The Pentagon’s Bug Bounty Program Should Be Expanded to Bases, DOD Official Says

The Pentagon’s Bug Bounty Program Should Be Expanded to Bases, DOD Official Says

Survey: Many agencies suffer frequent insider hacking attempts

Related Articles

GDIT Recruitment 600×300
Tom Temin 250×250
GM 250×250
GEMG 250×250

Upcoming Events

GDIT Recruitment 250×250
USNI News: 250×250
gdit cloud 250×250
The NSA Chief Has A Phone For Top-Secret Messaging. Here’s How It Works

The NSA Chief Has A Phone For Top-Secret Messaging. Here’s How It Works

There’s no such thing as a perfectly secure phone, especially if it also connects to the internet. But leaving your phone on the plane every time you visit a hostile foreign country isn’t an option for everyone, and so a handful of top military commanders now have a device that can send and receive Secret and Top Secret messages. No surprise: it doesn’t work quite like the one in your pocket.

Developed by Boeing and the Defense Information Systems Agency, the Boeing Black phone has a dual-SIM card that “enables users to switch between government and commercial networks. Boeing Black integrates seamlessly into customer mobile device management systems and virtual private networks,” according to the product data sheet.

Related Articles

GDIT Recruitment 600×300
Tom Temin 250×250
GM 250×250
GEMG 250×250

Upcoming Events

GDIT Recruitment 250×250
USNI News: 250×250
gdit cloud 250×250
There’s a Big Loophole in the Pentagon’s Guide to Eavesdropping

There’s a Big Loophole in the Pentagon’s Guide to Eavesdropping

A privacy update to 1982 Defense Department rules for conducting surveillance on Americans contains a loophole that lets the National Security Agency continue eavesdropping on a wide swath of online conversations, critics say.

DOD Manual 5240.01: Procedures Governing the Conduct of DOD Intelligence Activities” was last issued when all email addresses could fit in a Parent Teacher Association-sized directory.

Related Articles

GDIT Recruitment 600×300
Tom Temin 250×250
GM 250×250
GEMG 250×250

Upcoming Events

GDIT Recruitment 250×250
USNI News: 250×250
gdit cloud 250×250
U.S. Homeland Security’s $6B Firewall Has More Than a Few Frightening Blind Spots

U.S. Homeland Security’s $6B Firewall Has More Than a Few Frightening Blind Spots

A recent audit revealed the National Cybersecurity Protection System—aka EINSTEIN—does not scan for 94 percent of common computer vulnerabilities. But that’s not all of its shortcomings.

A firewall run by the Department of Homeland Security meant to detect and prevent nation-state hacks against the government functions ineffectively, according to a sanitized version of a secret federal audit.

Related Articles

GDIT Recruitment 600×300
Tom Temin 250×250
GM 250×250
GEMG 250×250

Upcoming Events

GDIT Recruitment 250×250
USNI News: 250×250
gdit cloud 250×250
The Intelligence Community Must Remove Barriers to Minority Recruitment

The Intelligence Community Must Remove Barriers to Minority Recruitment

To properly understand a wide world of actors and adversaries, the U.S. intelligence community needs a diverse workforce. The good news is that the IC understands this; the bad news is it’s still largely white and male. It’s time to pay more attention to the various barriers that keep members of some key demographics from joining up.

According to the current human capital strategic plan from the Office of the Director of National Intelligence (ODNI), the employees of the 17 agencies that make up the U.S. intelligence community are predominantly white (76.6 percent) and male (61.6 percent). For reference, the U.S. population is currently 65.1 percent white and 49.3 percent male.

Related Articles

GDIT Recruitment 600×300
Tom Temin 250×250
GM 250×250
GEMG 250×250

Upcoming Events

GDIT Recruitment 250×250
USNI News: 250×250
gdit cloud 250×250