recommended reading

Cyber and space systems top Defense tech priorities

Despite plans to cut $487 billion from its budget over the next decade, the Pentagon will continue to make investments in systems that will allow the United States to maintain a technological edge, Defense Secretary Leon Panetta told reporters Thursday.

The 2013 Defense budget, which will be released next month, will include increased investments in cyber technology and space systems, Panetta said, echoing comments he made when the Pentagon released a new strategy earlier this month.

Today Panetta said Defense needs to "leap ahead to defeat the enemy" across many domains, including space and cyberspace. He added that Defense managers need to make better use of information technology systems as part of a process to cut $60 billion from the department's overhead costs.

The top-line "Defense Budget Priorities and Choices" paper released by the Pentagon "highlights the increasing importance of cyber operations. As a result, cyber is one of the few areas in which we actually increased our investments, including in both defensive and offensive capabilities."

Deputy Secretary of Defense Ashton Carter declined to specify detailed funding details until the President releases the budget Feb. 13. Nextgov reported in March 2011 that the Pentagon's cybersecurity budget is ultimately hard to pin down, although officials pegged 2012 funding at $3.2 billion.

Space systems slated for an unspecified budget boost in 2013 include the Global Positioning System, the Space-Based Infrared System and the Advanced Extremely High Frequency satellite programs. The 2012 National Defense Authorization Act provided $514 million in funding for GPS, $3.1 billion for AEHF and $621.6 million for SBIRS.

The Pentagon also put a priority on and increased funding for upgrades to the Integrated Disability Evaluation System, a joint program with the Veterans Affairs Department to speed up military discharges. Veterans blasted the system as slow and unresponsive at a Senate Veterans Affairs Committee hearing in July 2011.

The 2013 budget request also includes cancellation of the Air Force Global Hawk unmanned surveillance aircraft program, as Nextgov reported yesterday. The Air Force wanted to use the Northrop Grumman Global Hawk as an inexpensive alternative to manned U-2 aircraft, but Carter said the unmanned aircraft ended up being more expensive than the manned U-2s. The Air Force will operate a fleet of 21 Global Hawks once aircraft in the production pipeline are delivered.

The Pentagon also canceled another Northrop Grumman project, the Defense Weather Satellite System as "premature to need."

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.