Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

SIGNAL Online Exclusives

The Now and Next of NIE

February 6, 2013
By Rita Boland

The U.S. Army is finalizing its official report on the Network Integration Evaluation 13.1 even as it prepares for the next iteration of the event and Capability Set 14. Soldiers are tweaking processes to make the exercises more valuable while working closer with industry to speed fielding as much as possible under tight acquisition regulations.

Liquid Metal Research Makes Wires That Stretch and Self-Repair

February 4, 2013
by Max Cacas

Imagine a wire that can stretch eight to 10 times its original length and still send crystal clear audio from your music player to your earphones, or imagine accidentally cutting a cable to a tactical radio and repairing the cut just by physically putting the wires back together.

Those are just two of the many possible products that could result from materials science research now underway at North Carolina State University under the direction of Dr. Michael Dickey, assistant professor of chemical and biomolecular engineering at the university.

Both scientific developments are the result of separate but related avenues of scientific research into advanced materials, explains Dickey, who says much of the work has been conducted by graduate and undergraduate students. “They’re related in the sense that we’ve used some common materials, but they are two different projects,” he says.

“Both ideas are almost embarassingly simple,” Dickey goes on to relate. “What we’ve done is taken the architecture of a conventional wire, which is a metal core surrounded by a plastic casing, and we’ve done two things. We’ve replaced the plastic casing with an elastomeric polymer that’s more like a rubber band, so it's stretchable, and then for the core of the wire, we use a special liquid metal alloy.”

That alloy, made up of gallium and indium, is a liquid at room temperature but has a unique characteristic. “We can shape it because there’s an oxide ‘skin’ that forms on the metal. The best analogy I can use is a waterbed, which, in the absence of a plastic casing, would be a big puddle.”

U.S. Army Combines Key Acquisition Directorates

January 23, 2013
By George I. Seffers

Over the past month, the U.S. Army has consolidated two directorates in an effort to continue improving agile acquisition. Combining the offices is designed to allow more efficient and effective cooperation, enhance long-term planning capabilities and boost the service’s ability to acquire an overall system of systems.

The two directorates—System of Systems Engineering and System of Systems Integration—within the Office of the Assistant Secretary of the Army for Acquisition, Logistics and Technology [ASA(ALT)] have been combined into the Systems of Systems Engineering and Integration Directorate. Heidi Shyu, the ASA(ALT), was briefed on the changes earlier this month.

Terry Edwards, who leads the new directorate, explains that under the previous organizational structure, no one was seeing the forest for the trees. “Unfortunately, these two processes weren’t connected optimally. The benefit first, for the Army, is the ability to look at a system of systems across the Army and to bring engineering and integration together,” Edwards says. “Nobody was looking at the system of systems.”

Additionally, he says, the former structure was too focused on the near-term. “The second benefit was to look at not just the near-term focused view of what we do for the Army, but also to look out at how we shape the Army’s architecture to be more capable but also more efficient in how we deliver that capability,” he says.

The ASA(ALT) officials have been developing long-term roadmaps toward the service’s future. “One thing Ms. Shyu has been doing is trying to establish this 30 year roadmap across all of our portfolios. One of the functions of our office will be to look across those portfolios and analyze how they align,” Edwards reveals.

A New Twist to Light Wave Communications

January 19, 2013
By Robert K. Ackerman

Twisted beams of light may illuminate a straight path to more secure and higher capacity communications. A new type of photodetector developed at Harvard’s School of Engineering and Applied Sciences (SEAS) allows systems to judge these beams by their spin rate. It will allow the encoding of an infinite amount of numbers in those data streams, which offers the potential for dramatically larger data rates as well as better encryption.

Big Data in Demand for Intelligence Community

January 4, 2013
By George I. Seffers

The National Security Agency is poised to deliver an initial cloud computing capability for the entire intelligence community that will significantly enhance cybersecurity and mission performance, and unleash the power of innovation for intelligence agencies, Lonny Anderson, NSA chief information officer, says.

Evidence of Possible Spring Cyber Attack on Banking Industry

January 3, 2013
By Max Cacas

The purpose of the attack is purely robbery, says a cyber expert, who has shared his McAfee report with government officials.

A cyber attack that could result in the theft of millions of dollars from American banks could take place this spring, according to a report from a noted cybersecurity expert. 
“What we’re dealing with here is a digital bank robber,” according to Ryan Sherstobitoff, a threats researcher with McAfee Labs and the principal author of the report entitled, “Analyzing Project Blitzkrieg, a Credible Threat.” And the attack mastermind could take additional steps to deter attacked banks from defending themselves and hinder their ability to recover stolen funds following such an attack.

The group behind the potential attack “is a collaboration or an alliance of ‘botmasters’ run by an individual named vorVzakone with the clear intention of robbing financial institutions,” Sherstobitoff explains in a report that was issued in mid-December. The white paper is based on months of in-depth analysis of Project Blitzkrieg, as it has been dubbed by vorVzakone’s website, and tracking the online activities of vorVzakone dating back to late summer 2012. “We know from forum posts he had published on an underground Russian cyberforum that was really meant for cybercriminals,” explains Sherstobitoff.  Those posts detailed how the attack was to be coordinated around the release of a variant of the trojan malware popularly known in the hacker community as Gozi Prinimalka.

Army Technology Acquisition Stumbles Despite Best Efforts

December 13, 2012
By Robert K. Ackerman

In many cases, haste makes waste as the U.S. Army wrestles with the inherent contradictions that emerged as it tries to speed new information technologies to warfighters.

 

Update on the Asia-Pacific

December 4, 2012
By Rita Boland

Military activities in the Asia-Pacific region have become more focused since the release of a defense strategy a few months ago that places renewed attention on the global area. Through U.S. Pacific Command's (PACOM's) recent theater campaign plan, leaders are telling the subordinate military-service components to report back in a year on how efforts are working while deconflicting duplicate programs.

Stepped Up Cyberthreats Prompt Air Force To Rethink Training, Acquisitions

November 30, 2012
By Max Cacas

Air Force cybersecurity training may be conducted 24 hours a day, seven days a week if needed to meet burgeoning demand for cybersecurity experts in the near future, according to the service’s chief information officer. Growing threats also may drive the need for adoption of rapid acquisition practices, which are being developed by a special corps of acquisition experts.

Power Grid Study Cites “Inherent Vulnerability” to Terrorist Attack, Natural Disaster

November 29, 2012
By Max Cacas

A newly released study on America’s electrical power transmission system strongly suggests that the government and industry take steps to safeguard it from shortcomings that make it vulnerable to things such as terrorist attack and acts of nature. Potential solutions will require not only ingenuity and technology, but investment and political decisiveness.

Pages

Subscribe to RSS - SIGNAL Online Exclusives