MARINE CORPS BASE QUANTICO, Va. --
Each year, Marine Corps Systems Command acquires a range of ground-based innovations designed to meet the warfighters needs. This includes infantry weapons, fire support technologies, communication gear, intelligence systems and much more.
Much of these capabilities share a common thread: information technology.
You would be hard pressed to name any device or componenteither commercial or in defense marketplacethat does not involve IT, said Brig. Gen. A.J. Pasagian, MCSC commander. IT is involved in every aspect of our lives today.
Since the dawn of the 21st century, the Marine Corps has progressively placed a greater emphasis on leveraging IT components. It has since become nestled within the Corps supply chain and is integral in achieving present and future goals.
IT is more than email and virtual meeting rooms. Marines rely on IT when employing interactive data collection capabilities, participating in modeling and simulation activities, connecting to wideband networks and for recruiting and retention purposes.
Today, IT is an inseparable part of our lives, said Col. Robert Bailey, military deputy at the Corps Program Executive Officer Digital. We are engaged with adversaries through our IT resources and networks, and we have to maneuver and win in that domain just as we do at sea, on land and in the air.
MCSC acquires ground weapons and other innovative systems that include data packets, cybersecurity products and information security elements. In many instances, the IT within these capabilities allow the Marine Corps to replace subcomponents rather than entire systems.
The Marine Corps continues to acquire systems designed to support expeditionary operations around the globe, meeting Force Design 2030 goals. IT serves as a pillar in future operations and provides tactical advantages, such as increased situational awareness, to naval forces.
These capabilities include tactical tablets such as the Marine Air-Ground Task Force Common Handheld, intelligence systems that include the Distributed Common Ground/Surface System-Marine Corps, and satellite communication technologies like Networking On-the-Move, among others.
I believe IT is a huge enabler in where the Corps is headed with regards to the commandants Force Design 2030 vision, said Bailey. The Marine Corps intends to leverage the benefits of modern compute, storage and learning to build and retain an optimal force. It will be a journey, but we are committed to it and we will get there.
Changes to IT procurement:
Bailey said achieving Force Design 2030 goals requires a greater emphasis on cybersecurity.
Cyberspace has created yet another domain for national competition and military conflict. History has shown that criminals and foreign entities infiltrate cyber to try to steal technology information, disrupt the U.S. economy and government processes, and threaten critical infrastructure, according to a 2018 DOD report.
Malware attacks can be particularly damaging to national security. Notably, in 2008, foreign actors conducted a cyber-attack on the Department of Defense, breaching U.S. military computers and compromising critical data. The event sparked the creation of the United States Cyber Command.
IT threats are real, said Michael Cirillo, senior IT advisor at MCSC. You cannot read the news without seeing a headline about how IT failed, was compromised or was used to cause problems.
The Marine Corps is dedicated to positioning itself to counter such threats while still supporting the warfighter. MCSC does this in several ways. The first is by educating its workforce. The command has inculcated its culture with the awareness, training and knowledge of the risks and threats IT can pose.
To adapt to evolving threats, MCSC has also enhanced its IT acquisition process. Pasagian said the command understands the cyberspace manifests threats through the internet as well as the Marine Corps use of IT in certain missions and functions.
In 2015, the Marine Corps analyzed its cyber acquisition model and ultimately derived 26 recommendations for improving Marine Corps IT acquisition, which the commandant approved. MCSC went to great lengths to implement them into their acquisition process.
That course of action involved developing and implementing an emergency and urgent cyber acquisition process. An emergency cyber acquisition process delivers capability needs in less than 30 days. The urgent process delivers in less than 180 days.It did not take long for MCSC to leverage this new process.
In 2015, the fleet urgently needed a piece of IT equipment. MCSC implemented the emergency cyber acquisition process, assembling experts in contracting, finance, engineering, logistics and more. The command ultimately procured the software in less than seven days and the hardware in less than 21 days.
