Millions of times every single day, antagonists search for entry into the U.S. Defense Department’s networks. They come from all over: Russia, China, North Korea, Iran. Some are sponsored by nation-states; others are terrorist groups.
Never before has there been such an intense focus on data security and privacy. With data breaches increasing exponentially and the European Union’s recent implementation of the General Data Protection Regulation (GDPR), data security has been at the forefront of news stories over the past several months, with both businesses and consumers suddenly paying very close attention. With this increased attention has come an understanding that data continues to exist even when it is no longer needed or used. Due to this newfound understanding and GDPR’s “Right to be Forgotten,” the eradication of data has new urgency and has become critical to a successful data security program.
When Alexander Woody was born, his mother knew she needed to forge a new path career-wise. She enrolled in an associate's degree program at her local community college and studied computer programming.
“She hit that program really hard back in the '90s and was able to succeed,” says Woody, who is now an Army specialist working as a counter pursuit operator within the National Security Agency’s (NSA’s) Cybersecurity Threat Operations Center.
Spc. Woody ended up with the NSA after finding himself also at a career crossroad. He studied chemistry at North Carolina State University and sometimes tutors high school students struggling with chemistry. But he realized it wasn’t the right career choice for him.
If you think of the cyber threat as Godzilla, you can see the need for a framework that optimizes limited resources. As the beast attacks the building, those individuals located on the ground floor—for example the architects and engineers—worry about being stepped on by its feet. Those on the next floor up, the systems engineers, see the knees and want protection from being kicked. The next level, the incident responders, see the claws and worry about what those claws can do. Higher in the building, the operators see the shoulders and are focused on how big the threat might be based on the shoulder size. The customers at the top only see teeth and flames.
Where some see challenges, others see opportunities. It sounds like a motivational poster, but that is exactly how researchers at the National Security Agency view the Internet of Things, or the IoT.
“We approach IoT a little differently than everybody else. Everybody’s talking about all the security problems. That’s certainly fair, but we look at IoT as an opportunity in terms of the security goals we can accomplish,” says George Coker, chief, Information Assurance Research Group, National Security Agency (NSA).
The U.S. Navy has outsourced geospatial intelligence at sea, delaying its investment in a solution to this core intelligence competency for the afloat commander. The service needs to train its analysts to produce geospatial intelligence and acquire software and hardware for them. A cost-effective systems solution exists, but the lack of commitment to geospatial intelligence holds the Navy back.
Officials from across the U.S. intelligence community are calling for reauthorization of section 702 of the Foreign Intelligence Surveillance Act, which allows the government to collect data on non-U.S. citizens on foreign soil, as Congress debates whether to reauthorize, reform or outright reject it.
Multiple officials from multiple agencies touted the benefits of Section 702 during the 2017 Intelligence and National Security Summit, which was held Sept. 6-7 in Washington, D.C.
After months of uncertainty, President Donald Trump announced today that he has elevated the U.S. Cyber Command to a unified combatant command. In addition, Cyber Command ultimately may be separated from the National Security Agency (NSA).
“This new unified combatant command will strengthen our cyberspace operations and create more opportunities to improve our nation’s defense,” Trump said. “The elevation of United States Cyber Command demonstrates our increased resolve against cyberspace threats and will help reassure our allies and partners and deter our adversaries.”
Solid-state drives store data using flash memory and are becoming common system-level components in military systems. Although they are inexpensive and readily available, commercial off-the-shelf versions often fail to meet military requirements: predictable performance under stressful operating conditions, robust ruggedization, long-term availability from an accredited supplier and trusted security. Drives designed for the commercial market do not provide the flexible security features needed in today’s modern military applications.
Editor’s note: Hugh Montgomery, the focus of this article, passed away April 6, just weeks after this SIGNAL interview.
It is just a matter of time before other countries face insider leaks similar to those that have haunted the American intelligence community, said Hugh Montgomery, a former U.S. diplomat and a pioneering intelligence officer who served for more than six decades.
An offshoot of social media, crowdsourcing could hold solutions to some of the biggest cybersecurity problems the U.S. Defense Department faces. The burgeoning field could find fixes for thorny legacy problems as well as emerging cyberthreats. This is exactly what is taking root at the Joint Forces Staff College in a course offered to service members and their Defense Department civilian equivalents learning cyber concepts in joint, interagency and multinational environments.
Cybersecurity can no longer be viewed as a technology-only problem and segmented into stovepipes where the U.S. Defense Department carries out one set of tasks; the civilian government another; and industry does its own thing, said Adm. Michael Rogers, USN, director of the National Security Agency (NSA) and commander of U.S. Cyber Command.
“It must be viewed more broadly and must be tackled from a national security perspective,” Adm. Rogers said during a morning West 2017 conference presentation Thursday with Adm. James Stavridis, USN (Ret.), former NATO commander and dean of Tufts University’s Fletcher School of Law and Diplomacy.
The ability of warfighters to be mobile and nimble is not a luxury during combat operations. It is an absolute necessity. Staying ahead of the enemy or avoiding attack often means an entire command post must move, and quickly—a mammoth challenge if the command post relies on a wired communications network with cumbersome and costly cables and equipment.
Maj. Gen. Mark W. Westergren, USAF, has been assigned as deputy chief, Central Security Service, National Security Agency, Fort George G. Meade, Maryland.
Securing the cyberspace will get worse before it gets any better, warned Adm. Michael Rogers, USN, director of the National Security Agency (NSA) and commander of U.S. Cyber Command.
“The very technical foundation of the world we’ve created with the Internet of Things is going to exacerbate [security vulnerabilities], not make it easier,” he said. Now, it’s not that the Internet of Things is bad, he pointed out. “As a private citizen, I love the convenience. But I also acknowledge it brings inherent challenges when we’re trying to defend something.”
Every now and then a poll result pops up that surprises me. Results sometimes are counter-intuitive, or at least counter-narrative from what we're led to believe in major media coverage.
Case in point: An early 2015 poll shows that after nearly two years of a negative spotlight on the U.S. intelligence community, and particularly on the National Security Agency (NSA) and Central Intelligence Agency (CIA), the American people still have a positive view of the NSA and CIA. More startlingly, young Americans have more favorable views of NSA and CIA than older Americans!
The National Security Agency’s third annual Best Scientific Cybersecurity Paper competition is now open. Scientific papers must have been published during 2014.
The papers will be judged on scientific merit and the the strength and significance of the work reported. In addition, the paper must exemplify the performance and reporting of cybersecurity scientific research.
General Dynamics C4 Systems, Scottsdale, Arizona, recently received the Defense Mobile Classified Capability (DMCC) contract from the National Security Agency (NSA). As part of the contract, General Dynamics will deliver up to 1,000 Samsung KNOX-enabled Galaxy S4 smartphones provisioned with added GD Protected software for the U.S. government. With these new smartphones, authorized government personnel will be able to make secure phone calls and access classified email. With GD Protected software, the phone operates using only authorized software and applications from a trusted source. The company will provide system updates and upgrades over the air.
The National Security Agency (NSA) is focusing inward and externally as it adopts a new approach to technology policy. This effort ranges from seeking outside partners in technology development to conducting an internal audit to uncover weak points that might bring down the agency.