Category Archives: Cybersecurity

Final Report of the Defense Science Board (DSB) Task Force on Cyber Supply Chain

Attached is the final report of the Defense Science Board Task Force on Cyber Supply Chain. The task force assessed the organization, missions, and authorities that encompass the use of microelectronics and components in Department of Defense (DoD) weapons systems. Continue reading

Final Rule re: “Department of Defense (DoD)’s Defense Industrial Base Cybersecurity Activities”

“This final rule responds to public comments to the interim final rule published on October 2, 2015. This rule implements statutory requirements for DoD contractors and subcontractors to report cyber incidents that result in an actual or potentially adverse effect on a covered contractor information system or covered defense information residing therein, or on a contractor’s ability to provide operationally critical support….”

More at federalregister.gov

Chinese man to serve U.S. prison term for military hacking

A Chinese businessman who pleaded guilty in March to conspiring to hack into the computer networks of Boeing (BA.N) and other major U.S. defense contractors was sentenced on Wednesday to nearly four years in prison, prosecutors said. …

More at Reuters

NDIA’s 7th Trusted Microelectronics Workshop will feature Ms. Kristen Baldwin, Dr. Bill Chappell, and Dr. Robert Latiff (Maj Gen, USAF, Ret.)

NDIA is pleased to announce that our seventh Trusted Microelectronics Workshop has now been expanded to two days, with the second day focused on Technology Based Solutions for Trusted Microelectronics.

Ms. Kristen Baldwin, Acting Deputy Assistant Secretary of Defense for Systems Engineering, will keynote Day 1 of our workshop with a presentation on OSD’s current and future security framework to ensure our defense systems have access to trusted technology components.

Dr. Bill Chappell, Director, DARPA Microelectronics Technology Office will keynote Day 2 with an introduction to the work being done at DARPA to explore technology based Trust solutions.

Presentations by DARPA MTO program managers and IARPA’s Dr. Carl McCants will follow Dr. Chappell’s talk on Day 2.

Dr. Robert Latiff (Maj Gen, USAF, Ret) will provide observations from the Air Force Science Board study, “Optimizing the Air Force Acquisition Strategy of Secure and Reliable Electronic Components”.

More at NDIA

NDIA’s seventh Trusted Microelectronics Workshop

NDIA is pleased to offer our seventh workshop designed to identify ways in which Trusted Microelectronics can contribute to greater systems security and information assurance. In this event we plan to continue the dialogue between government and industry on the challenges for comprehensive supply chain security management and program protection at the microelectronics level. With participation from both government and industry, our workshops have provided an effective forum for direct discussions of the challenges faced by policy makers, program managers, systems developers, and supply chain managers.

More at NDIA

What’s Really Inside? – Semiconductor Engineering

Concern is growing that devices of all types, including military hardware, may contain extra circuits or malicious code.

via Semiconductor Engineering .:. What’s Really Inside?.

Defense.gov News Article: Carter Unveils New DoD Cyber Strategy in Silicon Valley

Defense Secretary Ash Carter today unveiled the Defense Department’s second cyber strategy to guide the development of DoD’s cyber forces and to strengthen its cyber defenses and its posture on cyber deterrence.

via Defense.gov News Article: Carter Unveils New DoD Cyber Strategy in Silicon Valley.

DoD preparing to release new cyber strategy — C4ISR&Networks

Officials at the Defense Department in the coming days will release a new cyber strategy that “will guide DoD’s activities in cyberspace in defense and support of U.S. national interests,” according to one official.

More at C4ISR&Networks.

In the cyber domain, US ready to take offense — Defense Systems

Is the U.S. ready to go on offense in the cyber domain? It is certainly taking incremental steps in that direction. Exclusively focusing on defensive measures will not deter malicious behavior such as theft of intellectual property or manipulation of data, Adm. Michael Rogers, commander of U.S. Cyber Command and the director of the National Security Agency, said at the AFCEA Cybersecurity Technology Summit in Washington today. According to Rogers, the United States right now is reacting rather than acting.

More at Defense Systems.

How to protect the IT supply chain from cyber attacks | Information Age

There is no doubt that the global IT security threat landscape has evolved over the last decade, with governments and big businesses increasingly becoming the targets of cyber attackers. … The problem is that any IT product can include tainted or counterfeit components, which may include vulnerabilities that can leave them wide-open for cyber attacks.  ... What is needed is a way of identifying trusted providers, component suppliers (hardware and software), integrators and resellers, so that customers know who is following the best practices and with whom they should partner. …”

More at Information Age.