Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo

SIGNAL Connections

Innovations Shape LandWarNet

July 15, 2008
by Robert K. Ackerman

The U.S. Army’s LandWarNet program is reinventing itself as it progresses toward its goal of full connectivity from the command level down to the individual soldier. Technologies deployed in support of warfighters in Iraq and Afghanistan are leading to changes in the overarching program, and capabilities introduced by the private sector are adding a new flavor to the Army’s contribution to the Global Information Grid.

Numerous application and system advancements have been introduced into the theater of operations, and they are the focal point of many of the Army’s LandWarNet modifications. Lt. Gen. Jeffrey A. Sorenson, USA, Army Chief Information Officer (CIO)/G-6, states that these advances are changing the communications infrastructure for LandWarNet along with the type of data and applications it is providing.

Gen. Sorenson warrants that LandWarNet is how the Army is going to communicate in the future. From the standpoint of the warfighter in Iraq or Afghanistan, LandWarNet is all about improving situational awareness. The Army has introduced data and radio transport systems—such as Force 21 Battle Command Brigade and Below (FBCB2) and Blue Force Tracking—that have improved situational awareness.

Now, the Army is introducing the command post of the future, which addresses collaboration capabilities for soldiers from the tactical edge up to higher levels such as corps and above. The new capabilities are used to generate battle update briefs on a daily basis, the general reports. All levels of the force see the same picture.

Conference Content Delivery to the Desktop


One of AFCEA’s missions is to provide a forum for ethical dialogue between government agencies and industry. In the past, this has only taken the form of conferences, symposia and exhibitions. But today, both AFCEA and SIGNAL Magazine are forging a path in cyberspace to provide yet another avenue for discussion.

In addition to their traditional Web site features, each now provides snippets of material directly from the conference site as well as full coverage by way of audio recordings, usually available within a week of the event. But listening is only one side of a dialogue, so AFCEA and SIGNAL also invite virtual visitors to share their own insights and knowledge by commenting on the blogs and contributing to the wiki. Whether part of the Millennial Generation or ready to retire, participants in these forums are using the tools of their trade to download information into the hard drive they call a brain and suggesting new ways to solve old problems.

The WEBINAR SERIES offers insights about topics that will be discussed during a future event or a burning topic of interest to the AFCEA community.

NCES Reaches Milestone C Ahead of Schedule

July 15, 2008
by Rita Boland

Superman isn’t the only one faster than a speeding bullet. The Defense Information Systems Agency (DISA) recently achieved Milestone C on its Net-Centric Enterprise Services (NCES) project six months ahead of schedule. Program personnel used a combination of a new test and evaluation master plan template and the organization’s breakthrough acquisition model to reach the milestone early. They hope to encourage other programs to speed up their processes as well.

Military developers working on information technology-related projects have been struggling for years to meet U.S. Defense Department acquisition and evaluation requirements while fielding their products on a relevant timescale. If developers respond too slowly to warfighter requirements, the troops work around acquisitions to create what they need. Another problem, especially for information technology projects, is that technologies that take too long to field may be out of date by the time they arrive.

In an effort to reduce the lag time between requirement identification and solution provision and to reduce costs, DISA began its ABC acquisition policy: adopt before buy, buy before create and create if necessary. Using that model, the NCES program was able to accelerate the rollout of several of its capabilities, including the portal function. NCES adopted the Army’s Knowledge Online (AKO) to create Defense Knowledge Online, eliminating the need for NCES personnel to start from scratch or even buy technology to develop a new portal. “The AKO portal stood out as already serving a great number of people and providing most of the capabilities [NCES] was looking for,” Dr. Steve Hutchison, DISA’s director of test and evaluation, explains.

The Toughest School of All

July 15, 2008

Throughout the 1990s, the end of the Cold War brought with it a new approach to military doctrine. Planners throughout the newly enlarged Free World modernized their forces around information technologies. In the United States, network-centric operations became the modernization catch phrase as the military moved to embrace new enabling technologies and transform for new missions and obligations.

But, as with most military modernizations in peacetime, the effect of information technologies on the fighting force largely was theoretical. Planners designed architectures around systems that then were acquired and fielded; but at the end of the day the effectiveness of the network-centric force could be evaluated only by limited training and experimentation.

