SIGNAL Blogs

February 27, 2015
By George I. Seffers
Logos Technologies has received a contract to continue development of the SilentHawk military motorcycle in partnership with Alta Motors.

Logos Technologies, Fairfax, Virginia, has received a Phase II Small Business Innovation Research (SBIR) award from the Defense Advanced Research Projects Agency (DARPA) to continue development of the SilentHawk military motorcycle in partnership with Alta Motors.

February 27, 2015
By Terry Roberts

In 2015, we have approximately 3 million apps that we can download to our wireless devices (iOS and Android), topping out with more than 100 billion apps to be downloaded across all devices. As a result, the hunt is on for assured privacy and security.

February 26, 2015
By Sandra Jontz
Homeland Security Secretary Jeh Johnson, joined by leadership and employees from the DHS, calls on Congress on Monday to fully fund the department.

Secretary of Homeland Security Jeh Johnson voiced a hesitant optimism Thursday that U.S. Congress will come together to fully fund the department before tomorrow’s deadline that could shutter parts of the Department of Homeland Security.

February 26, 2015
By Sandra Jontz
NASA's Nanosatellite Launch Adapter System was developed to increase access to space while simplifying the integration process of miniature satellites, called nanosats or cubesats, onto launch vehicles.

Nations plan to launch more than 500 small satellites over the next five years, an increase of two-thirds in the number of the small space-bound platforms when compared with launches over the past decade, according to an international space firm report.

February 26, 2015
By Ed Bender
U.S. soldiers work on a Mission Event Synchronization List in the Joint Cyber Control Center during Operation Deuce Lightning in 2011.

Guest blogger Ed Bender from SolarWinds outlines the steps the U.S. Defense Department should take to secure and streamline information networks successfully toward the realization of the JIE. The department must strive for greater interoperability of NetOps and other IT management tools within the services.

February 26, 2015
By Maryann Lawlor

The Intelligence Advanced Research Projects Activity (IARPA) Office for Anticipating Surprise has initiated a competition for its Cyber-attack Automated Unconventional Sensor Environment (CAUSE) program, which aims at discovering ways to anticipate cyber attacks before they occur.

February 25, 2015
By George I. Seffers

A group of 144 universities warned Congress that pending legislation to address patent litigation abuses is so broadly drawn that it would weaken the nation’s patent system and hinder the flow of groundbreaking advances from universities to the private sector.

February 24, 2015
By Maryann Lawlor

The National Security Agency’s third annual Best Scientific Cybersecurity Paper competition is now open. Deadline for submissions is March 31.

February 19, 2015
NIST researchers developed this directional 16-antenna array to support modeling of wireless communications channels at 83 gigahertz.

Researchers at the National Institute of Standards and Technology are developing measurement tools for new mobile communications channels that could offer more than 1,000 times the bandwidth of today’s cellphone systems.

February 12, 2015
By Robert K. Ackerman

The three sea services are facing different challenges with cyber operations, but they are adopting some similar solutions as they wrestle with the newest warfighting domain.

February 12, 2015
By Robert K. Ackerman

Already dealing with an expanded mission set, the U.S. Coast Guard is facing new challenges as economic conditions generate different types of stresses on existing assets and capabilities.

February 12, 2015
By Robert K. Ackerman

The Navy’s mission set is likely to continue to grow over the foreseeable future, but the same cannot be said of the fleet. Both surface ships and submarines will need to be replaced or complemented, but budget restrictions severely hinder the Navy’s ability to meet those goals.

February 12, 2015
By Robert K. Ackerman

The U.S. Marine Corps needs more amphibious ships as it returns to its roots amid tight budgets. The Corps also needs to lighten the load its warfighters bear, and it wants to be able to access advanced intelligence data from its most sophisticated platform.

February 12, 2015
By Robert K. Ackerman

China is flexing its muscles and projecting power far beyond its traditional realm, but North Korea poses a bigger threat by nature of its irrational leadership.

February 12, 2015
By Robert K. Ackerman

Humanitarian assistance/disaster relief (HA/DR) has become so important a part of U.S. operations in the Asia-Pacific region that experts now are viewing it as a military doctrine and striving to improve it.

February 12, 2015
By Robert K. Ackerman

India, a nonaligned nation long reluctant to involve itself in the geopolitics of the Asia-Pacific region, has begun to increase its involvement with the United States and other nations of the dynamic region.

February 12, 2015
By Robert K. Ackerman

Viewed as an indispensable force for peace and security in the Asia-Pacific region, the United States risks losing the support it enjoys from nearly every nation in that hemisphere if it is ambiguous and not willing to take a stand during crises, said defense experts.

February 12, 2015
By Robert K. Ackerman

The U.S. Navy is exploiting its own assets and other capabilities to defend and protect against cyberthreats. Some of these internal assets include automated triggers in networks as well as advanced intelligence sources.

February 12, 2015
By Robert K. Ackerman

The U.S. Navy is facing new and better cyber adversaries as it expands its own cyber footprint. These threats face the fleet and the nation, and the Navy may be called upon to respond in both cases.

February 12, 2015
By Robert K. Ackerman

The U.S. Navy is focusing on five long-term goals in its cyber operations that involve other service and national assets.

Pages