cyber

March 9, 2015
 

Isis Defense, Alexandria, Virginia, has been awarded a $7,034,317 firm-fixed-price, other transaction for prototypes agreement, for a research project entitled "Threat Intelligence Platform." This agreement provides for the development of a threat intelligence and cyber analytics platform that will merge existing Defense Advanced Research Projects Agency big data research with novel approaches to high-performance computing and data storage hardware. Fiscal 2014 research, development, test and evaluation funds in the amount of $750,000 are being obligated at time of award. All work will be performed in Alexandria, Virginia, with an estimated completion date of March 2016.

March 1, 2015
By Robert K. Ackerman

Challenges ranging from teaching people new ways of learning languages to providing security for homemade computer chips head the priority list for researchers at the National Security Agency. The exponential expansion of technology capabilities is perhaps matched by the growth of potential conflict areas, and both are increasing the issues faced by the agency’s research community.

February 26, 2015
By Maryann Lawlor

The Intelligence Advanced Research Projects Activity (IARPA) is looking for a few good ideas. The organization’s Office for Anticipating Surprise has initiated a competition for its Cyber-attack Automated Unconventional Sensor Environment (CAUSE) program, which aims at discovering ways to anticipate cyber attacks before they occur.

January 12, 2015
 

Editor, SIGNAL:

I read Adm. Stravidis’ thoughtful piece on “Cyber Attacks” with great interest, for I directed the Tallinn Manual project to which he referred. Unfortunately, the admiral misstates the position taken by the “International Group of Experts” that prepared the manual during a three-year project sponsored by the NATO Cooperative Cyber Defence Center of Excellence.

December 23, 2014
By George I. Seffers

The National Cybersecurity Center of Excellence (NCCoE) is inviting comments on a draft project to secure medical devices known as networked infusion pumps, which convey fluids, drugs and nutrients into patients' bloodstreams. Hospitals are increasingly using the devices and connecting them to a central system, which makes them more vulnerable to cyberthreats.

A networked infusion pump can allow centralized control of the device’s programming as well as automated cross checks against pharmacy records and patient data to ensure the right dose of fluids or medication are delivered at the right time to the right patient.

December 19, 2014
By Sandra Jontz

Cyber attackers might have compromised computer files of more than 40,000 employees following an attack on federal contractor KeyPoint Government Solutions, according to the Office of Personnel Management (OPM).

OPM issued a statement on the breach and began notifying employees that files might have been compromised.

“While there was no conclusive evidence to confirm sensitive information was removed from the system, it is possible that personally identifiable data may have been exposed,” reads an OPM statement.

KeyPoint Government Solutions conducts background checks for government agencies. One of its competitors, USIS, suffered a breach earlier this year.

November 19, 2014
By George I. Seffers

Northrop Grumman officials say they are developing a new kind of cyber system—a disposable system tailored for a single mission. The concept, they say, will make it more difficult for adversaries to penetrate or maneuver inside user networks.

October 24, 2014
 

Booz Allen Hamilton, McLean, Virginia, is being awarded a $6,643,293 task order (P00003) to a previously awarded firm-fixed-price contract (HQ0034-14-A-0023) to provide technical support services for the Department of Defense's Chief Information Officer Cybersecurity and Information Assurance Support program. Work will be performed in Alexandria, Virginia, with an expected completion date of Oct. 16, 2015. Fiscal 2015 operations and maintenance funds in the amount of $6,643,293 are being obligated on this award and will expire at the end of the current fiscal year. This contract was competitively procured, with two proposals received.

October 20, 2014
 

NCI Inc., Reston, Va., has announced that it was awarded a cost-plus-fixed-fee, single-award indefinite delivery, indefinite quantity contract valued at $125 million for cyber network operations and security support (CNOSS) services for the U.S. Army's Network Enterprise Technology Command (NETCOM) G3/5/7. NCI has served NETCOM since 2007, with two predecessor contracts to CNOSS. The new contract has a 12-month base period with two one-year option periods and one six-month option period. NETCOM has primary oversight of network operations and security for the U.S. Army and serves as the single point of contact for network development and protection.

