Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

SIGNAL Online Exclusives

Learning Real-World Intelligence Analysis

September 6, 2013
George I. Seffers

Officials at Auburn University, Auburn, Alabama, are developing a program that allows students from any academic discipline to work closely with the U.S. intelligence community in a variety of actual national security-related problems. The university is on track to begin offering a minor in intelligence analysis in the relatively near future and a major in the next five years.

Implemented about a year ago, the program is described as a work in progress. In fact, it has not yet been officially named, but will likely be called the Intelligence Analysis Program. “The goal of the program is to train the future analysts for the intelligence community, the military and business. "What we are trying to do is to provide a learning environment in which students have to deal with real analytical problems,” reports Robert Norton, professor and director of the Open Source Intelligence Laboratory, Auburn University. “We’re not just using things like case studies. We’re actually working current problems. And we do so in an environment where they’re working under an operational tempo similar to what is experienced in the intelligence community.”

Future intelligence analysts learn how analytical products are put together, how data is validated and how to communicate findings in a timely manner. “What we say is that our students work on real problems with real customers. We are working with the intelligence community, we’re working with various combatant commands, and we’re working with various businesses,” Norton says.

New Systems Seek to Connect Troops at the Tip of the Spear

September 4, 2013
By Henry S. Kenyon

Two ongoing military programs, the ready-to-deploy Solider Network Extension (SNE) and the Content-Based Mobile Edge Networking (CBMEN) program now in prototype, aim to connect troops at the very tactical edge back to larger military data and communications networks. These programs—one service-oriented, the other an agency effort—are part of the Defense Department’s thrust to make warfighters, especially individual soldiers in small units, more connected.

GAO Calls for Army to Tweak NIE

August 28, 2013
By Robert K. Ackerman

The U.S. Army’s Network Integration Evaluation (NIE) is a good idea that is not achieving its potential, according to the Government Accountability Office (GAO).

Google Glass Sharpens View of Wearable Computer Future

August 27, 2013
By Rachel Lilly

Cutting-edge consumer technology that once seemed possible only in science-fiction films now is in the hands of experts and innovators working to solve government challenges. From wearable mobile devices to a sensor that lets you control your screen with the wave of a hand or lift of a finger, these tools could one day be key to serving soldiers in the field.

Thermopylae Sciences and Technology, based in Arlington, Virginia, is one defense contractor pushing the technology envelope to apply commercial solutions to government problems. By participating in the Google Glass Foundry and Explorer programs, which make technology available to early adopters, the company recently acquired several pairs of Google glasses. Through this program and partnerships with other technology companies, Thermopylae now is experimenting with how wearable computers could integrate with its current and future products.

“What we’re able to do is to start prototyping and working with these devices in conjunction with the tools and technology we’re developing for actual government programs,” John-Isaac Clark, chief innovation officer for Thermopylae, says. As part of the Google Glass effort, “We can get early access to some of these technology improvements and then wonder … how might this technology let me interact with the user in a different way altogether?”

Clark, brother of Thermopylae President A.J. Clark, is a self-proclaimed geek and wears the glasses up to eight hours per day to explore the capabilities. While Google focuses on the commercial and consumer product spaces, Clark believes Google Glass sheds light on the potential for wearable computers in the military realm. “Eventually, while it is incredibly unlikely to be Google Glass, a soldier will have something like this.”

Don’t Blink! Eyes Provide Long-Term Identifications

August 26, 2013
By Rita Boland

Iris scans are a legitimate form of biometric identification over the long term, a new study from the National Institute of Standards and Technology confirms.

White House Cyber Policy Focuses on Internal Consolidation, External Engagement

August 21, 2013
By Henry Kenyon

As a part of its ongoing efforts to protect critical national infrastructure, the Obama administration has been actively working on making government computer networks more robust and resistant to cyber attack. To do this, the White House has looked internally at federal agencies to put into place new metrics and policies to improve their security stance and externally, reaching out to foreign governments to set up international accords on cyber espionage, a top administration official said.
 
