Networks

June 9, 2015
By Brian Roach
The U.S. Navy Enterprise Data Center in San Diego at SPAWAR Systems Center Pacific provides a centrally managed and secure application hosting environment for Navy customers.

The increased dependence on interconnected networks propelled the Defense Department to seek viable solutions to not just counter the upsurge of cyberthreats, but to do so at much quicker speeds. There's a catch, though.

November 1, 2014
By Rita Boland

The U.S. Navy’s technology plans are moving away from systems to focus on capabilities. Changes aim to ensure that the fleet has the functionality to be operationally ready at all times.

November 1, 2014
By George I. Seffers
SPAWAR Systems Center Pacific personnel and sailors from Explosive Ordnance Disposal Mobile Unit ONE retrieve an unmanned underwater vehicle deployed to detect mines and improvised explosives in shallow water environments.

As the U.S. Navy modernizes information systems across the fleet, one organization is responsible for researching, developing and fielding the full range of technologies in the Asia-Pacific region, providing complete life cycle development and support for systems, from concept to fielded capability.

October 1, 2014
By George I. Seffers

The U.S. government is adopting changes to the cloud computing certification program that will better protect against potential insider threats. The improvements include additional penetration testing, more thorough testing of mobile devices, tighter controls over systems being carried from a facility and more stringent scrutiny of systems connecting from outside the network.

October 1, 2014
By Rita Boland
Soldiers from the 86th Expeditionary Signal Battalion evaluated the new command post 4G long-term evolution (LTE)/Wi-Fi system (network stacks) at the U.S. Army’s NIE 14.2. (U.S. Army photo by Amy Walker, PEO C3T)

The U.S. Army is extending advanced communications to disadvantaged users, fielding a series of capabilities to various groups in an effort to give soldiers at the pointy end of the spear the connectivity they need. With the rollout, forward-deployed troops should be able to access classified networks via wireless 4G long-term evolution connections. National Guard units also are acquiring the tools to aid their troops in disaster response scenarios.

October 1, 2014
By George I. Seffers
Unmanned air vehicles, such as the Global Hawk, can provide full-motion video and other intelligence, surveillance and reconnaissance data directly special operators equipped with the NG-TacMN.

U.S. Defense Department and interagency special operators are scheduled to begin receiving new tactical mesh networking equipment this month. The kit provides a mobile, ad hoc, self-healing network that offers a full range of situational awareness data, including intelligence, surveillance and reconnaissance feeds, blue force tracking and a voice over Internet protocol capability.

August 14, 2014
By George I. Seffers

Lockheed Martin officials report that some attackers against their networks have disappeared—for now.

September 1, 2014
By Rita Boland

The United States is in the midst of preparing its largest intelligence hub outside of its own national borders. The center will accommodate operations with reach into several global areas, including those rife with anti-terrorism operations.

September 1, 2014
By Sandra Jontz
A U.S. Marine experiments with Lighthouse software on a mobile device.

The jury is still out in the corporate world as to whether the bring-your-own-device trend will gain a permanent foothold. While the movement creates security worries and extra work for information technology employees, it presents a few perks corporate leaders are reluctant to turn down: cost savings and increased employee productivity. Efforts for full implementation for both businesses and government entities are stymied much more by policy than by technology, or the lack thereof, experts say. While some technological shortcomings create some security risk, viable solutions are on the horizon.

July 31, 2014
By George I. Seffers

Government information technology experts see benefits and challenges to software-defined networking.

July 14, 2014
By George I. Seffers

Lawrence Livermore National Laboratory and Los Alamos National Laboratory join Bechtel BNI to train a new class of cyberdefense professionals. The program is designed to allow the national labs to recruit and rapidly develop cybersecurity specialists who can guide research at their respective institutions and create solutions that meet the cyberdefense needs of private industry.

July 14, 2014
By George I. Seffers

The National Institute of Standards and Technology (NIST) primary external advisory board today announced a report calling for the agency to increase its staff of cryptography experts and to implement more explicit processes for ensuring openness and transparency to strengthen its cryptography efforts. In making its recommendations, the Visiting Committee on Advanced Technology (VCAT) specifically addressed NIST’s interactions with the National Security Agency (NSA).

July 10, 2014
By Maryann Lawlor

Only 6 percent of power and water companies say they provide cybersecurity training to all employees.

August 1, 2014
By George I. Seffers

The U.S. Army’s current tactical network delivers a wide range of capabilities for warfighters, including unprecedented communications on the move. But the complexity can overwhelm commanders who have countless critical tasks to complete and soldiers’ lives in their hands. Future tactical networks will automate many processes and may be smart enough to advise commanders, similar to JARVIS, Iron Man’s computerized assistant.

July 1, 2014
By Robert K. Ackerman
Lt. Gen. Ronnie D. Hawkins Jr., USAF (l), director, Defense Information Systems Agency, and Lt. Gen. Mark S. Bowman, J-6, The Joint Staff, offer presentations at the JIE Mission Partner Symposium.

The shrinking military cannot achieve mission success without the advances promised by the Joint Information Environment, U.S. Defense Department leaders say. Yet the effort itself depends on innovative advances that may lead to changes in doctrine and operations if—and when—they are incorporated into the force.

June 25, 2014
By Robert K. Ackerman

U.S. Defense Department data will be invading the commercial world as the department moves its unclassified information out of its own hands. Terry Halvorsen, acting Defense Department chief information officer, described the upcoming move at the AFCEA Cyber Symposium.

June 25, 2014
By Robert K. Ackerman

U.S. Defense Department networks will need to operate with the minimum security available as connectivity and the threat picture evolve, said a top defense official. Terry Halvorsen, acting Defense Department chief information officer, minced no words as he described how tight budgets are limiting options across the board.

July 1, 2014
By Kent R. Schneider

Virtualization and cloud implementation are critical components of information technology planning, acquisition and management going forward. Cloud implementations are important to security, efficiency, effectiveness, cost savings and more pervasive information sharing, particularly among enterprises.

July 1, 2014
By George I. Seffers
DARPA’s Advanced Radio Frequency Mapping (RadioMap) program seeks to provide real-time awareness of radio spectrum use across frequency, geography and time.

U.S. Defense Department officials intend to complete a departmentwide spectrum strategy road map this month, which will make more frequencies available to warfighters, provide greater flexibility—especially for international operations—and ultimately allow warfighters to conduct their missions more effectively. At the same time, however, some are suggesting a nationwide strategy to allow for more innovative and effective spectrum management and sharing across government and industry.

July 1, 2014
By George I. Seffers
Army vehicles are required to carry jammers to counter improvised explosive devices. Researchers seek technological solutions to prevent the devices from interfering with friendly force communications and use spectrum more efficiently.

The complexities of the U.S. Army’s networks and spectrum allocation processes interfere with the need to reassign units to different tasks, creating major delays and presenting serious challenges.

Pages