U.S. Secret Service officials are establishing two new cybercrime task forces—in Cincinnati and Denver—that will enhance the agency’s ability to detect and investigate information technology-related crimes, including credit card theft, attacks on the banking and finance infrastructure and identity fraud.
Europe’s defense markets have been contracting for the past decade because of the continent’s financial crisis and national priorities shifting away from military spending. But while fewer tanks and fighter jets are being acquired, money is being spent on modernizing computers and communications equipment—a trend that will continue into the foreseeable future, according to an industry analyst.
U.S. Navy officials expect to award a full-deployment contract for a new shipboard network this spring, and they plan to install the system on nine ships this year. The network provides commonality across the fleet, replacing multiple aging networks, improving interoperability and driving down costs.
The network-centric U.S. Navy could find itself without its core information assets during a conflict in the vast Asia-Pacific region. So, the U.S. Pacific Fleet is embarking on an effort to learn how to function without some of its most important technology capabilities.
Admiral Harry B. Harris Jr., USN, commander of the U.S. Pacific Fleet, outlined that scenario on the final day of TechNet Asia-Pacific 2013 in Honolulu, Hawaii. Adm. Harris said the fleet is planning for operation in a disconnected, intermittent, low-bandwidth environment, or DIL.
Future defense information technology is likely to focus on a set of services instead of specific elements. Accordingly, bidders likely will consist of industry teams bringing diverse expertise to the acquisition table.
This view was offered by Terry Halvorsen, Department of the Navy chief information officer, at the breakfast during the final day of TechNet Asia-Pacific 2013 in Honolulu, Hawaii. Halvorsen cited the Navy’s Next-Generation Enterprise Network (NGEN) acquisition as an example of the future. The winning bidder was a consortium that comprised several different companies
The U.S. Defense Department’s Joint Information Enterprise (JIE) promises to be the core of force networking, and it will be at the heart of coalition interoperability. An approach to networking allies and nontraditional partners in the JIE may loom in social media.
Establishing communities of interest within the JIE was broached by Randy Cieslak, chief information officer, U.S. Pacific Command (PACOM). Cieslak cited the concept during a panel discussion he was moderating on the final day of TechNet Asia-Pacific 2013 in Honolulu, Hawaii.
Effective cybersecurity ultimately will depend on the ability of nations with shared interests to form coalitions that influence the development of international rules and regulations, according to Internet security experts. A lively Wednesday panel on cyberspace at TechNet Asia-Pacific 2013 in Honolulu, Hawaii, explored the broad ramifications of cyberspace security on a global scale.
Scott Dewar, the Australian consulate general in Honolulu, warned of letting others define the Internet. Australia believes the openness of the Internet is “a libertarian force for good,” he said, adding “we need to be building like-minded coalitions” to obtain results that work in cybersecurity.
The biggest impediment to effective cybersecurity may be the national laws that underpin freedom in the most technologically advanced democracies. These laws not only provide cybermarauders with hiding places, they also prevent global law enforcement from pursuing them as they prey on unknowing victims around the world.
International experts seeking to cooperate in cybersecurity measures often do not even realize how cultural issues are hampering their efforts, according to a top cybersecurity expert. Even when negotiating with friends, they often do not understand the thought processes brought to the table by their foreign partners.
South Korea has developed a national policy and program that brings government and the private sector together in a coordinated effort. This thrust, which emerged from two serious cyber attacks earlier this year, aims to have several key measures in place by 2017.
Walter Paik, Republic of Korea consul general in Honolulu, told a panel audience at TechNet Asia-Pacific 2013 in Honolulu, Hawaii, that major cyber attacks in March and June had significant effects in the television sector and in commercial and government sites. Millions of citizens had data stolen, so the Korean government set out on a new approach.
