Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo

SIGNAL Online Exclusives

Small Change Realizes Large Savings

June 25, 2012
By Rita Boland, SIGNAL Online Exclusive

As U.S. military organizations and the private companies that support them struggle to adjust to decreases in funding, they are searching for efficiencies even in seemingly small matters

DOD Releases Mobile Device Strategy

June 17, 2012
By Robert K. Ackerman, SIGNAL Online Exclusive

Advanced 4G mobile service, the use of personal mobile devices and its own dedicated apps are among the objectives of Version 2.0 of the U.S. Defense Department’s Mobile Device Strategy. Released Friday, June 15, 2012, the strategy lists three major goals and several subset objectives designed to bring the benefits of mobile systems to the department.

Lockheed Martin Wins Potential $4.6 Billion Contract

June 15, 2012
By George I. Seffers, SIGNAL Online Exclusive

Industry experts say they expect the Defense Information Systems Agency to announce the winner--possibly as early as today--of the potential $4.6 billion Global Information Grid Services Management-Operations contract. The seven-year contract will provide for the day-to-day operations of the Defense Department's worldwide network, known as the Defense Information Systems Network, and related telecommunications.

Army Virtual Worlds Expert Forges Ahead Without 'Second Life'

June 11, 2012
By Max Cacas, SIGNAL Online Exclusive

One of the most ardent proponents of virtual worlds technologies for military collaboration has forged ahead and developed a version of the Second Life technology that is able to operate behind secure .mil firewalls, and it is on its way to being certified for secure operation within most military networks.

Cyber Attacks Reveal Infrastructure Holes

May 30, 2012
By Rita Boland, SIGNAL Online Exclusive

More cyber attacks launch from within the United States than anywhere else according to the latest threat report from McAfee, but the implications of the statistics are less obvious than they appear. Cybercriminals from other nations are routing their aggression through vulnerable U.S. Internet protocol (IP) addresses because outdated domains make easy targets. So while the country might not be the biggest breeding ground for hackers, its infrastructure has troubling weaknesses.

Websites that have gone without updates for the past five to six years are easy targets for malicious actors who exploit the outdated security and coding. "Our infrastructure has shown a lot of signs of weakness and age to be exploited," Adam Wosotowsky, messaging data architect at McAfee, explains. Part of the problem lies in the fact that the United States is an Internet pioneer. People from other countries often host their sites through U.S. infrastructure because it can withstand threats such as denial-of-service attacks. In addition, since no other country has more advanced Internet experience, the United States has to initiate solutions.

Older domains also are a commodity to hackers, because officials have a harder time blocking them. When a site is known to be malicious, measures can be taken to refuse content from it. But when an address historically has been trusted, blocking content becomes more complex.

Army Turns Bases Into System Docking Stations

May 24, 2012
By Rita Boland, SIGNAL Online Exclusive

The U.S. Army is making good on the mantra "train as you fight" by connecting units in garrison with the same mission command systems they use during deployments. Breaking through the bureaucracy inherent in putting these tactical technologies on a strategic network means that soldiers will be better prepared for their work in theater.

Improving Intelligence Interoperability

May 21, 2012
By George I. Seffers, SIGNAL Online Exclusive

The U.S. Defense Department is continually improving one of its major intelligence, surveillance and reconnaissance collection and distribution systems to improve interoperability among the military services and coalition allies and to make the information more readily available, increasing situational awareness on the battlefield.

The Evolving, Ever-present Cybersecurity Threat

May 11, 2012
By Max Cacas, SIGNAL Online Exclusive

The cyberthreat to the natural gas infrastructure is just a brushstroke in a bigger picture of an ongoing and evolving cybersecurity threat to the government and the nation, according to Greg Wilshusen, director of information security issues with the Government Accountability Office.

Joint Information Enterprise Rocks

May 3, 2012
By Robert K. Ackerman, SIGNAL Online Exclusive

The U.S. Defense Department's Joint Information Enterprise (JIE), launched by the Joint Chiefs of Staff Operational Deputies, will be built on "five big rocks," according to the assistant to the chairman of the Joint Chiefs of Staff. Vice Adm. Harry B. Harris Jr., USN, told the audience at the AFCEA NOVA Naval IT Day on May 3 that big rocks must serve as the foundation so that little rocks can be implemented atop them.

Corruption Could Cloud Afghanistan's Future

April 24, 2012
By Rita Boland, SIGNAL Online Exclusive

The situation in Afghanistan is good but not great, and corruption is the biggest problem facing the nation, according to Maj. Gen. John A. Toolan Jr., USMC. The corruption comes in two forms: the parasitic type found in the central government and the predatory corruption found in the military and police forces, especially the Afghan National Police. At the high level, dishonest officials use the current weak state of the Afghan government as a host off which they feed, often also making money from the drug trade.


Subscribe to RSS - SIGNAL Online Exclusives