May 1, 2020
By Shaun Waterman
A SpaceX Falcon 9 rocket launches the first of the new generation of modernized, harder-to-hack GPS block III satellites in December 2018. GPS is one of the space-based functions that’s increasingly vital to the functioning of the U.S. economy. Credit:

Amid growing fears that U.S. military reliance on civilian space infrastructure might prove a weak point, two organizations are seeking to improve cybersecurity in the burgeoning satellite industry. The Orbital Security Alliance has published a detailed set of cybersecurity guidelines for commercial satellite operators, which aims specifically at smaller, newer companies in the fast-growing “minisat” sector.

May 9, 2019

The Navy awarded nine indefinite-delivery/indefinite-quantity, cost-plus-fixed-fee contract for professional technical and management support services to establish and maintain cyberspace operations and enable product lines, programs and projects to include interoperability of systems, services and capabilities at the tactical, operational and strategic levels.

DOD reported that all of the contract awardees will have the opportunity to compete for task orders during the ordering period. The three-year contracts also include two two-year option periods.

January 17, 2018
By Julianne Simpson
Cyber operators (l-r) Lt. Col. Barian Woodward, USMC; Lt. Col. Angela Waters, USAF; Lt. Col. Benjamin A. Ring, Ph.D., USA; Lt. Jr. Clovis Guevara, USCG; and Col. Paul T. Stanton, USA, panel moderator, address attendees at AFCEA's first Cyber Education, Research and Training Symposium.

During the afternoon of the first day of AFCEA’s Cyber Education, Research and Training Symposium (CERTS), leaders from all five branches of the armed forces shared their perspectives on cyber education and training. Though all five laid out slightly different strategies and goals for their individual services, they all agreed they should leverage each other’s expertise and work together to figure out a way forward.

February 22, 2017
By Sandra Jontz
Vice Adm. Jan Tighe, deputy chief of naval operations for information warfare and director of naval intelligence, speaks at West 2017. Photo by Mike Carpenter

Information warfare is an aggressive game of soccer where not only are all the fans on the field with the players, but no one is wearing uniforms.

February 21, 2017
By Sandra Jontz
Are the U.S. armed forces ready to fight? It depends, says Vice Adm. Michael Gilday, USN, (c).

Emerging cyber trends such as the rapid increase in the number of bad actors, increased capabilities and sophistication, and the high degree of automation complicates a key question posed to U.S. military leaders: Are the armed forces ready to fight? 

In the cyber realm, the answer is: “It depends,” said Vice Adm. Michael Gilday, USN, commander of U.S. Fleet Cyber Command/10th Fleet.

September 14, 2015
Maryann Lawlor

Nearly everyone has heard a parent or grandparent refer to the good ol’ days. Tales usually begin either with “When I was your age…” or “In my day, we didn’t have….” While it seems appropriate that octogenarians and nonagenarians tell such stories, today they’re not the only generations sharing memories that begin with, “When I was young….” People in their 20s and 30s reflect on their youth wistfully because members of the younger generation—who, by the way, are only five or 10 years younger than they are—can communicate, play, buy and sell, and share life moments in ways that surprise even 20-somethings.

July 1, 2015
By Capt. Ryan Robinson, USA
Signaleers at Fort Gordon, Georgia, train to use satellite communications systems. With the entire force embracing cyberspace as a warfighting domain, these signaleers ultimately must impart their understanding of cyberspace and its technological capabilities to other soldiers in operational units.

Cyberspace is being accepted throughout the U.S. Army as a warfighting domain. However, many soldiers outside of the U.S. Army Signal Corps do not grasp the concept of cyberspace as an operational realm. Empowering them with that understanding is essential to operational success.

One of the primary tasks of Signal Corps members is to provide other leaders and soldiers with a clear understanding of the job of the corps and of cyberspace itself. As a military organization, the clearest means for the Signal Corps to communicate these concepts is through operational language. Many parallels exist between a battlefield’s physical landscape and what is done during offensive, defensive and support operations in cyberspace.

February 1, 2015
By Capt. Robert M. Lee, USAF

The U.S. Air Force cyber community is failing, but not all is lost. While some aspects are in dire need of repair or replacement, effective solutions potentially are within reach—if leadership is up to the task.

December 21, 2012
George I. Seffers

Intelligent Software Solutions, Colorado Springs, Colo.; BAE Systems, McLean, Va.; Charles River Analytics Inc., Cambridge, Mass.; Northrop Grumman Systems Corp., Herndon, Va.; Science Applications International Corp., McLean, Va.; Lockheed Martin Corp., Colorado Springs, Colo., and Solers Inc., Arlington, Va., are being awarded a $249 million multiple-award indefinite delivery/indefinite quantity for the development of command and control applications and information services for air, space and cyberspace domains. The contracting activity is the U.S. Air Force Life Cycle Management Center, Hanscom Air Force Base, Mass. 

December 21, 2011
By Dan Barber

From securing the cloud to unwrapping new architecture compliance requirements, 2011 was a busy year for the tech public sector. In the New Year's spirit of renewal and rededication, here are five resolutions federal agencies should make. 1. Leverage IT to meet budget requirements The government fiscal landscape changed radically in the last year with budget cuts across the majority of federal agencies. The Obama's Administration fiscal 2012 budget proposal calls for a five-year discretionary spending freeze along with $33 billion in additional cuts. Yet, there is a reason why federal IT spending to commercial contractors is expected to grow five percent annually.

