The Essentials of Trusted Computing and Cyber Security

Military & Aerospace Electronics

Published in Military & Aerospace Electronics

Written by Jamie Whitney


We live in a digital world that depends increasingly on technology and the systems that keeps the digital world connected. It also is incumbent on the military and the intelligence community to keep malicious actors at bay from the homeland’s connected infrastructure.

The cyber domain comprises civilian comforts like home appliances, video games, and streaming video services like Netflix and Hulu. However, comforts take a back seat to keeping our connected power grids, hospitals, logistics, satellite communications, and even our own representative democracy.

Last month, the American people participated in a nationwide general election that was protected from outside actors by the U.S. Cyber Command and National Security Agency (NSA).


Embedded computer expert Steve Edwards, director of product management at the Curtiss-Wright Corp. Defense Solutions division in Ashburn, Va., notes that hackers want to compromise, augment, or recreate the system.

“You’re listening in to see what you want to do with the information,” Edwards says. “You might be trying to disrupt, or you might be trying to just learn about the system so that you recreate it down the road or come up with countermeasures.”

End goals and uses for hackers depend on what sort of access they have, points out Charlie Kawasaki, chief technical officer for Pacific Star Communications Inc. (PacStar) tactical communications company Portland, Ore. Curtiss-Wright Defense Solutions acquired PacStar in September.

Read the full article.