Processing....

Logo

Digital News Coverage of Government Contracting and Federal Policy Landscape
Sticky Logo
  • Home
  • Acquisition & Procurement
  • Agencies
    • DoD
    • Intelligence
    • DHS
    • Civilian
    • Space
  • Cybersecurity
  • Technology
  • Executives
    • Profiles
    • Announcements
    • Awards
  • News
  • Articles
  • About
  • Wash100
  • Contact Us
    • Advertising
    • Submit your news
    • Jobs
Logo
DoD/News
DoD IG Begins Review of Air Force’s Bomber Aircraft Devt Program Classification
by Jane Edwards
Published on May 16, 2017
DoD IG Begins Review of Air Force’s Bomber Aircraft Devt Program Classification


DoD IG Begins Review of Air Force’s Bomber Aircraft Devt Program ClassificationThe Defense Department’s inspector general has launched an evaluation to assess whether the U.S. Air Force has exercised extreme discretion about the basic details of a potential $80 billion program to develop the new B-21 bomber aircraft, Bloomberg reported Tuesday.

The DoD IG office needs to submit within six months an evaluation report to Congress in compliance with a provision of a $1.17 trillion budget package for fiscal 2017.

Lt. Gen. Arnold Bunch, military deputy to the Air Force’s assistant secretary for acquisition, said the review seeks to examine the service branch’s disclosure activities with a goal to “balance program classification with the transparency that we’re shooting for.”

The Pentagon’s IG office is “analyzing how much we are releasing or are not releasing, to give us recommendations on how to move forward,” Bunch added.

The review came seven months after the Government Accountability Office released a redacted version of its February ruling to uphold the service branch’s decision to select Northrop Grumman for the bomber aircraft development program.

The military branch also disclosed the cost goals per aircraft, subcontractors and a sketch of the plane, the report added.

Civilian/News
Corey Cooke Appointed GSA Senior Adviser for Cyber & Tech
by Scott Nicholas
Published on May 16, 2017
Corey Cooke Appointed GSA Senior Adviser for Cyber & Tech


Corey Cooke Appointed GSA Senior Adviser for Cyber & TechPresident Donald Trump has appointed Corey Cooke as senior adviser for cyber and technology to the administrator of the General Services Administration.

GSA said Friday that Cooke will offer strategic guidance on legislation and policies related to the agency’s expanding technology transformation portfolio.

She previously served as counsel and deputy parliamentarian for the House Committee on Oversight and Government Reform, where her work focused on antitrust, appropriations, budget, financial services, parliamentary procedure and regulatory matters.

Cooke also provided legislative advice to the House Small Business Committee on capital, entrepreneurial development, financial services, intellectual property and procurement issues as a counsel of that committee.

She holds a bachelor’s degree from the University of Massachusetts at Amherst and a juris doctorate from the University of New Hampshire School of Law.

Civilian/News
NASA to Pursue Unmanned Mission for 1st SLS/Orion Flight Test
by Ramona Adams
Published on May 15, 2017
NASA to Pursue Unmanned Mission for 1st SLS/Orion Flight Test


NASA to Pursue Unmanned Mission for 1st SLS/Orion Flight TestNASA has decided to pursue its original plan to conduct the first integrated flight of the Space Launch System rocket and Orion spacecraft without crew.

The agency said Saturday it is “technically capable” of launching astronauts aboard the Exploration Mission-1 flight test, but it would be difficult to modify plans to make way for a crewed mission at this point.

NASA launched a study in February to explore the potential advantages and disadvantages of flying a crew on EM-1 in 2019.

Engineers will apply lessons learned from the study to the first flight test and integrated systems. NASA noted this is  part of a larger effort to expand human exploration across the solar system.

“We’re considering additional ground testing of the heat shield prior to EM-1 as well as the possibility of advancing the ascent abort test for the Orion launch abort system based on findings from the study,” said William Gerstenmaier, associate administrator for NASA’s human exploration and operations mission directorate.

Following a schedule review, NASA also decided to adjust the target launch date of EM-1 in 2019 and identify a new official launch date in the next weeks.

NASA said components for EM-1 are currently being delivered and contractors can move on to the next phase of their work for the crewed Exploration Mission-2.

SLS and Orion flight hardware are in production for both missions and test and development efforts are underway across U.S., according to NASA.

Civilian/News
Former Rep. Mike Rogers Gets FBIAA Endorsement for FBI Leadership Post
by Jane Edwards
Published on May 15, 2017
Former Rep. Mike Rogers Gets FBIAA Endorsement for FBI Leadership Post


Former Rep. Mike Rogers Gets FBIAA Endorsement for FBI Leadership Post

The FBI Agents Association has urged President Donald Trump to consider Mike Rogers, a CNN commentator and former chairman of the House Intelligence Committee, as a potential candidate to lead the FBI.

“Rogers’ unique and diverse experience will allow him to effectively lead the men and women of the bureau as we work to protect our country from criminal and terrorist threats,” FBIAA Thomas O’Connor said in a statement released Saturday.

“Rogers exemplifies the principles that should be possessed by the next FBI director,” O’Connor added.

Those principles include efforts to make FBI special agents key to the bureau’s core mission, initiative to fight crimes in the 21st century and the importance of seeking agents’ feedback on field-related issues.

Rogers’ endorsement came a week after President Trump fired James Comey as FBI director.

Rogers currently serves as host of CNN’s documentary series Declassified.

He spent 15 years in the House of Representatives, where he also served as a member of the Energy and Commerce Committee.

He is also a former special agent with the FBI and a member of the U.S. Army.

Civilian/News
DHS to Introduce 8 New Cyber Tech at Demo Day in Washington; Robert Griffin Comments
by Scott Nicholas
Published on May 15, 2017
DHS to Introduce 8 New Cyber Tech at Demo Day in Washington; Robert Griffin Comments


DHS to Introduce 8 New Cyber Tech at Demo Day in Washington; Robert Griffin CommentsThe Department of Homeland Security‘s science and technology directorate will demonstrate eight new cybersecurity technologies built under S&T’s Transition to Practice program at a ‘Demonstration Day’ event in Washington, D.C.

DHS said Thursday that researchers at federally funded laboratories and academic research centers developed the technologies which will be offered to clients in the commercial market.

The TTP program picks potential cybersecurity technologies, from Energy and Defense Department laboratories, federally funded research and development centers, university affiliated research centers and universities, which will be developed with federal funding and incorporated into the transition-to-market program.

The Demonstration Day event will showcase the 2017 batch of products to cybersecurity professionals, developers, integrators, investors and technology companies including those from the energy, financial and government sectors.

DHS will host more demonstration day events in the future. The events are designed to help foster pilot opportunities by bridging concepts with cybersecurity professionals who can help further develop technologies into commercially viable products.

Robert Griffin, acting DHS under secretary for science and technology said the 2017 TTP cohort includes a range of cybersecurity technologies designed to boost cyber defenses of networks in the public and private sectors.

The eight new TTP technologies include:

  • Cyber Human Language Technology Analysis, Reasoning and Inference for Online Threats (CHARIOT) addresses the data overload problem cyber-analysts encounter by filtering open-source social media to eliminate irrelevant topics. It was developed by Massachusetts Institute of Technology’s Lincoln Laboratory (MIT LL).
  • Quantitative Attack Space Analysis and Reasoning (QUASAR) provides visualization and quantitative analytics for determining the security impact of deploying cyber-defenses in an enterprise environment. QUASAR also was developed by MIT LL.
  • A Novel Intrusion Prevention System for Android (APE) is an application for Android devices that performs deep-packet inspection and filtering of traffic entering and leaving the device, thus blocking malicious traffic and lowering its attack profile. APE was developed by the Mitre Corporation.
  • Akatosh: Automated Cyber Incident Verification and Impact Analysis enables automated, real-time forensic analysis of endpoints after malware-attacks and other cybersecurity incidents by automatically maintaining detailed snapshots of host-level activity on endpoints over time. The technology was developed at Oak Ridge National Laboratory (ORNL).
  • Real-Time Cyber-Physical Attack Detection (CPAD) protects power transmission and distribution and other highly sensitive control systems by performing analytics and automatically inferring underlying physical relationships to detect sensor failures, replay attacks and other data-integrity issues in real time. CPAD also was developed at ORNL.
  • StreamWorks: Continuous Pattern Detection on Streaming Data supports continuous detection of emerging patterns in a system of graph-structured data, which are used to detect emerging events in massive netflow or event log data streams. It was developed at the Pacific Northwest National Laboratory.
  • Keylime: Enabling Trusted Platform Module-Based Trust in the Cloud enables users to securely bootstrap secrets (e.g., cryptographic keys, passwords, etc.) and continuously verify trust in their cloud computing resources without needing to trust their cloud provider. Keylime also was developed at MIT LL.
  • Policy Enforcement and Access Control for Endpoints (PEACE) protects endpoint devices in an enterprise network by intercepting all new network connections and vetting them at a centralized network controller, allowing administrators to enforce network policy and control access to proactively defend their networks. PEACE was developed at the Worchester Polytechnic Institute.

News
CBO: No Sequestration Required for Fiscal 2017
by Jane Edwards
Published on May 15, 2017
CBO: No Sequestration Required for Fiscal 2017


CBO: No Sequestration Required for Fiscal 2017The Congressional Budget Office has said sequestration is not necessary for fiscal year 2017 because appropriations for defense and nondefense initiatives are respectively equivalent to the $634 billion and $553.6 billion adjusted caps on discretionary budget authority for the year.

CBO said in the May 2017 report adjustments to discretionary budget limits for 2017 reached a total of $118 billion.

Those adjustments to the cap include overseas contingency operations, disaster relief, emergency requirements and program integrity initiatives such as disability insurance, Supplemental Security Income and Medicare programs.

Caps set in the Budget Control Act of 2011 for both defense and nondefense programs will rise from $1.156 trillion in fiscal 2018 to $1.234 trillion in fiscal 2021, according to the report.

CBO also predicts the overall cap on discretionary budget authority to increase from $1.065 trillion in FY 2018 to approximately $1.145 trillion by FY 2021.

The report noted that caps for defense initiatives will decline by approximately $54 billion between FY 2018 and FY 2021, while limits for nondefense programs will drop between $37.3 billion and $35.4 billion over the four-year period.

Government Technology/News
Report: NIST to Release New Online Password Security Guide
by Ramona Adams
Published on May 15, 2017
Report: NIST to Release New Online Password Security Guide


Report: NIST to Release New Online Password Security GuideThe National Institute of Standards and Technology could release this summer new guidance that recommends the use of long passwords or passphrases to eliminate the need for periodic password changes, Nextgov reported Friday.

The guide also calls on government agencies and contractors to allow password length of at least 64 characters; encourage employees to create passphrases based on memorized secrets using any characters; and refrain from imposing composition rules.

NIST recommends agencies to check whether new passwords contain repetitive or sequential characters as well as context specific words, such as the name of the service, the report noted.

The agency also suggest checking new passwords against lists of passwords obtained from previous breaches.

NIST currently reviews public feedback on the guidelines via GitHub.

Government Technology/News
Melissa Hathaway: Trump’s Cybersecurity Executive Order Would Require 14 Reports on Cyber Issues
by Ramona Adams
Published on May 15, 2017
Melissa Hathaway: Trump’s Cybersecurity Executive Order Would Require 14 Reports on Cyber Issues


Melissa Hathaway: Trump's Cybersecurity Executive Order Would Require 14 Reports on Cyber IssuesMelissa Hathaway, a senior adviser at the Harvard Kennedy School’s Belfer Center, has said President Donald Trump’s cybersecurity executive order will require 14 new reports on various cyber-related areas, BankInfoSecurity reported Thursday.

The former White House cybersecurity adviser noted that agencies will need to allocate time and personnel to meet reporting requirements, which Hathaway believes could delay and distract agencies from their cybersecurity activities and operations.

She added that Congress and private sector organizations have made more than 100 recommendations to optimize the cybersecurity of government and industry in the past 10 years, but most of those recommendations have yet to be implemented.

Thomas Bossert, assistant to the president for homeland security and counterterrorism, is the primary recipient for most of the new studies.

Civilian/News
Peter O’Rourke to Head VA Office for Accountability & Whistleblower Protection
by Scott Nicholas
Published on May 15, 2017
Peter O’Rourke to Head VA Office for Accountability & Whistleblower Protection


Peter O'Rourke to Head VA Office for Accountability & Whistleblower ProtectionPeter O’Rourke, senior adviser to the secretary of the Department of Veterans Affairs, has been appointed as a senior adviser and the executive director of the newly established office of accountability and whistleblower protection within the VA.

VA said Friday that O’Rourke will bring more than a decade’s worth of leadership experience to aid the department secretary on the use of available authorities to discipline personnel who have failed to carry out their respective duties on behalf of veterans.

He will help determine potential statutory barriers to the VA secretary’s authority to impose disciplinary actions against staff members who have jeopardized the safety of veterans.

The new executive director will also collaborate with various VA components to address veterans’ complaints regarding wrongdoings at the department and help conduct investigations to protect employees who disclose wrongdoings against potential retaliation.

“We need to hold our employees accountable for their actions if they violate the public trust, and at the same time protect whistleblowers from retaliation,” said David Shulkin, secretary of the Department of Veterans Affairs.

O’Rourke has held various leadership roles with Calibre Systems, the Association of the U.S. Army, Blackland Aerospace, Strong America Now, Accenture, George Group Consulting, the U.S. Air Force and U.S. Navy.

He received a bachelor’s degree in political science and government from the University of Tennessee-Knoxville and a master’s degree in logistics, materials and supply chain management from the U.S. Air Force Institute of Technology.

Government Technology/News
Europol: Ransomware Attack Compromised 200K Computers in Over 150 Countries
by Jane Edwards
Published on May 15, 2017
Europol: Ransomware Attack Compromised 200K Computers in Over 150 Countries


Europol: Ransomware Attack Compromised 200K Computers in Over 150 CountriesEuropol has said a ransomware attack disrupted computers of at least 200,000 individuals in more than 150 countries, The Washington Post reported Sunday.

Jan Op Gen Oorth, a spokesman for Europol, said the agency expects the number of computer networks and people affected by the malware, dubbed WannaCry or WanaCryptor 2.0, to increase since “many workers left their computer turned on last Friday and will probably find out that they are also affected by the malware on Monday morning.”

Europol said it believes the WannaCry attack started to spread from the U.K. National Health Service Friday and disrupted computer networks in Germany, Russia, Spain, China and India.

The cyber attack also affected several other countries that include Brazil and Sweden as well as several companies such as FedEx, French automaker Renault and Spain-based telecommunications firm Telefonica.

Europol noted that only few individuals and firms have made a ransom payment of $300 to get a decryption key to unlock their computers.

A 22-year-old U.K.-based cybersecurity researcher with a Twitter handle @MalwareTechBlog helped stem the spread of the cyber attack by buying the domain name associated with a “kill switch” that hackers built to stop the malware once the victims make ransom payments, the report added.

Brad Smith, president of Microsoft, wrote in a Sunday blog post that the malware attack leveraged a National Security Agency-built hacking tool that leaked on the internet in April, Reuters reported Sunday.

“We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world,” Smith noted.

“This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem,” he added.

A senior White House official told Reuters that President Donald Trump asked Tom Bossert, the administration’s homeland security adviser, to hold an emergency meeting to evaluate the cyber threat.

The FBI and NSA have begun efforts to identify the threat actors responsible for the ransomware attack, the official added.

Previous 1 … 2,211 2,212 2,213 2,214 2,215 … 2,603 Next
News Briefing
I'm Interested In:
Recent Posts
  • NIST Issues Updated Security & Privacy Control Catalog
  • Air Force Announces Collaborative Combat Aircraft Program Milestone
  • DCSA to Begin DISS Cloud Migration Under IT Modernization Strategy
  • NSA, Other Agencies Release Advisory Against China-Sponsored Cyberthreats
About

ExecutiveGov, published by Executive Mosaic, is a site dedicated to the news and headlines in the federal government. ExecutiveGov serves as a news source for the hot topics and issues facing federal government departments and agencies such as Gov 2.0, cybersecurity policy, health IT, green IT and national security. We also aim to spotlight various federal government employees and interview key government executives whose impact resonates beyond their agency.

Read More >>

RSS ExecutiveBiz
  • DOD, Peraton & Okta Launch myAuth Authentication System
  • NATO Procurement Agency Gets State Department Approval for $104M AIM-9X Sidewinder Missile FMS
  • Seekr Adds Allison Binns & Mat Winter to Advisory Board
  • Anthropic Launches National Security & Public Sector Advisory Council
  • VA Continues Rollout of New Acquisition Management System Powered by CGI’s Momentum
  • SNC Demos Airlift/Tanker Open Mission Systems Capabilities During Air Force Exercise
RSS GovConWire
  • Applied Signals Intelligence Appoints Azhar Haq as VP, CFO
  • Jilee Rich Joins Trilogy Federal as Vice President of Growth
  • Accenture Announces NeuraFlash Acquisition to Boost AI Capabilities
  • DHS Announce Plans for Potential $100M Counter-UAS Acquisition
  • Google to Invest Another $9B in Virginia’s Cloud, AI Infrastructure
  • DLA Launches Market Survey for $3.2B C5ISR G2S Contract’s Open Season
Footer Logo

Copyright © 2025
Executive Mosaic
All Rights Reserved

  • Executive Mosaic
  • GovCon Wire
  • ExecutiveBiz
  • GovCon Exec Magazine
  • POC
  • Home
  • Acquisition & Procurement
  • Agencies
    • DoD
    • Intelligence
    • DHS
    • Civilian
    • Space
  • Cybersecurity
  • Technology
  • Executives
    • Profiles
    • Announcements
    • Awards
  • News
  • Articles
  • About
  • Wash100
  • Contact Us
    • Advertising
    • Submit your news
    • Jobs
Go toTop