Table of Contents: May 2015
JIE/DEFENSIVE CYBER OPERATIONS
Joint Force Headquarters Changes Defense Networking
Cyber as a warfighting domain now is defended by an operational organization.
Making Progress Every Single Day on JIE
Officials race to build a single network for national defense.
NATO Shapes its Enterprise For Conflicts of Tomorrow
The alliance embarks on its own JIE-type effort to secure networks and built interoperability.
Commercial Cyber Vulnerabilities Challenge Transportation Command
Key digital traffic flowing in the unclassified realm threatens sea, air and surface traffic around the globe.
Boldness Is Needed for the Military Cloud Revolution
Embracing new technologies with old methodologies usually leads to old results.
Pilots Face Brick Wall-Like Icing Along Equator
A freak weather condition that spoofs sensors and controls may be the cause of airliner disappearances.
When the Law Becomes a Weapon of War
Adversaries turn courtrooms into battlegrounds.
DUAL-USE EMERGENCY TECHNOLOGIES
Better Tracking of the Thin Blue Line
Civilian emergency agencies tap one-time military exclusive technology to provide better situational awareness.
Satellite to the First Responder Rescue
Public service agencies tap military on-the-go methods for resilient network connections.
Cyber Technology Transitions From the Lab to the Street
National laboratory research promises to transform cybersecurity.
Improving the Flow From Sensors to Unmanned Vehicles
DISRUPTIVE BY DESIGN
Stymied by Progress? True Leaders Don't Fear Innovation
Igniting Cybersecurity Action
Perils to Homeland Security Mirror Threats of the World Stage
AFCEA EDUCATIONAL ACTIVITIES
Avaya Government Solutions Funds AFCEA STEM Scholarships
Thank You for Your Service