You are a SPECIAL Librarian! You are a Military Librarian!

PENTAGON: US CYBER RESERVE IS IN THE WORKS

“The Pentagon is prepared to draft thousands of private sector and National Guard cyber pros in the event of a network emergency affecting American lives, a top U.S. military official said Tuesday.

The “surge forces” will be trained by the Defense Department and help defend the energy sector, telecommunications and other so-called critical infrastructure, Defense Principal Cyber Adviser Eric Rosenbach said in remarks prepared for a Senate Armed Forces subcommittee hearing.

“Up to 2,000 Reserve and National Guard personnel will also support the Cyber Mission Force,” which is part of the department’s offensive and defensive Cyber Command, he added.”

 

Full Story: US Cyber Reserve

Posted in Links0 Comments

Sleep in the Military: Promoting Healthy Sleep Among U.S. Servicemembers

 

“Sleep disturbances are a common reaction to stress and are linked to a host of physical and mental health problems. Given the unprecedented demands placed on U.S. military forces since 2001, there has been growing concern about the prevalence and consequences of sleep problems for servicemembers. Sleep problems often follow a chronic course, persisting long after servicemembers return home from combat deployments, with consequences for their reintegration and the readiness and resiliency of the force. Therefore, it is critical to understand the role of sleep problems in servicemembers’ health and functioning and the policies and programs available to promote healthy sleep. This report provides the first comprehensive review of sleep-related policies and programs across the U.S. Department of Defense (DoD), along with a set of actionable recommendations for DoD, commanders, researchers, and medical professionals who treat U.S. servicemembers. The two-year multimethod study also examined the rates and correlates of sleep problems among post-deployed servicemembers, finding negative effects on mental health, daytime impairment, and perceived operational readiness. The research reviewed evidence-based interventions to treat sleep disturbances among servicemembers and veterans and exposed several individual- and system-level barriers to achieving healthy sleep. Implementing evidence-based treatments is just one step toward improving sleep across the force; as the research recommendations highlight, it is equally important that policies and programs also focus on preventing sleep problems and their consequences.”

Full Report: Sleep in the Military: Promoting Healthy Sleep Among U.S. Servicemembers
Source: RAND Corporation

Posted in Links0 Comments

CRS — Cyberwarfare and Cyberterrorism: In Brief (March 27, 2015)

Cyberwarfare and Cyberterrorism: In Brief (PDF)
Source: Congressional Research Service (via Federation of American Scientists)

Recent incidents have highlighted the lack of consensus internationally on what defines a cyberattack, an act of war in cyberspace, or cyberterrorism. Cyberwar is typically conceptualized as state-on-state action equivalent to an armed attack or use of force in cyberspace that may trigger a military response with a proportional kinetic use of force. Cyberterrorism can be considered “the premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives.” Cybercrime includes unauthorized network breaches and theft of intellectual property and other data; it can be financially motivated, and response is typically the jurisdiction of law enforcement agencies. Within each of these categories, different motivations as well as overlapping intent and methods of various actors can complicate response options.

Posted in Links0 Comments

From NEXTGOV – WATCHDOG: LIBRARY OF CONGRESS LACKS A DIGITAL BLUEPRINT — AND DOESN’T KNOW HOW MUCH IT SPENDS ON TECHNOLOGY

Alongside more than 36 million books and 13.7 million photographs and untold other documents, maps and manuscripts, the Library of Congress has ambitious plans to collect nearly every public tweet since 2006 to be used as a truly 21st-century research archive.

But a new watchdog report calls into question the library’s ability to keep up with the demands of the digital age.

The world’s largest library lacks “a clear direction for its use of IT,” and has been cycling through short-term IT leadership since the permanent chief information officer left the agency in 2012.

Posted in Links0 Comments

DARPA today released Breakthrough Technologies for National Security

DARPA Shares Its Vision for the Future (PDF)
Source: Defense Advanced Research Projects Agency

DARPA today released Breakthrough Technologies for National Security, a biennial report summarizing the Agency’s historical mission, current and evolving focus areas and recent transitions of DARPA-developed technologies to the military Services and other sectors. The report’s release coincided with testimony by DARPA Director Arati Prabhakar before the Emerging Threats and Capabilities Subcommittee of the House Armed Services Committee, at a hearing entitled “Department of Defense Fiscal Year 2016 Science and Technology Programs: Laying the Groundwork to Maintain Technological Superiority.” The full report is available at http://go.usa.gov/3rut4.

Breakthrough Technologies for National Security affirms that America is in a strong strategic position today, in large part because of its longstanding technological dominance. But it also notes that a number of challenges threaten that status, including the global spread of ever more powerful and less expensive technologies and the emergence of disruptive non-nation-state actors in addition to ongoing threats from peer adversaries.

Posted in Links0 Comments

Fact Sheet: U.S.-United Kingdom Cybersecurity Cooperation

The White House
Office of the Press Secretary

The United States and the United Kingdom agree that the cyber threat is one of the most serious economic and national security challenges that our nations face.  Every day foreign governments, criminals, and hackers are attempting to probe, intrude into, and attack government and private sector systems in both of our countries.  President Obama and Prime Minister Cameron have both made clear that domestic cybersecurity requires cooperation between governments and the private sector.  Both leaders additionally recognized that the inherently international nature of cyber threats requires that governments around the world work together to confront those threats.

During their bilateral meetings in Washington, D.C. this week, President Obama and Prime Minister Cameron agreed to further strengthen and deepen the already extensive cybersecurity cooperation between the United States and the United Kingdom.  Both leaders agreed to bolster efforts to enhance the cybersecurity of critical infrastructure in both countries, strengthen threat information sharing and intelligence cooperation on cyber issues, and support new educational exchanges between U.S. and British cybersecurity scholars and researchers.

Link to Fact Sheet

Posted in Links0 Comments

Blog Archives