SIGNAL Online Exclusives

October 29, 2013
By Max Cacas

The new head of the U.S. Army Cyber Command cites the importance of looking carefully at what cyberwarriors do to determine how best to manage the men and women tasked with protecting the service’s information technology networks. This focus on personnel addresses challenges ranging from retaining talent to ensuring that cyber operations have the best resources—human and technological—for their mission.

October 28, 2013
By Henry S. Kenyon

Information technology and communications companies doing business with the federal government may want to look at the Preliminary Cybersecurity Framework being released for public comment on October 29. The framework, which is a part of President Obama’s executive order for Improving Critical Infrastructure, outlines a series of voluntary steps that organizations can take to improve their network security.

October 28, 2013
By Beverly Cooper

Work has begun at the federal level to develop a nationwide dedicated, reliable network, which will provide advanced data communications capabilities to police officers, firefighters and other emergency personnel. The First Responder Network Authority (FirstNet) will enable public safety personnel to make cellular-quality calls and send data, video, images and text—similar to the capabilities offered on commercial networks. Incident commanders and local officials will have priority access and control over the network.

October 24, 2013
By Rita Boland

Lowest price technically acceptable procurement might not give government the best solutions, and it definitely causes consternation for industry, but it is here to stay at least for a while.

October 3, 2013
By Rita Boland

The latest results in graphene research show promise for improving electronics and biological or chemical sensors by pushing or pulling liquid droplets across the surface. By placing long chemical gradients onto the graphene, scientists can control the substances’ flow.

October 1, 2013
Henry S. Kenyon

The U.S. Defense Department has spent the last decade developing a family of multiband programmable radios and waveforms designed to move voice, data and video with the goal of connecting small tactical units with larger battlefield networks. Much of this work has focused on supporting warfighters on the ground through vehicle and man-portable radios. But the services now are looking at other ways to connect troops by installing the new radios in aircraft.

September 19, 2013
By Rita Boland

Biometrics is on the verge of becoming more pervasive than ever in everyday life, setting the stage for personal identifiers to take the place of other common security measures. The expansion mirrors increased usage in fields such as military operations, citizen enrollment and public safety.

 

September 16, 2013
By Henry S. Kenyon

The military’s plan to create a single, secure information-sharing environment for all the services finally is taking shape. After much talk and planning, the U.S. Defense Department’s Joint Information Environment (JIE) now is being built with its first component reaching initial operational capability this summer.

September 9, 2013
By Robert K. Ackerman

As the intelligence community moves into the cloud, it launches the first step at the desktop level.

September 6, 2013
George I. Seffers

Officials at Auburn University, Auburn, Alabama, are developing a program that allows students from any academic discipline to work closely with the U.S. intelligence community in a variety of actual national security-related problems. The university is on track to begin offering a minor in intelligence analysis in the relatively near future and a major in the next five years.

September 4, 2013
By Henry S. Kenyon

Two ongoing military programs, the ready-to-deploy Solider Network Extension (SNE) and the Content-Based Mobile Edge Networking (CBMEN) program now in prototype, aim to connect troops at the very tactical edge back to larger military data and communications networks. These programs—one service-oriented, the other an agency effort—are part of the Defense Department’s thrust to make warfighters, especially individual soldiers in small units, more connected.

August 28, 2013
By Robert K. Ackerman

The U.S. Army’s Network Integration Evaluation (NIE) is a good idea that is not achieving its potential, according to the Government Accountability Office (GAO).

August 27, 2013
By Rachel Lilly

Cutting-edge consumer technology that once seemed possible only in science-fiction films now is in the hands of experts and innovators working to solve government challenges. From wearable mobile devices to a sensor that lets you control your screen with the wave of a hand or lift of a finger, these tools could one day be key to serving soldiers in the field.

August 26, 2013
By Rita Boland

Iris scans are a legitimate form of biometric identification over the long term, a new study from the National Institute of Standards and Technology confirms.

August 21, 2013
By Henry Kenyon

As a part of its ongoing efforts to protect critical national infrastructure, the Obama administration has been actively working on making government computer networks more robust and resistant to cyber attack. To do this, the White House has looked internally at federal agencies to put into place new metrics and policies to improve their security stance and externally, reaching out to foreign governments to set up international accords on cyber espionage, a top administration official said.
 

July 31, 2013
By Robert K. Ackerman
Eugene Kaspersky, chief executive officer and co-founder of Kaspersky Lab, runs through the cyber threat spectrum and offers some solutions.

Protecting the nation from cyber attack entails deterring or preventing marauders from carrying out their malevolent plans. But, while government and the private sector endeavor to fight the menace jointly, evildoers constantly change their approaches and learn new ways of striking at vulnerable points. So many variables have entered the equation that even the likelihood of attacks—along with their effects—is uncertain.
 

July 19, 2013
By Max Cacas

In October 2014, the International Telecommunications Union (ITU) is scheduled to convene its Plenipotentiary Conference in Busan, South Korea. The conference, held every four years, is a venue for ITU member nations, including the United States, to discuss matters pertaining to the management of the planet’s telecommunications infrastructure.

July 11, 2013
By George I. Seffers

The U.S. Army is currently delivering a new and improved Coalition Joint Spectrum Management and Planning Tool (CJSMPT) to divisions scheduled for deployment in Afghanistan. The software automates the spectrum management process, dramatically reducing the amount of time and paperwork associated with spectrum allocation and mission planning in a tactical environment.

For operational security reasons, Army officials cannot reveal exactly which divisions will be receiving the systems or when, but for the next few months, they will be working to get the system out to Afghanistan.

June 27, 2013
By Robert K. Ackerman

The U.S. Navy has programmed change into its $3.45 billion Next-Generation Enterprise Network (NGEN) contract.

 

June 21, 2013
By Max Cacas
The U.S. Army has a long history of using supercomputers to further research and development toward meeting warfighter needs. A historical display of past Army supercomputers was part of the dedication of the new Army Supercomputing center.

The U.S. Army Research Laboratory (ARL) at Aberdeen Proving Grounds, Maryland, has unveiled two new supercomputers that are among the fastest and most powerful devices of their kind. The devices are part of a recently opened supercomputing center that is the new locus of the service’s use of high-speed computing not only for basic scientific research and development, but also to solve basic warfighter needs using the latest available technologies.

Pages