September 30, 2014
 

SeKON Enterprises Incorporated, Herndon, Virginia, was awarded an $12,433,560 cost-plus-fixed-fee contract, with options, to provide engineering, cybersecurity and configuration management support services to the program executive officer, Defense Healthcare Management Systems. The total potential contract value, including the one-year base period and four one-year option periods, is $75,603,463.

September 30, 2014
 

LongView International, Reston, Virginia, has been awarded a maximum $8,291,746 modification (P0006) exercising the first option period on a one-year base contract (HT0011-13-F-0039) with three one-year options for software design, development and testing to support emerging requirements in the Defense Medical Logistics Standard Support (DMLSS), DMLSS Customer Assistance Module and Joint Medical Asset Repository applications to meet information assurance and the establishment of new data exchanges/services. Location of performance is at the Joint Medical Logistics Functional Development Center at Fort Detrick, Maryland, with a Sept. 29, 2017, completion date.

September 18, 2014
By Robert K. Ackerman

The Internet of Things that will connect virtually all electronic devices in a surge of ubiquitous networking will be a target-rich environment to terrorists, saboteurs, criminals and other cybermarauders, according to a panel focusing on that aspect of future cyberspace.

September 17, 2014
By Rita Boland

The Department of Homeland Security (DHS) is looking to replace its Automated Biometric Identification System, or IDENT, in the next two to four years, an official with the department says. IDENT is DHS's central system for storing and processing biometric and associated biographic information for various homeland security purposes.

September 11, 2014
By George I. Seffers

The Online Show Daily: Day 3

The final day of AFCEA TechNet Augusta 2014 kicked off with a solemn remembrance of the September 11, 2001 terrorist attacks that rocked the nation. The conference then, necessarily, moved on to the future.

September 12, 2014
By Rita Boland

The Department of Homeland Security Science and Technology Directorate has transitioned the first technology in its Transition to Practice (TTP) program to commercial market two years ahead of schedule. The effort involves Los Alamos National Laboratory’s Quantum Secured Communication, which was picked up by the company Allied Minds. That private-sector entity exclusively licensed the technology in August 2013 and formed Whitewood Encryption Systems Incorporated to bring it to market. The product is a next-generation encryption system that leverages the quantum properties of light.

September 10, 2014
George I. Seffers

Mission success in the cyber arena, especially in a constrained budget environment, requires both cooperation and innovation, but military and industry officials speaking at AFCEA TechNet Augusta 2014 say they are not yet seeing enough of either.

Maj. Gen. Stephen Fogarty, USA, the new commanding general, U.S. Army Cyber Center of Excellence, Fort Gordon, initiated the discussion, saying that cyber is “inherently joint,” and warning against stovepiped systems and information for different mission areas, such as cyber, signal and intelligence, surveillance and reconnaissance. The Army, he said, has to cooperate with the other services, the Department of Defense, the National Security Agency, industry and multinational partners.

September 11, 2014
By George I. Seffers

Senior military leaders will try next week to hash out differences on the command and control (C2) of the Joint Information Enterprise, or JIE, said Lt. Gen. Mark Bowman, USA, director, command, control, communications and computers/cyber and chief information officer, Joint Chiefs of Staff. Gen. Bowman made the remarks while addressing the audience at the AFCEA TechNet Augusta 2014 conference, Augusta, Georgia.

September 9, 2014
By George I. Seffers

The U.S. Army may at some point need to allow soldiers to conduct offensive cyberwarfare at the brigade combat team level, according to a panel of chief warrant officers speaking at AFCEA TechNet Augusta 2014, Augusta, Georgia.

September 9, 2014
By George I. Seffers

U.S. Army officials struggled during AFCEA TechNet Augusta 2014 in Augusta, Georgia, to discuss the future of cyber operations when much of that future is currently unknowable, in large part because no one knows the full effects or challenges of emerging technologies.

September 10, 2014
By George I. Seffers

The cyber era requires partnerships and information sharing across the agencies, industries and nations, said Maj. Gen. Stephen Fogarty, USA, the new commanding general, U.S. Army Cyber Center of Excellence, Fort Gordon, during a keynote address at the AFCEA TechNet 2014 Augusta conference, Augusta, Georgia.

Pages