A newly revised Army regulation prescribes the use of “red teams” that are assigned to try and penetrate the security of military communications, as if they were hackers or opposition forces.
“Red Team operations expose vulnerabilities by challenging an organization’s readiness and ability to protect information. Red Team activities focus on identifying an organization’s critical and classified information to show the operational impact of physical, information and operations security shortcomings,” the regulation explains. “To replicate a true adversary, certified Red Teams have the authority to access .mil networks from public domains through the use of remote operations.”
See “Communications Security Monitoring,” Army Regulation 380-53, December 23, 2011.
Among other changes to the previous edition of the regulation, the new revision “removes the requirement to obtain permission from the Assistant Secretary of Defense for Networks and Information Integration to conduct communications security monitoring in the National Capital Region.”
We came out of the longest shutdown in history and we are all worse for it. Who won the shutdown fight? It doesn’t matter – Americans lost. And there is a chance we run it all back again in a few short months.
Promising examples of progress are emerging from the Boston metropolitan area that show the power of partnership between researchers, government officials, practitioners, and community-based organizations.
Americans trade stocks instantly, but spend 13 hours on tax forms. They send cash by text, but wait weeks for IRS responses. The nation’s revenue collector ranks dead last in citizen satisfaction. The problem isn’t just paperwork — it’s how the government builds.
In a new report, we begin to address these fundamental implementation questions based on discussions with over 80 individuals – from senior political staff to individual project managers – involved in the execution of major clean energy programs through the Department of Energy (DOE).