Can DoD Develop Effective Cyber Deterrents?

While the Pentagon’s 2015 Cyber Strategy emphasizes the importance of effective cyber deterrence, the U.S. has yet to develop a clear deterrent policy that would raise the stakes for adversaries and dissuade them from considering on how it will respond to cyber attacks on critical national infrastructure.

Read More

What’s New

Navy to Re-Compete NGEN Piece by Piece

The Navy’s and Marine Corps’ enterprise IT program is preparing for a major generational update by planning to break down NGEN – its next-generation information technology program – into smaller pieces. By using a multi-phased acquisition approach, the NGEN-Recompete (NGEN-R) program aims to add choice and cut costs.

What We’re Reading

One of Air Force’s Most Important Unclassified Systems is Now in the Oracle Cloud

One of the U.S. Air Force’s most important online portals is now running in the cloud.

MyPers, the Air Force’s personnel portal for 1.7 million active duty and retired airmen, civilian and reservists, began operating in July out of an Oracle-managed off-premise cloud specifically designed and secured to handle some of the Defense Department’s most sensitive unclassified workloads.

Electronic Threats from Above

Adversarial capabilities writ large have significantly improved vis-à-vis the United States (hence the necessity of the Defense Department’s so-called third offset strategy). One of these areas causing concern is that of the electromagnetic spectrum (EMS).

Census Announces Test Plans for 2017, 2018

The Census Bureau will forge ahead with its plans to tally and mark addresses in fiscal 2017 and with its 2018 tests to ensure that new technologies and methodologies are ready for the decennial census in 2020.

The NSA Chief Has A Phone For Top-Secret Messaging. Here’s How It Works

There’s no such thing as a perfectly secure phone, especially if it also connects to the internet. But leaving your phone on the plane every time you visit a hostile foreign country isn’t an option for everyone, and so a handful of top military commanders now have a device that can send and receive Secret and Top Secret messages. No surprise: it doesn’t work quite like the one in your pocket.

Army Releases New Cyber, EW Field Manual

The Army is getting up-to-date on cyber and electromagnetic activity policies, finally releasing the long-anticipated updated field manual for cyber and EW functions. The document, titled FM 3-12 “Cyberspace and Electronic Warfare Operations,” and dated for mid-April, though publicly released within the last week, replaces FM 3-38, which provided the initial guidance back in 2014.

DISA’s Plan to Replace CAC to Come Together This Year

When former Defense Department Chief Information Officer Terry Halvorsen talked about moving on from the Common Access Card (CAC) as the main approach to network authentication, many observers scoffed at the idea.

Halvorsen, who recently joined Samsung as an executive vice president focusing on mobile enterprise strategies and helping to navigate government and regulatory business affairs, envisioned and set as a goal last June for the next authentication technology to be more agile and less costly.