December 2, 2011
By Prenston Gale

Earlier this year, detailed information about the bomb resistance of a new Department of Defense (DoD) building in Virginia was compromised. Reuters broadcast the information worldwide. The news organization did not obtain the document by hacking network systems, but rather accessed the "official use only" document on the Army Corps of Engineers website. This incident is just one example of the thousands of data breaches that occur as a result of internal information leakage rather than an outside attack. In their 2011 Information Security Report, the U.S. Government Accountability Office (GAO) shed light on why internal leaks are so prevalent.

November 3, 2011
By Robert K. Ackerman

Where the 20th century was the age of airpower, the 21st century will be the age of cyberpower, according to the U.S. Air Force's chief information officer (CIO). Lt. Gen. William T. Lord, USAF, told the closing keynote luncheon audience that the growth in cyberspace's importance is outstripping even its own metrics for progress. What he referred to as "Android's Law" has accelerated Moore's Law when it comes to change. Mobile devices are driving a global cultural change, he offered, and that change is breaching barriers and crossing into new territory. For example, social media was the tipping point in recent revolutions, the general pointed out.

November 3, 2011
By Robert K. Ackerman

Situational awareness that borders on command and control (C2) may be necessary to protect vulnerable networks in the nation's critical infrastructure. The threat to these increasingly complex industrial control systems will require more than just commercial off-the-shelf security solutions, according to a panel of experts at TechNet Asia-Pacific 2011 in Honolulu. Rear Adm. Paul Becker, USN, the U.S. Pacific Command (PACOM) J-2, warned that the proliferation of control systems, coupled with a lack of network situational awareness, are prime opportunities for cybermarauders.

November 3, 2011
By Robert K. Ackerman

The new technologies that are enabling elements of the critical infrastructure to operate more efficiently also are making them more vulnerable to devastating cyberattacks. Advanced mobile connectivity and supervisory control and data acquisition (SCADA) systems have created fertile ground for cybermarauders to target key aspects of the infrastructure a number of ways. These were the findings of a panel comprising a number of experts from Hawaii and the U.S. Pacific Command (PACOM) at TechNet Asia-Pacific 2011 in Honolulu. Rear Adm. Paul Becker, USN, the PACOM J-2, described how the use of SCADA industrial control systems was a primary threat to the infrastructure.

November 2, 2011
By Robert K. Ackerman

The spread of mobile networking systems along with the use of social media have opened new backdoors for hackers with potentially serious consequences, according to a leading security expert speaking at TechNet Asia-Pacific 2011. Tom Reilly, vice president and general manager, HP Enterprise Security, told the Wednesday breakfast audience that this major information technology transformation is leading to an escalation of attacks, especially against applications, and cyberspace will be a more dangerous place as a result. "Things are going to be much uglier in the cybercrime world," Reilly declared. He added that our adversaries are evolving away from traditional marauders. Many of them now are working at the behest of nation states.

November 2, 2011
By Robert K. Ackerman

Building network security around firewalls is passé, as cybercriminals are employing innovative means to enter a network. Instead, security managers should concentrate on understanding the user, the application and the data, according to Tom Reilly, vice president and general manager, HP Enterprise Security. Speaking at the TechNet Asia-Pacific 2011 Wednesday breakfast, Reilly described how new types of networking are rendering old measures obsolete. Traditionally, experts have looked at security as being a 100-percent solution that is layer focused. With the advent of mobile and cloud computing, perimeters are devolving and consumers want more access to information.

November 2, 2011
By Robert K. Ackerman

As social media permeates deeper into military organizations, leaders are confronting a host of challenges. However, those challenges largely are new incarnations of longstanding problems that have faced military communicators for generations. A panel of experts at TechNet Asia-Pacific 2011 focused on how information sharing can exist within an information security environment. Many of their concerns proved to be more user-oriented than technology-based. Addressing those concerns, Master Sgt. Andrew Baker, USA, 516th Signal Brigade, said that forces need to be more operations-security (OPSEC) oriented with new media.

November 3, 2011
By Robert K. Ackerman

Building and operating the third version of the Global Information Grid-GIG 3.0-will require new forms of accountability both for security and for operation. Accordingly, identity and access management will be the key items as the next-generation defense network is developed, said a panel of defense networking experts at TechNet Asia-Pacific 2011. GIG 3.0 would tap existing technology to provide better information sharing-particularly for interservice, interagency and international coalitions-along with improved cyber security and responsiveness, offered panel moderator Randy Cieslak, U.S. Pacific Command (PACOM) chief information officer (CIO).

November 3, 2011
By Robert K. Ackerman

The third iteration of the Defense Department's Global Information Grid (GIG 3.0) may represent a breakthrough in networking capabilities, but only current technologies need apply to build it, according to a Defense Department official. Mark Loepker, acting director for the Defense Information Assurance Program, told a panel audience at TechNet Asia-Pacific 2011 that industry should bring innovative solutions to the GIG table-only, a solution that is not supported by current technology is not a solution.

November 1, 2011
By Robert K. Ackerman

The United States should start pursuing some of the people who are hacking into U.S. systems and stealing intellectual property, said the former commander of the U.S. Pacific Command. Adm. Timothy J. Keating, USN (Ret.), told the audience at the opening keynote address for TechNet Asia-Pacific 2011 in Honolulu, Hawaii, that going after cybermarauders may be the only way to reduce their activities. The admiral called for a "thorough review of our nation's policy" with an eye toward taking action against cyberintruders. Saying it's time to "let the Genie out of the bottle," Adm.