U.S. Army Rides Interoperability WAVE

July 30, 2015
By George I. Seffers
E-mail About the Author

The U.S. Army is procuring Motorola’s WAVE software technology to fill a need for a unified application that links two-way radios, smartphones, telephones and personal computers together for seamless communications. The $14.1 million contract provides the Army with unlimited access to the capability. WAVE will act as the glue to patch together devices normally incapable of communicating with one another.

The procurement, which was finalized June 30 and announced today, brings WAVE to the Army’s tactical network. WAVE will serve as the voice solution for command posts, enabling Army leaders to more effectively collaborate for mission command planning and operations. The technology can deliver interoperability in disaster relief efforts where disparate radio systems must work together quickly, and throughout the Army’s tactical network to allow communications with coalition networks and between tactical and commercial devices.

With WAVE, for example, two-way radio communication is converted into a voice over Internet protocol (VoIP) application that allows anyone with authorization and a voice-enabled IP device to participate in voice communications, regardless of the network or device. WAVE will be employed to fulfill requirements of programs of record under the U.S. Army’s Program Executive Office Command, Control and Communications–Tactical (PEO C3T), based at Aberdeen Proving Ground, Maryland.

Military Networks Embracing SDN to Gain Visibility and Control

July 29, 2015
By Bob Kimball

The Department of Defense plans to leverage open source solutions and services to meet mission requirements, no matter where the tactical edge lies. Guest blogger Bob Kimball highlights how providing connectivity that enables high-performance, assured networking is not only critical, but the reason why defense and civilian agencies are closely examining software-defined networking as a solution. 

Focusing on Acquisition Reform

July 24, 2015
By M. Thomas Davis

Acquisition reform remains a long-sought goal of defense procurement experts, but their efforts have a greater urgency as the existing system threatens the very existence of the defense industrial base.

Two Events, Many Questions

July 21, 2015
By Bill Nolte

Two headline dominating events—the Iranian nuclear accord and the Chattanooga shootings—have significant implications for the public debate about U.S. intelligence.

'Delete' Seems to be the Hardest Word

July 17, 2015
By Justin Marston

Is it possible to reliably delete data from commercial mobile devices? Guest blogger Justin Marston delves into the quandary that makes it difficult for the intelligence community to turn to the private sector for some of its communications needs. 

Solving the DOD Network Visibility Crisis

July 15, 2015
By Davis Johnson

In the Defense Department, networks carry critical information and applications from a data center to the battlefield. Guest blogger Davis Johnson from Riverbed Technology addresses how ensuring the apps travel quickly and securely over the vast networks is not only mission-critical—it can mean the difference between life and death.

Intel Community to Tackle State of Cybersecurity at Fall Summit

July 15, 2015
By Sandra Jontz
E-mail About the Author

Cyber intelligence is the emerging buzz term as the United States works to fend off not just attacks by criminals and nation-state hackers, but terrorists calling for an electronic jihad. The state of cybersecurity isn't as good as experts hoped, given years of initiatives and billions of dollars invested in shoring up vulnerabilities.