February 17, 2016
By Robert K. Ackerman

In a complex world rife with a plethora of threats, North Korea looms as the worst, according to the former supreme allied commander Europe. Adm. James G. Stavridis, USN (Ret.), dean of The Fletcher School of Law and Diplomacy, described the Hermit Kingdom in harsh detail during his keynote address opening West 2016, being held in San Diego February 17-19.

“They have a young, untested, untried, morbidly obese leader that has nuclear weapons,” Stavridis said in referring to Kim Jong Un.

December 1, 2015
By Sandra Jontz
Analysts can use predictive analytics, such as Haystax Technology’s Carbon software, to counter inside threats by continuously monitoring and evaluating employees.

Since the 2009 fatal shootings of 13 people at Fort Hood by a U.S. Army major and psychiatrist and the leaks of some 750,000 classified and sensitive military documents to WikiLeaks by another soldier, the U.S. Defense Department has sought technology to give analysts an advantage in finding insider threats.

The need spread, and now federal agencies employ advanced analytics and cybersecurity solutions to protect against an ever-morphing landscape of breaches, from those outside firewalls to rogue or careless employees. One of those solutions is a product called Carbon.

January 13, 2016
By David E. Meadows

If you have ever worked on a team, then you understand the intrinsic need for everyone to work from the same set of terms of references, or TORs—kind of a definitive dictionary. TORs are needed even if working internationally with team members who originate from nations that use the same language, such as English, the language of the early Germanic settlers—Angles, Saxons, Jutes—of Britain.

January 7, 2016
By Sandra Jontz

Director of National Intelligence, James Clapper, today announced the leaders of the Cyber Threat Intelligence Integration Center (CTIIC). Director Tonya Ugoretz will lead the center, with Maurice Bland as deputy and Office of the Director of National Intelligence (ODNI) Research Director Thomas Donahue as part of the team.

A year ago, President Obama directed Clapper to establish the CTIIC in a move to fuse intelligence collected from multiple agencies probing cyberthreats. The center serves to “connect the dots” regarding malicious foreign cyberthreats against the United States, according to an ODNI press release announcing the leaders.

December 16, 2015
By Eddie Garcia

Stopping insider threats has become a unifying cybersecurity mission, particularly in the defense and intelligence communities. And for good reason. While in the recent past, mention of the words insider threat conjured up the likeness of Edward Snowden, the reality is much scarier. More often than not, insider threats result from innocent people making simple mistakes rather than the common misconception of malicious employees or whistleblowers.

December 11, 2015

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) today announced its first Innovation Other Transaction Solicitation (OTS) aimed at non-traditional performers such as technology startups to offer solutions to some of the toughest threats facing DHS and the homeland security mission. Awarded through Other Transaction Solicitation HSHQDC-16-R-B0005, the first call for proposals is looking for solutions to improve situational awareness and security measures for protecting

December 10, 2015
By Cyndi Thomas
With electronic attack, adversaries now can deny use of command and control systems across all domains. Illustration courtesy NCI Inc.

The United States' dependence on valuable space assets and the nation's critical need to maintain superiority in command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) disciplines have also made these fields somewhat of an Achilles' heel. The country had long held technological and capabilities advantages over the rest of the world. Those days are gone.

December 3, 2015
By Sandra Jontz

Five years after the Canadian government launched an official national cybersecurity strategy to combat the rise of online attacks, the country’s national police force announced Wednesday it is creating an investigative team.

The Royal Canadian Mounted Police (RCMP) released its cyber crime strategy to reduce the threat and impact of digital criminal attacks in Canada, according to a news release.

The measure follows concerns that the country lags the United States and Europe in efforts to safeguard government, businesses and critical infrastructure from the increase in cyber attacks against Canadian interests.

November 20, 2015

Alion Science and Technology, Burr Ridge, Illinois (FA8075-16-D-0001); Battelle Memorial Institute, Columbus, Ohio (FA8075-16-D-0002); Booz Allen Hamilton, McLean, Virginia (FA8075-16-D-0003); Exelis Inc., Information Systems, Rome, New York (FA8075-16-D-0004); Georgia Tech Applied Research Corporation, Atlanta, Georgia (FA8075-16-D-0005); MacAulay-Brown Inc., Dayton, Ohio (FA8075-16-D-0006); ManTech Advanced Systems International Inc.,

November 3, 2015
By George I. Seffers

The Defense Information Systems Agency (DISA) seeks to use big data analytics to enhance network situational awareness while automating as many cybersecurity capabilities as possible, officials said during the agency’s November 2 forecast to industry in Washington, D.C.

