Wireless Hacking In Flight: Air Force Demos Cyber EC-130
Posted on
NATIONAL HARBOR: Matthew Broderick in his basement, playing Wargames over a landline, is still the pop culture archetype of a hacker. But as wireless networks became the norm, new-age cyber warfare and traditional electronic warfare are starting to merge. Hackers can move out of the basement to the sky. In a series of experiments, the… Keep reading →
DNI, NSA Seek Offensive Cyber Clarity; OPM Not An ‘Attack’
Posted on
WASHINGTON: No one really knows what they’re doing in cyberspace: It’s all too new and it changes too fast. So it was refreshing — if unnerving — for two top intelligence officials to admit this morning that the US government’s lack of clarity makes it more difficult both to deter adversaries’ cyber operations and to conduct… Keep reading →
New DoD Rule Might Cripple Silicon Valley Efforts: Sen. McCain
Posted on
WASHINGTON: The day before Defense Secretary Ash Carter heads to St. Louis to promote outreach to the high tech communities, Sen. John Mccain blasted a proposed new DoD rule that “would have the unfortunate effect of undermining many of the key objectives” of Carter’s efforts to entice Silicon Valley to do much more business with the Pentagon.… Keep reading →
Who Commands In Cyberspace As New HQ Expands?
Posted on
TYSON’S CORNER: “Unity of command” is a classic principle of war. As the US military struggles to improve cybersecurity against relentless Russian, Chinese, and other attacks, however, it’s finding the complex interconnectedness of computer networks complicate the chain of command. If the tech guys urgently need to shut a system down — say, because it’s… Keep reading →
Raytheon Sells Cyber At Air Show; Websense Acquisition Spurs Push
Posted on
PARIS AIR SHOW: A cyber ad? Hey, it’s an air show, Raytheon. Of course, there’s no law against selling anything at an air show, but defense companies traditionally do sell planes, sensors, avionics, support equipment, et al. So when I spotted the big ad placed where about half of show attendees have to pass on their… Keep reading →
Strike Back At Chinese For OPM Hack; Build A Cyber Strategy
Posted on
Chinese government-backed hackers continue to penetrate and steal information from large US personnel data repositories. Our government gnashes its teeth and may issue a statement. These attacks are not about grabbing credit cards or frequent flyer miles, creating mayhem with political messaging, or pure mischief. These infiltrations by the Chinese are all about an industrial scale preparation… Keep reading →
Mabus Sticks With UCLASS Approach (& Unisex Uniforms); Hill Says, Not Enough
Posted on
[UPDATED with Congressional reaction] ROSLYN, VA: Ray Mabus likes robots. The Navy Secretary has declared the F-35 will be “the last manned strike fighter” the service ever buys and invested heavily in unmanned aircraft, boats, and submersibles. But Mabus has frustrated drone advocates on one major program: the Unmanned Carrier-Launched Surveillance and Strike (UCLASS) aircraft. This morning, Mabus defended… Keep reading →
Nukes Or Conventional Weapons? Buy The Ones We Use
Posted on
As the House and Senate gear up for votes in the coming days to fund the Defense Department, lawmakers are set to support a bow wave of costly nuclear weapons programs increasingly at odds with the needs of U.S. troops and the future threats that dominate their agenda. Notably for a president who famously championed… Keep reading →
Navy, Marine Cyber Fought Off All Net Attackers Since 2013
Posted on
PENTAGON: When Iran hacked the Navy-Marine Corps Intranet in fall 2013, it shook up the sea services’ approach to cybersecurity. Thanks to that new vigilance, their networks have fended off every subsequent attack, the head of Navy Cyber Command said today. That doesn’t mean no one breached any portion of any Navy or Marine Corps… Keep reading →
Navy Rolls Out CYBERSAFE: ‘Our Operational Network Is Under Fire’
Posted on
A high-level cybersecurity task force will present its plan to the Chief of Naval Operations sometime tomorrow. Called CYBERSAFE (one word, all caps), the initiative is intended to overhaul information technology in the comprehensive way the SUBSAFE instruction overhauled all submarine safety after the USS Thresher disaster. Fixing up IT procurement, though, is just one step towards a larger… Keep reading →