The European Union has established the basis of an organizational structure to safeguard its important satellite assets, particularly those that provide vital positioning, navigation and timing data. As its Galileo constellation has grown in size and significance, the European Union is establishing the necessary organizational infrastructure to build and coordinate a collective effort to secure space against a broad range of threats.
Advanced Technology Systems Co., McLean, Virginia (FA8730-20-D-0018); Atlantic CommTech Corp., Norfolk, Virginia (FA8730-20-D-0022); BCF Solutions Inc., Chantilly, Virginia (FA8730-20-D-0017); CACI Inc., Arlington, Virginia (FA8730-20-D-0015); Chenega Security International LLC, Chantilly, Virginia (FA8730-20-D-0010); Evergreen Fire and Security, Tacoma, Washington (FA8730-20-D-0016); Government Contracting Services LLC, Tacoma, Washington (FA8730-20-D-0009); InDyne Inc., Crestview, Florida (FA8730-20-D-0013); Johnson Controls BAS LLC, Rockville, Maryland (FA8730-20-D-0008); KBRwyle Technology Solutions LLC, Columbia, Maryland (FA8730-20-D-0006); LINX Defense LLC, Deston, Florida (FA8730-20-D-0012); LVW Electronics (Low Voltage Wiring),
Security is among the single greatest concern government agencies have about moving their systems to the cloud. Although it offers significant benefits, cloud computing continues to raise questions about data and system protection. Regardless, the Office of Management and Budget via its Cloud Smart Strategy and the previous Cloud First policy mandates government agencies move to the cloud.
General Dynamics Information Technology (GDIT) will be supporting the U.S. State Department's global technical security supply chain effort, under a $2 billion single-award contract with the Bureau of Diplomatic Security (DS), Countermeasures Directorate. The contract includes a base period of five years and a five-year award term, the company reported.
Under the contract, GDIT will provide the State Department, U.S. Embassies and other posts worldwide with integrated technical security systems, engineering and solution development, hybrid supply chain and distribution management, as well as a global logistics and transportation network.
The fight to secure microelectronic chips is becoming as basic as the chip itself. With chips facing a myriad of threats throughout their life cycle, experts are incorporating security measures into the development of the chip from the foundry to assembly. Other approaches safeguard against threats that could appear as the chip moves through the supply chain. The bottom line for microelectronics security is that necessary measures cannot wait until the device is in the hands of the user.
The colossal reliance on semiconductor chips by the military and commercial industry reaches across weapons, machines and systems that perform key defense and national security functions. And while the Defense Department and the industry use secure chips, they are expensive and hard to design. To remedy that, the Defense Advanced Research Projects Agency, known as DARPA, is looking to automatically include defense mechanisms into the design of microchips. The agency is creating tools to manage the supply chain custody throughout the life cycle of a microchip and increase the availability and economics of secure microelectronics.
Mantech Advanced Systems International, Herndon, Virginia, has been awarded a $12,918,248 cost-plus-fixed-fee contract for security support. This contract provides Sensitive Compartmented Information and Special Access Program security services to the Space and Missile Systems Center and Air Force Space Command operational units. Work will be performed at Los Angeles Air Force Base, California; Vandenberg AFB, California; Peterson AFB, Colorado; and Schriever AFB, Colorado. The work is expected to be completed by November 16, 2019. This award is the result of a competitive acquisition with three offers received. Fiscal year 2018 research and development funds in the amount of $10,000 are being obligated at the time of award.
More than 50 percent of the video surveillance data the federal government collects is not being analyzed. This fact may not be surprising since cameras appear to be everywhere these days, and the amount of data they gather is so huge it’s unwieldy. But MeriTalk, the public-private partnership that conducted a survey of 151 federal decision makers, likens this situation to government agencies seeing only half a movie: They would have challenges following the plot and leveraging the information to achieve the goal—improved security.
Some of the hackers who have persistently attacked Lockheed Martin’s networks have “gone quiet” in recent months, officials told reporters yesterday at an Arlington, Virginia, media summit hosted by the company’s recently restructured Defense and Intelligence Solutions division. “We’ve seen a number of the adversaries—I wouldn’t say they’ve disappeared—but they’ve gone quiet,” said Darrell Durst, Lockheed Martin’s vice president, cyber solutions. “I think we have been able to counter a number of the adversaries relative to our networks.”