September 25, 2015
By George I. Seffers
President Barack Obama and President Xi Jinping of China hold a press conference at the Great Hall of the People in Beijing, China, last year. Today, the two announced a historic agreement designed to curb cyber aggression.

U.S. President Barack Obama and Chinese President Xi Jinping have agreed that neither country will “support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors,” according to a White House announcement released today.

September 30, 2015
By George I. Seffers

As part of its efforts to provide practical solutions to real-world cybersecurity challenges, the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) is requesting comments on a draft guidance to help organizations better control access to information systems.

September 30, 2015

Metova Federal LLC, Cabot, Arkansas, was awarded a $45 million firm-fixed-price contract for cyberspace and electronic warfare support. Bids were solicited via the Internet with nine received.  Funding and work location will be determined with each order. Army Contracting Command, Fort Gordon, Georgia, is the contracting activity (W91249-15-D-0006).


September 29, 2015

Raytheon will provide full lifecycle development and sustainment support for the Department of Homeland Security (DHS) and more than 100 federal agencies under a new DHS contract that could be worth approximately $1 billion, the company has announced. As prime contractor for the Network Security Deployment Division (NSD), Raytheon will help safeguard the .gov domain. Raytheon will support government efforts to develop, deploy and sustain systems that monitor, analyze and mitigate cyber threats to .gov networks.


September 28, 2015

The Department of Homeland Security Science and Technology (S&T) Directorate has awarded eight contracts totaling $14 million to create technology to defend against large and sophisticated Distributed Denial of Service (DDoS) attacks. The projects will become part of the Distributed Denial of Service Defenses Program.

The awards include:

September 14, 2015
By Sandra Jontz

The ease at which criminals can reverse engineer software makes for lucrative transgressions with national security implications, prompting government-backed researchers to seek innovations to shore up vulnerabilities, officials say.

The Defense Advanced Research Projects Agency, or DARPA, turned to academia and awarded a multiyear mission to develop obfuscation technology to better safeguard software intellectual property, both for commercial and government endeavors. The aim of DARPA’s SafeWare program is to find a solution that would render the software, such as proprietary algorithms, incomprehensible to a reverse engineer.

September 1, 2015
By Sandra Jontz
Staff members at the Naval Postgraduate School’s Common Operational Research Environment (CORE) Lab work on innovative ways to analyze open-source information gleaned from social network sites. This information lets scientists visualize troubled regions with greater fidelity than conventional intelligence analysis methods.

Having too little information once daunted the world of spies and intelligence analysts. Now the problem is too much data, and one of the biggest challenges going forward for the intelligence community is not a lack of technology but civilization’s dependency on it.

Today big data is one of the hottest segments of the information technology industry, successfully shrinking the world while creating an information overload that can paralyze analysts working to win the data-management war, experts lament.

September 1, 2015

Identity Theft Guard Solutions LLC, doing business as ID Experts, Portland, Oregon, is being awarded a $133,263,550 firm-fixed-price contract for commercially available data breach recovery services in response to the Office of Personnel Management (OPM) data breach affecting 21.5 million individuals. Data breach recovery services include credit and identity monitoring services, identity theft insurance, identity restoration services, as well as website services and call center services.

August 27, 2015
By Sandra Jontz
Gary Wang, deputy chief information officer/G-6 in the U.S. Army, says the U.S. government needs to identify the next generation of cyberwarriors when you are children. Photo by Mike Carpenter

Some of today’s 9-year-olds code in Java during their summer vacations, making them the optimal candidates the U.S. government and military should school to be the next generation of cyberwarriors, offered Gary Wang, deputy chief information officer/G-6 in the U.S. Army.

The government has waited until it’s nearly too late to begin cultivating the next-generation cadre of scientists, programmers and security experts needed to shore up cyber vulnerabilities to prevent intrusions and attacks that threaten to deliver even more debilitating blows against the nation.

August 26, 2015
By Sandra Jontz
Attendees listen to keynote addresses during the third annual AFCEA International TechNet Augusta conference, which wraps up Thursday. Photo by Mike Carptenter

TechNet Augusta 2015

The SIGNAL Magazine Show Daily

Day 2

Uncle Sam wants you—especially unicorns, leprechauns or something in between.

As the U.S. Defense Department revamps the way it protects its critical infrastructures and networks from emerging cyberthreats, military leaders want to reshape their work force and attract to their ranks highly specialized experts, including coveted data scientists.