SIGNAL Connections

June 16, 2008
SIGNAL Staff

Knowledge of the International Traffic in Arms Regulations (ITAR), including what they are, what they cover and the corporate responsibilities for compliance under these regulations, is pertinent to all small businesses that work in the federal sector. This especially is true for those that routinely deal with technical data.

June 16, 2008
SIGNAL Staff

The importance of electronic warfare in the information age should be a no-brainer. As electronics permeate—and in some cases dominate—every aspect of military operations, electronic warfare becomes a weapon of choice for forces ranging from the superpower down to the garage-shop terrorist. But in the same manner that the spread of information age technologies has spawned new capabilities, electronic warfare also has seen a geometric growth in its range of operations.

June 16, 2008
by Maryann Lawlor

June 15, 2008
by Maryann Lawlor

June 16, 2008
by Henry S. Kenyon

A Canadian company is offering two free software packages that allow a single computer to support two workstations. Besides supporting multiple computers, the software provides computers with a range of office applications.

June 16, 2008
by Henry S. Kenyon

May 15, 2008
by Robert K. Ackerman

The ongoing conflict in Southwest Asia is changing the thrust of many charities that support warfighters and their families. As patterns of need have emerged over time, charities are shifting their focus toward specific activities that address those needs.

The charities are not abandoning their original purposes. Instead, they are taking on new roles that are increasing in importance. And despite the slow economy, people are responding to charities’ appeals on behalf of men and women in the armed forces.

May 15, 2008
by Henry S. Kenyon

In late April, hackers attempted to penetrate the computer networks of several U.S. military academies and graduate schools. The intruders tried to infiltrate the school’s cyberdefenses to plant malicious software, shut down servers and cause damage to data. The military institutions resisted the attacks with varying levels of success, for which they were graded—there was a trophy at stake.

May 15, 2008
by Henry S. Kenyon

May 15, 2008
by Maryann Lawlor

May 15, 2008
by Maryann Lawlor

While most military planning focuses on how to win wars, a concept developed by forward-thinkers in the joint world is honing methods to prevent them. Dubbed cooperative security, the plan aims at helping countries with struggling governments and economies so they do not fall victim to internal conflict or become tempted to open their doors to terrorists.

May 15, 2008
by Rita Boland

The minds of the world creating the future’s communications technology already know what to expect in the next generation—tools that are smaller, more powerful and more flexible yet less expensive. These experimenters also know that current bandwidth problems have to be a focus area for future operations.

June 16, 2008
SIGNAL Staff

The U.S. government’s progress toward a universal personal identification card for government employees and contractors is moving into the next phase. A need to increase key lengths to ensure security has the National Institute of Standards and Technology (NIST) busy working to define replacements and to determine a specific migration schedule. Updates will begin at the end of this year and continue through 2015.

May 15, 2008

The AFCEA Intelligence Committee is looking for a few good men and women from industry to share their expertise by serving as members of the committee. The group comprises intelligence professionals from both the public and private sectors who volunteer to oversee AFCEA’s intelligence outreach.

November 17, 2008
SIGNAL Staff

SIGNAL Staff

August 2009
Satellite Communications/Search and Rescue System

Pages