Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Networks

Insider Threat Survey Reveals Increased Awareness, Little Action

May 20, 2014
By George I. Seffers

Raytheon-commissioned Ponemon Institute Survey: 88 percent believe privileged user abuse will increase.

NATO Testing Intelligence, Surveillance and Reconnaissance Capabilities

May 16, 2014
By George I. Seffers

Representatives from the U.S. Army and Air Force, along with 17 NATO nations and three partner nations, will participate in a joint reconnaissance trial in Norway this month to test and evaluate intelligence, surveillance and reconnaissance concepts and technologies.

Virtual Capabilities at Heart of JIE Service

May 14, 2014
By Robert K. Ackerman

The Joint Information Environment (JIE) will be relying on virtual capabilities to a greater degree as part of several thrusts within the network. Enabling technologies include the cloud and software modernization as planners strive to ensure interoperability and access wherever users may be located.

Customer Diversity Enhances, Threatens JIE

May 14, 2014
By Robert K. Ackerman

The Joint Information Environment (JIE) seeks to network the entire defense community, but its ability to address customer requirements could run afoul of its original purpose. Many military users have specific needs that must be addressed, so the JIE must meet those requirements without jeopardizing its desired interoperability.

Mobility Is More Than a Physical Concept With JIE

May 14, 2014
By Robert K. Ackerman

A key tenet of the Joint Information Environment (JIE) will be the ability of users to have access to the same information system capabilities regardless of physical location, according to Defense Information System Agency (DISA) officials speaking on the final day of AFCEA’s three-day JIE Mission Partner Symposium.

National Security Agency Program Fills Critical Cyber Skills Gaps

June 1, 2014
By George I. Seffers

The first graduates are emerging from centers of excellence for cyber operations that teach the in-depth computer science and engineering skills necessary to conduct network operations. The program better prepares graduates to defend networks and should reduce the on-the-job training needed for new hires, saving both time and money.

The National Security Agency (NSA) initiated the Centers of Academic Excellence-Cyber Operations (CAE-CO) program in 2012. Eight schools were designated centers of excellence in the first two years with another round of announcements expected in mid-June. Agency officials say they hope eventually to have a total of 20 to 25 schools on the list.

The effort is a deeply technical, interdisciplinary, higher education program firmly grounded in the computer science, computer engineering and electrical engineering disciplines. “We had noticed that a lot of graduates coming out of universities didn’t have quite the same skills that they’ve had in the past,” recalls Steve LaFountain, dean of the College of Cyber, National Cryptologic School, and the distinguished academic chair for information assurance and cyber, NSA. “Some of the skills needed in the cyber operations field, such as low-level programming, deep knowledge of networks and network protocols and understanding of operating systems internals, were starting to become less emphasized by academic programs.”

The change in school curricula is understandable because a lot of jobs today are focused on Web applications and mobile applications and require a different skill set than today’s cyber operations, he adds. “Instead of doing C programming, they’re now doing Java, Perl and Python programming. We decided to create this program and focus the requirements on the skills necessary for cyber operations,” LaFountain explains.

Sandia Cyber Technologies Academy Offers Free Courses

May 2, 2014
By George I. Seffers

High school students and teachers get to learn about the world of cybersecurity through Sandia National Laboratories' Cyber Technologies Academy (CTA), which offers free classes for those interested in computer science and cybersecurity.

The Bottom Line: JIE Revolutionizes Transformation

May 15, 2014
By Maryann Lawlor

The military’s evolving environment stands on the strong shoulders of the past to reach for the clouds.

Just How Important Is the Joint Information Environment (JIE)?

May 1, 2014
by Kent R. Schneider

Anyone following the progress of the Joint Information Environment (JIE) knows by now that it is not a program of record. No one will see large procurements to provide the JIE. It definitely is a framework: it defines standards and architectures for consistency across the defense environment. It defines a core environment and interfaces for the connection of networks and systems to the core. The JIE leverages initiatives to consolidate networks and data centers, to establish enterprise services and to implement transitional technologies such as cloud implementations, mobility, security solutions, big data and analytics, and the Internet of everything. It is a coordinating effort, using existing and planned programs, contracts and initiatives to provide a common operating environment rather than start with new acquisitions.

It is important to understand the JIE extends well beyond the boundaries of defense. It provides the path for better information sharing with other federal, state, local and tribal networks and systems. It is vital to achieving interoperability and ease of information sharing along with security with U.S. coalition partners.

Recently, I was in Europe attending AFCEA TechNet International and NATO C4ISR Industry Days, which are fully integrated in a single program. Key to this conference is AFCEA’s partnership with the NATO Communications and Information (NCI) Agency. An important element of this conference was reporting on the state of development of the Federated Mission Network (FMN), an evolution of the Afghan Mission Network (AMN), the information sharing environment created in Afghanistan to support the International Security Assistance Force (ISAF). The FMN is intended to institutionalize the AMN experience to provide an adaptable framework for information sharing in future NATO engagements, whether combat or humanitarian assistance.

The Air Force Networks its Networks

May 1, 2014
By Robert K. Ackerman

The U.S. Air Force networking that links its air assets has extended its reach into the rest of the service and the joint realm as it moves a greater variety of information among warfighters and decision makers. This builds on existing networking efforts, but it also seeks to change longtime acquisition habits that have been detrimental to industry—and, by connection, to the goal of speeding innovative capabilities to the warfighter.

The Air Force has broadened some of its research to apply to other networks such as the Joint Information Environment (JIE). One vital effort is the Battlefield Airborne Communications Node, or BACN. It provides airborne links aboard crewed and unmanned aircraft, and future iterations may take the form of pods attached to combat aircraft. Other networks and capabilities are being developed or expanded.

This method is in line with the overall Defense Department approach to networking. “We’re starting to think much more ‘system of systems,’ but we need to graduate to ‘enterprise of enterprises,’” says Dr. Tim Rudolph, chief technology officer (CTO) at the Air Force Life Cycle Management Center. “It is that much of an integration of different features of different platforms.”

Rudolph also supports the Program Executive Officer (PEO) Command, Control, Communications, Intelligence and Networks (C3I&N) as CTO and chief architect, and he is a senior leader/technical adviser for integrated information capabilities. He explains that networking air assets includes domains such as terrestrial, space and cyber.

“Networking is like plumbing,” Rudolph analogizes. “Most people don’t hire plumbers because they like cast iron or copper [pipes]; they do it because they want to move something through the pipes.” The Joint Aerial Layer Network (SIGNAL Magazine, June 2013, page 52, “Joint Aerial Layer…”) provides a construct that allows a great deal of interoperability among assets in various domains, he observes.

Pages

Subscribe to RSS - Networks