Trusted Microelectronics Workshop Proceedings — NDIA

Proceedings for the 26 February Trusted Microelectronics Workshop are available on the National Defense Industry Association website.

“Hardware Assurance for the Lifecycle: The Benefits of Trusted Microelectronics”.

DoD preparing to release new cyber strategy — C4ISR&Networks

Officials at the Defense Department in the coming days will release a new cyber strategy that “will guide DoD’s activities in cyberspace in defense and support of U.S. national interests,” according to one official.

More at C4ISR&Networks.

FAR / DFAR Case Update (10 Apr 2015)

Status updates from the ‘Open Cases Reports’ …

Continue reading

New DFARS Case re ‘Trusted Suppliers for Electronic Parts’

DFARS Case 2015-D020: DoD Use of Trusted Suppliers for Electronic Parts

Synopsis: Further implements section 818(c)(3) of the NDAA for FY 2012 (Pub. L. 112-81), as amended by section 817 of the NDAA for FY 2015 (Pub. L. 113-291), with focus on the requirement that DoD shall obtain electronic parts from trusted suppliers, and establish qualification requirements pursuant to which DoD may identify trusted suppliers in accordance with paragraph (c)(3)(C) of section 818.

Status: 03/13/2015 DARC Director tasked Ad Hoc Cmte. to draft proposed DFARS rule. Status Report due 04/29/2015.

FAR / DFAR Case Update (6 Apr 2015)

Status updates from the ‘Open Cases Reports’ …

Continue reading

In the cyber domain, US ready to take offense — Defense Systems

Is the U.S. ready to go on offense in the cyber domain? It is certainly taking incremental steps in that direction. Exclusively focusing on defensive measures will not deter malicious behavior such as theft of intellectual property or manipulation of data, Adm. Michael Rogers, commander of U.S. Cyber Command and the director of the National Security Agency, said at the AFCEA Cybersecurity Technology Summit in Washington today. According to Rogers, the United States right now is reacting rather than acting.

More at Defense Systems.

How to protect the IT supply chain from cyber attacks | Information Age

There is no doubt that the global IT security threat landscape has evolved over the last decade, with governments and big businesses increasingly becoming the targets of cyber attackers. … The problem is that any IT product can include tainted or counterfeit components, which may include vulnerabilities that can leave them wide-open for cyber attacks.  ... What is needed is a way of identifying trusted providers, component suppliers (hardware and software), integrators and resellers, so that customers know who is following the best practices and with whom they should partner. …”

More at Information Age.

And More on The Role of Traceability and Inspections, Tests and Other Methods in Counterfeit Electronic Part Avoidance (Part 3)

A reader of this blog approached me with an excellent question about my 24 March post More On The Role Of Traceability And Inspections, Tests And Other Methods In Counterfeit Electronic Part Avoidance. In this post, I stated that an organization could “(c) apply inspections, tests and other methods designed to intercept and avoid the use of counterfeits when unable to confirm traceability to the OCM or the OCM’s authorized distributors.” The reader, however, cannot find support for that contingency in DFARS 252.246-7007. I wish to share my response ….

Continue reading

U.S. Joint Chiefs drafting military cyber standards | Reuters

The chief U.S. weapons tester said on Tuesday he was working with the Joint Chiefs of Staff to draft military requirements to address widespread cyber vulnerabilities in nearly every arms program and military command. …

Moe at Reuters.

San Francisco Man And Company Indicted For Smuggling Sophisticated Electrical Components To Russian Federation | USAO-NDCA | Department of Justice

“… Many of the components alleged to have been wrongly smuggled into Russia were controlled dual-use programmable computer chips capable of operating in austere environments making them useful in both civilian and military applications. …”

More at Department of Justice.

Follow

Get every new post delivered to your Inbox.

Join 201 other followers