Native plant life could join traffic cameras, motion detectors and enemy sensor systems as future sources of battlefield information if the U.S. Army Research Laboratory has its way. The laboratory is applying the Internet of Things approach to theater command, control, communications, computers and intelligence as it plans to equip soldiers and their leaders with vital knowledge from nontraditional information sources, and it is leaving no stone—or crop—unturned in its efforts.
After analyzing lessons learned from a delay-riddled transition to Networx, where a 33-month long process resulted in a costly overrun of about $395 million, the General Services Administration (GSA) came well prepared to make the Enterprise Infrastructure Solutions (EIS) contract transition a much smoother process.
The U.S. Air Force Research Laboratory (AFRL) and IBM are collaborating on a brain-inspired supercomputing system powered by a 64-chip array. The laboratory is investigating applications for the system in embedded, mobile, autonomous settings where limiting factors today include size, weight and power.
As an end-to-end software ecosystem, the scalable platform would enable deep neural-network learning and information discovery. Its advanced pattern recognition and sensory processing power would be the equivalent of 64 million neurons and 16 billion synapses; however, the processor component only will consume approximately 10 watts, the equivalent of a dim light bulb.
Organizations today must deal with an avalanche of big data and the advanced computing requirements that are driven by so much data. To cover the accelerated speeds and throughput needs they increasingly face, their information systems require increased network speeds and upgrades as well as improved security and monitoring tools.
Let’s face it—we have a lot to learn about cybersecurity. For weeks, the FBI and Apple squared off in an epic and public battle over encryption—the Holy Grail for cybersecurity warriors. “Help us break the iPhone,” said the FBI. “The risk is too great, too many will be harmed,” Apple retorted. But the battle was over before the parties fully engaged. The FBI found someone to hack the iPhone belonging to one of the San Bernardino shooters and said, “Never mind, problem solved.”
Does this make you feel secure? With attacks launched every day, I don’t think so.
The information technology infrastructure, processes and solutions that government agencies rely on are becoming less suitable for today’s operational, mission and business challenges, says Federal CIO Tony Scott, the government’s top chief information officer.
In a white paper that compares available information transport technologies, experts from Aspera Incorporated tackle the topic of moving big data quickly over wide area networks. “The loss-based congestion control in TCP AIMD [transfer control protocol additive-increase-multiplicative-decrease] has a deadly impact on throughput,” they state. “Every packet loss leads to retransmission and stalls the delivery of data to the receiving application until retransmission occurs. This can slow the performance of any network application but is fundamentally flawed for reliable transmission of bulk data.”
The increased dependence on interconnected networks propelled the Defense Department to seek viable solutions to not just counter the upsurge of cyberthreats, but to do so at much quicker speeds.
“The cyberthreat is also growing and evolving, driving us to move faster to increase our cyber resilience,” says Lt. Gen. Mark Bowman, USA, director of command, control, communications and computers/cyber for the Joint Chiefs of Staff.
Some of the hackers who have persistently attacked Lockheed Martin’s networks have “gone quiet” in recent months, officials told reporters yesterday at an Arlington, Virginia, media summit hosted by the company’s recently restructured Defense and Intelligence Solutions division. “We’ve seen a number of the adversaries—I wouldn’t say they’ve disappeared—but they’ve gone quiet,” said Darrell Durst, Lockheed Martin’s vice president, cyber solutions. “I think we have been able to counter a number of the adversaries relative to our networks.”
A recently announced study by Juniper Networks found that 51 percent of government information technology decision makers plan to adopt software-defined networking (SDN) within the next two years. Twenty-five percent of government respondents to the Software-Defined Networking Progress Report said improved performance and more efficient networks will be the primary benefit, while 18 percent cited simplified network operations.
Lawrence Livermore National Laboratory, Los Alamos National Laboratory and Bechtel BNI are joining forces to a new class of cyberdefense professionals to protect the nation’s critical digital infrastructure. The Bechtel-Lawrence Livermore-Los Alamos Cyber Career Development Program is designed to allow the national labs to recruit and rapidly develop cybersecurity specialists who can guide research at their respective institutions and create solutions that meet the cyberdefense needs of private industry, which owns about 80 percent of the nation’s critical digital infrastructure and assets.
The National Institute of Standards and Technology (NIST) primary external advisory board today announced a report calling for the agency to increase its staff of cryptography experts and to implement more explicit processes for ensuring openness and transparency to strengthen its cryptography efforts. In making its recommendations, the Visiting Committee on Advanced Technology (VCAT) specifically addressed NIST’s interactions with the National Security Agency (NSA).
Research on the state of cybersecurity of the U.S. critical infrastructure companies reveals that 67 percent have experienced at least one security compromise that led to the loss of confidential information or disruption to operations during the past year. In addition, 24 percent of a survey’s respondents said the compromises involved insider attacks or negligent privileged information technology users. Only 6 percent provide cybersecurity training for all employees.
U.S. Defense Department data will be invading the commercial world as the department moves its unclassified information out of its own hands. Terry Halvorsen, acting Defense Department chief information officer, described the upcoming move at the Wednesday luncheon of the AFCEA International Cyber Symposium, being held June 24-25 in Baltimore.
U.S. Defense Department networks will need to operate with the minimum security available as connectivity and the threat picture evolve, said a top defense official. Terry Halvorsen, acting Defense Department chief information officer, minced no words as he described how tight budgets are limiting options across the board.
“I want for all these networks, the minimum level of security to get the mission done,” Halvorsen declared. “If we try to do the best security everywhere, we will not get to what we want. We don’t have the money; we don’t have the time.”
Ongoing budget cuts place the Defense Department in a challenging situation, tasked with continually supporting warfighters on an increasingly tight budget. The most direct route for the department to accomplish mission goals and support warfighters is through information technology innovation. And so to quote Gen. William L. Shelton, USAF: “If there was ever a time for innovation, this is it.”
The U.S. Army has released a draft request for proposals to procure additional Rifleman Radios, moving the system toward full rate production. The Rifleman Radio is part of the Handheld, Manpack, Small Form Fit program. Under the full and open competition approach, the Army will award contracts, and qualified vendors will compete for delivery orders as needed.
People with access to privileged data—such as health care records, sensitive company information, intellectual property or personal records—frequently put their organization’s sensitive information at risk, according to a new report by Raytheon Company. The survey report, “Privileged User Abuse & The Insider Threat,” finds that many individuals often are granted access to data and areas of the network not necessary for their roles and responsibilities. Furthermore, 65 percent of survey respondents indicated that curiosity—not job necessity—drives them to access sensitive or confidential data.
Key findings include:
The Joint Information Environment (JIE) seeks to network the entire defense community, but its ability to address customer requirements could run afoul of its original purpose. Many military users have specific needs that must be addressed, so the JIE must meet those requirements without jeopardizing its desired interoperability.
The Joint Information Environment (JIE) will be relying on virtual capabilities to a greater degree as part of several thrusts within the network. Enabling technologies include the cloud and software modernization as planners strive to ensure interoperability and access wherever users may be located.