Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
The House passed its version of the annual defense authorization bill Thursday, while the Senate's is still a work in progress. Both versions mostly shun DoD's proposals to cut costs during sequestration.
According to an internal Air Force review obtained by The Associated Press, armed security forces at a nuclear missile base failed a drill last summer that simulated the hostile takeover of a missile launch silo because they were unable to speedily regain control of the captured nuclear weapon. The AP's Robert Burns writes, "the previously unreported failure, which the Air Force called a `critical deficiency,' was the reason the 341st Missile Wing at Malmstrom Air Force Base in Montana flunked its broader safety and security inspection."
The Cyber Grand Challenge, set to launch for the first time two weeks from now, aims to encourage the development of computing systems that can seek out cybersecurity weaknesses better than humans can.
Appointment is a promotion for Dave Tillotson, who until now has served as the Air Force's deputy chief management officer.
The Missile Defense Agency, the U.S. Navy, and sailors at the Aegis Ashore Missile Defense Test Complex and Pacific Missile Range Facility (PMRF) successfully conducted the first flight test involving components of the Aegis Ashore system. During the test, a simulated ballistic missile target was acquired, tracked, and engaged by the Aegis Weapon System. The primary purpose of the test was to confirm the functionality of Aegis Ashore by launching a land-based SM-3.
A government report indicates more than 40 Pentagon weapons programs and nearly 30 other defense technologies have been compromised by cyber intrusions from China. The cybersecurity firm Mandiant issued a report last year alleging links between a secret Chinese military unit and years of cyber-attacks against U.S. companies. Alcoa World Alumina, Westinghouse Electric Co., Allegheny Technologies, U.S. Steel Corp., the United Steelworkers Union and Solar-World are just six companies the Justice Department says were victims of Chinese hacking. U.S. officials suggest there are many more amounting to billions of dollars in economic losses.
The Pentagon says Russia is not withdrawing its troops from the Ukraine border, despite Moscow's claim that the order to pull out has been given. Rear Adm. John Kirby says small numbers of Russian troops have gone back and forth to forward operating bases near the border, but the U.S. has seen no movement of Russian troops back to their home bases. NATO says Russia has 40,000 troops along the border.
A proposed amendment to the House version of the annual bill setting policy for the Defense Department would preemptively protect DoD employees paid through working-capital funds from potential furloughs. The measure was introduced Monday by Reps. Tom Cole (R-Okla.) and Derek Kilmer (D-Wash.).
Harry Hallock, the deputy assistant secretary of the Army for procurement, is Jared Serbu's guest for the full hour in this edition of On DoD.
It's been 23 years since the Tailhook scandal rocked the Navy, and the Pentagon is still struggling to eliminate sexual assaults from the military. The number of reported cases is on the rise, but is counting cases alone solving the problem?
Across the federal government, the officials who run hotline programs in agency inspector general offices say they're finding ways to cut their backlogs of incoming cases and get vital information into the hands of investigators more quickly. In part, it's because those officials are communicating with one another like never before.
The White House is threatening a veto of the House version of a $601 billion defense bill over election-year moves to spare weapons systems and popular programs in the face of limited budgets.
The Pentagon has revealed the U.S. military fired or disciplined nearly 500 workers for sexual harassment. In a 12-month period, and nearly 13 percent of the complaints filed involved repeat offenders. The report on May 15th was the first such report on sexual harassment. It says there were 1,366 reports in the last year.
Inside the DoD's Reporter's Notebook is biweekly feature focused on news about the Defense Department and defense community as gathered by Federal News Radio DoD Reporter Jared Serbu. Submit your ideas, suggestions and news tips to Jared via email.
A group of retired military officers is urging the Pentagon to beef up plans for dealing with the impact of climate change. The advice comes in the form of a 68-page report published yesterday by the CNA Corporation. It says the risk has accelerated and that climate change is a catalyst for conflict. Rear Adm. Dave Titley (Ret.) is a member of the CNA Corporation Military Advisory Board and a former Navy Oceanographer and Navigator. He told Tom Temin and Emily Kopp on the Federal Drive what CNA is recommending to current military leaders.
The Pentagon has issued a final rule for dealing with counterfeit parts. Officials believe too many of them make their way into crucial electronic systems, threatening their reliability or compromising their security. The rule has been a long time coming. It affects both government buyers and industry suppliers. Joe Petrillo, a procurement attorney with the law firm Petrillo & Powell, spoke about some of the main aspects of the rule with Tom Temin and Emily Kopp on the Federal Drive.
The Air Force thinks it's in a unique position with regard to the military's difficult migration into a shared IT infrastructure. It just went through the same exercise internally and believes those lessons can shape the Defense Department's Joint Information Environment.
The Pentagon says almost 300 Marines have been moved to a naval air station in Sicily in response to the growing unrest in Africa. There is trouble in Sudan, the Central African Republic, Libya and Nigeria. The U.S. is using surveillance drones in the search for the kidnapped Nigerian girls. Officials say at least one Global Hawk surveillance drone is in use, in addition to manned MC-12 aircraft.
Terry Halvorsen, who has served as the Navy Department's chief information officer since 2010, will become the acting DoD CIO next week.
The Pentagon is using drones to help search in northeastern Nigeria for school girls kidnapped by the terror group Boko Haram, although they will not call them drones. Pentagon spokesman Colonel Steve Warren explains, "as a general rule we don't discuss our use of unmanned aircraft." He indicates there are security concerns, continuing, "there are sensitivities surrounding where they are based out of." Warren says they are being used to collect intelligence and conduct surveillance.