It was the DoDs first rapid cyber procurement, said Cirillo. MCSC shared their IT acquisition process with the other services, the Joint Chiefs of Staff and National Security Agency. MCSC also assisted the USCC in standing up their congressionally mandated Cyber Acquisition Authority.
Cyber Security Photo by Staff Sgt. Jacob Osborne
Fielding this capability enabled [Marine Forces Cyber Command] to achieve initial operational capability, said Cirillo. Although not applicable for all IT procurements, when something is needed rapidly, MCSC can deliver it.
Not only can MCSC deliver IT systems rapidly, these teams of skilled professionals ensure the capabilities are effective through a painstaking develop-and-assess process. This will be particularly important in the coming years, as adversaries attempt to advance their own technologies.
Capt. Frank A. Wleklinski, a cyberspace warfare officer and team lead at Marine Corps Forces Cyberspace Command, said controlling the cyber domain is a priority for the Marine Corps. The service strives to achieve offensive or defensive effects on the most important terrain to give commanders and leaders options to seize and maintain the initiative.
Competition and conflict will increasingly play out simultaneously in the both the virtual and physical domains, said Wleklinski. As we begin networking more and more assets, the overlap between the physical and virtual will be heavily contested.
One of those virtual assets is the cloudan invisible network that provides remote data storage and processing services without the need for direct, active management by the user. Efforts are underway by MCSC to deliver cloud capabilities, as the Marine Corps continues to work with the Navy to acquire cloud services collaboratively.
Bailey said migrating to the cloud allows the Marine Corps to consolidate applications, security and infrastructure in a smart, secure and scalable way. Cloud computing offers both cost, security and operational benefits.
The Marine Corps is intelligently moving to the cloud, said Bailey. The goal is to leverage enterprise infrastructure, security, services and platforms when feasible, and to continue to deliver critical warfighting capabilities when operating in a communication-disadvantaged environment.
Cloud computing will be particularly important in meeting Force Design goals.
Commandant of the Marine Corps Gen. David Berger has espoused the need for the Corps to become a more naval force. He believes becoming a more amphibious, expeditionary force can support both the Marine Corps and Navy.
The concept of expeditionary advanced base operations will require a more mobile force that may operate in denied, degraded, intermittent or low bandwidth environments. The cloud enables Marines to access network through the Marine Corps Enterprise Network in such austere environments.
We want to understand how our Marines operate at echelon and providing them the services, applications, security and infrastructure they need to be successful while considering the employment, said Bailey.
Working with the Navy:
Bailey said the Marine Corps continues to establish and leverage existing development and delivery pipelines that can increase the frequency of software capability delivery and enhancement. He believes this will also make the Marine Corps more nimble and responsive to cyber threats.
MCSC has found ways to create similar tactical network engineering environments to those employed by the Navy. The Marine Corps has replicated its command and control architecture with partners at Naval Information Warfare Centers who are performing similar missions for shipboard environments.
We are actively becoming a more naval force, and part of that is partnering with the Navy and developing the naval network, said Bailey. We are looking for opportunities to share resources and follow the same technical paths where it makes sense, with an eye towards interoperability.
The Marine Corps is not only using this environment with the Navy but also with the Army and Joint Force. MCSC is contributing to the Armys Project Convergence efforts, which is their contribution to the military-wide Joint All Domain Command and Control. JAD2C is a concept where data will link together land, air, sea, cyber and space capabilities.
The network serves as an effective risk identification and mitigation tool, said Bailey.
This is going to save us money, accelerate capability delivery and make us smart quickly by modeling these architectures with both hardware and virtualized capabilities in the loop, he said.
Continuing to develop IT capabilities can assist in building partnerships with private-sector entities vital to helping support military operations. The Marine Corps can also share information with other federal agencies, foreign partners and allies who have advanced cyber capabilities, increase communication and effectiveness.