The National Institute of Standards and Technology (NIST) primary external advisory board today announced a report calling for the agency to increase its staff of cryptography experts and to implement more explicit processes for ensuring openness and transparency to strengthen its cryptography efforts. In making its recommendations, the Visiting Committee on Advanced Technology (VCAT) specifically addressed NIST’s interactions with the National Security Agency (NSA).
Lawrence Livermore National Laboratory, Los Alamos National Laboratory and Bechtel BNI are joining forces to a new class of cyberdefense professionals to protect the nation’s critical digital infrastructure. The Bechtel-Lawrence Livermore-Los Alamos Cyber Career Development Program is designed to allow the national labs to recruit and rapidly develop cybersecurity specialists who can guide research at their respective institutions and create solutions that meet the cyberdefense needs of private industry, which owns about 80 percent of the nation’s critical digital infrastructure and assets.
The National Security Agency (NSA) has selected five more schools for the National Centers of Academic Excellence (CAE) in Cyber Operations Program, which is designed to cultivate more U.S. cyber professionals. These schools are now designated as Cyber Operations CAEs for the 2014-2019 academic years:
Research on the state of cybersecurity of the U.S. critical infrastructure companies reveals that 67 percent have experienced at least one security compromise that led to the loss of confidential information or disruption to operations during the past year. In addition, 24 percent of a survey’s respondents said the compromises involved insider attacks or negligent privileged information technology users. Only 6 percent provide cybersecurity training for all employees.
Today the U.S. Defense Department released its strategy for countering weapons of mass destruction (WMD). This strategy will direct the department’s efforts to prevent hostile actors from acquiring WMD, contain and reduce WMD threats and ensure the department can respond effectively to WMD crises.
People with access to privileged data—such as health care records, sensitive company information, intellectual property or personal records—frequently put their organization’s sensitive information at risk, according to a new report by Raytheon Company. The survey report, “Privileged User Abuse & The Insider Threat,” finds that many individuals often are granted access to data and areas of the network not necessary for their roles and responsibilities. Furthermore, 65 percent of survey respondents indicated that curiosity—not job necessity—drives them to access sensitive or confidential data.
Key findings include:
High school students and teachers get to learn about the world of cybersecurity through Sandia National Laboratories' Cyber Technologies Academy (CTA), which offers free classes for those interested in computer science and cybersecurity.
The Department of Veterans Affairs (VA) remains plagued by decades-old problems of unreliable and vulnerable networks and computer systems, putting the veterans they serve at risk, according to a recent government report. Despite years of documented weaknesses, the VA still has failed to shore up vulnerabilities, according to the Government Accountability Office (GAO) report.
During the past six years alone, computer security incidents at the VA doubled, from 4,834 in 2007 to 11,382 in 2013, GAO investigators write. Incidents included unauthorized access, denial-of-service attacks, installation of malicious code and improper usage of computing resources, among others.
Middle and high school student teams from 14 states will gather next week for CyberPatriot, a culminating competition in which they will be tested defend computers against cyberattacks.
After months of preparation, the CyberPatriot event on March 28 will test students on their defensive measures and skills to trounce cyber and computer vulnerabilities, a much-needed emerging skill in the cybersecurity industry.
The real challenge to keeping the homeland secure is dealing with the world's increasing complexity, Adm. Thad Allen, USCG, (Ret.), executive vice president of Booz Allen Hamilton and former commandant of the U.S. Coast Guard, told the audience at the AFCEA Homeland Security Conference in Washington, D.C., on Monday during his luncheon keynote address.
Every year in the January issue, SIGNAL Magazine introduces a new columnist for its Incoming opinion column. Next year’s columnist, Lt. Gen. Daniel P. Bolger, USA (Ret.), picked a timely topic for his first column. He worries that with social media posts, warfighters and civilian military employees “merrily are doing the work of a million foreign spies.” Gen. Bolger warns of a broad trend toward posting too much information in social media.