The U.S. Senate is moving on a cyber bill that is more in line with the approach being taken by the House, said a member of the House Permanent Select Committee on Intelligence. Rep. Mac Thornberry (R-TX) told the morning audience at the AFCEA Global Intelligence Forum at the National Press Club in Washington, D.C., that this bill may be marked up by the Senate Commerce Committee this week. It would turn to standards established by the National Institute of Standards and Technology (NIST) for private sector guidelines.
Many elected officials who opposed the National Security Agency’s (NSA’s) broad surveillance efforts were “demagogues” who did not know the real issues involved, said a member of the House Permanent Select Committee on Intelligence. Rep. Mac Thornberry (R-TX) told the morning audience at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that the people in the House who voted to cut funding for the NSA’s surveillance efforts preferred taking a stand to understanding the situation. Those who voted against cutting the NSA’s funding were the people who’ve been getting the intelligence briefings.
Legislation that creates both positive and negative incentives may be necessary for industry to incorporate effective network security. The role of the insurance industry also can be brought to bear to convince companies it is in their best interest to ensure the sanctity of their data.
These points were offered by Rep. Mac Thornberry (R-TX). He told the morning audience at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that the government should pursue a private sector approach as part of its efforts to strengthen information security in the United States.
General Dynamics Advanced Information Systems has created a portal to facilitate collaboration among experts from multiple industries in a secure, controlled, cooperative environment. GDNexus matches innovative solutions to customer requirements across the defense, federal government, intelligence community and commercial markets.
Frank Kendall, undersecretary of defense for acquisition, technology and logistics, told the Senate Banking, Housing and Urban Affairs Committee that he is concerned about the level of cyber attacks affecting defense suppliers. As a result, he is considering changes in contracting procedures to mitigate the risk of corporate espionage. “I’m talking particularly about design information that might not be classified, but if you acquire that information, it certainly shortens your lead time to building things, and it reduces your costs,” he told committee members. “That’s an advantage we don’t want to give our potential adversaries.”
Maj. Gen. Burke Wilson, USAF, director, space operations, Headquarters U.S. Air Force, told the audience that cyber is all about improving operational effectiveness in other domains. “Mission outcome is the only reason we invest in this. We believe it will generate in better mission outcomes across the service,” he stated.
The United States is one of the best in the world at protecting civil liberties, Gen. Keith Alexander, USA, director of National Security Agency (NSA) and commander of the U.S. Cyber Command said at the AFCEA Cyber Symposium in Baltimore.
Edward Snowden, the NSA contractor who leaked reams of data about NSA monitoring activities to the press, has been called a hero whistleblower by some, but Gen. Alexander contends that the employees at the NSA, FBI, CIA and Defense Department, who protect the nation while protecting civil liberties, are the real heroes.
Although pockets of resistance still exist, leaders in the Defense Department and military services largely agree on the need for a Joint Information Environment, according to panelists at the AFCEA International Cyber Symposium in Baltimore. The JIE will one day consolidate all of the department’s myriad networks into one while providing enterprise services, such as email, Internet access, common software applications and cloud computing. It is expected to increase operational efficiency, enhance network security and provide cost savings through reduced infrastructure and manpower.
The U.S. Navy will announce the winner of the Next Generation Enterprise Network (NGEN) tonight, according to Brig. Gen. Kevin Nally, USMC, Marine Corps director of command, control, communications and computers and chief information officer. Gen. Nally discussed the pending decision while participating in a panel discussion on the final day of the AFCEA International Cyber Symposium in Baltimore.
The Defense Information Systems Agency (DISA) will likely announce within the next couple of weeks who will operate the Defense Department’s mobile app store, said Lt. Gen. Ronnie Hawkins Jr., USAF, DISA director.
Lt. Gen. Ronnie Hawkins Jr., USAF, director of the Defense Information Systems Agency (DISA), spent some time during his luncheon keynote address talking about the Joint Information Environment (JIE), which the agency already has been working on for some time.
The U.S. Defense Department is building a single security architecture that ultimately will eliminate firewalls in the future, according to Lt. Gen. Ronnie Hawkins Jr., USAF, Defense Information Systems Agency (DISA) director.
The Defense Information Systems Agency (DISA) is undergoing a substantial organizational restructuring, which is mostly complete and will be “set in concrete” July 15th. The reorganization will ensure the agency can support the military services, the joint staff, and all warfighting customers as the military moves to the Joint Information Environment, said Lt. Gen. Ronnie Hawkins, USAF, DISA director.
Maj. Gen. Jennifer Napper, USA, director of plans and policy, U.S. Cyber Command, and other panelists at the AFCEA International Cyber Symposium in Baltimore said that cyber requires cooperation across the U.S. government, with the private sector and with other nations, including China and Russia.
Gen. Napper cited her decade of experience working with international partners on a variety of projects, plans, initiatives and operations. “While we’ve made great progress in many areas, there’s always room for more improvement. This is especially true in the area of operations in and through cyberspace. This more than any other area must be a team sport,” she said.
The United States will continue to develop a bilateral relationship with China regarding cybersecurity issues. In fact, the two countries will meet again in Washington, D.C., on July 8th, according to Maj. Gen. John Davis, USA, senior military advisor to the undersecretary of defense—policy for cyber, Office of the Secretary of Defense. Gen. Davis, the luncheon keynote speaker on the first day of the July 24-27 AFCEA International Cyber Symposium in Baltimore, said the United States recognizes China as a rising power and a major voice in the cyber arena.
U.S. government officials are traveling the country warning companies about a new round of cyberattacks that have targeted 27 companies, compromised seven and may ultimately affect up to 600 asset owners, according to Neil Hershfield, deputy director, control systems security program (CSSP), Industrial Control Systems-Cyber Emergency Response Team (ICS-CERT), Homeland Security Department.
Hershfield made the comments while taking part in a critical infrastructure protection panel discussion as part of the July 25-27 AFCEA International Cyber Symposium, Baltimore.
The National Institute of Standards and Technology (NIST) has released the most comprehensive update to the government’s computer security guide since 2005. The fourth revision of “Security and Privacy Controls for Federal information Systems and Organizations” (SP 800-53) addresses issues such as mobile and cloud computing, applications security, supply chain risks and privacy concerns. It also calls for maintaining routine best practices to reduce information security risks while applying state-of-the-practice architecture and engineering principles to minimize the impact of threats such as cyber attacks.
The malware that infiltrated computer systems across South Korea’s banking and television broadcast industries on March 20 shares similarities with the Shamoon program used last year to wipe clean the hard drives of 30,000 Saudi Aramco workstations, according to experts at General Dynamics Fidelis Cybersecurity Solutions. Investigators at the company’s newly-opened cyber forensics laboratory in Columbia, Maryland, say the malware is not a Shamoon variant, but that the two programs share some characteristics.
The U.S. National Nuclear Security Administration (NNSA) began working on its Yourcloud solution about two years ago and expects to have the cloud computing solution in place by year's end. You can read more about this in "U.S. Nuclear Agency Enhances Cybersecurity With Cloud Computing ."
Despite continued budget crunching, U.S. Defense Department officials are continuing to implement a three-phase plan to equip the department’s 600,000 mobile-device users with secure classified and protected unclassified mobile solutions that leverage commercial products. In conjunction with the Defense Information Systems Agency, the department’s chief information officer is establishing a basic multivendor mobility capability with the Defense Department for assessment. This first phase, which continues through April, deploys voice and data services over a commercial wireless network, and a contract will be awarded for the department’s initial enterprise mobile device management (MDM) and mobile application store (MAS).