We are using the tools and processes and leveraging relationships and partnerships in effective ways, said Pasagian. We embrace change in the areas that will ultimately make us better.
Read more:
How the Marine Corps uses IT to defeat evolving threats - Marines.mil
- Google researchers have cracked a key internet security tool - Recode [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Letter: Internet security is in jeopardy - INFORUM [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- New internet security device launched to safeguard schools against child abuse - Phys.Org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Everything You Need to Know About Cloudbleed, the Latest Internet Security Disaster - Gizmodo [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Data from internet-connected teddy bears held ransom, security expert says - Fox News [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Emsisoft Internet Security 2017.2.0.7219 - TechCentral.ie [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- What you need to know about 'Cloudbleed,' the latest internet security bug - Globalnews.ca [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Google cracks longtime pillar of internet security - MarketWatch [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- BullGuard | Internet Security and Antivirus protection ... [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Internet Storm Center - SANS Internet Storm Center [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Internet-connected 'smart' devices are dunces about security - ABC News [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Derry internet security expert warns that advanced internet technology 'a risk to us all' - Derry Now [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Firewall Test, Web Tools and Free Internet Security Audit ... [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Internet security in the spotlight: How is the internet safer today than it was 20 years ago? - Mobile Business Insights (blog) [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Jim Mullen: Unsocial internet security | Columnists | auburnpub.com - Auburn Citizen [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Internet security company launches a perfume line to promote cybersecurity - Mashable [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Internet security - Wikipedia [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Are you undermining your web security by checking on it with the wrong tools? - The Register [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bruce Schneier on New Security Threats from the Internet of Things - Linux.com (blog) [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Carpe Diem: home internet security - KFOX El Paso [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Motivation Monday: home internet security - KFOX El Paso [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Medical records of 26m patients at risk because of GP surgeries' failing internet security - The Sun [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Free Internet Security | Why Comodo Internet Security Suite ... [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Internet Security Software | Trend Micro USA [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Fix crap Internet of Things security, booms Internet daddy Cerf - The Register [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Internet of Things security: What happens when every device is smart and you don't even know it? - ZDNet [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- CUJO is cuter than Wall-E, and it's the only internet security device you'll ever need - Yahoo News [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- The Senate just voted to undo landmark rules covering your Internet privacy - Washington Post [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- What the Cloudbleed disaster says about the state of internet security - Information Age [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Google Has Declared Symantec Harmful To Internet Security - UPROXX [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Internet Security Analysts: North Korea Is Planning a Global Bank Heist - Breitbart News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Internet Security Firm Confirms WikiLeaks 'Vault 7' At Least 40 Cyberattacks Tied to the CIA - The Ring of Fire Network [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Homeland Security warns of 'BrickerBot' malware that destroys unsecured internet-connected devices - ZDNet [Last Updated On: April 20th, 2017] [Originally Added On: April 20th, 2017]
- A Global Industry First: Industrial Internet Consortium and Plattform Industrie 4.0 to Host Joint IIoT Security ... - Business Wire (press release) [Last Updated On: April 20th, 2017] [Originally Added On: April 20th, 2017]
- Mucheru urges private sector to boost investment in internet security - The Standard (press release) [Last Updated On: April 25th, 2017] [Originally Added On: April 25th, 2017]
- Cloudflare debuts a security solution for IoT - TechCrunch [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- Russian-controlled telecom hijacks financial services' Internet traffic - Ars Technica [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- Avira Internet Security Suite v15.0.26 - TechCentral.ie [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- NSA To Limit Some Collection Of Internet Communication - NPR [Last Updated On: April 29th, 2017] [Originally Added On: April 29th, 2017]
