SIGNAL Blogs

July 30, 2015
By George I. Seffers
The U.S. Army has announced the procurement of Motorola’s WAVE technology to enhance radio interoperability.

The U.S. Army is procuring Motorola’s WAVE software technology to fill a need for a unified application that links two-way radios, smartphones, telephones and personal computers together for seamless communications. The $14.1 million contract provides the Army with unlimited access to the capability. WAVE will act as the glue to patch together devices normally incapable of communicating with one another.

July 29, 2015
By Bob Kimball

The Department of Defense plans to leverage open source solutions and services to meet mission requirements, no matter where the tactical edge lies. Guest blogger Bob Kimball highlights how providing connectivity that enables high-performance, assured networking is not only critical, but the reason why defense and civilian agencies are closely examining software-defined networking as a solution. 

July 29, 2015
By Terry Roberts

Cyber training must include helping build high-level leaders who can pave the way into the cybersecurity future.

July 27, 2015
By Robert Clark

Strong legal issues must be addressed before companies take cyber active defense into their own hands.

July 24, 2015
By M. Thomas Davis

Acquisition reform remains a long-sought goal of defense procurement experts, but their efforts have a greater urgency as the existing system threatens the very existence of the defense industrial base.

July 22, 2015
By George I. Seffers

New cyber crime facility provides enhanced operational and training capabilities to meet the growing cyber mission. 

July 21, 2015
By Bill Nolte
Chattanooga residents create makeshift memorials to honor and remember the victims killed by a gunman. The event raises questions about the public's view on intelligence services., Officials meet to discuss the Iranian nuclear accord. The agreement raises many questions about what intelligence is capable of doing.

Two headline dominating events—the Iranian nuclear accord and the Chattanooga shootings—have significant implications for the public debate about U.S. intelligence.

July 17, 2015
By Justin Marston

Is it possible to reliably delete data from commercial mobile devices? Guest blogger Justin Marston delves into the quandary that makes it difficult for the intelligence community to turn to the private sector for some of its communications needs. 

July 15, 2015
By Davis Johnson

In the Defense Department, networks carry critical information and applications from a data center to the battlefield. Guest blogger Davis Johnson from Riverbed Technology addresses how ensuring the apps travel quickly and securely over the vast networks is not only mission-critical—it can mean the difference between life and death.

July 15, 2015
By Sandra Jontz

Cyber intelligence is the emerging buzz term as the United States works to fend off not just attacks by criminals and nation-state hackers, but terrorists calling for an electronic jihad. The state of cybersecurity isn't as good as experts hoped, given years of initiatives and billions of dollars invested in shoring up vulnerabilities.

July 14, 2015

The Commerce Department’s Public Safety Communications Research program is signing up a new round of industry collaborators for the test bed used to evaluate advanced broadband equipment and software for emergency first responders.

July 14, 2015
Maryann Lawlor

The "Great Technical Glitch of July 8" shut down institutions that represent the economy (NYSE), transportation (United Airlines) and communications or freedom of speech (The Wall Street Journal). Not to go all X Files on you, but...

July 13, 2015
By Dr. Wesley Kaplow

The recent failures of government information technology security point out the need for a new cyber service model, which features accountability and liability for the provider.

July 9, 2015
By David E. Meadows

Just as when the Soviet Union launched Sputnik nearly 58 years ago, the science community in the United States must rise to the occasion in a national security effort for information technology.

July 2, 2015
By Robert Clark

Our problem with cybersecurity is we are spending billions of dollars on prevention and enforcement and not enough on education. Sound familiar?

July 1, 2015
By Robert B. Dix Jr.

At a time when the U.S. critical infrastructure is at its most vulnerable point, the Department of Homeland Security is moving away from cooperation and coordination with the private sector.

June 30, 2015
By George I. Seffers

The FBI’s Internet Crime Complaint Center (IC3) has identified CryptoWall as the most current and significant ransomware threat targeting U.S. individuals and businesses.

June 29, 2015
By Terry Roberts

The OPM breach should serve as a wake-up call for the government to take specific measures to protect its most valuable assets—its people and their information.

June 23, 2015
By Bill Nolte

The intelligence community needs to change with the times—nothing unusual about that. But, what does it hold onto and where does it let go? The process for determining these choices is as important as its consequences.

June 19, 2015
By Sandra Jontz

NIST published today its final guidelines for federal agencies to use when they provide unclassified but sensitive information to nonfederal workers, such as contractors or universities that work with the government.

Pages