ASMC The Business of Defense

  • Of the 300 troops authorized by President Barack Obama, 180 have arrived in Baghdad. Half are advisors and the remaining 90 are setting up an operations and intelligence analysis unit. The Pentagon confirms that Predator drones, armed with Hellfire missiles, are now also being used over the capitol for force protection.

    June 30, 2014
  • The Defense Department's request for its overseas contingency operations is about $20 billion less than initial estimates. Former Defense officials say realistic goals and managed expectations usually spelled success for weapons systems.

    June 30, 2014
  • Nothing has changed about getting face-to-face if you want to have success. What has changed the most is the demand for ROI by clients from their federal advertising.

    June 27, 2014
  • Join host Michael Keegan this week for The Business of Government Magazine -- A SPECIAL EDITION of The Business of Government Hour. Government executives must also avoid the tyranny of the present or the next budget cycle, and recognize that the challenges of today often morph into the hazards of tomorrow. This edition of The Business of Government magazine underscores the importance of correlating short-term decision-making with long-range consequences. We highlight the latest trends and best practices for improving government effectiveness by introducing you to key government executives, detailing the work of public management practitioners, and offering insights from leading academics.

    June 27, 2014
  • The White House has submitted an updated Fiscal Year (FY) 2015 Overseas Contingency Operations (OCO) request to Congress. DoD OCO funding allotted is $58.6 billion and it includes $1.4 billion for State Department programming. President Barack Obama says the request is consistent with the plan he laid out at West Point. The plan called for bringing the U.S. war in Afghanistan to a responsible end, while ensuring our Armed Forces have the flexibility and resources required to respond to emerging needs as terrorist threats around the world continue to evolve.

    June 27, 2014
  • The Science and Technology Directorate issued a Broad Agency Announcement and four specific solicitations to get industry, academia and others thinking about how to improve cybersecurity. Over the next nine months, the agency will review white papers, proposals and make awards, with expectations of the development of commercial or open source projects in the next year or two.

    June 27, 2014
  • The latest guide to mobile forensics from the National Institute of Standards and Technology adds hundreds of new tools for investigators to find and collect information from a mobile device. The additions come seven years after NIST first published its Guidelines on Mobile Device Forensics. To give some context, that guide came out BEFORE Apple released the first iPhone. The guide includes as many ways to keep a phone running when it has low battery to save as much data as possible. NIST plans to publish the final version later this year.

    June 26, 2014
  • Nigerian police shot and killed a suspect yesterday after an attack on a busy shopping plaza approximately four miles from the US Embassy in Abuja. One witness told the Associated Press a bomb was dropped at the entrance to the mall by a motorcyclist. The attack happened during the Nigeria/Argentina World Cup match. This is the second time in a week that an attack thought the be launched by the terror group Boko Haram has taken place during a World Cup match.

    June 26, 2014
  • Ninety of the 300 U.S. military advisers and special operations forces going to Iraq are in Baghdad. The Pentagon says they will begin to do three things: assess the strength of Iraqi forces, gauge the skill of The Islamic State of Iraq and the Levant, and determine if it's viable to send more US advisory teams to Iraq.

    June 25, 2014
  • The Continuous Diagnostics and Mitigation (CDM) program was created to provide agencies visibility into their networks to identify any cyber flaws and remediate them in a swift and streamlined approach. Though many agencies have already implemented a number of security tools, they still may lack a method for aggregating and analyzing the collective data for a holistic picture of their security posture. The CDM initiative is aimed at getting all civilian agencies the proper tools to improve vulnerability management, manage hardware and software assets, and ensure the proper security configurations are in place.

    June 25, 2014