Cyber

June 1, 2016
By Lt. Gen. Jeff Sorenson, USA (Ret.)

The second in a series of articles

Among the latest steps the federal government has taken to reform the acquisition process, the U.S. Defense Department initiatives Better Buying Power 2.0 and 3.0 aim to improve the affordability of weapon system development and reduce the bureaucracy of program acquisition. In addition, Congress recently passed H.R. 1232, the Federal Information Technology Acquisition Reform Act, which seeks better ways to obtain and manage federal information technology systems.

May 23, 2016
By Max Emelianov

April marked one of the largest data breaches in history, with 11.5 million confidential documents leaked online. How did it happen—and what can we learn from it?  

By now, you’ve probably heard all about the so-termed Panama Papers, one of the largest data leaks in history. The law firm Mossack Fonseca, a firm that specialized in helping clients create offshore financial holdings, reported that 11.5 million confidential documents leaked online, comprising more than 2 terabytes of data.

May 19, 2016
By Beverly Mowery Cooper
Lt. Gen. Rhett Hernandez, USA (Ret.) (l), spoke with conference attendees about the importance of academic, industry and Army partnership for innovation in the cyber domain.

Through innovation, we must adjust the human-machine balance to increase operational effectiveness. This begins with investing in people and technology, said Lt. Gen. Rhett Hernandez, USA (Ret.) at the AFCEA International/George Mason University Critical Issues in C4I Symposium. Our service men and women have trust in each other, but they must have trust that we will provide the capabilities to keep them successful. Trust is the number one ingredient that will create or hinder innovation, he explained.

Gen. Hernandez is West Point Cyber Chair to the Army Cyber Institute and president of CyberLens LLC. He was the first commander of Army Cyber Command (ARCYBER).

May 18, 2016
By Sandra Jontz
Vint Cerf, touted as one of the “fathers of the Internet” and now vice president and chief Internet evangelist for Google, speaks at AFCEA International/George Mason University Critical Issues in C4I Symposium.

Is the emergence of robotics raising a generation of meat puppets? Are you a meat puppet?

While the questions posed by Bob Gourley, co-founder of Cognitio, drew a little laughter from attendees at the AFCEA International/George Mason University Critical Issues in C4I Symposium, they should provide serious fodder for discussion on the people whose jobs are about to be replaced by robots. 

“I hope you laughed at that the term, but I hope that that makes it memorable for you,” Gourley said of slang adopted from sci-fi novels. “I hope it leads to a serious thought … about the people whose jobs are being displaced, because it’s going to be in the millions.” 

May 17, 2016
By Sandra Jontz
John Pellegrino, deputy assistant secretary of the Army (Strategic Integration) speaks during the AFCEA DC Chapter's IoT Summit. Photo by Mike Carpenter

The U.S. military must be able to rapidly leverage both technologies and new policies surrounding the Internet of Things—not to keep pace with industry, one official said, but because U.S. adversaries already have figured out how to adapt and capitalize on what’s available.

“The enemy is capable … and we have to be able to do that,” Maj. Scott Cuomo, USMC, said Tuesday at an IoT Summit hosted by the AFCEA DC Chapter.

May 11, 2016
By George I. Seffers
LinQuest's cyber solution allows analysts to view data in 3-D.

LinQuest Corporation officials are now offering a new game-based technology that allows cyber analysts to view data in an immersive 3-D environment, which the company says allows quicker understanding of the data, saving users both time and money.

The 3-D Cyber Immersive Collaboration Environment (ICE) allows analysts to create a 3-D virtual world in which users are represented as avatars able to interact with big data analytics and/or real-time systems. The virtual world includes video feeds, data feeds, web interfaces, data visualizations and analytical tools. Once the crisis is over, the virtual world and its super metadata can be archived into the cloud.

May 11, 2016
By George I. Seffers

Ultra Electronics, 3eTI, will soon see its CyberFence solution being integrated into programmable logic controllers, which often are used for automation of critical infrastructure—telling a power generator when to turn on and off, for example. CyberFence enables facility operators to monitor and address issues securely and remotely within the grid, saving time, energy and resources.

May 10, 2016
By Ray Rothrock

Let’s face it—we have a lot to learn about cybersecurity. For weeks, the FBI and Apple squared off in an epic and public battle over encryption—the Holy Grail for cybersecurity warriors. “Help us break the iPhone,” said the FBI. “The risk is too great, too many will be harmed,” Apple retorted. But the battle was over before the parties fully engaged. The FBI found someone to hack the iPhone belonging to one of the San Bernardino shooters and said, “Never mind, problem solved.”

Does this make you feel secure? With attacks launched every day, I don’t think so.

May 4, 2016
By George I. Seffers
Soldiers with the 25th Infantry Division conduct fast rope insertion extraction techniques with their Marine Corps and Air Force counterparts. Elements of the 25th participated in the Army’s recent Cyber Blitz exercise, which will help define the future of cyber and spectrum warfare.

The U.S. Army last week completed an exercise designed to further define how the service adapts operationally to modern threats, including cyber attacks and electromagnetic warfare. During the exercise, the Army tested the cyber-electromagnetic activities (CEMA) cell concept within a brigade combat team and introduced new, yet-to-be-fielded technologies.

May 5, 2016
By Robert B. Dix Jr.

