cyber

June 21, 2016
By George I. Seffers
Russell Deyo, undersecretary for management, U.S. Department of Homeland Security, addresses attendees at the AFCEA Homeland Security Conference in Washington, D.C.

The Department of Homeland Security (DHS) may sometimes seem like a confused teenager, but it is growing and maturing and striving to make the country stronger, reports Russell Deyo, the DHS undersecretary for management.

July 21, 2016
By George I. Seffers

The Department of Homeland Security (DHS) is taking steps to improve the Einstein system, which provides cyber situational awareness across government agencies.

The Einstein system was instrumental in helping to uncover the massive breach into the Office of Personnel and Management’s (OPM) networks, according to Phyllis Schneck, deputy under secretary for cybersecurity and communications, National Protection and Programs Directorate (NPPD), DHS.

May 24, 2016
By Sandra Jontz

In just a matter of weeks, the Defense Information Systems Agency (DISA) will open the process for requesting proposals for the next round in the U.S. Defense Department’s cloud services offering. DISA’s pre-solicitation notice serves as notification to industry of the upcoming request for proposal (RFP) package for DISA's milCloud 2, Phase 1 (m2P1) contract, a government-offered service that, while not a completely commercial cloud-based system, leverages commercial products.

May 19, 2016
By Beverly Mowery Cooper
Lt. Gen. Rhett Hernandez, USA (Ret.) (l), spoke with conference attendees about the importance of academic, industry and Army partnership for innovation in the cyber domain.

Through innovation, we must adjust the human-machine balance to increase operational effectiveness. This begins with investing in people and technology, said Lt. Gen. Rhett Hernandez, USA (Ret.) at the AFCEA International/George Mason University Critical Issues in C4I Symposium. Our service men and women have trust in each other, but they must have trust that we will provide the capabilities to keep them successful. Trust is the number one ingredient that will create or hinder innovation, he explained.

Gen. Hernandez is West Point Cyber Chair to the Army Cyber Institute and president of CyberLens LLC. He was the first commander of Army Cyber Command (ARCYBER).

May 11, 2016
By George I. Seffers
LinQuest's cyber solution allows analysts to view data in 3-D.

LinQuest Corporation officials are now offering a new game-based technology that allows cyber analysts to view data in an immersive 3-D environment, which the company says allows quicker understanding of the data, saving users both time and money.

The 3-D Cyber Immersive Collaboration Environment (ICE) allows analysts to create a 3-D virtual world in which users are represented as avatars able to interact with big data analytics and/or real-time systems. The virtual world includes video feeds, data feeds, web interfaces, data visualizations and analytical tools. Once the crisis is over, the virtual world and its super metadata can be archived into the cloud.

May 11, 2016
By George I. Seffers

Ultra Electronics, 3eTI, will soon see its CyberFence solution being integrated into programmable logic controllers, which often are used for automation of critical infrastructure—telling a power generator when to turn on and off, for example. CyberFence enables facility operators to monitor and address issues securely and remotely within the grid, saving time, energy and resources.

May 4, 2016
By George I. Seffers
Soldiers with the 25th Infantry Division conduct fast rope insertion extraction techniques with their Marine Corps and Air Force counterparts. Elements of the 25th participated in the Army’s recent Cyber Blitz exercise, which will help define the future of cyber and spectrum warfare.

The U.S. Army last week completed an exercise designed to further define how the service adapts operationally to modern threats, including cyber attacks and electromagnetic warfare. During the exercise, the Army tested the cyber-electromagnetic activities (CEMA) cell concept within a brigade combat team and introduced new, yet-to-be-fielded technologies.

April 8, 2016
 

Cyber Defense Information Assurance, Round Rock, Texas, has been awarded a $11,473,390 modification (P00003) to previously awarded contract FA8773-15-C-0045 for the Air Force Intranet Control weapon system and the Department of Defense Joint Regional Security Stacks. Contractor will provide Air Force enterprise-level network management, optimized communications and defensive measures at the Air Force Information Network gateways. Air Force Intranet Control operates the Common User virtual private network mesh tying the components of the Air Force’s intranet together and protecting Air Force network traffic through encryption as it traverses public infrastructure.

March 23, 2016
By Sandra Jontz
Panelists discuss advancing security technology in the air domain at an afternoon session of TechNet Air 2016.

History repeats itself: And the next-generation airframe might come as a bit of a surprise.

Blimps.

“They’re back,” said Thomas Kupiec, chief information security officer for SMS, as he shared as an example of two prototypes NASA is working on, complete with bulletproof skin and the potential for unmanned flight in the future.

But what is greatly different today from the first blimps of the 1890s is the need for cybersecurity, Kupiec shared during an afternoon panel discussion at AFCEA International’s inaugural TechNet Air 2016 symposium in San Antonio, which runs March 22-24. 

March 18, 2016
 

Georgia Tech Research Institute (GTRI), Atlanta, is being awarded an $84,538,427 indefinite-delivery/indefinite-quantity, cost-plus-fixed-fee contract for command, control, communications, computers, intelligence and cyberspace technology research in GTRI’s capacity as a Department of Defense university affiliated research center. Work will be performed in San Diego (90 percent) and Atlanta (10 percent), and is expected to be completed by February 28, 2021. No funds are being obligated at the time of award. Funds will be obligated as individual delivery orders are issued. This contract was a sole-source acquisition not competitively procured in accordance with 10 U.S.

