Defense Operations

July 1, 2013
George I. Seffers

 

July 1, 2013
George I. Seffers

 
Exelis Inc., Van Nuys, Calif., is being awarded a $20,285,451 modification to previously awarded contract for AN/SPS-48G(V) radar modification kits to support the Recovery Obsolescence Availability Radar. AN/SPS-48 radars are installed on USN ships for three-dimensional air search. The modification kits are expected to increase operational availability and decrease operating and support costs. The Naval Sea Systems Command, Washington,, D.C., is the contracting activity.

July 1, 2013
George I. Seffers

 
Northrop Grumman Corp., Electronic Systems, Linthicum Heights, Md., is being awarded a $24,502,359 modification under a previously awarded cost-plus-incentive-fee, firm-fixed-price contract to increase the estimated ceiling cost for the Ground/Air Task-Oriented Radar engineering and manufacturing development phase and associated other direct costs to reflect the anticipated cost growth. The Marine Corps Systems Command, Quantico, Va., is the contracting activity.

July 1, 2013
By Max Cacas

Rear Adm. Robert Day Jr., USCG, assistant U.S. Coast Guard commandant for command, control, communications and information technology, sees the Joint Information Environment as an opportunity to resolve some of the most pressing information technology problems in the years to come as he faces a future with more challenges and fewer resources. He says a military-wide common operating environment will establish “enterprisewide mandates that programs cannot ignore.”

July 1, 2013
By Maryann Lawlor

Today’s financial skimping will lead to military forces and equipment that are short on readiness for future conflicts. Cutbacks in training and travel to conferences where service members network, learn about the latest in technologies and benefit from educational courses is one way to meet mandated budget cuts; but in the long term, they will result in service members who are ill-prepared to meet the challenges of what some believe will be a volatile future.

July 1, 2013
By George I. Seffers
 The National Security Agency is wrapping up the Fishbowl pilot program, which distributed 100 Android devices to users. The program now transitions to the Defense Information Systems Agency.

Project Fishbowl spurs industry to
 meet military
 and intelligence 
community needs.

July 1, 2013
By Rita Boland

On-the-move communications go digital for 
troops in regular or disadvantaged locations. 

July 1, 2013
By George I. Seffers
The National Security Agency's Information Assurance Directorate is responsible for securing data for the entire national communications system.

While many cybersecurity experts preach the gloom and doom of more advanced adversaries attacking U.S. networks, one government official contends that U.S. network defenders can meet the challenge. Training, education and technological improvements are showing dividends in a better-prepared cyber workforce.

July 1, 2013
By Robert K. Ackerman
The Defense Information Systems Agency (DISA) command center at Fort Meade, Maryland, is the focal point for the agency’s efforts to maintain network connectivity throughout the U.S. defense community. DISA’s information assurance work has taken a new turn as capabilities such as commercial communications technologies and the cloud have altered the cyberscape.

The increasing use of readily available and inexpensive commercial technologies by the military is changing the way the Defense Information Systems Agency provides information assurance. As these technologies are integrated into the Defense Department information infrastructure, the agency is adjusting its approaches to providing security for its networks and the data that reside on them.

July 1, 2013
By Max Cacas
Eric Forsythe, Ph.D., team leader and flexible electronics display deputy project manager  with the Army Research Laboratory, poses with some of the equipment used to produce the flexible displays at the Army's Flexible Display Center at Arizona State University.

Recent developments in advanced materials bring the Army closer to next-generation displays for a new breed of warfighter mobile devices.

July 1, 2013
By Rita Boland
Sandia National Laboratory’s Cyber Engineering Research Laboratory (CERL) is focusing on enhancing enterprise security through an emphasis on collaboration internally and externally. CERL sits in a non-restricted area allowing easy access for academic, industry and government personnel.

Protection is as much about 
who you know as what you know.

July 1, 2013
By George I. Seffers
Law enforcement agencies and private contractors may play a larger role in solving nation state-sponsored hacks affecting national security.

Industry officials foresee 
changes in network security.

Cyber industry experts predict a number of coming developments in the cyber realm, driven in part by government strategy and funding uncertainties. The future may include a greater reliance on law enforcement to solve state-sponsored hacks, increased automation and more outsourcing.

July 1, 2013
By Lt. Ben Kohlmann, USN

As the Global War on Terrorism winds down in the minds of American military strategists, the rush to put this chapter of our history behind us without further reflection is palpable. Yet, by turning our focus to more easily understood conflicts, we risk missing the very real lessons of the past 10 years that likely will remain relevant in the coming decades.;

July 1, 2013
By Kent R. Schneider

This time it is the Internal Revenue Service (IRS) that has demonstrated bad judgment and lack of a full understanding of the rules governing large meetings. The revelation of extravagant IRS spending on meetings follows similar issues with the General Services Administration and the U.S. Department of Veterans Affairs. This waste shines a light on bad judgment for sure—but it also reveals a larger problem. For the most part, government personnel who are planning and coordinating government-run events do not do this as their primary function.

June 27, 2013
By George I. Seffers

Cyber Symposium 2013 Online Show Daily, Day 3

Gen. Keith Alexander, USA, who directs the National Security Agency (NSA) and commands U.S. Cyber Command, wrapped up the final day of the AFCEA International Cyber Symposium with a strongly-worded defense of the U.S. intelligence community, which is under fire following recently-leaked documents concerning the collection of data on the online activities of ordinary citizens in the United States and abroad. The general deviated from the topic of cyber long enough to address the controversy.

June 27, 2013
By Robert K. Ackerman

The U.S. Navy has programmed change into its $3.45 billion Next-Generation Enterprise Network (NGEN) contract.

 

June 26, 2013
By George I. Seffers

Cyber Symposium 2013 Online Show Daily, Day 2

The Joint Information Environment (JIE) took center stage during the second day of the AFCEA International Cyber Symposium in Baltimore. The conference devoted one full panel to the joint environment, but presenters throughout the day stressed the JIE’s importance to the future of the U.S. military and coalition partners, discussed some of the challenges to achieving the vision and vowed that the department will make it happen despite any remaining obstacles.

June 26, 2013
By Rita Boland

The Multi-Access Cellular Extension project develops the foundational architecture to integrate the equivalent of commercial cellular technologies into future force networks to enable communications by filling in gaps in fixed infrastructure.

June 25, 2013
By George I. Seffers

The United States will continue to develop a bilateral relationship with China regarding cybersecurity issues. In fact, the two countries will meet again in Washington, D.C., on July 8th, according to Maj. Gen. John Davis, USA, senior military advisor to the undersecretary of defense—policy for cyber, Office of the Secretary of Defense. Gen. Davis, the luncheon keynote speaker on the first day of the July 24-27 AFCEA International Cyber Symposium in Baltimore, said the United States recognizes China as a rising power and a major voice in the cyber arena.

Pages