Although still in the planning stages, next year’s National Level Exercise will likely include analysis of the role of social media during a major cyber event, according to sources participating in the exercise. One official says social media may prove useful in predicting and reacting to a wide array of catastrophes, including terrorist attacks, natural disasters and disease outbreaks.
SIGNAL Online Exclusives
The U.S. Navy's rescheduling of the Next Generation Enterprise Network (NGEN) request for proposals (RFP) should not delay the program, according to a Navy official. After slating an RFP release for December 21, the Navy changed course and extended the RFP release date to sometime in late January 2012 at the earliest.
This holiday season, don’t fall prey to a criminal’s cyber scam. Protect yourself by following a few simple guidelines when shopping online and giving to charities. Actually, these rules are good all year round as well.
The small form factor of increasingly popular mobile devices such as smartphones and tablets is posing new challenges to those developing applications, or apps, for these items. Gwynne Kostin offers her advice for agencies considering the move to mobile.
When it comes to Internet content consumed on a mobile device, there may be an app for that … but there’s an important distinction that must be recognized. Mobile isn't just a "little Web," according to a GSA official.
NASA's final space shuttle mission did not mark the end of U.S. space travel. Instead, scientists and engineers now have their sights set on exploring deeper into the solar system with plans to enable trips to Mars and asteroids. A plethora of projects are testing how to supply the food, liquids and fuel necessary for such journeys.
The U.S. intelligence community faces the possibility of devastating budget cuts if the congressional Joint Select Committee on Deficit Reduction does not reach an agreement by November 23, 2011. The community is not ready for the massive reductions that would be imposed if that congressional committee fails to reach agreement, says a senior defense official.
Here’s an interesting look into the inner workings of international cyber criminals by virtue of covertly recorded conversation snippets. The characteristics of similar processes in Western governments, particularly here in the United States, are well known because they are described in detail in the media. Our processes exist to provide accountability, budget constraint, quality assurance and fair competition. The bad guys have a slightly different take on how to go about things.
The U.S. Coast Guard 1st District is making plans to extend its network of disparate yet connected radio frequencies down to its front lines. If all goes according to plan, the smaller, lighter technology could make its way into the vests of boarding-team leaders, giving them the ability to connect with higher headquarters via not only voice, but also full-motion video and videoteleconferencing.
U.S. Army officials are planning improvements to the Army’s mobile cloud computing platform commonly used in Afghanistan. The next version of the Battle Command Common Services (BCCS) system will mark the Army’s first attempt to align the cloud platform with the Common Operating Environment. It will improve interoperability between the operations and intelligence communities, ultimately improving situational awareness for warfighters.
The nation’s critical infrastructure may be in more peril than anticipated as its new technology capabilities increase network vulnerability. A similar threat may extend to longtime military networks that suddenly are not as certain to be available when needed.
It may take a village of computer experts to build the next generation of networks as access, identification, applications and security concerns weigh heavily on planners and managers alike.
The future is in the East, and the United States must adapt to ensure that it can meet the challenges of the Asia-Pacific region in the 21st century.
NASA, the National Reconnaissance Office and the U.S. Air Force have created a coordinated strategy for certifying commercial launch vehicles to send their payloads into space, including Evolved Expendable Launch Vehicle missions.
A recently released report from researchers at Georgia Institute of Technology, Atlanta, Georgia, predicts an explosion of cell phone threats in the coming months and reveals newly emerging vulnerabilities, including weaknesses in mobile device browsers.
A new U.S. Army generator technology is saving fuel and lives in the rugged terrain of Afghanistan. Known as a microgrid, the technology links smart generators to provide the appropriate amount of power when it is needed.
Naval Special Warfare (NSW) Group 4 has reduced its time to process Government Purchase Card acquisitions from months to 3.2 days with a combination of technology and employee involvement. The resulting system not only lessens the time from request submission to purchase completion, it also walks users through processes to eliminate mistakes and can create various reports automatically for a variety of purposes.
A researcher at the University of Texas at Dallas has discovered a new way to anticipate the actions of computer viruses, possibly heralding a new generation of tools and strategies to combat malware that attacks networks, servers and individual personal computers.
The U.S. Marine Corps Warfighting Laboratory, Quantico, Virginia, is planning the biggest evaluation yet of its concept for networking unmanned platforms—including sensors, aircraft and ground vehicles—and controlling them with a Common Robotic Controller (CRC).
The Federal Communications Commission is in the midst of a rulemaking process for Docket No. 11-82, which would extend the commission’s rules under Part 4 of the Communications Act to telecommunications networks based on voice over Internet protocol (VoIP) technology, and broadband networking services provided by Internet service providers (ISPs).