That changed on September 11, 2001. The United States found itself at war, and the military soon was pressed into service in Afghanistan and Iraq. Suddenly the new network-centric systems had moved from the theoretical to the actual battlefield. The technologies and the concept itself would undergo the ultimate live-fire test—war.

Early grades were good. Warfighters liked many of the new technologies, which they found especially useful against the Taliban in Afghanistan and Saddam Hussein’s army in Iraq. Some systems making their way through the procurement pipeline were sent to the battlefield on an accelerated schedule, and they also were received warmly by the troops.

Navy's Top Acquisition Officials' Message to Small Business: Bring Your Ideas to Us

July 15, 2008

Opening-day remarks at the Navy Blue Coast Small Business Conference by two of the Navy’s top acquisition officials conveyed a clear message that the Department of the Navy values small businesses. John S. Thackrah, assistant secretary of the Navy for Research, Development and Acquisition, specifically asked for small business input and ideas in his kickoff address at this second annual Navy small business event. He encouraged small businesses to be persistent in their efforts to communicate their ideas to the Navy and remarked, “Small business is where all of our great innovation comes from.” Thackrah’s enthusiasm for the promise of the small business contribution in support of overall maritime strategy was evident throughout his remarks.

Rear Adm. Seán F. Crean, USN, deputy assistant secretary of the Navy (Research, Development and Acquisition) Acquisition and Logistics Management, in his address to the group after lunch, echoed Thackrah’s sentiments. Adm. Crean added that when it comes to small business, the Navy understands. “We know that 40 percent of our high-tech workers are employed in small businesses. We know that most of our innovation comes from small businesses.”

Both Thackrah and Adm. Crean have small business backgrounds, which helps explain their zeal. Thackrah was once a small business owner himself and understands first-hand what it means to manage a business. Adm. Crean is a Reserve component flag officer currently serving on active duty. In his civilian life, Adm. Crean works for the U.S. Small Business Administration’s Office of Government Contracting.

NMCI in a Box

July 15, 2008
by Maryann Lawlor

Disaster zones are the latest home for a system that is more often seen in command centers and Pentagon offices than in operations. The Deployable Site Transport Boundary (DSTB) is a local area network extension capability that can enable up to 200 warfighters in the field to tap into the Navy/Marine Corps Intranet (NMCI) using one public Internet protocol address. The capability was developed by the U.S. Marine Corps and EDS to enable humanitarian relief efforts with a small equipment footprint.

Ron Bowlin, manager, NMCI Enterprise Engineering Services, EDS, says the genesis of the capability occurred in mid-2006 when the Marine Corps needed instant plug-and-play access to the NMCI network during a deployment. The capability did not exist then, but by spring 2008, what has been donned “NMCI in a Box” was not demonstrated but actually used during exercise Cobra Gold in Thailand. Also, the 3rd Marine Logistics Group, based in Japan, recently used the capability while deployed to Burma as part of Joint Task Force Caring Response, a humanitarian relief mission.

The box this NMCI connection comes in is no ordinary container. About the size of a steamer trunk, it is both ruggedized and waterproof. Among the components inside is a router, virtual private networking technology, a wide-area data services application accelerator called Steelhead and an uninterruptible power supply.

New Products

by Henry S. Kenyon

Handheld Receiver

This handheld coded orthogonal frequency division multiplexing monitor/receiver is designed for a range of applications including security surveillance. The palm-sized RFX-PRX-II receiver is available in 2 gigahertz and 5.8 gigahertz versions. It is fully ruggedized with an impact-resistant plastic shell. For more information, visit


Document Inspection Software

Avoiding malicious software in incoming e-mails and files can prevent many headaches for network administrators. The PuriFile v3.2 software is a document inspection tool that detects and identifies hidden objects and metadata in Microsoft Office files that could accidentally or maliciously disclose sensitive information. The program can discover sensitive words or numbers, camouflaged text, hidden pictures or graphics, and cropped and scaled pages. For more information, visit


