• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

CYBER WARFARE, EW, CLOUD HOMELAND SECURITY UPDATE

May 27, 2016 by

24 May 16. The Army is about to enter pilot testing on a new software system to help commanders in the field respond more nimbly to rapid variations in cyber threats. Known as the Assured Compliance Assessment Solution (ACAS) Reporting Toolkit, or ART, this capability aims to provide commanders and program managers with the most up-to-date information available on their own cyber posture and to help keep those defenses current. Designed by Army’s Program Executive Office Command Control Communications-Tactical (PEO-C3T), the ART solution addresses multiple challenges including a lack of centralized control over security in battlefield applications, known as clients.
“Right now every tactical unit has their own domain. We don’t have administrative privileges over those clients,” said Chief Warrant Officer 5 James Ebeler, who spearheaded the project for Army Network Enterprise Technology Command (NETCOM). “We want to be able to see all clients, to see the [security] compliance level within those clients so then we can patch those vulnerabilities,” he said.
To that end, NETCOM expects to launch a pilot of ART soon at the regional cyber center at Fort Huachuca, Arizona, with an expected rollout to tactical units in early 2017. The Army has faced a number of challenges in recent years as it tries to address a cyber landscape that changes rapidly and constantly. To meet the threat, defenses must be kept current, but that doesn’t always happen when each unit is left to manage updates for itself, and to self-report on its security status.
“We rely on each unit to give us their compliance data, but there is always human nature in the way,” Ebeler said. The process of manually assessing and reporting security status can be time-consuming, inconsistent and prone to error. “We are looking to take that human element out of the equation, to get that information from the system itself.”
The ART solution can draw information from potentially hundreds of networked systems, can isolate vulnerable segments of software in minutes, and can rapidly implement needed security patches. Information on these updates is simultaneously fed into the Department of Defense Cybersecurity Scorecard, a tool for gauging how well different systems and units are protected against cyber threats.
Initial testing will evaluate the tool’s performance in battle command systems and intelligence platforms. Once fielded, the system might be used to secure fires control and a range of other systems.
Such a tool could be a significant enhancement to the Army’s sometimes fragmented cyber landscape, said Jim Christy, former director of Futures Exploration in the DoD Cyber Crime Center, and now vice president of investigations and digital forensics at cybersecurity provider Cymmetria.
“The Army does not have one homogenous network. The services have every kind of system and configuration imaginable to best serve the functional requirements of that specific unit,” he said.
The situation is analogous to that often seen in the private sector, he said, where a large company that has acquired many smaller firms may find itself saddled with that a diverse combination of operating systems, software and networks. ART could potentially help keep cybersecurity current, to the extent that it is able to identify and rapidly remediate specific configurations and vulnerabilities.
Pilot testing should help planners to address what Ebeler suspects may be the primary hurdle in ART’s eventual implementation: That is, the learning curve for field commanders as the new system is implemented, as units are tasked with making configuration changes to systems where vulnerabilities have been identified.
“We are in the process of writing the tactical techniques,” he said. “We want to get to the point where any soldier can take this and understand exactly what they need to do to their box.” (Source: C4ISR & Networks)

18 May 16. Hacking Team Postmortem. Hacking Team is an Italian company th

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
Hilux Military Raceday Novemeber 2023 Chepstow SOF Week 2023

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    March 24, 2023
    Read more
  • VETERANS UPDATE

    March 24, 2023
    Read more
  • MANAGEMENT ON THE MOVE

    March 24, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT