signalarticles

Ramping Up the
 Federal Cloud Against the Insider Threat

October 1, 2014
By George I. Seffers
E-mail About the Author


The U.S. government is adopting changes to the cloud computing certification program that will better protect against potential insider threats. The improvements include additional penetration testing, more thorough testing of mobile devices, tighter controls over systems being carried from a facility and more stringent scrutiny of systems connecting from outside the network.

Soldiers from the 86th Expeditionary Signal Battalion evaluated the new command post 4G long-term evolution (LTE)/Wi-Fi system (network stacks) at the U.S. Army’s NIE 14.2. (U.S. Army photo by Amy Walker, PEO C3T)
The Army’s Tactical Network Transmission, or TNT, equipment collection includes the  4G LTE/wi-fi antenna seen on the left. (U.S. Army photo by Amy Walker, PEO C3T)
The Tropo Lite, a transit case-based tropospheric (tropo) scatter communications system, was assessed at NIE 14.2 to replace the Army’s current truck- and trailer-based system. (U.S. Army photo by Amy Walker, PEO C3T)

Awaited Technologies About to Become Reality for Warfighters

October 1, 2014
By Rita Boland
E-mail About the Author


The U.S. Army is extending advanced communications to disadvantaged users, fielding a series of capabilities to various groups in an effort to give soldiers at the pointy end of the spear the connectivity they need. With the rollout, forward-deployed troops should be able to access classified networks via wireless 4G long-term evolution connections. National Guard units also are acquiring the tools to aid their troops in disaster response scenarios.

Isolation
 Mechanisms 
Help Protect Data in Public Cloud

October 1, 2014
By Sandra Jontz
E-mail About the Author


Explosive amounts of data and the strains on limited financial resources have prompted corporations and governmental agencies alike to explore joint tenancy in the cloud for storing, processing and transmitting data. But while good fences—or in this case isolation mechanisms—make good neighbors, in the virtual world of cloud security the idiom might not ring entirely true. In the public cloud arena, risks arise when organizations place their data in a cloud system but cannot control who their neighbors might be.

Unmanned air vehicles, such as the Global Hawk, can provide full-motion video and other intelligence, surveillance and reconnaissance data directly special operators equipped with the NG-TacMN.
The NG-TacMN is capable of receiving reconnaissance data from unmanned ground vehicles, such as the Micro Tactical Ground Robot produced by Roboteam, Bethesda, Maryland, one of the NG-TacMN contractors. Persistent Systems LLC, New York City, and Azimuth Inc., Morgantown, West Virginia, also are on the NG-TacMN team.

Combating Terrorism with Next-Generation Mesh Networking

October 1, 2014
By George I. Seffers
E-mail About the Author


U.S. Defense Department and interagency special operators are scheduled to begin receiving new tactical mesh networking equipment this month. The kit provides a mobile, ad hoc, self-healing network that offers a full range of situational awareness data, including intelligence, surveillance and reconnaissance feeds, blue force tracking and a voice over Internet protocol capability.

NSA Benefits Outweigh Snowden Damage

August 28, 2014
By George I. Seffers
E-mail About the Author


Revelations about the NSA's monitoring practices created some fallout with the telecommunications industry and other nations, acknowledges Adm. Michael Rogers, USN, the agency’s new director. But the capabilities the agency provides eclipse the damage done.

Pages