Commanders wrestling with control of cyberspace elements now have a new tool to help them secure their corner of cyberspace in an operational setting. The Adaptive Network Defense of Command and Control concept of operations enables joint force commander control of key terrain in cyberspace, based on assessments at an operational tempo. To achieve a joint force command objective, network operators concentrate cybersecurity and monitoring of command and control systems to maintain the initiative against adversarial attacks and provide enhanced situational awareness.
West 2013 Online Show Daily, Day 2
Quote of the Day: “How can you help me make the least-dumb decisions quicker?”—Terry Halvorsen, chief information officer (CIO) for the Department of the Navy, requesting cyber security solutions from industry
West 2013 Online Show Daily, Day 1
Quote of the Day:“’Flat’ is the new ‘up’ in this defense budget environment.”— Robert O. Work, undersecretary of the Navy
The military services are facing potentially crippling constraints if sequestration takes place in March. Defense officials foresee the likelihood of draconian budget cuts being imposed that will cripple the force just as it is being counted on to assume new strategic missions. In most cases, the services will have to choose to sacrifice some capabilities so that others will remain part of the force. In worse-case scenarios, the U.S. military may be unable to meet its obligations when a crisis emerges.
The shift of U.S. power to the Asia-Pacific will not be successful without an infusion of new technology and a dedicated effort to defeat a wide range of adversaries. The new strategic emphasis on the Asia-Pacific region poses a new set of challenges, mandating solutions that run the gamut from technological capabilities to cultural outreach and diplomacy.
On the military side, direct challenges range from dealing with cyberspace attacks to providing missile defense in a large-scale conflict. On the geopolitical side, centuries of conflict and confrontation among neighbors must be overcome if a region-wide security environment enabling economic growth is to be implemented.
The purpose of the attack is purely robbery, says a cyber expert, who has shared his McAfee report with government officials.
The report on the power transmission system was delayed by government officials for security reasons.
U.S. Air Force Cyber Summit raises leadership awareness on service’s roles and responsibilities.
A few staff experts can formulate new strategies in a short time. Over the years, the U.S. Defense Department has accumulated a large collection of long-range planning documents. However, none of the plans ever was fully implemented, as new administrations kept changing priorities.
The just announced Defense Department Cloud Computing Strategy presents a long list of radically new directions. Ultimately, it will take hundreds of thousands of person-years to accomplish what has been just outlined. Several points stand out.
The next great threat to computer and network security lies in the supply chain—and it is here now. From factories unwittingly turning out devices infected with malware, to counterfeit parts sold on the Internet, malevolent operators threaten the security of information systems without running any risk of being stopped or detected by conventional security practices.
Marcus H. Sachs, vice president, national security policy for Verizon, told the audience at TechNet Asia-Pacific 2012 in Honolulu, Hawaii, that 10 to 12 percent of the global information technology supply chain is counterfeit, and that number is growing.
Efforts to reduce barriers to information sharing in the cyberworld have met with criticism, but some in industry are emphasizing the necessity of swift action.
A premier cyber center and the next phase of the Joint Information Environment are altering the technical landscape for U.S. forces.
Cybersecurity remains the foremost concern for the man tasked with overseeing U.S. military communications technology in the Asia-Pacific area as the national defense strategy shifts focus to that region of the globe. New opportunities for technologies and programs are opening, but cyber issues continue to hold top billings in importance, and moves to shore up operations predate the recent official guidance.
The final conference in the TechNet Land Forces series focuses on military efforts to defend vital computer networks.
A new computing architecture emphasizes shared resources.
The nation’s intelligence community has embarked on a path toward a common computer desktop and a cloud computing environment designed to facilitate both timely sharing of information and cost savings. The implementation could result in budget savings of 20 to 25 percent over existing information technology spending within six years, but the ramifications could include large cultural changes that result both in lost jobs and business for industry partners.
The National Intelligence University prepares for its fifth decade with a shift in focus and a change in venue.
The National Intelligence University, which provides advanced training to U.S. intelligence professionals, is transitioning from an institution primarily focused on the U.S. Defense Department to one serving the entire intelligence community. This reflects the new emphasis toward sharing and collaboration within the nation's intelligence apparatus.
Defense customers are driving change; this effort tries to map the future.
The new Defense Information Systems Agency (DISA) strategic plan lines up many of the diverse information technology thrusts that are whirring throughout the Defense Department, according to an agency official. Tony Montemarano, director for strategic planning and information at DISA, states that the plan’s main goal is to codify where DISA is headed. This direction is fueled by demand signals from the Defense Department, particularly in high-mileage areas such as the Joint Information Environment, mobility initiatives and cloud services.
|An instructor from Georgia teaches a class to a group of Afghan cyberprofessionals. The Afghans traveled to Turkey as part of a NATO program to improve cyberdefense in their home country.|
|A U.S. paratrooper uses a handheld identity detection device to scan an Afghan man's iris while on patrol in Afghanistan's Ghazni province.|
|Patrick Grother is a computer scientist with the NIST Information Technology Laboratory, in charge of the biometric portion of the FIPS 201 update.|
By year's end, NATO’s rapid reaction team of network defenders is expected to be operational. These cyber experts will be capable of deploying within 24 hours to any NATO nation undergoing crippling attacks on its information technology infrastructure or to the battlefield in support of warfighters.