Congress

Defense authorization bill boosts cybersecurity

US Capitol

The House Armed Services Committee is moving forward on a fiscal 2015 defense authorization bill that would meet the Pentagon’s $5.1 billion request for cybersecurity operations.

The Pentagon has prioritized building up the federal cyber workforce, with Defense Secretary Chuck Hagel recently calling for more than 6,000 professionals to work in support of the National Security Agency by 2016. In relatively austere times for the Pentagon, cybersecurity has been one of the few areas to see a boost in funding.

The measure would “direct the secretary of Defense to establish an executive agent to coordinate and oversee cyber training and test ranges, critical to operationalizing and improving our DOD cyber forces,” according to a summary of the IT provisions included in the portion of the bill approved last week by the Subcommittee on Intelligence, Emerging Threats and Capabilities.

The defense authorization bill, which the full committee began debating May 7, “fully” supports the broader IT requests in President Barack Obama’s budget and tasks the Government Accountability Office with reporting on insider threats to IT systems, the summary said. GAO is also tasked with reporting on “opportunities to improve services contract processes,” as part of a larger move toward acquisition reform. The legislation also would require “assessments” of DOD’s Joint Information Environment, an effort to standardize IT operations across the department.

An amendment by Rep. Tulsi Gabbard, D-Hawaii, and approved in the May 7 markup, focused on bettering “situational awareness” at U.S. Cyber Command. The amendment directs the command to coordinate with the undersecretary of Defense for acquisition, technology and logistics to submit a plan for “improving cyber situational awareness tools” to congressional defense committees by March 1, 2015. That plan should include a “common, open cyber situational awareness architecture” that includes privacy and civil liberty protections, the amendment said. 

The amendment singles out “net flow data, host-based monitoring, anomaly detection, audit logs and agent-based algorithms” as cyber tools for DOD to consider focusing on.

About the Author

Sean Lyngaas is an FCW staff writer covering defense, cybersecurity and intelligence issues. Prior to joining FCW, he was a reporter and editor at Smart Grid Today, where he covered everything from cyber vulnerabilities in the U.S. electric grid to the national energy policies of Britain and Mexico. His reporting on a range of global issues has appeared in publications such as The Atlantic, The Economist, The Washington Diplomat and The Washington Post.

Lyngaas is an active member of the National Press Club, where he served as chairman of the Young Members Committee. He earned his M.A. in international affairs from The Fletcher School of Law and Diplomacy at Tufts University, and his B.A. in public policy from Duke University.

Click here for previous articles by Lyngaas, or connect with him on Twitter: @snlyngaas.


The Fed 100

Read the profiles of all this year's winners.

Featured

  • Shutterstock image (by wk1003mike): cloud system fracture.

    Does the IRS have a cloud strategy?

    Congress and watchdog agencies have dinged the IRS for lacking an enterprise cloud strategy seven years after it became the official policy of the U.S. government.

  • Shutterstock image: illuminated connections between devices.

    Who won what in EIS

    The General Services Administration posted detailed data on how the $50 billion Enterprise Infrastructure Solutions contract might be divvied up.

  • Wikimedia Image: U.S. Cyber Command logo.

    Trump elevates CyberCom to combatant command status

    The White House announced a long-planned move to elevate Cyber Command to the status of a full combatant command.

  • Photo credit: John Roman Images / Shutterstock.com

    Verizon plans FirstNet rival

    Verizon says it will carve a dedicated network out of its extensive national 4G LTE network for first responders, in competition with FirstNet.

  • AI concept art

    Can AI tools replace feds?

    The Heritage Foundation is recommending that hundreds of thousands of federal jobs be replaced by automation as part of a larger government reorganization strategy.

  • DOD Common Access Cards

    DOD pushes toward CAC replacement

    Defense officials hope the Common Access Card's days are numbered as they continue to test new identity management solutions.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group