February 9, 2016
By Sandra Jontz and George I. Seffers

President Barack Obama championed cybersecurity efforts Tuesday in seeking $19 billion for the cause as part of his fiscal year 2017 budget proposal. Additionally, he signed two executive orders to seek to strengthen government networks against cyber attacks while protecting personal information.

The budget proposal for FY17, which begins October 1, is a 35 percent increase over the current fiscal year.

February 19, 2016
By Robert K. Ackerman
Key sea service leaders comparing perspectives in a town hall format are (l-r) Vice Adm. Charles D. Michel, USCG, vice commandant, U.S. Coast Guard; Adm. John M. Richardson, USN, CNO; Gen. Robert B. Neller, USMC, commandant, U.S. Marine Corps; and moderator Adm. James Stavridis, USN (Ret.), dean, The Fletcher School of Law and Diplomacy.

West 2016

The SIGNAL Magazine Online Show Daily, Day 3

Quote of the Day:
“Innovation is a contact sport; it is not for the weak of heart.”—Jay M. Cohen, principal, The Chertoff Group, former chief of naval research

The U.S. Navy is counting on industry and academia to generate new capabilities that can meet sea service needs rapidly in a dynamic threat picture. Achieving this goal effectively will require overcoming cultural inertia and an acquisition architecture that is stacked against speed and innovation.

February 17, 2016
By Robert K. Ackerman

In a complex world rife with a plethora of threats, North Korea looms as the worst, according to the former supreme allied commander Europe. Adm. James G. Stavridis, USN (Ret.), dean of The Fletcher School of Law and Diplomacy, described the Hermit Kingdom in harsh detail during his keynote address opening West 2016, being held in San Diego February 17-19.

“They have a young, untested, untried, morbidly obese leader that has nuclear weapons,” Stavridis said in referring to Kim Jong Un.

December 1, 2015
By Sandra Jontz
Analysts can use predictive analytics, such as Haystax Technology’s Carbon software, to counter inside threats by continuously monitoring and evaluating employees.

Since the 2009 fatal shootings of 13 people at Fort Hood by a U.S. Army major and psychiatrist and the leaks of some 750,000 classified and sensitive military documents to WikiLeaks by another soldier, the U.S. Defense Department has sought technology to give analysts an advantage in finding insider threats.

The need spread, and now federal agencies employ advanced analytics and cybersecurity solutions to protect against an ever-morphing landscape of breaches, from those outside firewalls to rogue or careless employees. One of those solutions is a product called Carbon.

January 13, 2016
By David E. Meadows

If you have ever worked on a team, then you understand the intrinsic need for everyone to work from the same set of terms of references, or TORs—kind of a definitive dictionary. TORs are needed even if working internationally with team members who originate from nations that use the same language, such as English, the language of the early Germanic settlers—Angles, Saxons, Jutes—of Britain.

January 7, 2016
By Sandra Jontz

Director of National Intelligence, James Clapper, today announced the leaders of the Cyber Threat Intelligence Integration Center (CTIIC). Director Tonya Ugoretz will lead the center, with Maurice Bland as deputy and Office of the Director of National Intelligence (ODNI) Research Director Thomas Donahue as part of the team.

A year ago, President Obama directed Clapper to establish the CTIIC in a move to fuse intelligence collected from multiple agencies probing cyberthreats. The center serves to “connect the dots” regarding malicious foreign cyberthreats against the United States, according to an ODNI press release announcing the leaders.

December 16, 2015
By Eddie Garcia

Stopping insider threats has become a unifying cybersecurity mission, particularly in the defense and intelligence communities. And for good reason. While in the recent past, mention of the words insider threat conjured up the likeness of Edward Snowden, the reality is much scarier. More often than not, insider threats result from innocent people making simple mistakes rather than the common misconception of malicious employees or whistleblowers.

December 11, 2015
 

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) today announced its first Innovation Other Transaction Solicitation (OTS) aimed at non-traditional performers such as technology startups to offer solutions to some of the toughest threats facing DHS and the homeland security mission. Awarded through Other Transaction Solicitation HSHQDC-16-R-B0005, the first call for proposals is looking for solutions to improve situational awareness and security measures for protecting

December 10, 2015
By Cyndi Thomas
With electronic attack, adversaries now can deny use of command and control systems across all domains. Illustration courtesy NCI Inc.

The United States' dependence on valuable space assets and the nation's critical need to maintain superiority in command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) disciplines have also made these fields somewhat of an Achilles' heel. The country had long held technological and capabilities advantages over the rest of the world. Those days are gone.

December 3, 2015
By Sandra Jontz

Five years after the Canadian government launched an official national cybersecurity strategy to combat the rise of online attacks, the country’s national police force announced Wednesday it is creating an investigative team.

The Royal Canadian Mounted Police (RCMP) released its cyber crime strategy to reduce the threat and impact of digital criminal attacks in Canada, according to a news release.

The measure follows concerns that the country lags the United States and Europe in efforts to safeguard government, businesses and critical infrastructure from the increase in cyber attacks against Canadian interests.

Pages