is co-located with its operational counterpart to meld the identities of theory and practice.

July 27, 2017
By Richard Thieme

The mind of society is the battlefield in the current global struggle for geopolitical domination. The uses of soft power dominate in this battle and information warfare is the name of the game—not “cyber war” in all the ways it has been described but the influence and ultimately control of individual minds that, like cells in a body, make up the Mind of Society. Then control is used as leverage to achieve objectives that are often hidden.

June 29, 2017
By Sandra Jontz
U.S. Army Chief of Staff Gen. Mark A. Milley, USA, visits soldiers serving with the cyber electromagnetic activities (CEMA) support to corps and below (CSCB) team, 780th Military Intelligence Brigade, in May at the National Training Center in Fort Irwin, California. Photo by Sgt. 1st Class Chuck Burden, USA

The U.S. Army is serious about the narrative that it is serious about cyber. The service has put its organizational architecture on the line by prioritizing the newest warfighting domain while converging it with long-extant but re-emerging combat disciplines, a senior leader says.

July 21, 2017

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has awarded Salt Lake City-based startup Evernym a $749,000 Small Business Innovation Program (SBIR) award to develop an easy-to-use, decentralized mechanism for managing public and private encryption keys needed for the secure and scalable deployment of blockchain technologies.        

July 21, 2017

Officials with the Institute for Cybersecurity at Regent University recently announced the school is building a state-of-the-art cyber range training facility at its Virginia Beach campus. The Regent Cyber Range will open o during the fourth quarter of this year and will offer hands-on training programs for enterprises, consultancies, government and military organizations.

July 20, 2017

The U.S. Army Research Laboratory (ARL) opened the Army Cyber-research Analytics Laboratory (ACAL) on July 19, a facility that unlike any other lab, provides industrial and federally-funded partners—including universities—access to highly-sensitive live cyber-security data, the service has announced.

The new research space was developed as a result of a partnership with Army Cyber Command and represents an extension of ongoing collaborative efforts with the Defense Department’s science and technology community, said Philip Perconti, ARL director.

July 13, 2017
In late October, companies will have the opportunity to present cyber solutions to the U.S. Defense Department's Rapid Reaction Technology Office.

The U.S. Defense Department’s Rapid Reaction Technology Office (RRTO) will conduct a solutions meeting in late October in McLean, Virginia, according to a recent announcement posted on the FedBizOpps website. Companies will provide short technical presentations to government representatives about their technologies and products with the potential to be selected for pilot projects or experimentation if the technology appears to match the department's cyber needs.

The RRTO is interested in:

June 29, 2017
By Adam B. Jonas

On the eve of last year’s U.S. presidential election, two computational social scientists from the University of Southern California published an alarming study that went largely unnoticed in the flood of election news. It found that for a month leading up to the November vote, a large portion of users on the social media platform Twitter might not have been human.

The users were social bots, or computer algorithms built to automatically produce content and interact with people on social media, emulating them and trying to alter their behavior. Bots are used to manipulate opinions and advance agendas—all part of the increasing weaponization of social media.

June 29, 2017
By George I. Seffers
U.S. Army officials assessing cutting-edge cyber and electronic warfare capabilities during Cyber Quest 2017 tout the ingenuity of soldiers participating in the exercise.

U.S. Army officials expect that by this fall, they will have formal approval of a rapid prototyping process for acquiring cyber and electronic warfare prototypes assessed during the just-completed Cyber Quest 2017 exercise at Fort Gordon, Georgia.

Army officials describe Cyber Quest as an annual cyber and electronic warfare exploration and collaboration event hosted by the Cyber Center of Excellence. This is the second year for the event.

July 1, 2017
By Maj. Gen. Earl D. Matthews, USAF (Ret.)

In business as in life, whenever something goes terribly wrong, there is a reflexive tendency to start talking about what should have been done and to affix blame instead of focusing on how to move forward successfully. Cyber attacks are certainly no exception.

I simply WannaCry.

July 1, 2017
By Farisa Dastvar

President Donald Trump recently signed a succinct but sweeping cybersecurity executive order fortifying the U.S. government’s role in thwarting cyber attacks, establishing a path toward protecting federal networks and critical infrastructure, and bolstering cybersecurity for the nation as a whole. 

“Our nation’s economic and national security rely on a safe, secure and reliable cyberspace,” said U.S. Department of Homeland Security Secretary John Kelly of the order, titled Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.

July 1, 2017
By Carl De Groote
The CONUS Defense Department environment shares data and information amid complex networking. A secure and effective environment could be ensured using an approach known as Digital Network Architecture, or DNA.

The fully digital world has changed the strategies, tactics and procedures required to operate successfully in modern warfare. Highly skilled cyber analysts play an important role, but to achieve peak performance from both human and machine, automation within the network is needed. A new network approach—a single platform that is simple, automated, intelligent and secure—will better enable the U.S. Cyber Mission Force to operate within an enemy’s decision cycle and preserve U.S. supremacy across all five domains: land, sea, air, space and cyberspace.

June 27, 2017
By Sandra Jontz
Lt. Gen. Alan Lynn, USA, director of DISA and commander of the JFHQ-DODIN, speaks at AFCEA’s Defensive Cyber Operations Symposium in June. Photo by Mike Carpenter

Conquering cyberthreats that pose a national security risk means acquiring cutting-edge technology and leading-edge talent and pairing them, according to U.S. Defense Department experts.

The department’s technology wish list, discussed during the annual Defensive Cyber Operations Symposium (DCOS), touches on a number of disruptive areas, including machine learning, biometrics, the cloud, what officials are dubbing “software-defined everything,” and solutions to improve mobility and identity protections. Experts shared the challenges and solutions of leveraging technology and talent at the AFCEA International event June 13-15 in Baltimore.

June 26, 2017

The Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense provides guidance on prioritizing security processes that are most effective against the latest advanced threats, such as malware and other malicious targeted attacks. The main emphasis of the controls is on standardization and automation that not only maximize security but also enhance the operational effectiveness of information technology administration.

June 27, 2017
By Sandra Jontz

Governments, banks, transportation systems and critical infrastructure entities reeled Tuesday from yet another wide-sweeping disruptive cyber attack—one that echoed the WannaCry breach in May but is potentially far more crippling.

Cyber experts began bracing for the effects of a massive attack that hit Ukraine first, and then rippled throughout other European nations before going global.

June 26, 2017
By Maryann Lawlor
Only about 15 percent of U.S. Internet fraud victims report the crimes to law enforcement.

You’ve probably received a phone call that goes something like this: “Mr. Smith? I’m calling from ABC company, and there appears to be a security problem with XYZ operating systems. Are you at your computer right now? We can fix the problem for you. All you have to do open your computer, and I’ll take care of it.”

June 21, 2017
By Sandra Jontz
Students in a Virginia Tech laboratory test Popcorn Linux, an operating system that can compile different programming languages into a single cyber tongue. The research is a collaborative effort between the university and the Office of Naval Research. Photo courtesy Binoy Ravindran

A collaborative government-academia collaboration is crafting a new operating system that, if it comes to fruition, would compile different computer programming languages into what U.S. Navy officials have termed a single cyber tongue.

It's called Popcorn Linux, and the operating system unites the language spoken, if you will, by the many processors that otherwise use their own programming languages.

Pages