NSA

August 1, 2018
By George I. Seffers
Credit: TheDigitalArtist/Pixaba

Millions of times every single day, antagonists search for entry into the U.S. Defense Department’s networks. They come from all over: Russia, China, North Korea, Iran. Some are sponsored by nation-states; others are terrorist groups.

August 6, 2018
By Andrew Kelleher
The NSA has had significant, and perhaps surprising, influence on the standards for destroying no-longer-needed data. Credit: PRILL/Shutterstock

Never before has there been such an intense focus on data security and privacy. With data breaches increasing exponentially and the European Union’s recent implementation of the General Data Protection Regulation (GDPR), data security has been at the forefront of news stories over the past several months, with both businesses and consumers suddenly paying very close attention. With this increased attention has come an understanding that data continues to exist even when it is no longer needed or used. Due to this newfound understanding and GDPR’s “Right to be Forgotten,” the eradication of data has new urgency and has become critical to a successful data security program.

July 24, 2018
By George I. Seffers
Now an NSA hacker, Army Specialist Alexander Woody made a major career change similar to the one his mother made shortly after his birth. Credit: alan9187/Pixabay

When Alexander Woody was born, his mother knew she needed to forge a new path career-wise. She enrolled in an associate's degree program at her local community college and studied computer programming.

“She hit that program really hard back in the '90s and was able to succeed,” says Woody, who is now an Army specialist working as a counter pursuit operator within the National Security Agency’s (NSA’s) Cybersecurity Threat Operations Center.

Spc. Woody ended up with the NSA after finding himself also at a career crossroad. He studied chemistry at North Carolina State University and sometimes tutors high school students struggling with chemistry. But he realized it wasn’t the right career choice for him.

May 16, 2018
By Beverly Cooper
Credit: Shutterstock

If you think of the cyber threat as Godzilla, you can see the need for a framework that optimizes limited resources. As the beast attacks the building, those individuals located on the ground floor—for example the architects and engineers—worry about being stepped on by its feet. Those on the next floor up, the systems engineers, see the knees and want protection from being kicked. The next level, the incident responders, see the claws and worry about what those claws can do. Higher in the building, the operators see the shoulders and are focused on how big the threat might be based on the shoulder size. The customers at the top only see teeth and flames.

March 1, 2018
By George I. Seffers
Credit: Niyazz/Shutterstock

Where some see challenges, others see opportunities. It sounds like a motivational poster, but that is exactly how researchers at the National Security Agency view the Internet of Things, or the IoT.

“We approach IoT a little differently than everybody else. Everybody’s talking about all the security problems. That’s certainly fair, but we look at IoT as an opportunity in terms of the security goals we can accomplish,” says George Coker, chief, Information Assurance Research Group, National Security Agency (NSA).

November 1, 2017
By Cmdr. Bryan Leese, USN, and Brooke Wright
The aircraft carrier USS George H.W. Bush (l), the guided-missile destroyer USS Truxtun (c) and the guided-missile cruiser USS Philippine Sea transit the Strait of Gibraltar. The George H.W. Bush Carrier Strike Group helped prove the afloat geospatial intelligence concept through the National Geospatial-Intelligence Agency’s ship rider program.

The U.S. Navy has outsourced geospatial intelligence at sea, delaying its investment in a solution to this core intelligence competency for the afloat commander. The service needs to train its analysts to produce geospatial intelligence and acquire software and hardware for them. A cost-effective systems solution exists, but the lack of commitment to geospatial intelligence holds the Navy back.

September 7, 2017
By George I. Seffers
Panelists discuss section 702 Intelligence reauthorization during the Intelligence and National Security Summit.

Officials from across the U.S. intelligence community are calling for reauthorization of section 702 of the Foreign Intelligence Surveillance Act, which allows the government to collect data on non-U.S. citizens on foreign soil, as Congress debates whether to reauthorize, reform or outright reject it.

Multiple officials from multiple agencies touted the benefits of Section 702 during the 2017 Intelligence and National Security Summit, which was held Sept. 6-7 in Washington, D.C.

August 18, 2017
By George I. Seffers
Active-duty, Reserve and National Guard service members participate in exercises sponsored by U.S. Cyber Command. On Friday, President Donald Trump elevated the command to a unified combatant command. Photo: Chief Petty Officer Dennis J. Herring, USN

After months of uncertainty, President Donald Trump announced today that he has elevated the U.S. Cyber Command to a unified combatant command. In addition, Cyber Command ultimately may be separated from the National Security Agency (NSA).

“This new unified combatant command will strengthen our cyberspace operations and create more opportunities to improve our nation’s defense,” Trump said. “The elevation of United States Cyber Command demonstrates our increased resolve against cyberspace threats and will help reassure our allies and partners and deter our adversaries.”

July 1, 2017
By Bob Lazaravich

Solid-state drives store data using flash memory and are becoming common system-level components in military systems. Although they are inexpensive and readily available, commercial off-the-shelf versions often fail to meet military requirements: predictable performance under stressful operating conditions, robust ruggedization, long-term availability from an accredited supplier and trusted security. Drives designed for the commercial market do not provide the flexible security features needed in today’s modern military applications. 

