The U.S. Army Cyber Command is transferring some of its cyber defense responsibilities for the service’s networks to the Army Network Enterprise Technology Command, commonly known as NETCOM. The change, which officially took effect on June 1, transfers authority for the Army’s worldwide regional cyber centers to NETCOM, allows Cyber Command to increase its focus on electronic warfare and information operations and provides one primary point of contact for warfighters in need of network support.
Test and Evaluation Services LLC., Herndon, Virginia, was awarded a $213,853,442 cost-no-fee, cost-plus-fixed-fee, firm-fixed-price contract for the deployment, operation and maintenance of a technical infrastructure for information operation environments. Bids were solicited via the internet with three received. Work locations and funding will be determined with each order, with an estimated completion date of October 9, 2027. U.S. Army Contracting Command, Orlando, Florida, is the contracting activity (W900KK-20-D-0012).
Less than two months on the job, Lt. Gen. Timothy Haugh, USAF, commander of the 16th Air Force (Air Forces Cyber), is already shaping the structure of the service’s new information warfare Numbered Air Force (NAF). Stood up in October, the NAF combines the service’s cyber operations; intelligence, surveillance and reconnaissance (ISR) capabilities; electronic warfare and information operations, including capabilities folded in from the 24th and 25th Air Forces.
Maj. Gen. Neil Hersey, USA, commander, of the U.S. Army Cyber Center of Excellence and Fort Gordon, said the center could potentially change its name, but that close cooperation among the centers of excellence essentially already provides the benefits of an information warfare center of excellence.
The change—if it happens—would follow the lead of the Army Cyber Command. Lt. Gen. Stephen Fogarty, USA, who leads Army Cyber Command, has been pushing to change the name to Army Information Warfare Operations Command. The service’s centers of excellence fall under the U.S. Army Training and Doctrine Command (TRADOC).
A U.S. Army strategy document currently being developed and due to be published this year will emphasize the need to dominate in the information realm, Gen. Paul Funk, USA, commander, U.S. Army Training and Doctrine Command (TRADOC), told the audience on the first day of the AFCEA TechNet Augusta conference in Augusta, Georgia.
Russia’s ability to evolve its use of information operations to leverage social media and the cyber domain continues to shock and challenge the world community. The country’s actions, especially during the 2016 U.S. elections, have brought cyber information operations out of the shadows and into the limelight. Now, state and nonstate actors are frequently using similar techniques to influence the public and achieve political goals once only attainable through armed conflict.
The Navy's Space and Naval Warfare (SPAWAR) Systems Center (SSC) Pacific in San Diego awarded seven contracts for Naval Information Operations, Meteorology and Oceanography Systems Support to (1) Technology Unlimited Group, San Diego, $22,443,225; (2) Solers Inc., Arlington, Virginia, $22,055,924; (3) General Dynamics Information Technology Inc., Fairfax, Virginia, $20,909,579; (4) Forward Slope Inc., San Diego, $20,227,678; (5) P&J Robinson Corp., San Diego, $20,211,616; (6) P&J Robinson Corp., San Diego, $20,211,616; and (7) Geocent LLC, Metairie, Louisiana, $18,286,074.
Leadership starts with cultivating your core with a healthy and strong mind, body and soul.
Lt. Gen. Mark Bowman, USA (Ret.), former director of command, control, communications and computers/cyber for the Joint Staff, paints a dire picture of future warfare. The next war, he says, will begin with wave after wave of cyber and electronic warfare attacks that our nation is not prepared for. Although the Army is making strides in training the cyber electromagnetic activities (CEMA) force, the service may not be able to address all scenarios in a training environment.
The Russian Federation forces are using a wide array of cyber and electronic warfare capabilities unlike anything U.S. forces have faced in the past 16 years. Russia uses its sophisticated capabilities to detect, locate and eliminate enemy forces, according to Maj. Gen. Stephen Fogarty, USA, commander, U.S. Army Center of Excellence.
Gen. Fogarty made the comments as the first speaker for AFCEA’s TechNet Augusta conference, Cyber in the Combined Arms Fight, taking place in Augusta, Georgia, August 2-4.
