With the election looming, policymakers both inside and outside the government are working overtime to prepare for what’s ahead. “No matter who wins this election, whether Trump gets a second term or we get a different president, there’s going to be an awful lot of changes,” said Duane Blackburn, S&T policy analyst for The MITRE Corporation, during an interview with AFCEA Asks.
When global positioning system (GPS) devices entered the consumer marketplace, they were big, clunky and not user friendly. To reach a location, users had to input waypoints and then be sure to stay on the line connecting each one. Despite their difficulties, early GPS receivers represented a typically incremental pathway for innovation: evolving from an early military application to becoming extremely useful on a commercial basis when connected to digital maps.
Now, GPS connectivity is standard in cars, smart phones and fitness devices, and the innovation continues with applications for autonomous farming equipment, online cargo tracking and smart munitions.
As the Department of Defense (DOD) continues its digital transformation efforts with systems upgrades and emerging technology, it needs to consider the foundational piece—the network infrastructure. Network infrastructure—including fiber and copper cabling, antennas, wireless access points and switches—is the backbone for all current and future devices that run on the network.
For decades, Type 1 has been the National Security Agency’s most prized cybersecurity designation, describing technology that can effectively keep the nation’s most classified information under lock and key.
Recent years, however, have seen the growth of NSA’s Commercial Solutions for Classified (CSfC) program, which offers an alternative to Type 1 products.
With these two competing options, it is important to understand what the difference between Type 1 and CSfC really is and which one is best for your use case.
Below, we’ll discuss everything you need to know about both NSA Type 1 and the CSfC program.
What Is NSA Type 1 Equipment?
High on the list of disruptions caused by the COVID-19 pandemic is productivity, with multiple sectors of the economy having slowed. As industries and workers find their path forward, many are taking a renewed look at telework, and for good reason.
Some industries, such as hospitality or healthcare, require at least some face-to-face contact with customers, and they must take the necessary precautions to keep employees safe and functioning where possible. However, for other industries, this crisis presents an opportunity to rethink remote work and how well it can fulfill organizational goals and missions.
There’s no question that 2020 is going to be a big year for technology transformation in the Defense Department. The National Defense Authorization Act gives DoD a $738 billion budget – a $20 billion increase over last year – with an emphasis on fielding the technology necessary for a faster, more agile force, while improving operations and efficiency across the enterprise. That means having fast, low-latency cellular and Wi-Fi connections at every access point and refreshing its legacy infrastructure.
Over the past few months, I have participated in a forum to help competitive graduates find quality internships and jobs after earning bachelor’s and master’s degrees from Carnegie Mellon University’s prestigious engineering and computer science programs. Listening to the next generation of technologists, innovators and leaders has helped me understand their concerns and desires in the hiring process. I have also gained new perspectives on what applicants think employers do right and wrong.
The following tactics, techniques and procedures (TTPs) are meant to help those in the government and defense sectors attract tech talent today.
Defense Industrial Base (DIB) supply chain cyber attacks are more widespread than ever due to multiple vulnerabilities. Government agencies require complete assurance that all entry points to their networks are fully secured. Meanwhile, supply chain vendors struggle with the quandary of how to ensure robust security without large investment dollars and without compromising daily operations.
The DoD Agency Secures Its Supply Chain case study is your comprehensive resource for identifying weaknesses within the supply chain and selecting the best solutions to keep your organization’s data secure.
There was massive technological growth in 2018; things like artificial intelligence and blockchain have gained much support recently. IT departments often enable improved efficiency and security in their organizations by adopting emerging technologies, but that's only if they have the freedom to do so. A few years ago, IT had very less influence over business decisions, but now times are changing: IT is gaining an increased role in business decisions with implementation of cloud computing, data centres and enterprise mobility.
Hypersonic flight introduces fundamental changes to the way today’s missiles operate. Cruise missiles fly and maneuver within the atmosphere across a range of altitudes, but at speeds barely reaching Mach 1. Ballistic missiles have speeds of up to Mach 9 during re-entry from space but their trajectory is fixed. Vastly faster than cruise missiles, yet following an unpredictable and adjustable flight path, hypersonic missiles are a unique threat.