Tangles of electronics and power cables are not only unsightly but also a potential fire hazard. The CableBox covers and organizes power strips and surplus cable lengths. Made of flame-retardant plastic, it features open slots at either end to align cords. For more information, visit

ART: Cablebox2.jpg

Rugged Handheld Computer

Remaining connected in harsh environments can be a challenged for many workers. The Handheld Toughbook CF-U1 is designed for use by a range of professions, from industrial workers to first responders. The CF-U1 features a backlit keyboard, a sunlight-viewable liquid crystal display screen and a magnesium alloy chassis designed to survive drops up to four feet. For  more information, visit

Laptop Case

The New SIGNAL Online

June 16, 2008

The New SIGNAL Online

SIGNAL Connections arrives in thousands of e-mail inboxes each month, but now it’s time to also catch up on news about SIGNAL Online. SIGNAL Connections, AFCEA’s monthly e-newsletter, is only part of the SIGNAL family of publications. Newly redesigned and easier to get around in, the magazine’s redesigned Web site features additional online exclusives such as “On Cyber Patrol,” the popular cartoon and feature from the U.S. Army’s Office of Information Assurance and Compliance, and archives of recent SIGNAL webinars.

Also available online is SIGNAL’s digital edition—the complete magazine in an easy-to-browse format—as well as Web versions of the articles you read in SIGNAL each month, making them simple to share with colleagues through e-mail. Chapter News is more visible on the home page, making it easier for chapters to publicize what they are doing. And the magazine’s resources are going to grow as our editors find more and better channels for readers to make the most of their Internet experience.

But that’s just the beginning. As part of the AFCEA 2.0 initiatives announced in March by AFCEA President and CEO Kent R. Schneider, SIGNAL also has launched SIGNAL Scape, the official blog of SIGNAL Magazine and AFCEA International. SIGNAL Scape has expanded capabilities to allow readers to share information from SIGNAL through the medium of their choice, be it e-mail, Facebook, or more than a dozen other social media platforms.

Electronic Warfare Spans the Virtual World

June 16, 2008

The importance of electronic warfare in the information age should be a no-brainer. As electronics permeate—and in some cases dominate—every aspect of military operations, electronic warfare becomes a weapon of choice for forces ranging from the superpower down to the garage-shop terrorist. But in the same manner that the spread of information age technologies has spawned new capabilities, electronic warfare also has seen a geometric growth in its range of operations.

Electronic warfare (EW) is not new. From the day that radios appeared on the battlefield, enemies sought to intercept or degrade those signals. Signal degradation often took the form of broadcasting noise over the frequencies in use—jamming, it was called. And interception was simply a matter of listening to the same frequency as the targeted transmissions. One way U.S. forces provided real-time countermeasures to interception in both world wars was to employ American Indians who spoke in their own unique languages and code.

Now, in a world of frequency-hopping radios and digital encryption, EW has taken many forms. It is a measure of the advance of EW that it can be employed effectively by even the least-capable combatant. With U.S. military strength virtually unchallengeable on the battlefield, adversaries are turning to the virtual world to wage effective warfare against a power they cannot defeat conventionally.

International Traffic in Arms Regulations (ITAR): From a Small Business Perspective

June 16, 2008

Knowledge of the International Traffic in Arms Regulations (ITAR), including what they are, what they cover and the corporate responsibilities for compliance under these regulations, is pertinent to all small businesses that work in the federal sector. This especially is true for those that routinely deal with technical data.

Paul Luther, partner at Baker Botts LLP, addressed the AFCEA Small Business Committee and covered ITAR from a small business perspective. He shared information about specific areas that have been common pitfalls for some companies, such as the transfer, maintenance and safeguarding of technical data. In addition, Luther listed best practices that can help ensure compliance and outlined possible penalties for noncompliance.

The U.S. Department of State Directorate of Defense Trade Controls (DDTC) branch administers ITAR. The regulations deal with the export and temporary import of defense articles and the provision of defense services, including technical data and assistance to foreign nationals. All companies or individuals that manufacture, import, export or broker defense articles must register under ITAR with the DDTC. This is generally an annual registration requirement with few exemptions.


Subscribe to RSS - SIGNAL Connections