General Dynamics Information Technology, Herndon, Virginia, was awarded a $20,208,718 modification (F405549) to contract W91QUZ-06-D-0012 for command, control, communications and computer information operations and maintenance. Work will be performed in Korea, with an estimated completion date of September 29, 2016. Fiscal 2015 operations and maintenance (Army) funds in the amount of $17 million were obligated at the time of the award. Army Contracting Command, Yongsan, Korea APO AP, is the contracting authority.
New Mexico State University was awarded a $75 million indefinite-delivery/indefinite-quantity cost contract to support the Information Operations Vulnerability/Survivability Assessment program, with an estimated completion date of July 26, 2020. One offer was solicited with one received. Funding and work location will be determined with each order. The Army Contracting Command, Adelphi, Maryland, is the contracting activity (W911QX-15-D-0022)
Some of the hackers who have persistently attacked Lockheed Martin’s networks have “gone quiet” in recent months, officials told reporters yesterday at an Arlington, Virginia, media summit hosted by the company’s recently restructured Defense and Intelligence Solutions division. “We’ve seen a number of the adversaries—I wouldn’t say they’ve disappeared—but they’ve gone quiet,” said Darrell Durst, Lockheed Martin’s vice president, cyber solutions. “I think we have been able to counter a number of the adversaries relative to our networks.”
Lawrence Livermore National Laboratory, Los Alamos National Laboratory and Bechtel BNI are joining forces to a new class of cyberdefense professionals to protect the nation’s critical digital infrastructure. The Bechtel-Lawrence Livermore-Los Alamos Cyber Career Development Program is designed to allow the national labs to recruit and rapidly develop cybersecurity specialists who can guide research at their respective institutions and create solutions that meet the cyberdefense needs of private industry, which owns about 80 percent of the nation’s critical digital infrastructure and assets.
The National Security Agency (NSA) has selected five more schools for the National Centers of Academic Excellence (CAE) in Cyber Operations Program, which is designed to cultivate more U.S. cyber professionals. These schools are now designated as Cyber Operations CAEs for the 2014-2019 academic years:
People with access to privileged data—such as health care records, sensitive company information, intellectual property or personal records—frequently put their organization’s sensitive information at risk, according to a new report by Raytheon Company. The survey report, “Privileged User Abuse & The Insider Threat,” finds that many individuals often are granted access to data and areas of the network not necessary for their roles and responsibilities. Furthermore, 65 percent of survey respondents indicated that curiosity—not job necessity—drives them to access sensitive or confidential data.
Key findings include:
The late Vice Adm. Arthur K. Cebrowski, USN (Ret.), looks over my shoulder as I work in my home office. His picture graced the May 2003 cover of SIGNAL Magazine, highlighting an article Clarence A. Robinson Jr., wrote based on an interview with the admiral. I was lucky enough to escort SIGNAL’s freelance photographer to take the photo of Adm. Cebrowski when he led the charge for change as the director of the U.S. Defense Department’s Office of Force Transformation. I received a cover photo plaque that hangs in my home office for my effort, though it really wasn’t necessary.
The National Weather Service is the granddaddy of open source data, according to Adrian Gardner, chief information officer, Federal Emergency Management Agency (FEMA). And, the National Oceanic and Atmospheric Administration (NOAA) was "into big data before big data was cool," added David McClure, a data asset portfolio analyst within the NOAA Office of the Chief Information Officer. The two officials made their comments during a panel on big data analytics at the AFCEA Homeland Security Conference in Washington, D.C.
The real challenge to keeping the homeland secure is dealing with the world's increasing complexity, Adm. Thad Allen, USCG, (Ret.), executive vice president of Booz Allen Hamilton and former commandant of the U.S. Coast Guard, told the audience at the AFCEA Homeland Security Conference in Washington, D.C., on Monday during his luncheon keynote address.
The U.S. Customs and Border Protection (CBP) agency is only interested in mobile communication if it allows the agency to perform functions it could not perform otherwise, Mark Borkowski, component acquisition executive and assistant commissioner with the CBP Office of Technology Innovation and Acquisition, told the audience at the AFCEA Homeland Security Conference in Washington, D.C., on Monday. "We're not interested in mobility for mobility's sake but because it allows us to do something we haven't done before," Borkowski said, while participating in a panel on mobility and interoperability.