- Report Indicates '10 Concerts' Facebook Trend Could Compromise Your Internet Security - Complex [Last Updated On: April 29th, 2017] [Originally Added On: April 29th, 2017]
- "Improving the World" through Internet Security: Chatting with David Gorodyansky, CEO of AnchorFree - Huffington Post [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Don't Fall For This Tech Support Scam Targeting PC Users - KTLA [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Yikes! Antivirus Software Fails Basic Security Tests - Tom's Guide [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Watch Hackers Sabotage an Industrial Robot Arm - WIRED [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Decoding Internet Security: Spear phishing - Washington Post [Last Updated On: May 5th, 2017] [Originally Added On: May 5th, 2017]
- From the Desk of Jay Fallis: To internet vote, or not to internet vote - BarrieToday [Last Updated On: May 7th, 2017] [Originally Added On: May 7th, 2017]
- Crippling cyberattack continues to spread around the world - Los Angeles Times [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- Cyber Security Experts: Russia Disproportionately Targeted by Malware - Voice of America [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- The Latest: 29000 Chinese institutions hit by cyberattack - ABC News [Last Updated On: May 15th, 2017] [Originally Added On: May 15th, 2017]
- Cyberattack Aftershock Feared as US Warns of Its Complexity - New York Times [Last Updated On: May 15th, 2017] [Originally Added On: May 15th, 2017]
- This week's poll: Priorities for improving internet security - The Engineer [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Akamai Releases First Quarter 2017 State of the Internet / Security Report - PR Newswire (press release) [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Do Macs get viruses? - PC Advisor [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Massive Ransomware Attack Underscores Threats To Internet Security - Benzinga [Last Updated On: May 19th, 2017] [Originally Added On: May 19th, 2017]
- Security News This Week: Hoo-Boy, Mar-a-Lago's Internet Is Insecure - WIRED [Last Updated On: May 20th, 2017] [Originally Added On: May 20th, 2017]
- Internet security firm calls for law to compel information sharing to ... - The Star, Kenya [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- Check It Out: No need to unplug after reading books on internet security - The Columbian [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- How to beat security threats to 'internet of things' - BBC News - BBC News [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Best Mac antivirus 2017 - Macworld UK [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Avira, Kaspersky Top Windows 10 Antivirus Tests - Tom's Guide [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Paranoid about internet security? Here are the most secure OS options - The American Genius [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- Blockchain Offers Hope for the Broken Internet - Fortune [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- New uses for RFID and security for the internet of things - Phys.Org [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Security Best Practices for the Internet of Things - Web Host Industry Review [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Internet infrastructure security guidelines for Africa unveiled - Premium Times [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- In addressing internet security issues, make sure to provide solutions - Minneapolis Star Tribune [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Whistic Partners with the Center for Internet Security to Extend the ... - PR Web (press release) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Internet Security Alliance: NIST framework metrics should focus on threats - Inside Cybersecurity (subscription) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- China cyber-security law will keep citizens' data within the Great Firewall - The Register [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Cyber security: Africa gets Internet security guidelines - TheNewsGuru [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- China to Implement Its First Law on Internet Security After Ransomware Attack - Sputnik International [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Decoding Internet Security: Ransomware - Washington Post [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Internet security upgrade on course - Business Daily (press release) (blog) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- What's the Safest Laptop For Internet Security? - HuffPost [Last Updated On: June 2nd, 2017] [Originally Added On: June 2nd, 2017]
- Every Day Is Internet Security Day - The Chief-Leader [Last Updated On: June 3rd, 2017] [Originally Added On: June 3rd, 2017]
- 5 Reasons why internet security is crucial in 2017 - Techworm [Last Updated On: June 3rd, 2017] [Originally Added On: June 3rd, 2017]
- Are Pop-Ups An Internet Security Threat? - Good Herald [Last Updated On: June 4th, 2017] [Originally Added On: June 4th, 2017]
- 3 Ways Software Programs Can Help With Internet Security in 2017 - Geek Snack [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- Inside Social Security: Make every day your internet security day - Santa Ynez Valley News [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- SOCIAL SECURITY: Every day is internet security day - Palm Beach Post [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]