Security

July 9, 2019
 

General Dynamics Information Technology (GDIT) will be supporting the U.S. State Department's global technical security supply chain effort, under a $2 billion single-award contract with the Bureau of Diplomatic Security (DS), Countermeasures Directorate. The contract includes a base period of five years and a five-year award term, the company reported.

Under the contract, GDIT will provide the State Department, U.S. Embassies and other posts worldwide with integrated technical security systems, engineering and solution development, hybrid supply chain and distribution management, as well as a global logistics and transportation network. 

July 1, 2019
By Robert K. Ackerman
Shutterstock/Kritsana Maimeetook

The fight to secure microelectronic chips is becoming as basic as the chip itself. With chips facing a myriad of threats throughout their life cycle, experts are incorporating security measures into the development of the chip from the foundry to assembly. Other approaches safeguard against threats that could appear as the chip moves through the supply chain. The bottom line for microelectronics security is that necessary measures cannot wait until the device is in the hands of the user.

July 1, 2019
By Kimberly Underwood
Some of DARPA’s research into microelectronics is creating automatic security mechanisms integrated into the design of microchips, which are smaller than a grain of sand.  Connect world/Shutterstock

The colossal reliance on semiconductor chips by the military and commercial industry reaches across weapons, machines and systems that perform key defense and national security functions. And while the Defense Department and the industry use secure chips, they are expensive and hard to design. To remedy that, the Defense Advanced Research Projects Agency, known as DARPA, is looking to automatically include defense mechanisms into the design of microchips. The agency is creating tools to manage the supply chain custody throughout the life cycle of a microchip and increase the availability and economics of secure microelectronics.

September 27, 2018
 

Mantech Advanced Systems International, Herndon, Virginia, has been awarded a $12,918,248 cost-plus-fixed-fee contract for security support. This contract provides Sensitive Compartmented Information and Special Access Program security services to the Space and Missile Systems Center and Air Force Space Command operational units. Work will be performed at Los Angeles Air Force Base, California; Vandenberg AFB, California; Peterson AFB, Colorado; and Schriever AFB, Colorado. The work is expected to be completed by November 16, 2019. This award is the result of a competitive acquisition with three offers received. Fiscal year 2018 research and development funds in the amount of $10,000 are being obligated at the time of award.

March 18, 2015
By Maryann Lawlor

More than 50 percent of the video surveillance data the federal government collects is not being analyzed. This fact may not be surprising since cameras appear to be everywhere these days, and the amount of data they gather is so huge it’s unwieldy. But MeriTalk, the public-private partnership that conducted a survey of 151 federal decision makers, likens this situation to government agencies seeing only half a movie: They would have challenges following the plot and leveraging the information to achieve the goal—improved security.

August 14, 2014
By George I. Seffers

Some of the hackers who have persistently attacked Lockheed Martin’s networks have “gone quiet” in recent months, officials told reporters yesterday at an Arlington, Virginia, media summit hosted by the company’s recently restructured Defense and Intelligence Solutions division. “We’ve seen a number of the adversaries—I wouldn’t say they’ve disappeared—but they’ve gone quiet,” said Darrell Durst, Lockheed Martin’s vice president, cyber solutions. “I think we have been able to counter a number of the adversaries relative to our networks.”

July 14, 2014
By George I. Seffers

The National Institute of Standards and Technology (NIST) primary external advisory board today announced a report calling for the agency to increase its staff of cryptography experts and to implement more explicit processes for ensuring openness and transparency to strengthen its cryptography efforts. In making its recommendations, the Visiting Committee on Advanced Technology (VCAT) specifically addressed NIST’s interactions with the National Security Agency (NSA).

July 14, 2014
By George I. Seffers

Lawrence Livermore National Laboratory, Los Alamos National Laboratory and Bechtel BNI are joining forces to a new class of cyberdefense professionals to protect the nation’s critical digital infrastructure. The Bechtel-Lawrence Livermore-Los Alamos Cyber Career Development Program is designed to allow the national labs to recruit and rapidly develop cybersecurity specialists who can guide research at their respective institutions and create solutions that meet the cyberdefense needs of private industry, which owns about 80 percent of the nation’s critical digital infrastructure and assets.

