Technique Solutions Inc., Stafford, Virginia, was awarded a $25 million indefinite- delivery/indefinite-quantity, firm-fixed-price contract for the entire spectrum of equipment and services associated with the Cyber Network Defense mission and information assurance support. Funding and work location will be determined with each order, with a completion date of Sept. 14, 2019. Army Contracting Command, Key West, Florida, is the contracting activity (W912PX-14-D-0002).
The Department of Homeland Security Science and Technology Directorate has transitioned the first technology in its Transition to Practice (TTP) program to commercial market two years ahead of schedule. The effort involves Los Alamos National Laboratory’s Quantum Secured Communication, which was picked up by the company Allied Minds. That private-sector entity exclusively licensed the technology in August 2013 and formed Whitewood Encryption Systems Incorporated to bring it to market. The product is a next-generation encryption system that leverages the quantum properties of light.
The Defense Information Systems Agency (DISA) is seeking information from small businesses as potential sources to provide cyber-related support services; to conduct activities; and to create products to improve the U.S. Defense Department's cyber systems. Specifically, the agency's omnibus indefinite delivery/indefinite quantity contract will support the U.S. Cyber Command's ability to operate resilient, reliable information and communication networks; counter cyberspace threats; and assure access to cyberspace.
The Online Show Daily: Day 3
The final day of AFCEA TechNet Augusta 2014 kicked off with a solemn remembrance of the September 11, 2001 terrorist attacks that rocked the nation. The conference then, necessarily, moved on to the future.
Although the U.S. Defense Department and the military industry are feeling the effects of constrained budgets, they have not yet been forced to find truly innovative solutions, Mark Bigham, chief innovation officer for Raytheon Intelligence and Information Services, told the AFCEA TechNet Augusta 2014 audience.
Bigham quoted Winston Churchill as saying that Americans will always do the right thing after they’ve exhausted all other alternatives. He also cited another Churchill quote: "Gentlemen, we have run out of money, now we have to think."
Mission success in the cyber arena, especially in a constrained budget environment, requires both cooperation and innovation, but military and industry officials speaking at AFCEA TechNet Augusta 2014 say they are not yet seeing enough of either.
Maj. Gen. Stephen Fogarty, USA, the new commanding general, U.S. Army Cyber Center of Excellence, Fort Gordon, initiated the discussion, saying that cyber is “inherently joint,” and warning against stovepiped systems and information for different mission areas, such as cyber, signal and intelligence, surveillance and reconnaissance. The Army, he said, has to cooperate with the other services, the Department of Defense, the National Security Agency, industry and multinational partners.
Senior military leaders will try next week to hash out differences on the command and control (C2) of the Joint Information Enterprise, or JIE, said Lt. Gen. Mark Bowman, USA, director, command, control, communications and computers/cyber and chief information officer, Joint Chiefs of Staff. Gen. Bowman made the remarks while addressing the audience at the AFCEA TechNet Augusta 2014 conference, Augusta, Georgia.
In his farewell address, President Dwight Eisenhower coined the phrase "military industrial complex" to describe the relationships between the military, Congress and industry. That complex no longer exists, according to Tom Davis, a former vice president for General Dynamics. Davis made the comments during an industry panel at the AFCEA TechNet Augusta 2014 conference in Augusta, Georgia.
The U.S. Army may at some point need to allow soldiers to conduct offensive cyberwarfare at the brigade combat team level, according to a panel of chief warrant officers speaking at AFCEA TechNet Augusta 2014, Augusta, Georgia.
U.S. Army officials struggled during AFCEA TechNet Augusta 2014 in Augusta, Georgia, to discuss the future of cyber operations when much of that future is currently unknowable, in large part because no one knows the full effects or challenges of emerging technologies.
The cyber era requires partnerships and information sharing across the agencies, industries and nations, said Maj. Gen. Stephen Fogarty, USA, the new commanding general, U.S. Army Cyber Center of Excellence, Fort Gordon, during a keynote address at the AFCEA TechNet 2014 Augusta conference, Augusta, Georgia.
Former National Security Agency contractor Edward Snowden single-handedly shocked the U.S. intelligence community by leaking reams of information to the news media, but the insider threat is much more widespread, said Maj. Gen. Stephen Fogarty, USA, the new commanding general, U.S. Army Cyber Center of Excellence and Fort Gordon, Georgia.
“Who would imagine one person could have as much impact on this nation as he did,” Gen. Fogarty said, referring to Snowden. “And we were not prepared for that. We were not looking for that. That’s an asymmetric attack that occurred, and it’s happening every single day.”
The U.S. Army is standing up a cyber brigade and considering a cyber branch, which has some questioning the future of the service's Signal Corps, but the Signal Corps will survive, Lt. Gen. Robert Ferrell, USA, the service’s chief information officer, said during a luncheon keynote speech at the AFCEA TechNet Augusta 2014 conference, Augusta, Georgia. “The Signal Corps will be enduring. It will not be going away,” Gen. Ferrell said. “You’re still going to be required to build, operate and defend the network.
The U.S. Army is building a Cyber Center of Excellence at Fort Gordon, Georgia, and it will not come cheap, warned Maj. Gen. Stephen Fogarty, USA, the center’s new commanding general.
All too often, the topic of cyber presents a negative view of vulnerabilities and attacks, but cyber has a positive role to play in national defense, said Lt. Gen. Edward Cardon, USA, commanding general, U.S. Army Cyber Command.
U.S. Army officials are laboring to define what the force will look like in 2025. But technologically speaking, it is hard to define anything beyond the next two or three years, said Lt. Gen. Edward Cardon, USA, commanding general, U.S. Army Cyber Command, during AFCEA TechNet Augusta held Sept. 9-11, Augusta, Georgia.
This article is written by our sponsor Riverbed Federal. Views expressed do not necessarily reflect views of AFCEA International or SIGNAL Media.
Federal agencies are always looking for ways to spend their security dollars more efficiently. Cyber Attack Defenders recently sat down with Sean Applegate, director of technology strategy at Riverbed Federal, who provided some tips on how agencies can boost their security capabilities while cutting costs by coordinating their investments in network and security monitoring.
The National Institute of Standards and Technology (NIST) is preparing recommendations to help organizations leverage the benefits of mobile apps while managing their risks. The publication’s authors are seeking public comments about the draft of "Technical Considerations for Vetting 3rd Party Mobile Applications." The deadline for comments is Sept. 18.
While apps can improve productivity, they also can introduce vulnerabilities that put sensitive data and network resources at risk. The draft publication describes tests that software security analysts can employ to find and understand these security gaps before the app is approved for use.
Some of the hackers who have persistently attacked Lockheed Martin’s networks have “gone quiet” in recent months, officials told reporters yesterday at an Arlington, Virginia, media summit hosted by the company’s recently restructured Defense and Intelligence Solutions division. “We’ve seen a number of the adversaries—I wouldn’t say they’ve disappeared—but they’ve gone quiet,” said Darrell Durst, Lockheed Martin’s vice president, cyber solutions. “I think we have been able to counter a number of the adversaries relative to our networks.”