Defense.gov News Article: Carter Unveils New DoD Cyber Strategy in Silicon Valley

Defense Secretary Ash Carter today unveiled the Defense Department’s second cyber strategy to guide the development of DoD’s cyber forces and to strengthen its cyber defenses and its posture on cyber deterrence.

via Defense.gov News Article: Carter Unveils New DoD Cyber Strategy in Silicon Valley.

FAR / DFAR Case Update (20 Apr 2015)

Status updates from the ‘Open Cases Reports’ …

Continue reading

Trusted Microelectronics Workshop Proceedings — NDIA

Proceedings for the 26 February Trusted Microelectronics Workshop are available on the National Defense Industry Association website.

“Hardware Assurance for the Lifecycle: The Benefits of Trusted Microelectronics”.

DoD preparing to release new cyber strategy — C4ISR&Networks

Officials at the Defense Department in the coming days will release a new cyber strategy that “will guide DoD’s activities in cyberspace in defense and support of U.S. national interests,” according to one official.

More at C4ISR&Networks.

FAR / DFAR Case Update (10 Apr 2015)

Status updates from the ‘Open Cases Reports’ …

Continue reading

New DFARS Case re ‘Trusted Suppliers for Electronic Parts’

DFARS Case 2015-D020: DoD Use of Trusted Suppliers for Electronic Parts

Synopsis: Further implements section 818(c)(3) of the NDAA for FY 2012 (Pub. L. 112-81), as amended by section 817 of the NDAA for FY 2015 (Pub. L. 113-291), with focus on the requirement that DoD shall obtain electronic parts from trusted suppliers, and establish qualification requirements pursuant to which DoD may identify trusted suppliers in accordance with paragraph (c)(3)(C) of section 818.

Status: 03/13/2015 DARC Director tasked Ad Hoc Cmte. to draft proposed DFARS rule. Status Report due 04/29/2015.

FAR / DFAR Case Update (6 Apr 2015)

Status updates from the ‘Open Cases Reports’ …

Continue reading

In the cyber domain, US ready to take offense — Defense Systems

Is the U.S. ready to go on offense in the cyber domain? It is certainly taking incremental steps in that direction. Exclusively focusing on defensive measures will not deter malicious behavior such as theft of intellectual property or manipulation of data, Adm. Michael Rogers, commander of U.S. Cyber Command and the director of the National Security Agency, said at the AFCEA Cybersecurity Technology Summit in Washington today. According to Rogers, the United States right now is reacting rather than acting.

More at Defense Systems.

How to protect the IT supply chain from cyber attacks | Information Age

There is no doubt that the global IT security threat landscape has evolved over the last decade, with governments and big businesses increasingly becoming the targets of cyber attackers. … The problem is that any IT product can include tainted or counterfeit components, which may include vulnerabilities that can leave them wide-open for cyber attacks.  ... What is needed is a way of identifying trusted providers, component suppliers (hardware and software), integrators and resellers, so that customers know who is following the best practices and with whom they should partner. …”

More at Information Age.

And More on The Role of Traceability and Inspections, Tests and Other Methods in Counterfeit Electronic Part Avoidance (Part 3)

A reader of this blog approached me with an excellent question about my 24 March post More On The Role Of Traceability And Inspections, Tests And Other Methods In Counterfeit Electronic Part Avoidance. In this post, I stated that an organization could “(c) apply inspections, tests and other methods designed to intercept and avoid the use of counterfeits when unable to confirm traceability to the OCM or the OCM’s authorized distributors.” The reader, however, cannot find support for that contingency in DFARS 252.246-7007. I wish to share my response ….

Continue reading

Follow

Get every new post delivered to your Inbox.

Join 201 other followers