Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo


Locking the Door From the Inside

August 2003
By Kevin Holmes, John Henry and Ray Steffey

A review of U.S. Defense Department information systems using a code analysis process has found no evidence of deliberate infusion of vulnerabilities into applications, but it has found instances of bad coding practices and programmer shortcuts that have left systems open to attack. The vulnerabilities found would not have been easily detected by an outside source, but they were open doors for an insider who wished to exploit them. The systems were hosted on extremely critical networks where a breach could have catastrophic consequences.

Security Solutions Ride Wi-Fi Wave

August 2003
By Michael A. Robinson

One of the key factors inhibiting the growth of the wireless fidelity market is security. The attractive wireless technology that offers a wide range of applications also is generating a wave of uncertainty about the fidelity of its connectivity.

Alert Module Links Remote Facilities

August 2003
By Henry S. Kenyon

U.S. Army communications facilities in Okinawa, Japan, are using an automated alarm management system to monitor legacy equipment that is not interoperable. Consisting of an easily installed remote unit and management software, the system permits administrators to control multiple proprietary devices from a single on-screen interface.

Unconventional Information Operations Shorten Wars

August 2003
By Henry S. Kenyon

Future U.S. Air Force combat missions will see the widespread use of nontraditional tactics designed to end a campaign quickly with a minimum of casualties and damage. By embracing these methods, the service moves toward effects-based operations where success is measured by an enemy's decreased warfighting capabilities or outright capitulation rather than by counting casualties and destroyed equipment.

Document Exploitation Increases in Importance

August 2003
By Robert K. Ackerman

New technologies that increase the ability to process and enhance text documents are giving a badly needed boost to intelligence experts fighting terrorists and their weapons of mass destruction. Many of these technologies are being employed overseas on the battlegrounds of Afghanistan and Iraq as well as in the pursuit of terrorists in other countries.

Anatomy of Network-Centric Warfare

August 2003
By Clement C. Chen

As momentum grows for network centricity in military operations, architects of the plans may find themselves closely examining sciences such as sociology or biology to preview where network-centric activity can lead. When command, control, communications, computers and intelligence systems become more highly networked, the need for sophistication in the products and platforms that sit at the edges diminishes. In some cases, too much capability at the edge may actually inhibit self-organizing behavior and negatively impact the mission of the networked whole.

Network Centricity Begins at Home

August 2003
By Robert K. Ackerman

A new initiative by the U.S. Defense Department aims to speed the advent of network centricity by incorporating ideas directly from users. The result may be improved network centricity for small Defense Department components as well as new capabilities across the entire defense community.

Computer Models Ensure Open Navy Communication Lines

August 2003
By Lawrence Nosek

Communication decision aids are enabling U.S. Navy shipboard-system developers to improve system designs and on-station communicators to prepare better communications plans by predicting performance. The tools help designers take into account the variables of the entire communications environment, including a sea of antennas or other obstacles that could block communications. Perhaps more importantly, the tool set helps commanders answer the quandary, "I have the systems, but can I communicate?"

Thursday, May 13, 2004

Thursday, May 13, 2004

SIGNAL’s Online Show Daily

TechNet International 2004

Day 3 Quote of the Day:

 “Let there by no doubt that we are at war … in the United States.”

—Lt. Gen. Edward G. Anderson III, USA, deputy commander, U.S. Northern Command and vice commander, U.S. element, North American Aerospace Defense Command.

The third and final day of TechNet International 2004 featured blunt and direct talk from two speakers—one civilian, one military. Leading off with the breakfast address was Michael Wynne, acting undersecretary of defense for acquisition, technology and logistics.

 Instead of focusing largely on the successes of network-centric warfare, Wynne spent a considerable amount of time discussing his views on shortcomings and impending perils facing the military and the country as a whole. The country is “making a big bet” on network-centric operations, but pitfalls loom. He warned that the military is in danger of “proliferating gaps” as it moves ahead with new systems.

Tuesday, May 11, 2004

Tuesday, May 11, 2004

TechNet International 2004 Day 1

Quote of the Day:

“We have our own asymmetric advantage … our own C3.”

—Gen. Richard B. Myers, USAF, chairman of the Joint Chiefs of Staff.

Gen. Richard B. Myers, USAF, chairman of the Joint Chiefs of Staff, addresses the Tuesday luncheon audience at TechNet International 2004.

TechNet International 2004, AFCEA International’s annual conference and exposition in Washington D.C., began with a two blockbuster events to inaugurate three days of conferences, speakers, panels and courses. Being held May 11-13 at the Washington Convention Center, this year’s event was titled “Combating Emerging Threats.”

The star of the first day’s events was Gen. Richard B. Myers, USAF, chairman of the Joint Chiefs of Staff. Gen. Myers told a packed luncheon audience that command and control (C2) is the link that holds U.S. forces together, and he also described C2 as “a caulk to fill gaps.”


Subscribe to signalarticles