The United States' dependence on valuable space assets and the nation's critical need to maintain superiority in command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) disciplines have also made these fields somewhat of an Achilles' heel. The country had long held technological and capabilities advantages over the rest of the world. Those days are gone.
Five years after the Canadian government launched an official national cybersecurity strategy to combat the rise of online attacks, the country’s national police force announced Wednesday it is creating an investigative team.
The Royal Canadian Mounted Police (RCMP) released its cyber crime strategy to reduce the threat and impact of digital criminal attacks in Canada, according to a news release.
The measure follows concerns that the country lags the United States and Europe in efforts to safeguard government, businesses and critical infrastructure from the increase in cyber attacks against Canadian interests.
Alion Science and Technology, Burr Ridge, Illinois (FA8075-16-D-0001); Battelle Memorial Institute, Columbus, Ohio (FA8075-16-D-0002); Booz Allen Hamilton, McLean, Virginia (FA8075-16-D-0003); Exelis Inc., Information Systems, Rome, New York (FA8075-16-D-0004); Georgia Tech Applied Research Corporation, Atlanta, Georgia (FA8075-16-D-0005); MacAulay-Brown Inc., Dayton, Ohio (FA8075-16-D-0006); ManTech Advanced Systems International Inc.,
The Defense Information Systems Agency (DISA) seeks to use big data analytics to enhance network situational awareness while automating as many cybersecurity capabilities as possible, officials said during the agency’s November 2 forecast to industry in Washington, D.C.
U.S. President Barack Obama and Chinese President Xi Jinping have agreed that neither country will “support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors,” according to a White House announcement released today.
As part of its efforts to provide practical solutions to real-world cybersecurity challenges, the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) is requesting comments on a draft guidance to help organizations better control access to information systems.
Metova Federal LLC, Cabot, Arkansas, was awarded a $45 million firm-fixed-price contract for cyberspace and electronic warfare support. Bids were solicited via the Internet with nine received. Funding and work location will be determined with each order. Army Contracting Command, Fort Gordon, Georgia, is the contracting activity (W91249-15-D-0006).
Raytheon will provide full lifecycle development and sustainment support for the Department of Homeland Security (DHS) and more than 100 federal agencies under a new DHS contract that could be worth approximately $1 billion, the company has announced. As prime contractor for the Network Security Deployment Division (NSD), Raytheon will help safeguard the .gov domain. Raytheon will support government efforts to develop, deploy and sustain systems that monitor, analyze and mitigate cyber threats to .gov networks.
The Department of Homeland Security Science and Technology (S&T) Directorate has awarded eight contracts totaling $14 million to create technology to defend against large and sophisticated Distributed Denial of Service (DDoS) attacks. The projects will become part of the Distributed Denial of Service Defenses Program.
The awards include:
The ease at which criminals can reverse engineer software makes for lucrative transgressions with national security implications, prompting government-backed researchers to seek innovations to shore up vulnerabilities, officials say.
The Defense Advanced Research Projects Agency, or DARPA, turned to academia and awarded a multiyear mission to develop obfuscation technology to better safeguard software intellectual property, both for commercial and government endeavors. The aim of DARPA’s SafeWare program is to find a solution that would render the software, such as proprietary algorithms, incomprehensible to a reverse engineer.
Having too little information once daunted the world of spies and intelligence analysts. Now the problem is too much data, and one of the biggest challenges going forward for the intelligence community is not a lack of technology but civilization’s dependency on it.
Today big data is one of the hottest segments of the information technology industry, successfully shrinking the world while creating an information overload that can paralyze analysts working to win the data-management war, experts lament.
Identity Theft Guard Solutions LLC, doing business as ID Experts, Portland, Oregon, is being awarded a $133,263,550 firm-fixed-price contract for commercially available data breach recovery services in response to the Office of Personnel Management (OPM) data breach affecting 21.5 million individuals. Data breach recovery services include credit and identity monitoring services, identity theft insurance, identity restoration services, as well as website services and call center services.
Some of today’s 9-year-olds code in Java during their summer vacations, making them the optimal candidates the U.S. government and military should school to be the next generation of cyberwarriors, offered Gary Wang, deputy chief information officer/G-6 in the U.S. Army.
The government has waited until it’s nearly too late to begin cultivating the next-generation cadre of scientists, programmers and security experts needed to shore up cyber vulnerabilities to prevent intrusions and attacks that threaten to deliver even more debilitating blows against the nation.
TechNet Augusta 2015
The SIGNAL Magazine Show Daily
Uncle Sam wants you—especially unicorns, leprechauns or something in between.
As the U.S. Defense Department revamps the way it protects its critical infrastructures and networks from emerging cyberthreats, military leaders want to reshape their work force and attract to their ranks highly specialized experts, including coveted data scientists.
TechNet Augusta 2015
The SIGNAL Magazine Show Daily
Convergence was the buzzword du jour as leaders outlined major changes to sweep the U.S. Army in efforts to shore up cyber weaknesses following a year of high-profile breaches and hacks that stunned the Defense Department. It is part of a cultural change that will have several military disciplines working together and removing the divides that have kept the intelligence community from working closely with signal commands, electronic warfare, cyber and information operations.
The U.S. Army must move quicker toward a massive cultural change to streamline cybersecurity processes—from training to all-out operations—if leaders hope to maintain the momentum toward innovation.
Northrop Grumman Systems Corp., McLean, Virginia, was awarded a $13,586,965 modification (0002) to contract W91RUS-14-D-0002 for non-personal information technology for the Army Regional Cyber Center-Europe, 5th Signal Command (Theater), with an estimated completion date of July 18, 2016. Fiscal 2015 operations and maintenance (Army) funds in the amount of $6,508,863 were obligated at the time of the award. Army Contracting Command, Ft. Huachuca, Arizona, is the contracting activity.
The U.S. government must direct serious attention to fixing the integrity of the nation’s security clearance system, marred by the cyber breach on the U.S. Office of Personnel Management (OPM). The true magnitude of the attack, which exposed more than 20 million federal workers and their families, is even greater than previously reported—now that we know that attack could have multiple repercussions on national security. Charles Allen, a senior intelligence adviser to the Intelligence and National Security Alliance, stated the breach was a risk to national security unlike any he has seen during his 50 years in the intelligence community.
The Department of Homeland Security Science and Technology Directorate (S&T) today announced a $2.9 million cybersecurity mobile app security research and development award that will help identify mobile app vulnerabilities. The Northern Virginia-based small business, Kryptowire, was awarded a 30-month contract through the S&T’s Long Range Broad Agency Announcement.
Cyber intelligence is the emerging buzz term as the United States works to fend off not just attacks by criminals and nation-state hackers, but terrorists calling for an electronic jihad.