The sea service seeks to extend NMCI’s lifetime just in case its replacement is delayed.
SIGNAL Online Exclusives
The Long Beach Police Department dive team adopts new homeland security equipment.
The Long Beach, California, police department dive team is now using a newly acquired search and recovery system to help protect the local port, shipping lanes and critical infrastructure.
The latest generation Tracking and Data Relay Satellite, TDRS-K, updates existing technology with an eye to the future. New electronics and better power management will help extend the TDRS constellation for at least another decade, but NASA already is looking ahead to major changes in the system’s capabilities that would define the next-generation TDRS.
One day after unveiling a long-awaited executive order concerning a wide-range of cybersecurity concerns, President Barack Obama’s top cybersecurity advisers admit that the order only goes so far in dealing with pressing Internet security needs. They say that the order is only a “down payment” and no substitute for permanent congressional legislation on the matter.
The U.S. Army is finalizing its official report on the Network Integration Evaluation 13.1 even as it prepares for the next iteration of the event and Capability Set 14. Soldiers are tweaking processes to make the exercises more valuable while working closer with industry to speed fielding as much as possible under tight acquisition regulations.
Imagine a wire that can stretch eight to 10 times its original length and still send crystal clear audio from your music player to your earphones, or imagine accidentally cutting a cable to a tactical radio and repairing the cut just by physically putting the wires back together.
Those are just two of the many possible products that could result from materials science research now underway at North Carolina State University under the direction of Dr. Michael Dickey, assistant professor of chemical and biomolecular engineering at the university.
Over the past month, the U.S. Army has consolidated two directorates in an effort to continue improving agile acquisition. Combining the offices is designed to allow more efficient and effective cooperation, enhance long-term planning capabilities and boost the service’s ability to acquire an overall system of systems.
Twisted beams of light may illuminate a straight path to more secure and higher capacity communications. A new type of photodetector developed at Harvard’s School of Engineering and Applied Sciences (SEAS) allows systems to judge these beams by their spin rate. It will allow the encoding of an infinite amount of numbers in those data streams, which offers the potential for dramatically larger data rates as well as better encryption.
The National Security Agency is poised to deliver an initial cloud computing capability for the entire intelligence community that will significantly enhance cybersecurity and mission performance, and unleash the power of innovation for intelligence agencies, Lonny Anderson, NSA chief information officer, says.
The purpose of the attack is purely robbery, says a cyber expert, who has shared his McAfee report with government officials.
In many cases, haste makes waste as the U.S. Army wrestles with the inherent contradictions that emerged as it tries to speed new information technologies to warfighters.
Military activities in the Asia-Pacific region have become more focused since the release of a defense strategy a few months ago that places renewed attention on the global area. Through U.S. Pacific Command's (PACOM's) recent theater campaign plan, leaders are telling the subordinate military-service components to report back in a year on how efforts are working while deconflicting duplicate programs.
Air Force cybersecurity training may be conducted 24 hours a day, seven days a week if needed to meet burgeoning demand for cybersecurity experts in the near future, according to the service’s chief information officer. Growing threats also may drive the need for adoption of rapid acquisition practices, which are being developed by a special corps of acquisition experts.
A newly released study on America’s electrical power transmission system strongly suggests that the government and industry take steps to safeguard it from shortcomings that make it vulnerable to things such as terrorist attack and acts of nature. Potential solutions will require not only ingenuity and technology, but investment and political decisiveness.
Small business contracts make up 32 percent of the U.S. Department of Homeland Security’s (DHS’s) business, with an average of 3,500 new contracts added every year. But it can be challenging for small companies to take advantage of these opportunities. Breaking into the DHS market as a small business is not impossible, according to Bob Namejko, industry liaison, DHS, but it is difficult.
Efforts to reduce barriers to information sharing in the cyberworld have met with criticism, but some in industry are emphasizing the necessity of swift action.
The U.S. Army hopes to ditch its dependency on joint electronic warfare assets by fielding new systems, improving training and creating new career paths and functional areas.
The defense information technology realm is exploding with innovation—so much so, the organizations tasked with ensuring effective information systems run the risk of losing control of both the process and its capabilities. The Defense Information Systems Agency has issued a new strategic plan that outlines its approach to ensuring advanced technology implementation without reining in innovation.
The U.S. Army is fielding its Vigilant Pursuit system to reduce the time necessary to combine data gathered from human and signals intelligence assets.