Event Coverage

June 26, 2013
By George I. Seffers

Maj. Gen. Jennifer Napper, USA, director of plans and policy, U.S. Cyber Command, and other panelists at the AFCEA International Cyber Symposium in Baltimore said that cyber requires cooperation across the U.S. government, with the private sector and with other nations, including China and Russia.

Gen. Napper cited her decade of experience working with international partners on a variety of projects, plans, initiatives and operations. “While we’ve made great progress in many areas, there’s always room for more improvement. This is especially true in the area of operations in and through cyberspace. This more than any other area must be a team sport,” she said.

June 25, 2013
By George I. Seffers

The United States will continue to develop a bilateral relationship with China regarding cybersecurity issues. In fact, the two countries will meet again in Washington, D.C., on July 8th, according to Maj. Gen. John Davis, USA, senior military advisor to the undersecretary of defense—policy for cyber, Office of the Secretary of Defense. Gen. Davis, the luncheon keynote speaker on the first day of the July 24-27 AFCEA International Cyber Symposium in Baltimore, said the United States recognizes China as a rising power and a major voice in the cyber arena.

June 25, 2013
George I. Seffers

U.S. government officials are traveling the country warning companies about a new round of cyberattacks that have targeted 27 companies, compromised seven and may ultimately affect up to 600 asset owners, according to Neil Hershfield, deputy director, control systems security program (CSSP), Industrial Control Systems-Cyber Emergency Response Team (ICS-CERT), Homeland Security Department.

Hershfield made the comments while taking part in a critical infrastructure protection panel discussion as part of the July 25-27 AFCEA International Cyber Symposium, Baltimore.

May 16, 2013
By Maryann Lawlor

Robert O. Work, former undersecretary of the Navy, and current chief executive officer, Center for a New American Security, spoke frankly about the state of the military’s financial circumstances and shared his opinion about the next steps. The final keynote speaker at East: Joint Warfighting 2013 at the Virginia Beach Convention Center, Virginia, pointed out that this is not the first time the U.S. military has felt a budget crunch and the time for sounding the alarm has not yet arrived. Explaining that fiscal year 2013 is only the third year of a drawdown in funding, Work stated that the cuts have not yet bottomed out.

March 13, 2013
By Max Cacas

On the road to the future “expeditionary Army of 2020,” Lt. Gen. Susan Lawrence, USA, chief information officer/G-6, says the path through a changed environment will include buying only what is needed to deal with network and information technology refresh programs in the short term. In discussing how the Army will spend its money in the year to come, Gen. Lawrence said that her staff has done the basic engineering work and initial purchasing decisions for the network modernization of 10 installations. She discussed the topic during the keynote address at the 2013 Army IT Day, sponsored by AFCEA NOVA.

February 28, 2013
By George I. Seffers

The recently signed executive order on cybersecurity and the presidential directive on critical infrastructure protection are not separate documents. In fact, they are part of the same overall effort to protect the nation, said Rand Beers, undersecretary for the National Protection and Programs Directorate, U.S. Department of Homeland Security. Beers discussed the effort on Thursday at the AFCEA Homeland Security Conference in Washington, D.C.

February 28, 2013
George I. Seffers

Top information technology officials from a variety of government agencies identified cloud computing, mobile devices and edge technologies as the technologies that will be critical for accomplishing their missions in the future.

Luke McCormack, chief information officer, Justice Department, cited cloud-as-a-service as vital to the future. He urged industry to continue to push the barriers of stack computing, and he mentioned edge technology as an emerging technology. “Edge is going to be really critical to perform missions,” he said. He cited the Google Glass project as an indicator of what the future will bring.

February 28, 2013
George I. Seffers

As the U.S. government wrestles with its myriad budgetary woes, training, modeling and simulation can provide substantial savings in a variety of ways, according to officials speaking on the Training, Modeling and Simulation panel at the AFCEA Homeland Security Conference in Washington, D.C.

“With the economic turmoil that we find ourselves in today, where we have to simultaneously reduce costs while protecting the homeland, I believe we are now in a period where modeling and simulation and virtual reality methodologies are not really an aid to live training, they are indispensable,” said Sandy Peavy, chief information officer, Federal Law Enforcement Training Center, Homeland Security Department (DHS).

February 27, 2013
By George I. Seffers

Security concerns have largely driven advances in biometric technologies, but that likely will not be the case in the coming years. Commercial needs will overtake government security needs in determining the direction of biometrics, according to Troy Potter, vice president, Identity and Biometrics Solutions, Unisys Federal Systems, at the AFCEA Homeland Security Conference on Wednesday.

“We’re looking at this change from a security focus to a convenience, automation and cost-savings focus. That’s driving the market today. Commercial organizations will drive the market for the next 10 years,” Potter stated.