Many people involved in the discussion about cyber information sharing fail to grasp the fact that the sharing is only part of what is required to achieve the true objective, which is to attain the timely and actionable situational awareness necessary to inform cyber risk management decision making. Without the attendant analysis and collaboration, information sharing is just that. Some seem to believe that is enough. It is not.

May 2, 2016
By Joel Dolisy

In World War I, the U.S. Army used lumbering GMC trucks for the first time in combat—revolutionary for its time. Today, these vehicles would be considered slow, cumbersome and archaic in comparison to today's fast, powerful and, most of all, constantly connected warfighting machines.

In fact, thanks to the Internet of Things (IoT), just about everything that can be connected—from tanks to smartwatches—is connected. The Defense Department’s whole work force depends on thousands of devices that work off of disparate operating systems. The net result is a security risk nightmare for those who must secure government IT networks.

April 24, 2016
By Robert K. Ackerman
Vice Adm. Jan E. Tighe, USN, commander, Fleet Cyber Command and 10th Fleet, reviews cyberthreats during the AFCEA 2016 AFCEA Defensive Cyber Operations Symposium.

Defensive Cyber Operations Symposium 2016
The SIGNAL Magazine Online Show Daily, Day 3 and Final Wrap-up

Quote of the Day:
“The longer cyber attackers are in, the harder they are to get out.”—Marty Roesch, vice president and chief architect, Cisco Security Business Group

May 1, 2016
By James P. Craft

Acquisition reform has been a topic of discussion among individuals in government, industry and academia for several decades. A regular outpouring of well-written studies has occurred year after year, such as the 1986 Packard Commission report, the 1992 U.S. General Accounting Office (now the Government Accountability Office) report on weapons acquisition, the 1993 report of the Defense Department Acquisition Law Advisory Panel and the more recent Center for Strategic and International Studies report “Measuring the Outcomes of Acquisition Reform by Major DoD Components.” These studies have made recommendations and measured progress. In some cases, the same recommendations are repeated from study to study. 

May 1, 2016
By Senior Airman Ryan René Rosado, USAF

The advent of cyberspace has opened up many possibilities and now paves the way for a long overdue change in the way voters elect officials. It is time to purge outdated voting methods and use cyber platforms, which can improve voter turnout and the nation’s confidence in returns.

Despite landmark constitutional changes that give the right to vote to most adults, U.S. voter turnout is notoriously low—embarrassingly so. In 2012, 53.6 percent of an estimated voting-age population of nearly 241 million people cast ballots in the U.S. presidential election, according to Pew Research Center. 

April 26, 2016

The Defense Information Systems Agency (DISA) has renamed the Continental United States Field Command to reflect the organization’s evolution as a global service provider. The organization, which will soon consolidate the majority of its personnel into a new facility at Scott Air Force Base, Illinois, is now called the DISA Global Operations Command (DGOC).

The organization, which was informally known as DISA CONUS, was one of four regional field commands and Defense Network Operations Centers operated by DISA. It was originally established in 2003. Unlike DISA’s Central, European and Pacific field commands, DISA CONUS was not directly aligned or co-located with a combatant command headquarters. 

April 22, 2016
By Robert K. Ackerman

The days of the United States as an unassailable hyperpower have been replaced by an intensely competitive environment where two large rivals have rebuilt their militaries based on perceived U.S. vulnerabilities. Cyberspace is a foremost operational domain for each nation, and the United States must respond to their challenge or risk coming out second in a conflict with either nation.

April 22, 2016
By Robert K. Ackerman

Time is of the essence in detecting and protecting against cyber intruders, but some security measures actually work counter to their goal by increasing the difficulty for managers to fight intruders. In their haste to provide the best network security possible, these managers have hindered their ability to rid their system of many types of malware.

April 22, 2016
By Robert K. Ackerman

Efforts to counter adversaries in cyberspace jointly continue apace in the U.S. military, but the changing nature of enemy activities may require new approaches by the services. Baseline cyber activities may need to be increased, while some actions will need to remain the purview of individual services.

A panel of cyber officials discussed the ramifications of such changes on the final day of the AFCEA Defensive Cyber Operations Symposium (DCOS) 2016, held April 20-22 at the Walter E. Washington Convention Center in Washington, D.C.

April 1, 2016
By Robert K. Ackerman
A serviceman monitors his computer during the Cyber Guard 2015 exercise. Efforts within the Defense Information Systems Agency (DISA) may lead to defense personnel receiving a cybersecurity lesson every time they log on to a military network.

The ballooning volume of network breaches, the increasing sophistication of cyber attacks and the advancing talents of adversaries are among the cybersecurity challenges keeping Roger Greenwell awake at night. The chief of cybersecurity for the Defense Information Systems Agency’s Risk Management Executive, Greenwell confronts increasingly potent threats throughout a more diverse cyberscape. 

Consequently, the agency, known as DISA, is moving away from traditional cybersecurity measures. New methods, from embedding security in an operating system baseline to providing security training whenever a user accesses a device, are part of the agency’s evolving cybersecurity strategy.

April 21, 2016
By Robert K. Ackerman

Working with allies on cybersecurity could provide wide-ranging solutions that both address challenges and generate operational opportunities, suggested the U.S. Defense Department’s chief information officer. Speaking at Defensive Cyber Operations Symposium (DCOS) 2016, being held in the Washington, D.C., convention center, April 20-22, Terry Halvorsen told the morning plenary session audience that European allies are pursuing excellent approaches as they strive for cybersecurity. The United States and its allies would benefit highly from cooperating, he said.

Pages