TechNet Asia-Pacific 2013 Online Show Daily: Day 2
Quote of the Day:
“You may have to make the job fun. What motivated me to get where I am today is not necessarily what will motivate the leaders of tomorrow.”—Cindy Moran, director, network services, Defense Information Systems Agency
An evolving mission network connecting U.S. and Australian forces is being expanded to include other trusted allies with an eye toward adding coalition partner nations. The network is built around a risk-managed approach for sensitive information sharing.
Known as Pegasus, the network expands on the two nations’ Improved Connectivity Initiative (ICI). Maj. Gen. Mike J. Milford, Australia Military, chief technology officer, Chief Information Officer Group of the Australian Department of Defence, outlined details of the network to the Wednesday breakfast audience at TechNet Asia-Pacific 2013 in Honolulu, Hawaii.
Now that allied forces have accepted coalitions as a requisite for future military operations, they must undergo a cultural sea change for cybersecurity. Accepting nontraditional partners demands a new way of viewing cybersecurity that entails greater flexibility at its most philosophical level.
“We have realized the value of fighting on a single network instead of multiple networks,” said Maj. Gen. Mike J. Milford, Australia Military, chief technology officer, Chief Information Officer Group of the Australian Department of Defence, at TechNet Asia-Pacific 2013 in Honolulu, Hawaii. “Now, we are moving from a risk averse approach to a risk management approach.”
Australia has implemented a cybersecurity policy that brings together government and industry to secure the domain nationally. The country recently elevated cybersecurity as a major priority for national security, and in 2009, it established a Cyber Security Operations Center (CSOC).
The recent humanitarian assistance/disaster response (HA/DR) effort in the wake of the Philippine typhoon demonstrated new capabilities and vulnerabilities for the broad networking necessary for successful operations. Information was shared to a degree greater than at previous emergencies, but this opened the door to potential information assurance problems.
TechNet Asia-Pacific 2013 Online Show Daily, Day 1
Quote of the Day:
"If you allow the United States to operate out of sanctuary, we will beat the crap out of you." - Lt. Gen. Stanley T. Kresge, USAF, vice commander, U.S. Pacific Air Forces, addressing potential adversaries.
The recent U.S. strategic pivot toward the Pacific has placed that region at the forefront of change in the military. Where in the recent past activities in the area of responsibility (AOR) for the U.S. Central Command (CENTCOM) defined military needs, now the requirements for the U.S. Pacific Command (PACOM) are emerging as the leading edge of the defense technology sword.
The U.S. Pacific Air Forces will benefit greatly from combining its A-3 and A-6, said its director of communications and chief information officer. Col. Michael Finn II, USAF, told the audience at the opening panel discussion at TechNet Asia-Pacific 2013 in Honolulu, Hawaii, that the Pacific Air Forces would have “a lot of synergy combining the -3 with the -6.”
The concept of cyber readiness has a different perspective from the operations side and the cyber side. This consolidation helps provide warfighting integration across the entire network, Col. Finn said.
An increasing number of missions combined with more diverse settings offer a major challenge to establishing needed communications throughout the Asia-Pacific region. U.S. forces cannot count on having necessary communications links in place with they respond to a new mission, noted a panel of military officers.
U.S. Pacific Command military leaders agree that any future operation will be conducted amid a coalition, and partner countries must be networked. However, that networking opens the possibility for greatly increased network vulnerabilities as less-secure nations provide weak links for network security.
This vital issue was discussed by a panel featuring the U.S. Pacific Command’s -6s at TechNet Asia-Pacific 2013 in Honolulu, Hawaii. Col. Michael Finn II, USAF, director of communications and chief information officer, headquarters, U.S. Pacific Air Forces, noted, “all of our partners are hungry for this [cyber] domain.” Japan and South Korea in particular are primary information sharing partners.
U.S. forces may be over relying on cyber to meet challenges in the Asia-Pacific region at a time when potential adversaries view it as a key to disrupting U.S. operations, according to the top leaders of the U.S. Pacific Command (PACOM). Lt. Gen. Thomas L. Conant, USMC, deputy commander of PACOM, offered that U.S. forces must expect to operate without at least some of their cyber assets in a time of conflict.