The U.S. Naval Education and Training Command (NETC) is in the first stages of a five-stage plan to virtualize its computers at facilities across the globe in an attempt to save resources. Though the program itself has no direct connection to the recent sequester cuts that went into effect earlier this month, such projects could present possible cost-saving options to budget-constrained organizations.
SIGNAL Online Exclusives
The United States quickly must adopt a segmented approach to its military forces to ensure that key elements can survive a comprehensive cyber attack, according to a recently released Defense Science Board (DSB) Task Force on Resilient Military Systems. This approach entails a risk reduction strategy that combines deterrence, refocused intelligence capabilities and improved cyber defense.
U.S. Navy technology may allow in-flight conversion from helicopter to fixed wing.
Researchers at the U.S. Naval Research Laboratory are developing unmanned aircraft technology that will allow the conversion from a vertical take-off and landing system to a fixed-wing craft during in-flight operation. The conversion capability will provide the take-off and landing flexibility of a helicopter with the longer range, higher speeds and lower wear and tear of an airplane.
The sea service seeks to extend NMCI’s lifetime just in case its replacement is delayed.
The Long Beach Police Department dive team adopts new homeland security equipment.
The Long Beach, California, police department dive team is now using a newly acquired search and recovery system to help protect the local port, shipping lanes and critical infrastructure.
The latest generation Tracking and Data Relay Satellite, TDRS-K, updates existing technology with an eye to the future. New electronics and better power management will help extend the TDRS constellation for at least another decade, but NASA already is looking ahead to major changes in the system’s capabilities that would define the next-generation TDRS.
One day after unveiling a long-awaited executive order concerning a wide-range of cybersecurity concerns, President Barack Obama’s top cybersecurity advisers admit that the order only goes so far in dealing with pressing Internet security needs. They say that the order is only a “down payment” and no substitute for permanent congressional legislation on the matter.
The U.S. Army is finalizing its official report on the Network Integration Evaluation 13.1 even as it prepares for the next iteration of the event and Capability Set 14. Soldiers are tweaking processes to make the exercises more valuable while working closer with industry to speed fielding as much as possible under tight acquisition regulations.
Imagine a wire that can stretch eight to 10 times its original length and still send crystal clear audio from your music player to your earphones, or imagine accidentally cutting a cable to a tactical radio and repairing the cut just by physically putting the wires back together.
Those are just two of the many possible products that could result from materials science research now underway at North Carolina State University under the direction of Dr. Michael Dickey, assistant professor of chemical and biomolecular engineering at the university.
Over the past month, the U.S. Army has consolidated two directorates in an effort to continue improving agile acquisition. Combining the offices is designed to allow more efficient and effective cooperation, enhance long-term planning capabilities and boost the service’s ability to acquire an overall system of systems.
Twisted beams of light may illuminate a straight path to more secure and higher capacity communications. A new type of photodetector developed at Harvard’s School of Engineering and Applied Sciences (SEAS) allows systems to judge these beams by their spin rate. It will allow the encoding of an infinite amount of numbers in those data streams, which offers the potential for dramatically larger data rates as well as better encryption.
The National Security Agency is poised to deliver an initial cloud computing capability for the entire intelligence community that will significantly enhance cybersecurity and mission performance, and unleash the power of innovation for intelligence agencies, Lonny Anderson, NSA chief information officer, says.
The purpose of the attack is purely robbery, says a cyber expert, who has shared his McAfee report with government officials.
In many cases, haste makes waste as the U.S. Army wrestles with the inherent contradictions that emerged as it tries to speed new information technologies to warfighters.
Military activities in the Asia-Pacific region have become more focused since the release of a defense strategy a few months ago that places renewed attention on the global area. Through U.S. Pacific Command's (PACOM's) recent theater campaign plan, leaders are telling the subordinate military-service components to report back in a year on how efforts are working while deconflicting duplicate programs.
Air Force cybersecurity training may be conducted 24 hours a day, seven days a week if needed to meet burgeoning demand for cybersecurity experts in the near future, according to the service’s chief information officer. Growing threats also may drive the need for adoption of rapid acquisition practices, which are being developed by a special corps of acquisition experts.
A newly released study on America’s electrical power transmission system strongly suggests that the government and industry take steps to safeguard it from shortcomings that make it vulnerable to things such as terrorist attack and acts of nature. Potential solutions will require not only ingenuity and technology, but investment and political decisiveness.
Small business contracts make up 32 percent of the U.S. Department of Homeland Security’s (DHS’s) business, with an average of 3,500 new contracts added every year. But it can be challenging for small companies to take advantage of these opportunities. Breaking into the DHS market as a small business is not impossible, according to Bob Namejko, industry liaison, DHS, but it is difficult.
Efforts to reduce barriers to information sharing in the cyberworld have met with criticism, but some in industry are emphasizing the necessity of swift action.