Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo


Uncooled Photonic Devices Shine

January 2003
By Henry S. Kenyon

The U.S. Defense Department is developing miniaturized infrared detectors and sensors that do not require bulky cooling systems. These devices will be compact enough to fit in small robotic vehicles and microaircraft or will be manportable. The technology also may improve night vision and missile seeking equipment. Recent advances in physics and materials science are moving these devices from the laboratory to the battlefield.

We All Live in a See-All World

January 2003
By Maryann Lawlor

When the first commercial imaging satellite rocketed into outer space, few realized that a quiet revolution leading to total transparency had begun. Like the introduction of television, the advent of commercial satellite imagery has facilitated the dissemination of information to the world in graphic detail. But experts warn that this new capability could be a double-edged sword. Commercial satellite imagery is unveiling previously secretive activities to the court of public opinion where it can be scrutinized in a way never before possible.

Authenticating With Distinction

June 2003
By Christopher Hekimian and Sue Adamkiewicz

Information security researchers at George Washington University are studying new ways to strengthen identification authentication processes while keeping transactions as simple as possible. The techniques involve deliberate perturbations of traditional authentication processes and can be applied to password, token and biometric systems alike.

National Strategy Tackles Tough Security Issues

August 2002
By Maryann Lawlor

While military combatants continue to fight the war against terrorism on the battlefield, U.S. government officials are stepping up work to protect the borders of cyberspace. Information infrastructure security is such a high priority that government agencies are now required to provide reports on risk assessments, system security needs and security plans before they receive program funding.

Government Maps Cyberspace Security Program

April 2003
By Robert K. Ackerman

The newest U.S. government plan for cybersecurity proposes some short-term remedies while acknowledging that long-term security goals may take years to come to fruition. First published in draft form last fall, the new version establishes a list of priority programs but eschews detailed directives. This changes the thrust of the strategy from an operations manual to a list of guidelines.

Air Force Experts Attack Their Own Networks

June 2004
By Robert K. Ackerman

People and equipment rise to the occasion when military computer networks are attacked, according to evaluators at a recent U.S. Air Force exercise. A two-week event that tested experts on both native Air Force networks and a simulation range produced some surprises in the capabilities of humans and hardware.

Security Solutions Ride Wi-Fi Wave

August 2003
By Michael A. Robinson

One of the key factors inhibiting the growth of the wireless fidelity market is security. The attractive wireless technology that offers a wide range of applications also is generating a wave of uncertainty about the fidelity of its connectivity.

Locking the Door From the Inside

August 2003
By Kevin Holmes, John Henry and Ray Steffey

A review of U.S. Defense Department information systems using a code analysis process has found no evidence of deliberate infusion of vulnerabilities into applications, but it has found instances of bad coding practices and programmer shortcuts that have left systems open to attack. The vulnerabilities found would not have been easily detected by an outside source, but they were open doors for an insider who wished to exploit them. The systems were hosted on extremely critical networks where a breach could have catastrophic consequences.

Advisory Board Blazes Security Professionals Trail

August 2003
By Maryann Lawlor

An increasing emphasis on information security is prompting experts in the technology industry to follow the lead of the medical and legal professions, which feature a system of specialties and subspecialties. One major accreditation organization is taking a closer look at the government sector and addressing the distinct circumstances of information security specialists in that arena. Once specific issues are identified, they could affect the certification process as well as influence public policy.

Securing the Perimeter Virtually

February 2002
By Henry S. Kenyon

A software analysis tool allows military and civilian managers of government facilities to evaluate vulnerability to terrorist attacks quickly. Now being installed at all U.S. military installations, the program calculates the risks that a variety of extremist organizations pose to a base or building, taking into account known tactics, methods of attack, preferred weapons and capabilities. This data is converted into graphics and three-dimensional models that can be stored and incorporated into reports.


Subscribe to RSS - Security