A nonprofit group tallied 2,310 conflicts of interest stemming from President Trump’s unprecedented decision to retain a stake in his business properties since he took office in 2017.
Citizens for Responsibility and Ethics in Washington released a report Thursday that calculated the number of times the president visited his properties at taxpayers’ expense (362), the number of foreign government officials (110) and U.S. officials (250) who have visited Trump properties and the number of political events (63) held at his properties.
U.S. Air Force researchers are wrapping-up a project, begun in 2015, that asks industry for new ways of using embedded computing and sensors to improve military networking.
The idea is to provide an infrastructure that can extend to all levels of the battlespace involving legacy, current, and next-generation communications technologies to improve communications network resiliency problems.
Pooling best practices from across the company’s weapons programs, the effort includes a growing database with hundreds of requirements and metrics for assessing them, a step-by-step how-to guide for Lockheed cyber staff, and a trademarked Cyber Resiliency Level framework to sum it all up.
The 2016 National Defense Authorization Act required that all weapons begin to be assessed for cyber vulnerabilities, and the 2019 bill kept pressing the effort ahead. Breaking D readers know that Raytheon won contracts to ensure cyber safety for the F-15 and C-130 fleets.
But implementing new cybersecurity standards is just the beginning of a much more complex process, Lockheed execs argue, a process in which their deep knowledge of specific weapons systems is vital.
U.S. Air Force researchers are asking for industry’s help in developing seamless, adaptive, and self-healing airborne networks to enable manned and unmanned aircraft to connect and disseminate important information.
Today’s aerial layer networks limit combat effectiveness, especially in highly contested, operationally limited (CDO), and significantly congested environments in which communications can be considerably degraded.
The U.S. Indo-Pacific Command is incorporating new cyber technologies and standards as it strives for greater interoperability among a growing number of allies and potential partners. This increased reliance on cyber is viewed by command leadership as essential for maintaining effective military capabilities in the face of a growing kinetic and cyber presence by diverse adversaries.
Readiness is the top priority for command’s J-6. This applies to command, control, communications and computers (C4) capabilities, capacities and resiliency as well as cybersecurity. Brig. Gen. Paul Fredenburgh III, USA, the outgoing director for command, control, communications and cyber, J-6, U.S. Indo-Pacific Command (INDOPACOM), emphasizes that the command must be ready to respond fully to any crisis that erupts.
“It’s the evolving tactics, techniques and procedures of zero-day exploits that we really are concerned about,” he says.
The U.S. Cyber Command has released a list of 39 challenge problems fitting under 12 categories: vulnerabilities, malware, analytics, implant, situational awareness, capability development, persona, hunt, mission management, attack, security and blockchain.
The document was released by the Cyber Command deputy director for technology, Berl “Mike” Thomas.
“These Technical Challenge Problems are not requirements for which we anticipate solutions exist today. Rather, they are significant challenges which will require developers to use existing capabilities in novel ways, add new features, innovate, or drive new research,” the document says.
The Integrated Tactical Network is the name of the Army’s envisioned future network, and integration is the name of the game for one of the service’s premier research and development centers.
The mission for the newly named Command, Control, Communications, Computers, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) Center remains largely the same, but seamless integration of those eight closely related technology areas is now a primary focus, according to Michael Monteleone, who directs the C5ISR Center’s Space and Terrestrial Communications Directorate.
“The biggest change right now is that we are incredibly focused on the integrated capabilities across the traditional functional areas and really looking at multidomain operations,” Monteleone offers.
For the vast majority of us, broadband has become so commonplace in our professional, personal, and social lives that we rarely think about how much we depend on it. Yet without broadband, our lives would be radically upended: Our work days would look different, we would spend our leisure time differently, and even our personal relationships would exist differently.
But if broadband is an essential part of daily American life in the 21st century, how can we be comfortable with the fact that over 19 million households do not have a mobile or in-home subscription?
The Chinese telecommunications giant Huawei is central to the construction of new fifth-generation (5G) mobile networks around the world, yet its global influence has led the United States to raise concerns about whether the Chinese government could use the company to spy, or to sabotage critical infrastructure.
Washington has led a crackdown on Huawei by enforcing nationwide bans on the company’s equipment and encouraging its allies to do the same.
Some experts warn that tensions between Washington and Beijing over technology could lead to a “digital iron curtain,” which would result in governments having to decide between doing business with the United States or China.