Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

signalarticles

Geospatial Data Aids Emergency Response

August 2004
By Robert K. Ackerman

A Web-based decision support system developed by private industry and university researchers allows government and military emergency responders to build situational awareness pictures of an unfolding crisis. The support tool taps data from diverse sources, translates it to a common database and presents it according to user needs.

Congress Scrutinizes Information Security Efforts

August 2004
By Maryann Lawlor

U.S. legislators are fighting to secure information systems on two fronts: the federal government and the private sector. And, they are worried that the government is underachieving badly at a most crucial time for information security.

Wireless Security Takes Shape at Defense

August 2004
By Robert K. Ackerman

The future of the network may be wireless, but without security there can be no wireless network access for the military, according to the U.S. Defense Department. The department has issued a set of guidelines establishing policy for the use of commercial wireless technologies in the Global Information Grid, or GIG. The goal is to exploit the advantages of emerging wireless technologies without compromising the very core of the military's network-centric doctrine.

Security Processes Cross Lines

August 2004
By Maryann Lawlor

The U.S. Defense Department and defense contractors are learning a lesson about security from the financial world. In a current government-industry project, authentication experts in both communities are examining how to create a cross-credentialing approach that will facilitate access to military, government and corporate facilities while at the same time boost security. The effort does not focus on issuing yet another security token but rather on establishing standard processes. These processes foster a level of trust that can be accepted between agencies and companies.

Spyware Stymies Network Operators

August 2004
By Henry S. Kenyon

The U.S. government is growing concerned about a family of computer programs that can infiltrate and compromise system integrity. These programs attach to a host computer during Internet browsing and send data to a third party about how that machine is operated. Although most of this code is used for legitimate business or marketing purposes, many types can circumvent firewall protections, leading to security breaches.

Keeping Troops Virtually in the Loop

August 2004
By Henry S. Kenyon

An experimental Internet-based system could allow future warfighters to direct satellites and unmanned aerial vehicles and to acquire reconnaissance data and imagery immediately from tactical battlefield positions. The software-based technology treats space and air assets like Internet addresses, permitting remote users to request information from them or to monitor the status of platforms.

Naval Acquisition Takes a New Tack

August 2004
By Robert K. Ackerman

The U.S. Navy's Naval Sea Systems Command is adopting corporate acquisition strategies for buying services nationwide through the Web. A new e-commerce system that expands on a three-year-old model has designated more than 100 industry teams for procurements under a performance-based contracting process. This novel contracting approach also opens new opportunities for small businesses, including set-asides for primes and subcontractors.

Australia Builds Future Tactical Network

August 2004
By Adam Baddeley

Interoperability with allied forces is a priority for Australia's military, and a program underway will deliver a multiphase, $600 million renewal of the Australian Defence Force's tactical communications systems. The program initially will rely on a bridging capability largely based on existing infrastructure that will be supplemented and ultimately replaced over at least the next decade in a series of phased improvements.

China Builds Destroyers Around Imported Technology

August 2004
By James C. Bussert

The most impressive new large guided missile destroyers (DDGs) of China's Peoples Liberation Army Navy, or PLAN, are the showcases of new operations and responsibilities beyond traditional coastal roles. The ships' new sensors, missiles and combat systems are mainly of Russian and Western origin. However, China now is faced with the challenge of operating and maintaining these advanced systems to create a credible threat to foreign navies in Far Eastern waters. This blue-water fleet primarily comprises ships that have been operational for years, but other more advanced ships are being built and may be deployed as soon as next year.

Radio Interoperability In a Box

August 2004
By James Careless

First responders from a number of organizations are now equipped with technology that allows them to coordinate their actions in an emergency using an interface that facilitates communications between incompatible devices. The interface enables one telephone and five different radio networks to interconnect by plugging in a telephone or radio handset from each network. The small, lightweight unit has been tested by the U.S. Air Force and currently is in use by the National Guard and several law enforcement groups.

Pages

Subscribe to signalarticles