SHILLS INSIDE: HBGary DoD Cyber Warfare Support Work Statement | |
Programmer (OP) User ID: 1105850 United States 03/03/2011 05:29 AM Report Abusive Post Report Copyright Violation | |
Programmer (OP) User ID: 1105850 United States 03/03/2011 05:57 AM Report Abusive Post Report Copyright Violation | Increasingly, SSC PAC, DoD and other Government customers require advice, assistance, coordination and products necessary to support operational planning, assessment, integration and execution and technology development required to assure superiority for the warfighter in the Cyberspace domain. Specific activities of interest required to achieve superiority in Cyberspace include, but are not limited to: - Computer Network Operations (e.g. Attack, Defend and Exploit functions) as they relate to the interdependent network of information technology infrastructures, including the internet, telecommunications networks, computer systems and embedded processors and controllers. - Computer Network Attack (CNA) and Computer Network Exploitation (CNE) against automated systems, and the interaction between the physical, social and biological networks that define human-machine interaction. - Information Assurance (IA) and Computer Network Defense (CND) measures to protect and defend Naval, Joint and National systems. - Cyber Warfare Mission Assurance and Mission Planning. - Understanding aspects of human behavior and cognitive functions to influence adversary decision making (e.g. Psychological Operations (PSYOP) and Military Deception (MILDEC)). - Electronic Warfare (EW) to include Electronic Attack (EA) Electronic Support (ES) and Electronic Protect (EP) in the RF, millimeter wave, and optical environments. - Monitoring, analyzing and mitigating Operations Security (OPSEC) vulnerabilities. - Command and Control (C2) of Cyber Warfare capabilities. - Intelligence, Surveillance and Reconnaissance (ISR) aspects of Cyber Warfare (including Space Operations). - Ubiquitous Communications and Computing Environment. - Countermeasures including the capabilities and expertise to develop source identification tools, cyber data management, and methodologies for object correlation and referencing - Modeling, Simulation and Visualization of the future environment in which communications, computing, data, sensors and networks are interoperable, ubiquitous and transparent to humans. - Understanding networks as a science and developing models which can provide clarity into how networks operate and resist or deter attack. - Convergence of physical, biological and social networks and how this will effect human interactions and decision cycles. - Understanding of Cyber Warfare Doctrine, Tactics, Techniques and Procedures (TTP) Last Edited by Programmer on 03/03/2011 05:58 AM |
Programmer (OP) User ID: 1105850 United States 03/03/2011 01:58 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 1278975 United States 03/03/2011 02:00 PM Report Abusive Post Report Copyright Violation | |
Programmer (OP) User ID: 1105850 United States 03/03/2011 02:21 PM Report Abusive Post Report Copyright Violation | We in the heart of it. Quoting: Anonymous Coward 1278975Yes. They're in damage control mode at the moment, what with Centcom releasing statements about not using the software against Americans. Hah. Yeah, Centcom may not be, but the private contract NGO's that are working for Cybercom are without boundary. |