May 1, 2017
By George I. Seffers
The late Hugh Montgomery, a former ambassador who retired from the CIA in 2014 after serving the intelligence community for more than six decades, displays photographs from his younger days.

Editor’s note: Hugh Montgomery, the focus of this article, passed away April 6, just weeks after this SIGNAL interview.

It is just a matter of time before other countries face insider leaks similar to those that have haunted the American intelligence community, said Hugh Montgomery, a former U.S. diplomat and a pioneering intelligence officer who served for more than six decades.

April 1, 2017
By Lt. Cmdr. Jon T. Wende, USN
Tapping the expertise of the flood of cyberspace users could hold the key to solving many of the dynamic realm’s challenges.

An offshoot of social media, crowdsourcing could hold solutions to some of the biggest cybersecurity problems the U.S. Defense Department faces. The burgeoning field could find fixes for thorny legacy problems as well as emerging cyberthreats. This is exactly what is taking root at the Joint Forces Staff College in a course offered to service members and their Defense Department civilian equivalents learning cyber concepts in joint, interagency and multinational environments.

February 23, 2017
By Sandra Jontz
Adm. Michael Rogers, USN (l), and Adm. James Stavridis, USN (Ret.), discuss national security issues during day three of the West 2017 conference in San Diego. Photo by Mike Carpenter

Cybersecurity can no longer be viewed as a technology-only problem and segmented into stovepipes where the U.S. Defense Department carries out one set of tasks; the civilian government another; and industry does its own thing, said Adm. Michael Rogers, USN, director of the National Security Agency (NSA) and commander of U.S. Cyber Command.

“It must be viewed more broadly and must be tackled from a national security perspective,” Adm. Rogers said during a morning West 2017 conference presentation Thursday with Adm. James Stavridis, USN (Ret.), former NATO commander and dean of Tufts University’s Fletcher School of Law and Diplomacy.

January 30, 2017
By Charlie Kawasaki
A U.S. Marine uses a tablet to communicate in real-time during the Infantry Officer’s Course.

The ability of warfighters to be mobile and nimble is not a luxury during combat operations. It is an absolute necessity. Staying ahead of the enemy or avoiding attack often means an entire command post must move, and quickly—a mammoth challenge if the command post relies on a wired communications network with cumbersome and costly cables and equipment.

April 18, 2016
 

Maj. Gen. Mark W. Westergren, USAF, has been assigned as deputy chief, Central Security Service, National Security Agency, Fort George G. Meade, Maryland.

October 29, 2015
By Sandra Jontz
Adm. Michael Rogers, USN, director of the NSA and commander of U.S. Cyber Command, warns of an increase in number and sophistication of cyber attacks during Thursday's SAP NS2 Solution Summit.

Securing the cyberspace will get worse before it gets any better, warned Adm. Michael Rogers, USN, director of the National Security Agency (NSA) and commander of U.S. Cyber Command.

“The very technical foundation of the world we’ve created with the Internet of Things is going to exacerbate [security vulnerabilities], not make it easier,” he said. Now, it’s not that the Internet of Things is bad, he pointed out. “As a private citizen, I love the convenience. But I also acknowledge it brings inherent challenges when we’re trying to defend something.”

June 24, 2015
By George I. Seffers
NSA officials intend to increase open source software releases through GitHub.

The National Security Agency’s (NSA’s) recently established GitHub presence could become a focal point for releasing new technologies into the open source community. Sharing software could benefit the nation’s cybersecurity while also benefiting businesses and economic growth, officials say.

April 6, 2015
By Lewis Shepherd

Every now and then a poll result pops up that surprises me. Results sometimes are counter-intuitive, or at least counter-narrative from what we're led to believe in major media coverage.

Case in point: An early 2015 poll shows that after nearly two years of a negative spotlight on the U.S. intelligence community, and particularly on the National Security Agency (NSA) and Central Intelligence Agency (CIA), the American people still have a positive view of the NSA and CIA. More startlingly, young Americans have more favorable views of NSA and CIA than older Americans!

February 24, 2015
By Maryann Lawlor

The National Security Agency’s third annual Best Scientific Cybersecurity Paper competition is now open. Scientific papers must have been published during 2014.

The papers will be judged on scientific merit and the the strength and significance of the work reported. In addition, the paper must exemplify the performance and reporting of cybersecurity scientific research.

October 24, 2014
 

General Dynamics C4 Systems, Scottsdale, Arizona, recently received the Defense Mobile Classified Capability (DMCC) contract from the National Security Agency (NSA). As part of the contract, General Dynamics will deliver up to 1,000 Samsung KNOX-enabled Galaxy S4 smartphones provisioned with added GD Protected software for the U.S. government. With these new smartphones, authorized government personnel will be able to make secure phone calls and access classified email. With GD Protected software, the phone operates using only authorized software and applications from a trusted source. The company will provide system updates and upgrades over the air.

September 19, 2014
By Robert K. Ackerman

The National Security Agency (NSA) is focusing inward and externally as it adopts a new approach to technology policy. This effort ranges from seeking outside partners in technology development to conducting an internal audit to uncover weak points that might bring down the agency.

Pages