Air Force cybersecurity training may be conducted 24 hours a day, seven days a week if needed to meet burgeoning demand for cybersecurity experts in the near future, according to the service’s chief information officer. Growing threats also may drive the need for adoption of rapid acquisition practices, which are being developed by a special corps of acquisition experts.
SIGNAL Online Exclusives
A newly released study on America’s electrical power transmission system strongly suggests that the government and industry take steps to safeguard it from shortcomings that make it vulnerable to things such as terrorist attack and acts of nature. Potential solutions will require not only ingenuity and technology, but investment and political decisiveness.
Small business contracts make up 32 percent of the U.S. Department of Homeland Security’s (DHS’s) business, with an average of 3,500 new contracts added every year. But it can be challenging for small companies to take advantage of these opportunities. Breaking into the DHS market as a small business is not impossible, according to Bob Namejko, industry liaison, DHS, but it is difficult.
Efforts to reduce barriers to information sharing in the cyberworld have met with criticism, but some in industry are emphasizing the necessity of swift action.
The U.S. Army hopes to ditch its dependency on joint electronic warfare assets by fielding new systems, improving training and creating new career paths and functional areas.
The defense information technology realm is exploding with innovation—so much so, the organizations tasked with ensuring effective information systems run the risk of losing control of both the process and its capabilities. The Defense Information Systems Agency has issued a new strategic plan that outlines its approach to ensuring advanced technology implementation without reining in innovation.
The U.S. Army is fielding its Vigilant Pursuit system to reduce the time necessary to combine data gathered from human and signals intelligence assets.
The 2012 Olympics may be over in London, but the Defense Advanced Research Projects Agency (DARPA) has laid down a competitive challenge of a different sort, this time for the world's robotics experts.
The U.S. Army's Communications-Electronics Research, Development and Engineering Center (CERDEC) is building a prototype network capable of morphing over time to confuse cyber intruders and thwart attacks on military networks. The Morphing Network Assets to Restrict Adversarial Reconnaissance (MORPHINATOR) prototype is scheduled to be available in the 2014 fiscal year and will be capable of pulling a cyber bait-and-switch on unsuspecting network intruders.
Civilian and military leaders had cited urgency in need for bill passage.
The U.S. Naval Sea Systems Command recently invested almost $8 million in upgrades to current explosive ordnance disposal robots to improve their usefulness to operators. These enhancements also could benefit troops in other mission areas.
Breaking with traditional government strategies that target public perception, the National Geospatial-Intelligence Agency has issued a new strategic plan that focuses on internal processes and goals. The strategy establishes measures of effectiveness by defining end-states that will be the targets of NGA activities, and it touches on topics ranging from work force activities to major organizational shifts.
A new nonskid deck coating developed at NRL, and now undergoing final development and ship testing, promises to be more durable, hold its color longer, and be more resistant to spilled chemicals. Because the new material, called siloxane, will last longer compared with traditional nonskid deck coating, it will also be cheaper in the long run.
Systems and technologies undergoing scrutiny at the U.S. Army's next Network Integration Evaluation this fall will first have to pass muster in the service's newly opened laboratory at Aberdeen Proving Ground, Maryland. The new lab facility is expected to reduce the risk associated with some new technologies and systems. It also is designed to save time, money and integration headaches during future evaluation exercises.
As U.S. military organizations and the private companies that support them struggle to adjust to decreases in funding, they are searching for efficiencies even in seemingly small matters
Advanced 4G mobile service, the use of personal mobile devices and its own dedicated apps are among the objectives of Version 2.0 of the U.S. Defense Department’s Mobile Device Strategy. Released Friday, June 15, 2012, the strategy lists three major goals and several subset objectives designed to bring the benefits of mobile systems to the department.
Industry experts say they expect the Defense Information Systems Agency to announce the winner--possibly as early as today--of the potential $4.6 billion Global Information Grid Services Management-Operations contract. The seven-year contract will provide for the day-to-day operations of the Defense Department's worldwide network, known as the Defense Information Systems Network, and related telecommunications.
One of the most ardent proponents of virtual worlds technologies for military collaboration has forged ahead and developed a version of the Second Life technology that is able to operate behind secure .mil firewalls, and it is on its way to being certified for secure operation within most military networks.