July 14, 2014
By George I. Seffers

The National Security Agency (NSA) has selected five more schools for the National Centers of Academic Excellence (CAE) in Cyber Operations Program, which is designed to cultivate more U.S. cyber professionals. These schools are now designated as Cyber Operations CAEs for the 2014-2019 academic years:

July 10, 2014
By Maryann Lawlor

Research on the state of cybersecurity of the U.S. critical infrastructure companies reveals that 67 percent have experienced at least one security compromise that led to the loss of confidential information or disruption to operations during the past year. In addition, 24 percent of a survey’s respondents said the compromises involved insider attacks or negligent privileged information technology users. Only 6 percent provide cybersecurity training for all employees.

July 1, 2014
By George I. Seffers

Today the U.S. Defense Department released its strategy for countering weapons of mass destruction (WMD). This strategy will direct the department’s efforts to prevent hostile actors from acquiring WMD, contain and reduce WMD threats and ensure the department can respond effectively to WMD crises.

May 20, 2014
By George I. Seffers

People with access to privileged data—such as health care records, sensitive company information, intellectual property or personal records—frequently put their organization’s sensitive information at risk, according to a new report by Raytheon Company. The survey report, “Privileged User Abuse & The Insider Threat,” finds that many individuals often are granted access to data and areas of the network not necessary for their roles and responsibilities. Furthermore, 65 percent of survey respondents indicated that curiosity—not job necessity—drives them to access sensitive or confidential data.

Key findings include:

May 2, 2014
By George I. Seffers

High school students and teachers get to learn about the world of cybersecurity through Sandia National Laboratories' Cyber Technologies Academy (CTA), which offers free classes for those interested in computer science and cybersecurity.

April 1, 2014
By Sandra Jontz

The Department of Veterans Affairs (VA) remains plagued by decades-old problems of unreliable and vulnerable networks and computer systems, putting the veterans they serve at risk, according to a recent government report. Despite years of documented weaknesses, the VA still has failed to shore up vulnerabilities, according to the Government Accountability Office (GAO) report.

During the past six years alone, computer security incidents at the VA doubled, from 4,834 in 2007 to 11,382 in 2013, GAO investigators write. Incidents included unauthorized access, denial-of-service attacks, installation of malicious code and improper usage of computing resources, among others.

March 21, 2014
By Sandra Jontz

Middle and high school student teams from 14 states will gather next week for CyberPatriot, a culminating competition in which they will be tested defend computers against cyberattacks.

After months of preparation, the CyberPatriot event on March 28 will test students on their defensive measures and skills to trounce cyber and computer vulnerabilities, a much-needed emerging skill in the cybersecurity industry.

March 10, 2014
By George I. Seffers

The real challenge to keeping the homeland secure is dealing with the world's increasing complexity, Adm. Thad Allen, USCG, (Ret.), executive vice president of Booz Allen Hamilton and former commandant of the U.S. Coast Guard, told the audience at the AFCEA Homeland Security Conference in Washington, D.C., on Monday during his luncheon keynote address.

December 13, 2013
By Jim Sweeney

Every year in the January issue, SIGNAL Magazine introduces a new columnist for its Incoming opinion column. Next year’s columnist, Lt. Gen. Daniel P. Bolger, USA (Ret.), picked a timely topic for his first column. He worries that with social media posts, warfighters and civilian military employees “merrily are doing the work of a million foreign spies.” Gen. Bolger warns of a broad trend toward posting too much information in social media.

July 31, 2013
By Robert K. Ackerman

The most damaging cyber attacks possible are among the least likely to happen, because the powers capable of undertaking them are unlikely to launch them, according to an expert with the Office of the Director of National Intelligence (ODNI). Sean Kanuck, national intelligence officer for cyber issues at the National Intelligence Council, ODNI, told the audience at the second day of the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that cyber attack capability need not translate to immediate threat.

July 31, 2013
By Robert K. Ackerman

A “digital Pearl Harbor Armageddon” that inflicts catastrophic damage on the United States is not likely soon or in the foreseeable future. The worst cyber attack that could be expected would have less of an effect for a shorter period of time, said an expert with the Office of the Director of National Intelligence (ODNI).

Sean Kanuck, national intelligence officer for cyber issues at the National Intelligence Council, ODNI, told the audience at the second day of the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that predictions of destruction that would bring the United States to its knees are unnecessarily pessimistic and unlikely to materialize.

July 31, 2013
By Robert K. Ackerman

Democracy has only 20 years left to live if an effective means of digital identification is not developed before that deadline. As young people growing up with social media reach voting age in increasing numbers, they will lead a major shift to online voting. A lack of identity security will throw open the gates to massive voter fraud that will destroy the fidelity of elections, and with it, true representative government.

Pages