• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

CYBER, EW, CLOUD AND HOMELAND SECURITY UPDATE

September 16, 2016 by

14 Sep 16. Palantir Claims Army Misled To Keep It Out of DCGS-A Program. Palantir Technologies has mapped out in a motion filed with the US Court of Federal Claims what it believes are the Army’s repeated, biased attempts to block the company from working with the service to test and integrate its technology into the force’s intelligence analysis framework. Palantir sued the Army in July for issuing what it says is an unlawful procurement solicitation for the service’s next iteration of its internally developed intelligence software suite — the Distributed Common Ground System-Army (DCGS-A) — that shuts the company’s commercial offering out of the competition. The Palo Alto-based company has argued the way the Army wrote its requirements in a request for proposals to industry would shut out Silicon Valley companies that provide commercially available products. The company contended that the Army’s plan to award just one contract to a lead systems integrator means commercially available solutions would have to be excluded. (Source: glstrade.com/Defense News)

12 Sep 16. Leak Spotlights NSA’s Conflicting Missions. A top National Security Agency official revealed this month that the agency’s staff had rushed to the scene of virtually every major hack of a government computer network in the past two years.
Curtis W. Dukes, director of information assurance at the NSA, was trying to emphasize the Fort Meade-based spy outfit’s lesser-known but growing role of helping to protect the nation’s sensitive data.
But while Dukes was speaking to reporters in Washington, the cyber world was poring over a leaked cache of what appeared to be tools developed by the NSA for its more controversial activity: surveilling, spying and hacking.
The disclosure of the files — the NSA hasn’t confirmed that they’re authentic, but researchers and former NSA employees say they seem to be — underscored once again the tension between the two sides of NSA’s dual mission: breaking into computer networks overseas in search of useful intelligence about foreign governments and terrorists and helping protect America’s networks against foreign spies and other hackers.
Dukes, talking to reporters on the sidelines of an NSA conference last week, said his responsibilities included “fortifying public trust” in the agency — trust that suffered a major blow three years ago when former contractor Edward Snowden leaked details of its phone and email surveillance programs.
A group that called itself the Shadow Brokers posted files they claim came from the Equation Group, a name used in cyber circles for the NSA. Computer security analysts who have studied the files are mostly convinced they came from the agency.
In stilted English, the Shadow Brokers said they had more such files, which they would sell to the highest bidder.
A former NSA employee, who requested anonymity to discuss the agency’s sensitive operations, said he recognized details in the leaked files.
“I don’t think it was faked,” the former employee said. “It’s a big deal. Could be used to conduct active exploitation today.”
The networking giant Cisco confirmed that the leak included a previously undiscovered weakness in its products. The weakness has attracted particular attention because it is a so-called zero-day vulnerability, meaning it was unknown to the company.
The NSA’s identification of such vulnerabilities is controversial. While the NSA says it does not use them to break into American computers, there is no guarantee that another country or group of hackers has not found the same flaw.
In recent years, the government has followed a formal process to determine whether a weakness should be kept secret so it can be used to gather intelligence, or whether it should be shared to protect computer users.
The government’s policy is to favor sharing. The NSA said recently that it had done so in 91 percent of cases. Andrew Crocker, an attorney at the Electronic Frontier Foundation, said too many

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
Hilux Military Raceday Novemeber 2023 Chepstow SOF Week 2023

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • Ajax vehicles on course for new delivery times.

    March 20, 2023
    Read more
  • EXHIBITIONS AND CONFERENCES

    March 17, 2023
    Read more
  • VETERANS UPDATE

    March 17, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT