October 2011

October 26, 2011
By George I. Seffers, SIGNAL Online Exclusive

The U.S. Defense Department has struggled for years to find ways to deploy mobile devices without introducing new vulnerabilities to its networks. But a recently released report from researchers at Georgia Institute of Technology, Atlanta, Georgia, predicts an explosion of cell phone threats in the coming months and reveals newly emerging vulnerabilities, including weaknesses in mobile device browsers.  

October 13, 2011
By Rita Boland, SIGNAL Online Exclusive

Naval Special Warfare (NSW) Group 4 has reduced its time to process Government Purchase Card acquisitions from months to 3.2 days with a combination of technology and employee involvement. The resulting system not only lessens the time from request submission to purchase completion, it also walks users through processes to eliminate mistakes and can create various reports automatically for a variety of purposes.

October 20, 2011
By Robert K. Ackerman, SIGNAL Online Exclusive

A new U.S. Army generator technology is saving fuel and lives in the rugged terrain of Afghanistan. Known as a microgrid, the technology links smart generators to provide the appropriate amount of power when it is needed.

A 1-megawatt system already has been deployed to Bagram, Afghanistan, where it has replaced several generators and is conserving fuel while providing uninterrupted power to its users. Fuel saved translates to potential lives saved, as convoys carrying fuel to U.S. Afghanistan outposts have come under increasing fire from Taliban guerillas.

October 15, 2011
By Maryann Lawlor, SIGNAL Connections

Digital immigrants have observed that digital natives, thanks to speed dial, don’t even bother to memorize phone numbers—the practice is not even on their radars. The immigrants needn’t worry. Another more crucial memory game has become an annoying, yet necessary, part of communicating: passwords. Whether opening a browser, checking email or shopping online, two pieces of information are required and should be memorized: username and password. Yelling “Open Sesame” at your computer, smartphone or tablet for access will not work. I’ve tried it.

October 15, 2011
By Maryann Lawlor, SIGNAL Connections

October 15, 2011
By Maryann Lawlor, SIGNAL Connections

October 15, 2011
By Maryann Lawlor, SIGNAL Connections

Through AFCEA, corporate members benefit from a high degree of visibility in the command, control, communications, computers, intelligence and information technology military and government arenas. This visibility creates the opportunity to network, build relationships, exchange information and contribute to ongoing discussion. Corporate membership has doubled in the past five years—now topping 2,000—because of these benefits, but in addition to the somewhat intangible value of visibility, corporate members enjoy more concrete financial benefits.

October 2011
By Robert K. Ackerman, SIGNAL Magazine

 

A U.S. Air Force F-16 takes off from Eielson Air Force Base in Alaska to participate in Red Flag 11-2, held this past July. The multiday exercise, which comprised air and land forces from four countries, generated air combat data that could be reviewed by all participants in real time.

October 2011
By Rita Boland, SIGNAL Magazine

 
Telecomm leaders explain that the present is driving what will come as they identify several common trends.

October 3, 2011
By Max Cacas, SIGNAL Online Exclusive

A researcher at the University of Texas at Dallas has discovered a new way to anticipate the actions of computer viruses, possibly heralding a new generation of tools and strategies to combat malware that attacks networks, servers and individual personal computers.

An added bonus: those tools take advantage of computing capabilities and instructions already “baked into” a wide range of computer chips now in use.

October 2011
By Robert K. Ackerman, SIGNAL Magazine

 

A U.S. Army staff sergeant instructs others in the capabilities of the RQ-11B Raven unmanned aerial vehicle in Iraq. The increasing amount of diverse intelligence information, coupled with a growing customer base, has impelled the Defense Intelligence Agency to formulate a new strategy for intelligence collection, analysis and dissemination.

October 2011
By Max Cacas, SIGNAL Magazine

 

An E-3 Sentry airborne warning and control system (AWACS) prepares to taxi out for takeoff in Guam. The AWACS aircraft, from the 552nd Air Control Wing at Tinker Air Force Base, Oklahoma, provides all-weather surveillance, command, control and communications.

October 2011
By Max Cacas, SIGNAL Magazine

 

A building stands surrounded by rubble in Wakuya, Miyagi, Japan, in March. Ships and aircraft from the USS Ronald Reagan Carrier Strike Group conducted search and rescue operations and resupply missions as directed in support of operation Tomodachi.

October 2011
By Kent R. Schneider, SIGNAL Magazine

October 2011
By Rita Boland, SIGNAL Magazine

 

HMAS Collins (foreground) meets with HMAS Waller (l) and HMAS Rankin. The Royal Australian Navy plans to replace its six submarines, all Collins class, with 12 new future submarines over the course of several years.

October 2011
By Max Cacas, SIGNAL Magazine

October 2011
By Rita Boland and Maryann Lawlor, SIGNAL Magazine

 

Lt. Gen. Susan Lawrence, USA, the chief information officer (CIO)/G-6 of the U.S. Army, tells listeners at LandWarNet 2011 about the network of 2020 and how budgets, personnel and technology will affect it. She also discusses the Army’s new plans for integrating technical advancements into the network.

October 1, 2011
By James C. Bussert, SIGNAL Magazine

 

A Chinese trawler plies the waves in waters off the coast of China. While ostensibly designed for fishing, these trawlers increasingly are carrying out government and military missions against foreign vessels in areas of interest to China.

October 2011
By George I. Seffers, SIGNAL Magazine

 
The U.S. Defense Department may be on the brink of harnessing brain signals for intelligence analysts.

October 2011
By George I. Seffers, SIGNAL Magazine

 

A Tiger Shark unmanned aerial vehicle returns from a mission supporting forces in theater. Under NATO’s Multi-sensor Aerospace-ground Joint Intelligence, Surveillance and Reconnaissance Interoperability Coalition 2 (MAJIIC 2) program, nine nations will continue to improve sharing of intelligence, surveillance and reconnaissance assets.