The U.S. military’s readiness to fight and its ability to purchase major weapon systems for the future are both threatened by strict budget caps established under sequestration, the Joint Chiefs warned during a November 7 hearing with the U.S. Senate Committee on Armed Services.
SIGNAL Online Exclusives
The delay in implementing the U.S. Navy’s Next Generation Enterprise Network (NGEN) caused by the contract challenge to the Government Accountability Office (GAO) has affected more than just the transition time frame. The network transition will cost more for the Navy because of lost funding opportunities.
A new government-run competition seeks to advance the boundaries of computer network analysis and defense by developing autonomous cyberdefense capabilities, which combine the speed and scale of automation with reasoning abilities that exceed what human experts can do.
The Government Accountability Office (GAO) has dismissed the protest of the U.S. Navy's Next Generation Enterprise Network (NGEN). As a result, the original winner of the $3.5 billion contract—a consortium headed by HP—officially has won the competition.
The new head of the U.S. Army Cyber Command cites the importance of looking carefully at what cyberwarriors do to determine how best to manage the men and women tasked with protecting the service’s information technology networks. This focus on personnel addresses challenges ranging from retaining talent to ensuring that cyber operations have the best resources—human and technological—for their mission.
Information technology and communications companies doing business with the federal government may want to look at the Preliminary Cybersecurity Framework being released for public comment on October 29. The framework, which is a part of President Obama’s executive order for Improving Critical Infrastructure, outlines a series of voluntary steps that organizations can take to improve their network security.
Work has begun at the federal level to develop a nationwide dedicated, reliable network, which will provide advanced data communications capabilities to police officers, firefighters and other emergency personnel. The First Responder Network Authority (FirstNet) will enable public safety personnel to make cellular-quality calls and send data, video, images and text—similar to the capabilities offered on commercial networks. Incident commanders and local officials will have priority access and control over the network.
Lowest price technically acceptable procurement might not give government the best solutions, and it definitely causes consternation for industry, but it is here to stay at least for a while.
The latest results in graphene research show promise for improving electronics and biological or chemical sensors by pushing or pulling liquid droplets across the surface. By placing long chemical gradients onto the graphene, scientists can control the substances’ flow.
The U.S. Defense Department has spent the last decade developing a family of multiband programmable radios and waveforms designed to move voice, data and video with the goal of connecting small tactical units with larger battlefield networks. Much of this work has focused on supporting warfighters on the ground through vehicle and man-portable radios. But the services now are looking at other ways to connect troops by installing the new radios in aircraft.
Biometrics is on the verge of becoming more pervasive than ever in everyday life, setting the stage for personal identifiers to take the place of other common security measures. The expansion mirrors increased usage in fields such as military operations, citizen enrollment and public safety.
The military’s plan to create a single, secure information-sharing environment for all the services finally is taking shape. After much talk and planning, the U.S. Defense Department’s Joint Information Environment (JIE) now is being built with its first component reaching initial operational capability this summer.
As the intelligence community moves into the cloud, it launches the first step at the desktop level.
Officials at Auburn University, Auburn, Alabama, are developing a program that allows students from any academic discipline to work closely with the U.S. intelligence community in a variety of actual national security-related problems. The university is on track to begin offering a minor in intelligence analysis in the relatively near future and a major in the next five years.
Two ongoing military programs, the ready-to-deploy Solider Network Extension (SNE) and the Content-Based Mobile Edge Networking (CBMEN) program now in prototype, aim to connect troops at the very tactical edge back to larger military data and communications networks. These programs—one service-oriented, the other an agency effort—are part of the Defense Department’s thrust to make warfighters, especially individual soldiers in small units, more connected.
The U.S. Army’s Network Integration Evaluation (NIE) is a good idea that is not achieving its potential, according to the Government Accountability Office (GAO).
Cutting-edge consumer technology that once seemed possible only in science-fiction films now is in the hands of experts and innovators working to solve government challenges. From wearable mobile devices to a sensor that lets you control your screen with the wave of a hand or lift of a finger, these tools could one day be key to serving soldiers in the field.
Iris scans are a legitimate form of biometric identification over the long term, a new study from the National Institute of Standards and Technology confirms.
As a part of its ongoing efforts to protect critical national infrastructure, the Obama administration has been actively working on making government computer networks more robust and resistant to cyber attack. To do this, the White House has looked internally at federal agencies to put into place new metrics and policies to improve their security stance and externally, reaching out to foreign governments to set up international accords on cyber espionage, a top administration official said.
Protecting the nation from cyber attack entails deterring or preventing marauders from carrying out their malevolent plans. But, while government and the private sector endeavor to fight the menace jointly, evildoers constantly change their approaches and learn new ways of striking at vulnerable points. So many variables have entered the equation that even the likelihood of attacks—along with their effects—is uncertain.