February 27, 2013
George I. Seffers

The National Network of Fusion Centers, developed in the aftermath of the September 11, 2001, attacks, are a vital part of the nation’s homeland security efforts, according to experts on the Intelligence and Information Sharing Panel at AFCEA’s Homeland Security Conference in Washington, D.C.

The fusion centers serve as the primary focal point for the receipt, gathering and sharing of threat-related information among federal, state, local, tribal and territorial partners. Although largely funded through federal homeland security grants, the centers are owned and operated by local entities.

February 27, 2013
By George I. Seffers

The First Responder Network Authority (FirstNet), which is responsible for deploying the Nationwide Public Safety Network, could learn lessons from the September 11, 2001, attack on the Pentagon, during which emergency responders experienced almost no interoperability problems, according to emergency management panelists at the AFCEA Homeland Security Conference in Washington, D.C.

February 27, 2013
By George I. Seffers

The U.S. top-down, federal government-based national security model currently used to protect the nation is not the best model for homeland security. Instead, the country should adopt a decentralized model called "network federalism" that empowers state and local agencies and encourages them to work together to resolve security issues.

February 27, 2013
By George I. Seffers

Although the Department of Homeland Security is eyeing mobile technologies, the organization faces a number of challenges, revealed Shawn Lapinski, the chief interoperable architect for Department of Homeland Security Joint Wireless Program Office within the Customs and Border Protection (CBP) agency, speaking at Wednesday's panel on mobile communications for homeland security at AFCEA's Homeland Security conference. 

February 26, 2013
By George I. Seffers

The National Institute of Standards and Technology (NIST) released a request for information on Tuesday, February 26, for the cybersecurity framework demanded by the recent White House executive order.

Speaking on the cybersecurity panel at the AFCEA Homeland Security Conference in Washington, D.C., on Tuesday, Jeff Voas, a NIST computer scientist, said he received his first briefing on the executive order about a week ago and NIST already has begun putting together working groups. The request for information process should be concluded in about 45 days. “We’re only a week or two into this,” Voas said.

February 26, 2013
By George I. Seffers

Senior leaders in both industry and government have learned their lessons from major storms, such as Katrina and Sandy, and are working together to improve the nation’s ability to bounce back from natural disasters.

As a member of the Critical Infrastructure Protection panel at AFCEA’s Homeland Security conference in Washington, D.C., William Bryan, deputy assistant secretary for infrastructure security and energy restoration, reported that in the aftermath of Sandy, a major storm that wreaked havoc in the Northeast, industry and government senior leaders worked closely to solve problems.

February 27, 2013
By George I. Seffers

Gen. Michael Hayden, USAF (Ret.), former director of the CIA, indicated an astounding extent of Chinese cyber espionage and said he believes the Iranians are attacking U.S. banks with unsophisticated but pervasive cyber attacks.

February 27, 2013
By George I. Seffers

The FBI's Next Generation Identification (NGI) system will improve law enforcement’s capabilities as much as DNA analysis, according to Dave Cuthbertson, assistant director, Criminal Justice information Services Division, FBI.

The NGI advances the FBI’s biometric identification services, providing an incremental replacement of the current system while introducing new functionality. The NGI improvements and new capabilities are being introduced across a multiyear timeframe within a phased approach.

February 26, 2013
By George I. Seffers

The hotel industry has seen a greater increase in terrorist attacks than any other industry in recent years, according to Alan Orlob, vice president of global safety and security for Marriott International. Orlob offered a first-hand account of the attacks on two hotels in Jarkarta, Indonesia, in 2009.

Orlob, the luncheon keynote speaker at the AFCEA Homeland Security Conference in Washington, D.C., was staying at a Ritz Carlton hotel, which is owned by Marriott, at the time of the attack.

September 18, 2014
By Robert K. Ackerman
James R. Clapper, director of national intelligence, gives the opening plenary address at the AFCEA/INSA Intelligence and National Security Summit 2014.

AFCEA/INSA Intelligence and National Security Summit 2014

The SIGNAL Magazine Online Show Daily

Day 1

Quote of the Day:

“We are expected to keep the nation safe by collecting intelligence in such a manner as there is no risk and no embarrassment to anyone if that is revealed, no threat to anyone’s bottom line. We call that ‘immaculate collection.’”—James R. Clapper, director of national intelligence

 

September 22, 2014
By Robert K. Ackerman
Rep. Mike Rogers (R-MI), chairman of the House Permanent Select Committee on Intelligence (l), and Rep. Dutch Ruppersberger (D-MD), ranking member of the committee, discuss intelligence oversight issues at the AFCEA/INSA Intelligence and National Security Summit 2014.

AFCEA/INSA Intelligence and National Security Summit 2014

The SIGNAL Magazine Online Show Daily

Day 2

Quote of the Day:

“The things we see today may be abominations, but they are not aberrations. They are the new normal.”—Brig. Gen. Michael Groen, USMC, director of intelligence, U.S. Marine Corps.

 

Pages