Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

mobile

Information Agency 
Changes Security Approach

July 1, 2013
By Robert K. Ackerman

The increasing use of readily available and inexpensive commercial technologies by the military is changing the way the Defense Information Systems Agency provides information assurance. As these technologies are integrated into the Defense Department information infrastructure, the agency is adjusting its approaches to providing security for its networks and the data that reside on them.

Future Is Bright for U.S. 
Information Assurance

July 1, 2013
By George I. Seffers

While many cybersecurity experts preach the gloom and doom of more advanced adversaries attacking U.S. networks, one government official contends that U.S. network defenders can meet the challenge. Training, education and technological improvements are showing dividends in a better-prepared cyber workforce.

Visual Information
 on Your Sleeve

July 1, 2013
By Max Cacas

Recent developments in advanced materials bring the Army closer to next-generation displays for a new breed of warfighter mobile devices.

A coalition of military, academic and industry scientists is approximately one year away from the first working prototypes of mobile devices using newly developed flexible display technologies. The goal is to demonstrate that manufacturing the displays can be done economically, and in quantity, so that they can be widely adopted by mobile device makers, benefitting both the military and consumers. Project managers ultimately hope to introduce mobile devices that are lighter, more reliable and less expensive.

These displays could make possible small screens bearing important tactical information that would be worn on the sleeve of a soldier’s uniform. Another use might be as a pen that fits in a pocket but contains a roll-out display with maps and mission information. The technology even might enable rugged displays worn on the thigh of a field medic with the latest medical record information on the patient in front of him or her.

“The goal of the program is to speed development of flexible displays for the soldier,” says David Morton, program manager for flexible displays with the Army Research Laboratory (ARL) in Adelphi, Maryland. “They had a recognized need for lightweight, rugged, flexible displays. And, although industry was working on it, the goal of the program was to speed the development so that the Army could get them sooner.”

The ARL is conducting the flexible display research and development in conjunction with Arizona State University and a growing list of industry and academic partners (see box, page 47). The focus of the nearly decade-long collaborative effort is the Flexible Display Center (FDC), located in Tempe, Arizona.

Army Makes Battlefield Cellular Networks Whole

June 26, 2013
By Rita Boland

The Multi-Access Cellular Extension project develops the foundational architecture to integrate the equivalent of commercial cellular technologies into future force networks to enable communications by filling in gaps in fixed infrastructure.

Cyber Command Redefines the Art

June 1, 2013
By Robert K. Ackerman

The U.S. Cyber Command is developing a strategy that acknowledges the convergence of network systems by empowering a similar convergence of military disciplines to help place U.S. cyberspace operators on a level field with their malevolent counterparts. This strategy acknowledges that the structure of the cyberforce has not kept pace with technology developments. As all types of information management—networking, communications and data storage—became digitized, previously disparate disciplines assumed greater commonality. With more common aspects, these disciplines share similar vulnerabilities as well as potential solutions.

NIST Releases Latest Catalog of Security and Privacy Controls for Federal Systems

May 3, 2013
by Max Cacas

A government-wide task force led by NIST is out with the latest catalog of security and privacy controls for federal information systems, including some new thinking when it comes to addressing insider threats that go beyond technology.

NIST Revises Federal Computer Security Guide

May 1, 2013

The National Institute of Standards and Technology (NIST) has released the most comprehensive update to the government’s computer security guide since 2005. The fourth revision of “Security and Privacy Controls for Federal information Systems and Organizations” (SP 800-53) addresses issues such as mobile and cloud computing, applications security, supply chain risks and privacy concerns. It also calls for maintaining routine best practices to reduce information security risks while applying state-of-the-practice architecture and engineering principles to minimize the impact of threats such as cyber attacks.

The U.S. Defense Department, the intelligence community and the Committee on National Security Systems developed SP 800-53 as part of the Joint Task Force.

Army Network Testing 
Increases Commonality

May 1, 2013
By Robert K. Ackerman

The same approach used to test and implement the Army’s single largest networking system is laying the groundwork for extending the network down to the individual soldier. As laboratory tests and field exercises validate the interoperability of separate elements in a network, system conflicts are giving way to greater commonality among different elements.

This effort has borne fruit in the evolution of the Warfighter Information Network–Tactical (WIN–T). The last fielding of WIN–T Increment 1 took place in August 2012, and WIN–T Increment 2 is taking the final steps toward deployment. Meanwhile, WIN–T Increment 3 is beginning to take shape.

As these increments progress toward full implementation, their test efforts are helping leaven out other capabilities. Greater interoperability testing of individual elements in a fully networked environment is allowing engineers to extend interoperable functions farther down the chain of command and into the hands of individual warfighters.

Col. Edward J. Swanson, USA, project manager WIN–T (PM WIN–T), explains that WIN–T Increment 1 provides a static networking capability for forces in the field. While it does not work on the move, soldiers can establish WIN–T linkage at the quick halt—they simply pull their vehicle off the road to a dead stop and immediately begin communications without a complicated setup. Newer WIN–T Increment 1 systems incorporate Joint Network Node Ka-band satellite connectivity, and its capabilities are deployed down to the battalion level. Col. Swanson describes WIN–T Increment 1 as “the backbone of the tactical network today.”

Nuclear Agency's Cloud Computing Plan Comes Together

March 20, 2013
By George I. Seffers

The U.S. National Nuclear Security Administration (NNSA) began working on its Yourcloud solution about two years ago and expects to have the cloud computing solution in place by year's end. You can read more about this in "U.S. Nuclear Agency Enhances Cybersecurity With Cloud Computing
." 

One of the surprises along the way to cloud was that NNSA is not alone in the problems it needs to solve, according to Travis Howerton, NNSA chief technology officer. "When we first started putting this together, I would have thought that we were more unique than we are, but when I traveled around talking to other chief information officers and other leaders in government agencies, or even in the commercial sector, everybody's struggling with the same set of issues," Howerton observes. "In general, what surprised me is how much synergy there is in trying to solve this problem government-wide. We're happy to be part of that overall ecosystem and to share with others what we're doing that may be helpful."

Agency officials spent about a year developing a strategic plan for transformation, which includes three pillars: the NNSA Network Vision (2NV), which modernizes the current computing environment by providing a secure, mobile, agile and adaptive IT infrastructure that will allow the NNSA workforce to perform their duties from any device, anywhere, any time; the Joint Cybersecurity Coordination Center (JC3), which provides the agency a capability for understanding the health of the systems, data and network; and the Cyber Sciences Laboratory (CSL), which establishes a process through which theoretical research in IT and cybersecurity can be rapidly applied to operational computing environments.

 

 

Military Moves on Mobile

March 4, 2013

Despite continued budget crunching, U.S. Defense Department officials are continuing to implement a three-phase plan to equip the department’s 600,000 mobile-device users with secure classified and protected unclassified mobile solutions that leverage commercial products. In conjunction with the Defense Information Systems Agency, the department’s chief information officer is establishing a basic multivendor mobility capability with the Defense Department for assessment. This first phase, which continues through April, deploys voice and data services over a commercial wireless network, and a contract will be awarded for the department’s initial enterprise mobile device management (MDM) and mobile application store (MAS). Phase two, which is set to last nine months, will focus on creating a security and service delivery infrastructure to support several competitive acquisition options. During the final phase, set to begin in October 2013, an operational capability will be offered to all Defense Department entities as a subscription-based service. Work is contingent on the availability of fiscal year 2013 and fiscal 2014 funding.
 

 

Pages

Subscribe to RSS - mobile