The administration has several major priorities for its cyberspace policy: protecting critical infrastructure, securing the government, engaging internationally, and shaping the future, explained Andy Ozment, the White House’s senior director for cybersecurity.
 
Speaking at the USENIX Security Symposium in Washington D.C., on August 15, he said that as part of its overall cyberspace goals, the Obama administration is actively pursuing international engagement and cooperation. This is a necessity as most cyberspace intrusions come from overseas, he said, adding that it also touches on diplomatic issues. This is because the term “attack” has a number of political implications that can potentially lead to direct conflict with a nation. On the other hand, intrusions fall under the category of espionage, an area where there are well established protocols for working with other nations, he said.
 

Cyber Threats Abound, but Their Effects Are Not Certain

July 31, 2013
By Robert K. Ackerman

Protecting the nation from cyber attack entails deterring or preventing marauders from carrying out their malevolent plans. But, while government and the private sector endeavor to fight the menace jointly, evildoers constantly change their approaches and learn new ways of striking at vulnerable points. So many variables have entered the equation that even the likelihood of attacks—along with their effects—is uncertain.
 

Change Ahead for Global Governance of the Internet

July 19, 2013
By Max Cacas

In October 2014, the International Telecommunications Union (ITU) is scheduled to convene its Plenipotentiary Conference in Busan, South Korea. The conference, held every four years, is a venue for ITU member nations, including the United States, to discuss matters pertaining to the management of the planet’s telecommunications infrastructure. One of the most contentious and controversial issues dealt with in previous meetings of this type is global governance of the Internet. And now, one of the people who was “present at the creation” and helped develop the initial technical protocols for what would become the Internet is speaking out on the governance issue and the possibility of continued contention at next year’s ITU meeting.

Vint Cerf is vice president and chief Internet evangelist with Google in Reston, Virginia. Because the Internet as it is known today is largely the result of the American military’s investment in its predecessor, the DARPAnet, Cerf describes the U.S. role in the governance of the global network as “seminal.” As the Internet has evolved from being a resource for academics and government scientists, to a fast-growing network for commercial business, and now, a global communications tool, so too has the governance of what Cerf calls “the Internet ecosystem.”

Cerf, who helped invent the IP system for the transmission of data packets, says that the “distributed” nature of the Internet, which he calls “an engine of permissionless invention,” is also at the heart of the challenges of governance.

Spectrum Management System Deploying to Afghanistan

July 11, 2013
By George I. Seffers

The U.S. Army is currently delivering a new and improved Coalition Joint Spectrum Management and Planning Tool (CJSMPT) to divisions scheduled for deployment in Afghanistan. The software automates the spectrum management process, dramatically reducing the amount of time and paperwork associated with spectrum allocation and mission planning in a tactical environment.

For operational security reasons, Army officials cannot reveal exactly which divisions will be receiving the systems or when, but for the next few months, they will be working to get the system out to Afghanistan.

Warfighters are continually confronted with an increasingly crowded radio spectrum—too many devices transmitting on a limited range of frequencies and interfering with one another. Poor spectrum availability can have a devastating effect on operations, and spectrum management normally is a complex and time-consuming process involving frequency access requests that must be approved at multiple levels. “There’s a lot of paperwork associated with the spectrum management process. There are thousands of these [requests] that have to be prepared, submitted, received and reconciled down at the brigade level. Normally, this could take days or even weeks in preparation for a mission or deployment, and CJSMPT can do this in a matter of hours. It provides automation to the spectrum manager to reduce the complexity of his tasks,” says Bob Shields, chief of the Spectrum Analysis and Frequency Management Branch, Space and Terrestrial Communications Directorate, U.S. Army Communications-Electronic Research, Development and Engineering Center (CERDEC), Aberdeen Proving Ground, Maryland.

Citing Cost, Innovation and Flexibility, Navy Awards NGEN Contract to HP Group

June 27, 2013
By Robert K. Ackerman

The U.S. Navy has programmed change into its $3.45 billion Next-Generation Enterprise Network (NGEN) contract.

 

Pages

Subscribe to RSS - SIGNAL Online Exclusives