Cyber

February 13, 2013
By Max Cacas

One day after unveiling a long-awaited executive order concerning a wide-range of cybersecurity concerns, President Barack Obama’s top cybersecurity advisers admit that the order only goes so far in dealing with pressing Internet security needs. They say that the order is only a “down payment” and no substitute for permanent congressional legislation on the matter.

February 1, 2013
By George I. Seffers
The Joint Cyberoperations Range can include live training, such as a fighter jet flying over a training range, along with virtual and constructive cyber training.

A cyberspace operations facility grows with the burgeoning mission.

The U.S. Defense Department’s network operations training and education capabilities must continually evolve in the ever-shifting cyber realm. To meet that need, one of the department’s premier cyber ranges harnesses the power of simulation to support a full array of training, education, certification and military exercises for the warfighters.

February 1, 2013
By Maj. Jose Gonzalez, USAF

Commanders wrestling with control of cyberspace elements now have a new tool to help them secure their corner of cyberspace in an operational setting. The Adaptive Network Defense of Command and Control concept of operations enables joint force commander control of key terrain in cyberspace, based on assessments at an operational tempo. To achieve a joint force command objective, network operators concentrate cybersecurity and monitoring of command and control systems to maintain the initiative against adversarial attacks and provide enhanced situational awareness.

January 31, 2013
By Robert K. Ackerman
John Smart, president of the Acceleration Studies Foundation, tells the keynote luncheon audience that dramatic change is evolutionary and inevitable.

West 2013 Online Show Daily, Day 2

Quote of the Day: “How can you help me make the least-dumb decisions quicker?”—Terry Halvorsen, chief information officer (CIO) for the Department of the Navy, requesting cyber security solutions from industry

February 1, 2013
By Robert K. Ackerman

West 2013 Online Show Daily, Day 3

January 30, 2013
By Robert K. Ackerman

West 2013 Online Show Daily, Day 1

Quote of the Day:“’Flat’ is the new ‘up’ in this defense budget environment.”— Robert O. Work, undersecretary of the Navy

The military services are facing potentially crippling constraints if sequestration takes place in March. Defense officials foresee the likelihood of draconian budget cuts being imposed that will cripple the force just as it is being counted on to assume new strategic missions. In most cases, the services will have to choose to sacrifice some capabilities so that others will remain part of the force. In worse-case scenarios, the U.S. military may be unable to meet its obligations when a crisis emerges.

January 1, 2013
By Robert K. Ackerman

The shift of U.S. power to the Asia-Pacific will not be successful without an infusion of new technology and a dedicated effort to defeat a wide range of adversaries. The new strategic emphasis on the Asia-Pacific region poses a new set of challenges, mandating solutions that run the gamut from technological capabilities to cultural outreach and diplomacy.

On the military side, direct challenges range from dealing with cyberspace attacks to providing missile defense in a large-scale conflict. On the geopolitical side, centuries of conflict and confrontation among neighbors must be overcome if a region-wide security environment enabling economic growth is to be implemented.

January 3, 2013
By Max Cacas

The purpose of the attack is purely robbery, says a cyber expert, who has shared his McAfee report with government officials.

November 29, 2012
By Max Cacas

The report on the power transmission system was delayed by government officials for security reasons.

November 30, 2012
By Max Cacas

U.S. Air Force Cyber Summit raises leadership awareness on service’s roles and responsibilities.

December 1, 2012
By Paul A. Strassmann

A few staff experts can formulate new strategies in a short time. Over the years, the U.S. Defense Department has accumulated a large collection of long-range planning documents. However, none of the plans ever was fully implemented, as new administrations kept changing priorities.

The just announced Defense Department Cloud Computing Strategy presents a long list of radically new directions. Ultimately, it will take hundreds of thousands of person-years to accomplish what has been just outlined. Several points stand out.

November 14, 2012
By Robert K. Ackerman

The next great threat to computer and network security lies in the supply chain—and it is here now. From factories unwittingly turning out devices infected with malware, to counterfeit parts sold on the Internet, malevolent operators threaten the security of information systems without running any risk of being stopped or detected by conventional security practices.

Marcus H. Sachs, vice president, national security policy for Verizon, told the audience at TechNet Asia-Pacific 2012 in Honolulu, Hawaii, that 10 to 12 percent of the global information technology supply chain is counterfeit, and that number is growing.

November 5, 2012
By Rita Boland

Efforts to reduce barriers to information sharing in the cyberworld have met with criticism, but some in industry are emphasizing the necessity of swift action.

November 1, 2012
By Rita Boland
Ships from the Japan Maritime Self-Defense Force, the Republic of Korea Navy, and the U.S. Navy maneuver through the Pacific Ocean during a trilateral exercise. PACOM’s J-6 directorate is working to enhance coalition communications in its area of responsibility.

A premier cyber center and the next phase of the Joint Information Environment are altering the technical landscape for U.S. forces.

Cybersecurity remains the foremost concern for the man tasked with overseeing U.S. military communications technology in the Asia-Pacific area as the national defense strategy shifts focus to that region of the globe. New opportunities for technologies and programs are opening, but cyber issues continue to hold top billings in importance, and moves to shore up operations predate the recent official guidance.
 

October 1, 2012
By Max Cacas

The final conference in the TechNet Land Forces series focuses on military efforts to defend vital computer networks.

October 1, 2012
By Max Cacas

A new computing architecture emphasizes shared resources.

The nation’s intelligence community has embarked on a path toward a common computer desktop and a cloud computing environment designed to facilitate both timely sharing of information and cost savings. The implementation could result in budget savings of 20 to 25 percent over existing information technology spending within six years, but the ramifications could include large cultural changes that result both in lost jobs and business for industry partners.

October 1, 2012
By Max Cacas

The National Intelligence University prepares for its fifth decade with a shift in focus and a change in venue.

The National Intelligence University, which provides advanced training to U.S. intelligence professionals, is transitioning from an institution primarily focused on the U.S. Defense Department to one serving the entire intelligence community. This reflects the new emphasis toward sharing and collaboration within the nation's intelligence apparatus.

September 12, 2012
By Robert K. Ackerman

Defense customers are driving change; this effort tries to map the future.

The new Defense Information Systems Agency (DISA) strategic plan lines up many of the diverse information technology thrusts that are whirring throughout the Defense Department, according to an agency official. Tony Montemarano, director for strategic planning and information at DISA, states that the plan’s main goal is to codify where DISA is headed. This direction is fueled by demand signals from the Defense Department, particularly in high-mileage areas such as the Joint Information Environment, mobility initiatives and cloud services.

September 1, 2012
By Rita Boland
An instructor from Georgia teaches a class to a group of Afghan cyberprofessionals.  
An instructor from Georgia teaches a class to a group of Afghan cyberprofessionals. The Afghans traveled to Turkey as part of a NATO program to improve cyberdefense in their home country.  
September 1, 2012
By Rita Boland
  A U.S. paratrooper uses a handheld identity detection device to scan an Afghan man's iris while on patrol in Afghanistan's Ghazni province.
  A U.S. paratrooper uses a handheld identity detection device to scan an Afghan man's iris while on patrol in Afghanistan's Ghazni province.

Pages