Table of Contents: May 2015


SIGNAL May 2015JIE/DEFENSIVE CYBER OPERATIONS
Joint Force Headquarters Changes Defense Networking
    Cyber as a warfighting domain now is defended by an operational organization.

Making Progress Every Single Day on JIE
    Officials race to build a single network for national defense.

NATO Shapes its Enterprise For Conflicts of Tomorrow
    The alliance embarks on its own JIE-type effort to secure networks and built interoperability.

Commercial Cyber Vulnerabilities Challenge Transportation Command
    Key digital traffic flowing in the unclassified realm threatens sea, air and surface traffic around the globe.

VIEWPOINT
Boldness Is Needed for the Military Cloud Revolution
    Embracing new technologies with old methodologies usually leads to old results.

Pilots Face Brick Wall-Like Icing Along Equator
    A freak weather condition that spoofs sensors and controls may be the cause of airliner disappearances.

INTERNATIONAL
When the Law Becomes a Weapon of War
    Adversaries turn courtrooms into battlegrounds.

DUAL-USE EMERGENCY TECHNOLOGIES

Better Tracking of the Thin Blue Line
    Civilian emergency agencies tap one-time military exclusive technology to provide better situational awareness.

Satellite to the First Responder Rescue
    Public service agencies tap military on-the-go methods for resilient network connections.

Cyber Technology Transitions From the Lab to the Street
    National laboratory research promises to transform cybersecurity.

PEO SPOTLIGHT
Improving the Flow From Sensors to Unmanned Vehicles

DISRUPTIVE BY DESIGN
Stymied by Progress? True Leaders Don't Fear Innovation

PRESIDENT'S COMMENTARY
Igniting Cybersecurity Action

ASSOCIATION FEATURE
Perils to Homeland Security Mirror Threats of the World Stage

AFCEA EDUCATIONAL ACTIVITIES
Avaya Government Solutions Funds AFCEA STEM Scholarships

INCOMING
Thank You for Your Service