The vaunted technology edge enjoyed by Western nations risks fading into history because of espionage by nation-states. National competitors and potential adversaries are saving years of research and development and billions of dollars in related expenses by extricating secrets through cyberspace. Both military and commercial organizations are suffering what could amount to devastating losses from opportunistic enemies, and communications and information technologies top the list of desirable targets.
Cyber capabilities have dramatically transformed the battlefield and how conflicts are resolved. Traditionally, battles were fought in conventional domains—land, air, sea, space—using kinetic, psychological and economic means to defeat opponents. In the cyber realm, anything goes. There are no rules. And adversaries are developing advanced cyber capabilities just as quickly as the United States, threatening critical infrastructure and other systems. So-called cyber-to-physical attacks, when hackers target physical buildings, networks and sites, demonstrate the potentially catastrophic results of a successful campaign against power, water and transportation services.
The 80-page summary of China’s recently published five-year plan (5YP) establishes information and communications technology (ICT) as the country’s highest priority. China presents a well-thought-out plan to close the technology gap with the United States and ultimately surpass it. The published text also conveys a sense of urgency. In view of rapid developments in China, attention to its 5YP is well-warranted.
Sixth in an ongoing series of articles
The intelligence community recently has directed activity toward creating common resources to increase collaboration and speed up the delivery of information technology tools for the government. The need for modern and cost-effective information technology solutions is paramount. However, complex, paper-heavy, time-consuming information-assurance processes steal capital required to modernize. This unproductive cycle affects both U.S. government systems and the industrial base that develops mission systems for the government.
The U.S. Army aims to move sophisticated offensive and defensive cyber operations out of a headquarters environment to the front lines as it prepares its mission force to adapt to and prevail in the critical cyber warfighting domain.
The Office of Personnel Management (OPM) is launching its new background investigation service following a White House directive to address shortcomings and cyber vulnerabilities that have plagued the agency. Charles Phalen Jr., a former CIA director of security, will be the director of the National Background Investigations Bureau (NBIB) starting October 1.
When it comes to cybersecurity, I have heard many people express consternation and wonderment as to why the government cannot protect the Internet. It boils down to two things: No authorization, and officials only have visibility into a scant number of networks under their control.
Yahoo Inc. released a statement Thursday informing customers that at least 500 million user accounts were stolen from its network in 2014 by what company officials labeled a "state-sponsored actor."
The hacked account information might have included customer names, email addresses, telephone numbers, birth dates, hashed passwords (the vast majority with bcrypt) and, in some cases, encrypted or unencrypted security questions and answers, according to a company statement. The release does not identify the nation officials believe are behind the hack.
Cybersecurity will remain as much of a challenge for the next administration as it has been for the current White House, especially in light of the constant barrage of cyber attacks from nation states, Director of National Intelligence James Clapper said Wednesday.
“The Russians hack our systems all the time, not just government but corporate and personal systems,” Clapper said on the inaugural day of at the Intelligence & National Security Summit (INSS) in Washington, D.C. The two-day conference, sponsored by AFCEA International and the Intelligence and National Security Alliance (INSA), runs through Thursday.
Fifth in an ongoing series of articles
The U.S. government must bring its key software providers into the secure environment and use them as trusted partners in delivering and supporting their products. In many cases, these providers are not only the best sources of trusted software but also the only sources. Holding them contractually liable for certifying their products and delivering them directly to the end system may be the only way to reduce the time to furnish baseline systems, streamline costs and maintain product integrity and security.
The U.S. Defense Department and the federal government could piggyback on the recent blockbuster popularity of Pokemon Go, the location-based augmented reality game that catapulted some couch potatoes from their sofas to the great outdoors, to transform cyber training. The mobile app, an overnight international sensation, combines the virtual world of Pokemon with the real world in which people live.
The gaming craze offers insights on how to excite people to partake in—and really learn from—cybersecurity training.
The U.S. Defense Department unveiled Thursday a bold information technology and cybersecurity road map that modifies its approach on several efforts in the rapidly changing environments. The guide positions the department’s IT infrastructure and processes for a broad impact, in addition to hopes of greater security and scrutiny, said its chief information officer, Terry Halvorsen.
With all of the public and media attention around high profile cyber attacks such as the Office of Personnel Management (OPM) breach and the Sony hack, it is easy to understand why many in government, as well as others, continue to focus on the consequences associated with major cybersecurity events.
When we think of cyber attacks, we generally picture a lone wolf hacker or Anonymous-type organization. But foreign governments are also formidable threats. Take a moment to scan the headlines and you’ll see that articles about cyber hacks on Sony Pictures Entertainment and the Democratic National Committee—among many others—have been attributed to North Korea and Russia.
When students studying cybersecurity return to Capitol Technology University in Maryland this fall, cash scholarships donated by a former adjunct professor will aid at least two of them.
Nischit Vaidya, president and CEO of Argotis, is driven by a love of education and a desire to give back to his community. The new scholarship program—created in his parents' names—accomplishes that quest and provides a legacy honoring his parents, who endured years of hard work and worry to see their son succeed, he says. “For me, the biggest thing is my mom and dad.”
A private cybersecurity institute is plucking U.S. veterans with related experience, training them and placing them with commercial firms where they can help develop solutions that ultimately could benefit their former services. Government and the military increasingly are calling on industry to provide them with effective cybersecurity, and this program aims to tap the expertise of former military cyber warriors as part of that private sector effort.
The Office of Personnel Management (OPM) announced Tuesday it has appointed David DeVries as its new chief information officer. DeVries now leaves the Defense Department, where he serves as the department’s principal deputy chief information officer under Terry Halvorsen.
One often-overlooked aspect of software development is how much programmers rely on open source libraries and packages for prewritten functions. Instead of writing code from scratch, or even copying and pasting code from one program into a new one, programmers often rely on what is called a dependency, the technical term for a shortcut to code maintained by a cloud service provider. Using the method makes a new program dependent on the existence and availability of that particular module. If that dependency is not available or the code functionality is broken, the entire program fails.
AFCEA TechNet Augusta 2016
The SIGNAL Magazine Online Show Daily, Day 3
Quote of the Day:
“We need a network environment where cybersecurity and cyber situational awareness is, in real time, capable of automated response, reacting at machine speed, self-diagnosing and self-healing.”—Gen. Dennis Via, USA, commander, Army Materiel Command
Officials with the Army’s Materiel Command (AMC) have initiated discussions with Army Cyber Command officials to see if the command can play a greater role in the cyber arena, according to Gen. Dennis Via, USA, AMC commander.
AFCEA TechNet Augusta 2016
The SIGNAL Magazine Online Show Daily, Day 2
Quote of the Day:
“There isn’t a warfighting function that isn’t impacted by cyber, so securing, operating and defending the Army portion of the DODIN is a core warfighting capability.” —Ronald Pontius, deputy to the commanding general, U.S. Army Cyber Command and Second Army
On day two of the AFCEA TechNet Augusta conference, cyber experts from across the military and industry openly and bluntly discussed the challenges of cybersecurity.