Dealing with virtual challenges may require a meeting of different disciplines.
Roles are changing as the service reshapes its digital future.
The U.S. Air Force is subjecting itself to a cyber reality check with an eye toward restructuring the discipline both operationally and organizationally. A working group is parsing the service’s activities in this domain, and this effort involves interaction with the other services as well as the commercial sector.
The revision reflects efforts of government-wide joint task force.
Managers of information technology systems for the federal government have new mandatory guidance on security and privacy controls used to manage and protect those systems from cyber attack.
Two brigades from the Army’s 10th Mountain Division are preparing to deploy to Afghanistan with a host of technologies that will allow the units to provide their own network down to the tactical edge. The new equipment provides battalion and company commanders with a communications on the move capability and pushes critical data down to the individual squad level.
The same approach used to test and implement the Army’s single largest networking system is laying the groundwork for extending the network down to the individual soldier. As laboratory tests and field exercises validate the interoperability of separate elements in a network, system conflicts are giving way to greater commonality among different elements.
This effort has borne fruit in the evolution of the Warfighter Information Network–Tactical (WIN–T). The last fielding of WIN–T Increment 1 took place in August 2012, and WIN–T Increment 2 is taking the final steps toward deployment. Meanwhile, WIN–T Increment 3 is beginning to take shape.
A military exercise designed to refine and improve the way coalition partners share vital information will, for the first time, include the network that is supporting troops in Afghanistan. Scheduled to take place in Poland next month, the event will feature military command and control communications experts from NATO, partner organizations and nations who share the goal of rigorously testing communications interoperability among coalition members. But one of the largest of those partners, the United States, is not taking a leading role in one of the newest, and most challenging areas, cybersecurity.
Coalition interoperability has received a good deal of focus during the past few years. The Afghan Mission Network (AMN) has given many hope that a repeatable solution for coalition operations could be developed that would allow rapid deployment of a coalition-compatible network for future conflicts. The Future Mission Network (FMN) is envisioned to allow coalition partners to plug into a standards-compliant network with the functionality and security needed to support complex operations.
Moving forward through sequester, next fiscal year's evaluations include new contracts and contacts.
As the U.S. Army prepares its network of the future, it plans to make some changes to the way it approaches working with government and private partners. The moves will increase interoperability downrange while attempting to shorten the ever-frustrating acquisition cycle that keeps the military behind the curve in implementing cutting-edge technologies.
Future conflicts likely will be fought in degraded information technology environments, which will require the U.S. Navy to develop and exploit new capabilities to continue to operate in contested cyberspace. Technologies such as a flexible information grid, assured timing services and directed energy weapons must be part of the naval information system arsenal if the sea service is to maintain information dominance through the year 2028.
Defense Department will decide on a path forward within 30 days.
Secretary of Defense Chuck Hagel told members of Congress on April 16 that he is personally committed to solving the database interoperability problems between the Defense Department (DOD) and the Department of Veterans Affairs (VA) that have left thousands of veterans waiting months while benefits claims are processed.
After a special operations deployment, handling state-of-the-art communications technology tops the list.
Back from a nearly year-long deployment to Afghanistan, the 1st Marine Special Operations Battalion already is working to apply lessons learned to training for the next deployment. As the battalion prepares for its next mission, it is reflecting on what its Marines learned about how they train, how their equipment worked and how they will prepare themselves for the future.
The Defense Information Systems Agency (DISA) has begun internal discussions regarding a multiaward contract for cloud computing services.
Anthony Montemarano, DISA’s director of strategic planning and information, told a briefing of industry leaders Monday that he and his agency are firm believers in cloud computing. “When you look at some of the functions that we perform in government, a lot of it can be provided in the commercial cloud. We have to come to grips with the value proposition,” he explains. He believes that the Defense Department’s cloud computing strategy must include DISA cloud resources, commercial cloud services and privately owned cloud services where appropriate.
When it comes to popular smartphones and tablets, security can be a many-layered and necessary endeavor
The growing use of advanced mobile devices, coupled with the increase in wireless broadband speed, is fueling demand by employees to bring their own devices to the job. This situation has opened a new set of security challenges for information technology staff, especially when it comes to the use of apps.
The whole becomes greater than the sum of the parts in a networked software engineering realm.
A network built after its major move to a new base is allowing the U.S. Army Communications-Electronics Command to link diverse communications systems into an overarching network. This enables capabilities ranging from debugging software updates before they are sent to the front to a multinational exercise for validating operational activities.
Homeland Security Conference 2013 Show Daily, Day 1
All too often, cyber and physical protection are considered separately, when really they go hand-in-hand, according to experts speaking at the first day of the AFCEA Homeland Security Conference in Washington, D.C., February 26, 2013. The conference opened with a half-day of conversation about hackers, terrorists and natural disasters and addressed concerns involving both physical infrastructure and the cyber environment for all kinds of attacks, be they physical, virtual or even natural in origin.
The U.S. agency responsible for customs and border protection has suffered from an unreliable infrastructure and network downtimes but already is seeing benefits from a fledgling move to cloud computing. Those benefits include greater reliability and efficiency and lower costs.
To meet the challenge of implementing big data, a new international scientific organization is forming to facilitate the sharing of research data and speed the pace of innovation. The group, called the Research Data Alliance, will comprise some of the top computer experts from around the world, representing all scientific disciplines.
Managing the staggering and constantly growing amount of information that composes big data is essential to the future of innovation. The U.S. delegation to the alliance’s first plenary session, being held next month in Switzerland, is led by Francine Berman, a noted U.S. computer scientist, with backing from the National Science Foundation (NSF).
Commanders wrestling with control of cyberspace elements now have a new tool to help them secure their corner of cyberspace in an operational setting. The Adaptive Network Defense of Command and Control concept of operations enables joint force commander control of key terrain in cyberspace, based on assessments at an operational tempo. To achieve a joint force command objective, network operators concentrate cybersecurity and monitoring of command and control systems to maintain the initiative against adversarial attacks and provide enhanced situational awareness.
West 2013 Online Show Daily, Day 2
Quote of the Day: “How can you help me make the least-dumb decisions quicker?”—Terry Halvorsen, chief information officer (CIO) for the Department of the Navy, requesting cyber security solutions from industry