Army Research Laboratory releases new comprehensive science and technology plan

The so-called Technical Implementation Plan, which identifies two dozen program areas from high-performance computing and alternative energy to intelligent vehicles and even cybernetics, will guide the laboratory's technical strategy from 2015 to 2019.

GAO: DoD IT programs not meeting baselines may result in possible cost overruns, limited oversight

The Government Accountability Office focused on major automated information system, or MAIS, programs such as communications, logistics, management, and command and control systems. In fiscal 2013, DoD spent about $4.4 billion on MAIS programs out of the nearly $31.9 billion earmarked for IT investments.

Spotlight: GSA issues draft RFP for NS2020

The General Services Administration Feb. 28 posted a draft request for proposal for Network Services 2020.

GAO reports poor visibility into IRS IT investments

Reporting on the Internal Revenue Service's information technology investments is unreliable in terms of cost, schedule and scope of performance, says the Government Accountability Office.

DARPA touts advances in deep Web search through Memex

The Defense Advanced Research Projects Agency is working to shine light into the "dark Web" – the intentionally hidden portion of the World Wide Web which often provides those exchanging information with anonymity and encryption that deters monitoring.

Spotlight: FCC passes net neutrality rules

The Federal Communications Commission voted Feb. 26 to codify new net neutrality regulations for wireless and wireline networks that would bar blocking and throttling of content and ban carriers and ISPs from striking deals with content companies to zip their content faster to consumers. 

Cyber deterrence 'relatively immature,' says head of US Cyber Command

"The concepts of deterrence in the cyber domain are still relatively immature," said Adm. Mike Rogers, director of the National Security Agency and commander of the U.S. Cyber Command.

Federal regulators unveil new online tools designed to track mining violations, infractions

Two new online tools can help U.S. mine operators, miners, government officials and others better monitor infractions and violations, including those commonly associated with mining deaths, the U.S. Mine Safety and Health Administration announced Feb. 25.

China's military still struggling with its cyber and electronic warfare capabilities, new RAND report says

The study examined the People's Liberation Army, or PLA, weaknesses in the areas of human capital and organizational areas, defense research and industrial complex, and combat areas at on land, sea, air, space, cyber and electromagnetic regions.

UN report focuses on modern technology to improve peacekeeping missions

United Nations peacekeeping missions are "well behind the curve" when it comes to using technology to establish situational awareness, carry out mandates and protect themselves.

Sorry VistA, DoD's health record won't be open source

The Defense Department's next electronic health record will not be based on the open source architecture that supports the Veterans Affairs Department's EHR.

US government offers $3M reward for Russian hacker involved in massive malware operation

Both the State and Justice departments announced the reward for Evgeniy Mikhailovich Bogachev, who is accused of being the mastermind behind the "GameOver Zeus" botnet that infected between 500,000 to 1 million computers from 2011 through 2014 that resulted in more than $100 million in financial losses in the U.S. alone.

Executive order meant to apply internationally, says Schwartz

The executive order issued by the White House Feb. 13 will enable private sector companies to better share cybersecurity threat information, whether they're domestic or international entities.

White House official pooh-poohs cyber information sharing for the sake of sharing

White House Cybersecurity Coordinator Michael Daniel warned against cyber information sharing just for the sake of sharing. It's important that the sharing actually achieves something, he said.

New paper finds int'l English-language news coverage beefing up focus on cyberterrorism

A wide-ranging study of the international English-language news media's role in covering cyberterrorism found that outlets are considerably focused on this topic and building it as a "real security threat" despite skepticism from some academic reseachers regarding the phenomenon.

More watchful eye needed on 'dark Web' and cybercriminal activities, notes new paper

Security researchers and government investigators need to be watchful and respond to illicit activities emerging from the "dark Web," the intentionally hidden portion of the World Wide Web that hosts many cybercriminal enterprises.

Federal lead to 'kill the password,' NSTIC's Jeremy Grant resigning with 'mixed feelings'

Grant has been serving as the director for the National Strategy for Trusted Identities in Cyberspace program office since it was stood up in 2011.

Kaspersky uncovers 'Death Star of the Malware Galaxy'; experts suspect NSA link

Russian security research firm Kaspersky recently unveiled a previously unknown hacker group called Equation Group – dubbing it the "Death Star of the Malware Galaxy" – that is suspected of being active for almost two decades.

CIO council dives into federal IT workforce data with the aim of sharpening the workforce

After surveying the federal information technology community and human capital officers, the Federal Chief Information Officers Council has completed a detailed analysis of the government's IT workforce, but is keeping it under wraps.

White House names DJ Patil as first US chief data scientist

In his new role, Patil is expected to help shape policies and practices on U.S. technological innovation, forge partnerships to help the nation get the most on its investments in data, and recruit and retain talent in data science to help serve the public.