For military intelligent sensor systems constrained by size, weight and power (SWaP), custom microelectronic processing devices using advanced 3D packaging and thermal management are the only solution for success.
Deception changes the asymmetry against attackers with attractive traps and lures designed to deceive and detect attackers. Providing an active defense for early detection, forensics, and automated incident response to in-network threats is a must. The ThreatDefend™ Platform provides accurate threat detection within user networks, data centers, clouds, and specialized attack surfaces. The portfolio includes expansive network, endpoint, application, and data deceptions that misdirect and reveal attacks from all threat vectors. Advanced machine-learning makes deployment and operations simple to operate for organizations of all sizes.
When the NATO Communications and Information Agency (NCIA) went looking for technology to enable alliance officials to use smartphones without being eavesdropped on by hackers or spies, they immediately came up against a problem.
“There were a very limited number of solutions that had been accredited by member-nation security agencies to protect sensitive but unclassified voice [and text] communications,” NCIA General Manager Kevin Scheid said.
As conflicts become faster and more complex with multiple platforms and data streams feeding information to warfighters, there is a growing need to manage this process to improve operational efficiency. The Department of Defense (DOD) is investing in cloud and machine learning tools and systems to help improve situational awareness and connectivity at the last tactical mile.
The military is striving to maintain tactical dominance in two ways: (1) ubiquitous edge computing and processing on intelligence, surveillance and reconnaissance (ISR) platforms, and (2) cloud-based services and tools that can reach small tactical units to provide them with vital information even in contested electromagnetic environments.
From the end of the Cold War to the present era, there has been a growing need for military platforms to coordinate for operations and to share information. The Link 16 family of data links has been central to providing critical battlefield information to the U.S. and its allies since the 1980s.
But Link 16 has primarily been used for theater-wide operations, connecting fast jets and large platforms like ships. One area where the data link has not seen much use was in tactical missions on the ground connecting helicopters, ground vehicles and dismounted troops.
Talk about taking on a big job: Red Hat wants to bring agile software production practices — and the company’s OpenShift application development platform — into the Department of Defense with their decades of constraints, habits and bureaucracy.
And the task is made more daunting still, because making an organization agile isn’t just a matter of buying stuff.
“Agile is not bought, it’s taught,” said Red Hat Public Sector Lead Transformation Specialist Chuck Svoboda, “And it needs to be taught by seasoned practitioners.”
Svoboda dismisses the idea that an organization can become agile simply by buying the right technology—like the lightweight and easily replicable software called containers.
In a rapidly changing and dynamic world, we are lacking a most important ingredient for policy making: honest, constructive political debate. Civil discourse, in which responsible and thoughtful people discuss proposed policies and events based on facts, logic and reason in an atmosphere of mutual respect, has all but disappeared. It is being replaced by one-sided, confrontational politics wrapped in narrowly focused biases that give no quarter to opposing views. Emotion and deception have ousted integrity and truth. Moderate voices are being driven to the sidelines or silenced altogether.
With technologies entering the market at a blistering pace and autonomous systems expected to make a larger contribution, the work force of the future may not resemble past efforts.
Eager to try and make sense of the coming environment, Deloitte's recent study, Government jobs of the future: What will government work look like in 2025 and beyond?, delves into predictions.
Mission assurance and resilience can be interpreted differently, but having the tools, capabilities, partnerships and skilled work force that can respond to a variety of scenarios in a flexible manner is the ultimate goal.
The solutions possible in the Indo-Asia-Pacific region are as varied as the challenges, and the speakers at TechNet-Asia Pacific were cautiously optimistic because of the tools they have. But they also emphasized that the United States needs to rely on much more than technical prowess. The human factor is equally important.
Your endpoints don’t just live within the safety of your corporate network—they’re out in the wild exposed to millions of new threats every day. With non-malware attacks on the rise that are even harder to detect than traditional malware, security professionals are realizing it is no longer a matter of if they will be breached, but when.