September 2010

September 2010

A soldier in harm’s way has no greater ally than other soldiers watching his or her back. That trust is the key component of a good unit. Usually, the bond of trust that only members of the military share is built during training and missions. That trust is priceless in theater, but what about other environments? Dark alleys, sketchy neighborhoods, the bleachers of an away game – soldiers have that covered. But, who has your back in cyber space?

September 30, 2010
By George I. Seffers, SIGNAL Online Exclusive

In the next few years, the U.S. military could field a portable, laser backpack device developed by the University of California, Berkeley, which will provide three-dimensional maps of buildings.

September 24, 2010
By Robert K. Ackerman, SIGNAL Online Exclusive

The United States faces the likelihood of a “destructive cyber attack” in the future as malevolent digital capabilities proliferate among a range of adversaries, says the head of the U.S. Cyber Command, Gen. Keith B. Alexander, USA. He warns that nation-states and other malefactors now “can use this as a way of applying their will and power against our country in an asymmetric manner.”

September 21, 2010
By Rita Boland, SIGNAL Online Exclusive

The U.S. Marine Corps now has its first fully assembled Ground/Air Task Oriented Radar (G/ATOR) system and is working to overcome past difficulties to put the asset in warfighters' hands. Plans to upgrade multiple radar capabilities with the single system hit some snags over the past few years, but developers are back on track after finding solutions to the problems.

September 17, 2010
By Maryann Lawlor, SIGNAL Online Exclusive

Most people distrust the security of all websites equally. But in reality, Web devotees can take simple precautions to ensure their safety while researching, shopping, downloading or playing browser games such as Texas Hold’em.

September 15, 2010
By Joe Dysart, SIGNAL Connections

While anecdotes abound about job opportunities lost over something posted online, new research reveals that the risk is greater than previously known. One survey revealed that 70 percent of recruiters have eliminated a candidate based on online text, photos or videos.

September 9, 2010
By Rachel Eisenhower, SIGNAL Online Exclusive

Give two cents—get big prizes. The U.S. General Services Administration (GSA), in partnership with ChallengePost, launched Challenge.gov on September 7 at the Gov 2.0 Summit 2010 in Washington, D.C. The free online challenge platform invites the general public to propose solutions to government challenges, including the U.S. Army’s push for new training and simulation tools utilizing artificial intelligence.

September 1, 2010
By Rita Boland, SIGNAL Online Exclusive

The Global Threat Reduction Initiative (GTRI) is working to keep U.S. citizens safe from dirty bombs by conducting exercises on the other side of the world. Members representing the initiative recently wrapped up a three-scenario tabletop exercise in Mongolia to help the country prevent terrorists from obtaining its nuclear or radiological material.

September 15, 2010
By Robert K. Ackerman, SIGNAL Connections

Advances in cyberspace and missile technology are extending China’s military reach.

September 15, 2010
By George I. Seffers, SIGNAL Connections

The U.S. Army received a prototype that will eventually integrate current and future air and missile defense capabilities into one overall command and control (C2) system.

September 15, 2010
By Rita Boland, SIGNAL Connections

September 15, 2010
By George I. Seffers, SIGNAL Connections

Deepwater Communications

September 2010
By Linton Wells II, SIGNAL Magazine

This summer I attended a series of thought-provoking conferences, ranging from business technology to clean energy to cybersecurity and network integration. Collectively, they suggest that we’re living in a “golden age” of technological innovation, but they also highlighted a growing gap between increasingly interactive capabilities and the ability to provide security at several levels, ranging from individual privacy to critical infrastructure protection. The bottom line is that nothing I heard makes me sleep better at night.

September 2010
By Robert K. Ackerman, SIGNAL Magazine

While the world’s attention largely has been focused on areas of conflict, one NATO nation has quietly developed an indigenous defense industry that is poised to be a significant player in international military procurement. By focusing on developing technologies and capabilities within reach, Turkey has developed a domestic defense technology base that spans all military activities on land, at sea and in the air.

September 2010
By George I. Seffers, SIGNAL Magazine

Based on technology being developed through the U.S. Army’s Robotics Collaborative Technology Alliance, unmanned systems of the future could become trusted companions on the battlefield—much like canines have been for thousands of years.

September 2010
By George I. Seffers, SIGNAL Magazine

Automated logistics software based on commercial standards will make its combat debut next year when Germany’s 1st Armored Division deploys to Afghanistan.

September 2010
By Henry S. Kenyon, SIGNAL Magazine

The agency responsible for managing NATO’s computer and communications networks is redrawing its financial goals to deal with the global financial crisis. Not only is the NATO Consultation, Command and Control Agency reducing expenses, but it also is finding new sources of revenue, such as by providing research and development and procurement services to alliance nations.

September 2010
By Maryann Lawlor, SIGNAL Magazine

A time-honored military event turned 16 years old this summer, and what some may call an unruly adolescent and others an annual gathering that has outlived its usefulness reveals how lessons learned can turn into powerful practices. The Coalition Warrior Interoperability Demonstration, with its trial sandbox mirroring Afghanistan, not only continues to be as vital as it was in years past but also shows that building on experience leads to new discoveries.

September 2010
By Maryann Lawlor, SIGNAL Magazine

In the war against illicit drug trafficking, the U.S. Southern Command is employing unmanned weapons that are disrupting the operations of drug-running organizations. By combining remotely controlled air, surface and subsurface vehicles to monitor criminals moving drugs from South America northward, the United States and local law enforcement agencies are shutting down the avenues drug traffickers once dominated. The result has been a mixed blessing. While the flow of drugs has been disrupted, the use of unmanned assets to scrutinize air and sea transport has forced these criminals to move their product via land through countries that must deal with the consequences.

September 2010
By Kent R. Schneider, SIGNAL Magazine

The fundamental nature of warfare has changed. Asymmetric warfare has become the prominent threat. Non-state actors, often difficult to identify, have become the primary warfighters in many cases. The cyber domain has been recognized as one of the most dangerous and potentially harmful warfighting domains. And, defense and security budgets are strained by a troubled global economy. Does this sound familiar? It is the environment no matter where you sit on this globe.

Pages