SECURITY &
US DEPARTMENT OF DEFENSE
NATO
OOSCE

How far up does each nation's airspace extend? Should enemy satellites be allowed to broadcast and listen inside US and NATO airspace? Guide missiles to hit US targets?
MISSILE & AIR DEFENSE
Over half a million Ukrainian citizens are now dead in the Russian Invasion, as of August 2023. Tragically, Russia used US Military GPS out of Peterson AFB to atttack.
DFAS, FedRAMP, DCAA, NDAA, and Fiscal Audit: Compliance & Strategy
We coach and serve US Military and vendor teams on audit compliance and program review, either as prime for smaller audit or targeted assignments; or through established partnerships with PWC, Booz Allen, Deloitte, or other primes. Our Cyber Ssecurity Audit and Performance Review expertise includes:
WHITE HOUSE CYBER SECURITY POLICY
Our world post-pandemic is particularly challenging for US National Defense mission and security, due to the lingering remote workforce model, making reliance on home data and IP integrity critical.
At a recent White House cyber security summit we were invited to attend this summer, it's not surprising that the No. 1 topic was endpoint security. Followed by malware threat. With so many workers using home lans or private hotspots; and an immigrant-rich military vendor workforce; it can be almost impossible to monitor or manage OPSEC and Endpoint threat scenarios.
Using FedRamp, Software, and Containers to Control Endpoint Creep
FedRamp remains the gold standard for US national security and cyber threats in large, distributed computing environments. But even this framework is only as strong as the weakest Beidou, Glonass, or other IOT enemy data or cellular carrier link. Foreign and even US contractors are often so loyal to their foreign technology brands, and especially to NEST, Alexis, and cameras; they forget the endpoint security risks these bring into sensitive government environments.
TECHNOLOGY & COUNTER-INTELLIGENCE
Should US Phone Carriers be Allowed to Outsource Work to Sanctioned, Unstable, or Russian-friendly Nations?
T-Mobile and Metro PCS continue to use Philippines-based customer service centres, which provide full access to US customer financial, personal, and call log data, in seeming violation of US and EU sanctions and export controls; and in violation of industry and FTC CFR compelling carriers to keep US consumer data and call logs secure and private.
The Phillipines is under US State Department and European Union warning for extreme human rights violations, ISIS and Abu Sayaf terrroist activity, and kidnapping and extreme unrest. Should the US Joint Staff impose the same restrictions against T-Mobiel equipment and service usage that it imposed on Apple, when Apple's use of Chinese manufacturing sites and workers caused security vulnerabilities? Or fines?
#CyberSecurity #RussianSanctions #OPSEC #TTFIA
GIS, Spatial Analytics, & Awareness
Geospatial and predictive tools for military and intelligence and geoint
Infor Cloud Aerospace & Defense
Used by over 5,000 aerospace and defense manufacturers worldwide
IBM, Leidos, & Oracle Analytics
OTS AI and data platform tools to leverage template models and ML
DC STRATEGIC GROUP
US Navy Top 20 Innovator of the Year
DC Strategic Group l DSG Global