Gen. Keith Alexander has outlined a series of next steps to be pursued by the six-month-old U.S. Cyber Command.
The Department of Veterans Affairs, which processed a record one million claims in 2010, is still seeing claims come in faster than it can process them and expects even more new filings in 2011. Despite that, VA hopes to eliminate its backlog of claims by 2015.
The idea is to treat cyberspace as a domain within DoD and employ active cyber defenses and other new defense approaches.
Language, protocol and cultural barriers can still get in the way of disaster relief even if the countries are allies. Col. Dino Pick, Commandant for the Defense Language Institute, tells us about his unit\'s efforts to overcome that.
The Marine Corps is going green to save lives rather than to save the planet.
The Department of Defense is working with private developers to create a system that automatically detects and prevent network intrusions.
Just when it looked like federal workers have hit rock bottom, it turns out that two big chunks of the government family may be in for some good news. Senior Correspondent Mike Causey says there may be pay raises for some postal workers and the return of the COLA for retirees.
Al Qaida in Iraq has claimed responsibility for last week\'s car bomb attack on an Iraqi army unit that killed at least eight soldiers The bomb targeted an army headquarters in the northern area of Diyala province. 30 others were wounded when it exploded last Monday. Security forces stopped a second attack and defused a car bomb parked at the scene. The attacks in Iraq are a daily occurrence as insurgence continue to attack Iraqi forces knowing that U.S. troops are leaving Iraq totally at the end of this year.
It doesn\'t necessarily take a disaster or cyber attack to knock out a terrestrial communications network—a simple construction error or backhoe cut can do it. A diverse-path, satellite backup solution to a primary landline network is essential to ensure Continuity-of-Operations, or COOP, to keep defense networks running, no matter the situation. National Programs must have a COOP back-up for broadband connections with inherent security functions to protect voice, video, and data transmissions. Hughes defense solutions meet U.S. TRANSEC and FIPS 140-2 Security Level 2 standards for secure, global connectivity wherever your mission may take you. Hughes has the technologies and experience to deliver the right COOP solutions on time and on budget.
The U.S. military is increasingly deploying airborne video surveillance applications to aid in a variety of operations, such as natural disaster assessment, homeland defense and protection, as well as military intelligence, surveillance and reconnaissance missions. Only satellite networks can provide unconstrained coverage over land and water, enabling critical information to be shared in real-time with command and control locations. Whether your mission is to secure our country\'s borders, operate UAV networks, or provide situational awareness beyond-the-line-of-sight, Hughes has the scalable airborne solution to meet your requirements, anywhere in the world. Hughes commercial Airborne Broadband Solutions are interoperable, can work seamlessly within your current operational network, and fit into your tightly constrained budget. Hughes solutions are ideal for both fixed wing and rotary aircraft.
Only satellite can support real-time communications everywhere in the field - whether in the air, on the ground, or at sea. Hughes provides advanced communications-on-the-move solutions with global coverage. Their solutions meet U.S. government security requirements, including FIPS and TRANSEC, and operate on multiple bands and waveforms. Hughes products comply with open, commercial standards enabling easy integration with existing systems. Their team of highly-skilled and cleared engineers stands ready to work with you to meet your mission requirements.
March 23rd, 2011 at 11 AM Criminal enterprises operating globally - so-called \"Transnational Criminal Organizations\" -- have spent years refining their approaches to all types of illicit trafficking including narcotics, weapons, illicitly gained and laundered money, and even modern day slavery. In many ways, these organizations can be considered multi-national corporations, given their size, reach, and sophistication. Indeed, their production and logistics operations rival best practices in the commercial sector, with highly resilient supply chains driven by the need to minimize the risk of seizure. TCOs often directly and indirectly enable, support, and facilitate insurgencies and terrorism; undermine state stability, security, and sovereignty; and corrupt legitimate global financial and trade networks. The stakes are high. U.S. Law Enforcement, Homeland Security, and the Department of Defense (DoD) find themselves at the front lines of this global security issue. As criminal organizations adapt to traditional interdiction methodologies, stakeholders across government are coming together to stem the tide, looking at what new technologies and whole of government approaches can be brought to bear to address this complex threat.
The international military intervention in Libya is likely to last \"awhile,\" a top French official said Monday, echoing Moammar Gadhafi\'s warning of a long war ahead as rebels said they were fighting to reclaim a city under the Libyan leader\'s control. We get an update from the AP\'s Sagar Meghani.
The bullet that killed President Lincoln is one of many cool items on the move at the National Museum of Health and Medicine. NMHM\'s Tim Clarke gives us an update.
Cyber Command gave no reason for the turnabout in policy.