Event Coverage

June 25, 2013
George I. Seffers

U.S. government officials are traveling the country warning companies about a new round of cyberattacks that have targeted 27 companies, compromised seven and may ultimately affect up to 600 asset owners, according to Neil Hershfield, deputy director, control systems security program (CSSP), Industrial Control Systems-Cyber Emergency Response Team (ICS-CERT), Homeland Security Department.

Hershfield made the comments while taking part in a critical infrastructure protection panel discussion as part of the July 25-27 AFCEA International Cyber Symposium, Baltimore.

May 16, 2013
By Maryann Lawlor

Robert O. Work, former undersecretary of the Navy, and current chief executive officer, Center for a New American Security, spoke frankly about the state of the military’s financial circumstances and shared his opinion about the next steps. The final keynote speaker at East: Joint Warfighting 2013 at the Virginia Beach Convention Center, Virginia, pointed out that this is not the first time the U.S. military has felt a budget crunch and the time for sounding the alarm has not yet arrived. Explaining that fiscal year 2013 is only the third year of a drawdown in funding, Work stated that the cuts have not yet bottomed out.

March 13, 2013
By Max Cacas

On the road to the future “expeditionary Army of 2020,” Lt. Gen. Susan Lawrence, USA, chief information officer/G-6, says the path through a changed environment will include buying only what is needed to deal with network and information technology refresh programs in the short term. In discussing how the Army will spend its money in the year to come, Gen. Lawrence said that her staff has done the basic engineering work and initial purchasing decisions for the network modernization of 10 installations. She discussed the topic during the keynote address at the 2013 Army IT Day, sponsored by AFCEA NOVA.

February 28, 2013
By George I. Seffers

The recently signed executive order on cybersecurity and the presidential directive on critical infrastructure protection are not separate documents. In fact, they are part of the same overall effort to protect the nation, said Rand Beers, undersecretary for the National Protection and Programs Directorate, U.S. Department of Homeland Security. Beers discussed the effort on Thursday at the AFCEA Homeland Security Conference in Washington, D.C.

February 28, 2013
George I. Seffers

Top information technology officials from a variety of government agencies identified cloud computing, mobile devices and edge technologies as the technologies that will be critical for accomplishing their missions in the future.

Luke McCormack, chief information officer, Justice Department, cited cloud-as-a-service as vital to the future. He urged industry to continue to push the barriers of stack computing, and he mentioned edge technology as an emerging technology. “Edge is going to be really critical to perform missions,” he said. He cited the Google Glass project as an indicator of what the future will bring.

February 28, 2013
George I. Seffers

As the U.S. government wrestles with its myriad budgetary woes, training, modeling and simulation can provide substantial savings in a variety of ways, according to officials speaking on the Training, Modeling and Simulation panel at the AFCEA Homeland Security Conference in Washington, D.C.

“With the economic turmoil that we find ourselves in today, where we have to simultaneously reduce costs while protecting the homeland, I believe we are now in a period where modeling and simulation and virtual reality methodologies are not really an aid to live training, they are indispensable,” said Sandy Peavy, chief information officer, Federal Law Enforcement Training Center, Homeland Security Department (DHS).

February 27, 2013
By George I. Seffers

Security concerns have largely driven advances in biometric technologies, but that likely will not be the case in the coming years. Commercial needs will overtake government security needs in determining the direction of biometrics, according to Troy Potter, vice president, Identity and Biometrics Solutions, Unisys Federal Systems, at the AFCEA Homeland Security Conference on Wednesday.

“We’re looking at this change from a security focus to a convenience, automation and cost-savings focus. That’s driving the market today. Commercial organizations will drive the market for the next 10 years,” Potter stated.

February 27, 2013
George I. Seffers

The National Network of Fusion Centers, developed in the aftermath of the September 11, 2001, attacks, are a vital part of the nation’s homeland security efforts, according to experts on the Intelligence and Information Sharing Panel at AFCEA’s Homeland Security Conference in Washington, D.C.

The fusion centers serve as the primary focal point for the receipt, gathering and sharing of threat-related information among federal, state, local, tribal and territorial partners. Although largely funded through federal homeland security grants, the centers are owned and operated by local entities.

February 27, 2013
By George I. Seffers

The First Responder Network Authority (FirstNet), which is responsible for deploying the Nationwide Public Safety Network, could learn lessons from the September 11, 2001, attack on the Pentagon, during which emergency responders experienced almost no interoperability problems, according to emergency management panelists at the AFCEA Homeland Security Conference in Washington, D.C.

February 27, 2013
By George I. Seffers

The U.S. top-down, federal government-based national security model currently used to protect the nation is not the best model for homeland security. Instead, the country should adopt a decentralized model called "network federalism" that empowers state and local agencies and encourages them to work together to resolve security issues.

