Network Operations

October 28, 2021
By George I. Seffers
Lt. Gen. John Morrison, USA, U.S. Amy deputy chief of staff, G-6 addresses the audience at TechNet Cyber in Baltimore. Photo by Michael Carpenter

The U.S. Army seeks to enhance the effectiveness of local cybersecurity defenders—and ultimately the joint force cyber warriors—by revamping organizational design, fielding the best technologies and improving training, Lt. Gen. John Morrison, USA, U.S. Amy deputy chief of staff, G-6, told the audience at the TechNet Cyber conference in Baltimore.

“Here’s my thesis: we have a lot of folks that are doing cybersecurity work, but we are not optimized across the entire joint force to conduct cybersecurity operations,” Gen. Morrison declared.

July 27, 2021
By Maj. James Torrence, USA
While some tout the idea that U.S. forces could pre-emptively degrade their own technological capabilities in a peer, or near-peer conflict, doing so would lead to losing, says an Army signal officer. Credit: Andy Gin/Shutterstock

The novel 2034 by James Stavridis and Elliot Ackerman perpetuates a fundamental misunderstanding of how technology should be employed and managed in future conflicts.

The continuing narrative is that we should purposely degrade our systems in a conflict with a peer competitor because of the possibility of a degraded spectrum, cyber attacks, space-based detection and jamming. But if we preemptively degrade our technology in a peer conflict, we will lose.

In the novel, after a conflict with the Chinese Navy in which the U.S. technical systems were incapacitated, U.S. ships preemptively disabled “any interface with a computer, a GPS or [any interface] that could conceivably be accessed online.”

July 1, 2019
By Kyle Aldrich
Looking Glass stock

Global, asymmetrical threats now dominate attacks on nations and businesses alike, and the enemy is not always immediately knowable, identifiable or even seen. These realities are forcing leaders to invest more resources into analytics, as well as intelligence, surveillance, reconnaissance and other 21st century responses to cyber bombardments today.

July 12, 2018

General Dynamics Information Technology Inc., Fairfax, Virginia, was awarded a $14,303,431 modification to contract W91QUZ-06-D-0012 for combined mission command network operations and maintenance information technology services. Work will be performed in Seoul, Republic of Korea, with an estimated completion date of July 31, 2019. Fiscal year 2018 operations and maintenance (Army) funds in the amount of $14,303,431 were obligated at the time of the award. U.S. Army 411th Combat Support Battalion is the contracting activity.

July 17, 2013
George I. Seffers

CENTECH Group, Falls Church, Va., has been awarded a $14,015,472 modification to a contract for operation and maintenance of the base network. The total cumulative face value of the contract is $27,236,061. Air Force Life Cycle Management Center, Hanscom Air Force Base, Mass., is the contracting activity. 

February 19, 2013
George I. Seffers

CACI Inc. - Federal, Chantilly, Va., is being awarded a $10,557,263 modification to a previously awarded firm-fixed-price contract for on-site operational support to the mission systems of the office of the undersecretary of defense (comptroller) in the areas relating to system maintenance, system conversion and migration, report generation and documentation, training and guidance on the comptroller mission systems as well as service desk and network operations. This contract supports the department's IT consolidation efficiency initiative. This is the third option of a five-year contract period. Defense Finance and Accounting Service, Contract Services Directorate is the contracting activity.