SIGNAL Online Exclusives

March 26, 2015
By Sandra Jontz
An example of neutron imaging: On the left, lilies photographed through an open cask. On the right, a neutron imaging system used to photograph the lilies through the lead walls of the cask. This image demonstrates the power of neutrons to easily pass through otherwise impenetrable materials.

The notion of nefarious scientists re-engineering the genetics of living organisms to then weaponize their new specimens has some researchers jostling for the upper hand, including those at the U.S. Defense Department’s main research agency. 

March 19, 2015
By Sandra Jontz
From left to right, Jason Healey, Suzanne Schwartz, Joshua Corman and Pat Calhoun discuss the impact of lack cybersecurity on the Internet of Things and health care.

Experts today trumpet the very same warnings voiced two years ago, when then Vice President Dick Cheney’s heart implant drew public attention and fervor to the mounting warnings of lax cybersecurity on wireless medical devices, some worn and some implanted inside the body. 

March 18, 2015
By Sandra Jontz
Photo courtesy of NASA

It will not be long before adversaries narrow the superiority gap the United States holds over others in satellite technology. Rivals are unencumbered by bureaucratic stagnation and can rapidly leverage commercial technology for military use, according to one panelist speaking at the Satellite 2015 symposium in Washington D.C.

February 25, 2015
By Sandra Jontz
Example of McAfee phishing quiz, determined to be among the most successful phishing email sample to compromise victims' computers through a malicious URL.

The European Union faces the same formidable increase in cyber attacks as the United States—but comes up against issues compounded by disparate national laws and cybersecurity expertise, experts say. While technology might lead to some of the security lapses, humans certainly contribute to the problem.

February 12, 2015
By Sandra Jontz
NIST's Cybersecurity Framework of protective guidelines was released February 12, 2014.

The U.S. government-backed cybersecurity framework for the nation’s federal agencies and critical infrastructure sector—released one year ago today—has received a general thumbs up of approval from industry experts, who say the NIST guideline is proving a successful advent toward a better understanding of cyber risks and organizations’ vulnerabilities. 

January 29, 2014
By George I. Seffers
Smugglers used a makeshift ramp to attempt to drive over a border fence in 2012 but fled when the truck didn’t make it over. Jeh Johnson, secretary of the Homeland Security Department, is calling for a 2015 appropriations bill to fund more technology to help secure the southern border.

Jeh Johnson, secretary of the Homeland Security Department, is calling on Congress to pass a 2015 appropriations bill to fund additional security measures for border protection and homeland security.

January 29, 2015
By George I. Seffers
An EA-18G Growler (top) and EA-6B Prowler (bottom) fly together. The Navy is developing a next-generation jammer to be integrated onto the EA-18G, but Frank Kendall warns the United States is falling behind potential adversaries on electronic warfare systems.

The U.S. is falling behind potential adversaries, such as China and Russia, in key technological areas, warned Frank Kendall, undersecretary of defense for acquisition, technology and logistics, while testifying before the House Armed Services Committee.

January 14, 2015
By Sandra Jontz

President Barack Obama has put the cybersecurity ball into Congress’ court, seeking legislation that pushes what some industry experts have clamored for in the quest to better protect the nation’s information network. The president has unveiled details for new laws toward better cybersecurity, which includes a heavy focus on increased information sharing between government and industry. Some experts have said better protections lacking a robust information-sharing plan—and the related safeguards—between the private sector and government. It's a good start, but not quite enough. 

January 12, 2015
By Sandra Jontz
Screen shot of CENTCOM's Twitter page, which had been hacked January 12, 2015.

The Twitter and YouTube accounts for the U.S. Central Command, the Defense Department branch responsible for operations in the Middle East and Afghanistan, were hacked by sympathizers of the Islamic State militant group, prompting U.S. officials to suspend the accounts and launch yet another round of investigations into a cybersecurity breach.

January 9, 2015
By George I. Seffers

Georgia Tech researchers work toward a scanner—similar to a virus scan—for side channel emissions.

January 7, 2015
By Sandra Jontz

As China, Russia and Iran continue to develop capabilities that could circumvent U.S. missile defenses, technology under development by one defense industry contracting giant has piqued the interest of the U.S. Missile Defense Agency.

December 29, 2014
By Sandra Jontz

The U.S. military can get a bird's-eye view of a battlefield or humanitarian mission via use of unmanned aerial vehicles. Now, DARPA is asking for technology that would let the military get into buildings without having troops actually step foot inside.

December 12, 2014
By George I. Seffers

With the National Geospatial-Intelligence Agency's interactive Map of the World now residing in the cloud, the intelligence agency plans to expand the tools and content.

December 10, 2014
By Sandra Jontz
Maj. Mark Jacobsen, USAF, tests an unmanned aerial vehicle as part of the Syria Airlift Project, which he hopes one day will use drones to deliver food and medicine to war-torn countries.

After witnessing the depressing impact of starvation and lack of medicine for Syrian refugees encamped in Turkey, Maj. Mark Jacobsen, USAF, embarked on a project that he hopes one day will use unmanned aerial vehicles to airdop lifesaving supplies for victims of war-ravaged nations.

December 5, 2014
By Sandra Jontz

Behavioral analytic tools might just open new horizons for better cybersecurity that would let experts better prioritize alerts and collect actionable intelligence, giving them an advantage for more rapid responses to breaches. Or might they open new doors for hackers?

November 18, 2014
By George I. Seffers

The National Institute of Standards and Technology (NIST) has published for public review draft recommendations to ensure the confidentiality of sensitive federal information residing on the computers of contractors and other nonfederal organizations working for the government.

November 18, 2014
By Sandra Jontz

Technology plays a central role in helping the Department of Veterans Affairs work smarter, not harder, to medically treat veterans, particularly those who live in rural areas of the nation.

November 14, 2014
By Sandra Jontz
Michelle Dennedy (r), chief privacy officer for Intel Security, talks about a new program to teach children safe cyberpractices in partnership with Discovery Education, led by Bill Goodwyn, (c). Penny Baldwin, CMO of Intel Security, moderated the discussion.

Intel Security partnered with Discovery Education to launch a three-year national education initiative with a goal of reaching at least 35 million students with a brand new program to teach safe cyberpractices. “Think Before You Link” is the first and only Discovery Education-supported initiative to focus on cybersecurity education with a first of its kind digital safety curricula.

November 6, 2014
By Sandra Jontz

The U.S. Army has not begun using a 3-D printer for food—yet. But scientists at the Natick Research Center have the idea and the funding to research the potential capabilities of 3-D food printers.

October 29, 2014
George I. Seffers

The Defense Department is expected very soon to release a new policy revising the role DISA plays in brokering cloud services. The changes are designed to speed cloud service acquisitions. DISA no longer will be the sole acquisition agency, but it will continue to ensure network access to cloud service providers is secure and reliable, agency officials say.

Pages