February 27, 2013
By George I. Seffers

Although the Department of Homeland Security is eyeing mobile technologies, the organization faces a number of challenges, revealed Shawn Lapinski, the chief interoperable architect for Department of Homeland Security Joint Wireless Program Office within the Customs and Border Protection (CBP) agency, speaking at Wednesday's panel on mobile communications for homeland security at AFCEA's Homeland Security conference. 

February 26, 2013
By George I. Seffers

The National Institute of Standards and Technology (NIST) released a request for information on Tuesday, February 26, for the cybersecurity framework demanded by the recent White House executive order.

Speaking on the cybersecurity panel at the AFCEA Homeland Security Conference in Washington, D.C., on Tuesday, Jeff Voas, a NIST computer scientist, said he received his first briefing on the executive order about a week ago and NIST already has begun putting together working groups. The request for information process should be concluded in about 45 days. “We’re only a week or two into this,” Voas said.

February 26, 2013
By George I. Seffers

Senior leaders in both industry and government have learned their lessons from major storms, such as Katrina and Sandy, and are working together to improve the nation’s ability to bounce back from natural disasters.

As a member of the Critical Infrastructure Protection panel at AFCEA’s Homeland Security conference in Washington, D.C., William Bryan, deputy assistant secretary for infrastructure security and energy restoration, reported that in the aftermath of Sandy, a major storm that wreaked havoc in the Northeast, industry and government senior leaders worked closely to solve problems.

February 27, 2013
By George I. Seffers

Gen. Michael Hayden, USAF (Ret.), former director of the CIA, indicated an astounding extent of Chinese cyber espionage and said he believes the Iranians are attacking U.S. banks with unsophisticated but pervasive cyber attacks.

February 27, 2013
By George I. Seffers

The FBI's Next Generation Identification (NGI) system will improve law enforcement’s capabilities as much as DNA analysis, according to Dave Cuthbertson, assistant director, Criminal Justice information Services Division, FBI.

The NGI advances the FBI’s biometric identification services, providing an incremental replacement of the current system while introducing new functionality. The NGI improvements and new capabilities are being introduced across a multiyear timeframe within a phased approach.

February 26, 2013
By George I. Seffers

The hotel industry has seen a greater increase in terrorist attacks than any other industry in recent years, according to Alan Orlob, vice president of global safety and security for Marriott International. Orlob offered a first-hand account of the attacks on two hotels in Jarkarta, Indonesia, in 2009.

Orlob, the luncheon keynote speaker at the AFCEA Homeland Security Conference in Washington, D.C., was staying at a Ritz Carlton hotel, which is owned by Marriott, at the time of the attack.

September 18, 2014
By Robert K. Ackerman
James R. Clapper, director of national intelligence, gives the opening plenary address at the AFCEA/INSA Intelligence and National Security Summit 2014.

AFCEA/INSA Intelligence and National Security Summit 2014

The SIGNAL Magazine Online Show Daily

Day 1

Quote of the Day:

“We are expected to keep the nation safe by collecting intelligence in such a manner as there is no risk and no embarrassment to anyone if that is revealed, no threat to anyone’s bottom line. We call that ‘immaculate collection.’”—James R. Clapper, director of national intelligence

 

September 22, 2014
By Robert K. Ackerman
Rep. Mike Rogers (R-MI), chairman of the House Permanent Select Committee on Intelligence (l), and Rep. Dutch Ruppersberger (D-MD), ranking member of the committee, discuss intelligence oversight issues at the AFCEA/INSA Intelligence and National Security Summit 2014.

AFCEA/INSA Intelligence and National Security Summit 2014

The SIGNAL Magazine Online Show Daily

Day 2

Quote of the Day:

“The things we see today may be abominations, but they are not aberrations. They are the new normal.”—Brig. Gen. Michael Groen, USMC, director of intelligence, U.S. Marine Corps.

 

August 1, 2014
By Robert K. Ackerman

The price of failure to provide adequate cybersecurity ultimately may be too high for any nation to tolerate. Yet, the cost of effective cybersecurity may be too much for a nation to afford. The consequences of a damaging cyberattack on a part of the critical infrastructure could be catastrophic, yet securing national capabilities from cyberattack will require more than just government or industry action. Both groups must work in concert to produce results that are greater than the sum of their parts, but no single approach to cybersecurity will work to protect the diverse government and commercial assets that are both extremely vulnerable and highly critical to a nation’s well-being.

July 1, 2014
By Mandy Rizzo
Attendees at TechNet International 2014 in Bucharest, Romania, listen as Patrick Auroy, NATO’s assistant secretary general for defense investment, gives the opening keynote address.

Cyber, defense technology, coalition interoperability, NATO contracting opportunities and Ukraine were among the topics discussed at the NATO Industry Conference and TechNet International 2014, held in Bucharest, Romania. For the third time, the NATO Communications and Information Agency and AFCEA Europe organized a joint conference and exposition. The two organizations generated a program with an agenda of truly intertwined sessions relevant to all.

Pages