SIGNAL Blogs

September 18, 2014
By Robert K. Ackerman

Demands for "immaculate collection" of intelligence data are putting U.S. national security at risk.

September 17, 2014
By Rita Boland

Cyber is the prime concern of the intelligence community, and going forward, every identity problem is a cyber issue.

September 17, 2014
By Rita Boland

The Department of Homeland Security is looking to roll out a new central biometric system in the next two to four years.

September 17, 2014
By Rita Boland

Strong credentials that people trust will unlock new government and private sector activities. That was the message this morning from Jeremy Grant, senior executive adviser, National Strategy for Trusted Identities in Cyberspace (NSTIC).

September 17, 2014
By Rita Boland

Confyrm, GSMA and MorphoTrust win contracts from NSTIC to secure identities better.

September 16, 2014
By Rita Boland

Frank Abagnale, whose now-famous criminal exploits during his early years led him to an adulthood protecting the public, explained today what concerns him in terms of security and why people, not technology, need to be the biggest concern.

September 16, 2014
By Rita Boland

Biometric identification moved past fingerprints long ago, and the range of modalities is helping the keepers of law and order make a big difference in several ways.

September 16, 2014
By Rita Boland

People often don’t know who has their information, how those groups are using it or even if it’s correct.

September 16, 2014
By Rachel Lilly

Driving somewhere unfamiliar and in need of a gas station? Starving but not sure which restaurants are nearby? The free AroundMe app for iOS and Android identifies your location and shows you a complete list of nearby businesses in the category you select.

September 16, 2014
By Rita Boland

The FBI’s Next Generation Identification system went live last week, replacing the Integrated Automated Fingerprint Identification System and improving accuracy.

September 15, 2014
By Maryann Lawlor

The Defense Information Systems Agency (DISA) is seeking information from small businesses as potential sources to provide cyber-related support services; to conduct activities; and to create products to improve the U.S. Defense Department's cyber systems.

September 12, 2014
By Rita Boland

The Department of Homeland Security Science and Technology Directorate has transitioned the first technology in its Transition to Practice program to commercial market two years ahead of schedule.

September 11, 2014
By George I. Seffers

The anniversary of 9/11 serves as a reminder of the importance of planning the national security future. In the years since, the country strengthened relationships among departments and agencies, as well as with coalition partners and allies. It also has implemented tactics, techniques, procedures and technologies for sharing information across government and with international partners.

September 11, 2014
By George I. Seffers

DISA had been identified as the Defense Department’s cloud broker, but that was rescinded just last week, reported Lt. Gen. Mark Bowman, USA, director, command, control, communications and computers/cyber and chief information officer, Joint Chiefs of Staff.

September 11, 2014
By George I. Seffers

Senior military leaders will try next week to hash out differences on the command and control (C2) of the Joint Information Enterprise, or JIE, said Lt. Gen. Mark Bowman, USA, director, command, control, communications and computers/cyber and chief information officer, Joint Chiefs of Staff, in remarks at AFCEA TechNet Augusta 2014.

September 10, 2014

AFCEA International awarded a total of $2,250 to three teams competing in the PlugFest contest, providing innovative solutions to interoperability problems. PlugFest is a demonstration of information technology interoperability using pre-integrated standards based components, from a variety of providers, which run in open standards based run-time environments across a particular enterprise.

September 11, 2014
By George I. Seffers

Many Army soldiers are receiving new vehicles and new tactical communications systems, but often those systems are so complex soldiers have difficulties setting up and taking down their tactical networks. The issue limits mobility on the battlefield because units hesitate to move knowing it can take hours to re-establish network communications, said Lt. Gen. Patrick Donahue, USA, the new deputy commanding general, U.S. Army Forces Command.

September 11, 2014

There is an enormous opportunity in the Defense Department information technology to streamline operations, reduce costs and increase security. Two enabling policies from the Federal CIO are Cloud First and Shared First.

September 10, 2014
George I. Seffers

Mission success in the cyber arena, especially in a constrained budget environment, requires both cooperation and innovation, but military and industry officials speaking at AFCEA TechNet Augusta 2014 say they are not yet seeing enough of either.

September 10, 2014
George I. Seffers

Although the U.S. Defense Department and the military industry are feeling the effects of constrained budgets, they have not yet been forced to find truly innovative solutions, Mark Bigham, chief innovation officer for Raytheon Intelligence and Information Services, told the AFCEA TechNet Augusta 2014 audience.

Pages