March 2012

April 3, 2012
By Rita Boland, SIGNAL Online Exclusive

Tethered aerostats with Persistent Threat Detection Systems that fly over separate forward operating bases in Afghanistan received capability upgrades recently with the addition of new Kestrels. Unlike the former versions, the revamped technology includes electro-optical/infrared features, enabling users to have a 360-degree view of targets in a city-size area after sundown and during the day.

March 29, 2012
By Robert K. Ackerman, SIGNAL Online Exclusive

Securing the homeland will require closer cooperation among military and civilian government organizations as diverse threats adopt each others' tactics and techniques. Terrorists, smugglers and other organized crime entities have learned from each other and, in some cases, are joining forces to threaten Western democracies in new ways. Testifying before the U.S. Senate Armed Services Subcommittee on Emerging Threats and Capabilities, Michael A. Sheehan, assistant secretary of defense for special operations and low-intensity conflict, described a menacing trend in which "terrorism, drug trafficking and other types of transnational organized crime are increasingly intertwined."

March 21, 2012
By Max Cacas, SIGNAL Online Exclusive

Technical advances in the field of virtual reality, also known as virtual worlds (VWs), are making it possible for the U.S Navy to tap into the collective expertise of its best submariners to design and build the next generation of attack submarines.

March 15, 2012
By Rita Boland, SIGNAL Online Exclusive

The Air Force Office of Scientific Research (AFOSR) wrapped up its annual review earlier this month, during which the organization's program managers had a chance to showcase their work to authorities from defense, government, academia and the general public. Already personnel have identified areas where research will adjust to meet identified needs with more detailed plans expected soon.

March 15, 2012
By Rita Boland, SIGNAL Connections

AFCEA features an information resource for members of the military community and people who wish to support them: Homefront Help.

March 15, 2012
By Rachel Eisenhower, SIGNAL Connections

After an accident left Dawn Ottman with limited short-term memory, she tapped into her skills as an inventor to keep her passion for engineering alive.

March 15, 2012
By Maryann Lawlor, SIGNAL Connections

Understanding the cloud will determine whether it helps organizations realize the efficiencies and cost savings it promises or the opportunities that float on by.

March 15, 2012
By Maryann Lawlor, SIGNAL Connections

AFCEA International, the Cyber Conflict Studies Association (CCSA) and the Atlantic Council have collaborated to create a cyberconflict history case studies contest. Up to six prizes of up to $1,000 will be awarded for the best submissions.

March 15, 2012
By Maryann Lawlor, SIGNAL Connections

The AFCEA Educational Foundation, in conjunction with its preferred education provider Cypherpath LLC, soon will offer a solution designed to assist information security experts maintain their U.S. Defense Department 8570.01-M (DOD 8570.1-M) Computing Technology Industry Association (CompTIA) certifications.

March 15, 2012
By Rachel Eisenhower Lilly, SIGNAL Connections

Less than one month after Brandon Oldenburg and Lampton Enochs of Moonbot Studios addressed the ArkLaTex Chapter of AFCEA and became members of the association, the company took home an Oscar for Best Animated Short Film.

Thursday, March 8, 2012
By George I. Seffers, SIGNAL Online Exclusive

It's not often that objects as small as battery chargers and solar blankets become the center of attention at a U.S. Senate budget hearing where multibillion-dollar programs are discussed, but for a few minutes of the March 8 Senate Armed Services Committee hearing, U.S. Army officials touted the need for such items to take a load off of the backs of soldiers.

March 2012
By Robert K. Ackerman, SIGNAL Magazine

Command and control is undergoing an evolution spawned by the information technology revolution. These changes may be both desired and immutable, as no military commander can either neglect new capabilities or turn back the technological clock when it comes to managing forces in the battlespace.

March 2012
By Robert K. Ackerman, SIGNAL Magazine

Significant changes lie ahead for U.S. Army forces as communicators move into the next era of battlespace communications. Smartphone technology is opening the door for individual networking devices for which signaleers already are laying the groundwork. And, the promise of cloud computing would enable large amounts of data to be moved among the battlefield without mobile databases.

March 2012
By Paul A. Strassmann, SIGNAL Magazine

We now have the U.S. Defense Department information technology enterprise strategy and roadmap. The new direction calls for an overhaul of policies that guide the department’s information systems. Yet, implementation is a challenge, and several issues require the reorientation of how the Defense Department manages information technologies.

March 2012
By Max Cacas, SIGNAL Magazine

The U.S.-led global cybersecurity exercise known as Cyber Storm will sport a new look and format when it takes place later this year. The changes reflect the constantly deviating nature of the threats posed daily to the world’s cyber infrastructure.

March 2012
By Kent R. Schneider, SIGNAL Magazine

Cyber threats draw much of the focus in today’s information technology realm. The threat profile in cyberspace is growing and becoming more complex, more sophisticated and more diverse.

March 2012
By Rita Boland, SIGNAL Magazine

The U.S. Army's plan to revolutionize its approach to integrating advancements into the network is on track, according to senior leaders. These Network Integration Evaluations designed to facilitate this assimilation already have yielded results, offering a glimpse into the technology of the future and how soldiers will use it.

March 2012
By Rita Boland, SIGNAL Magazine

U.S. Marines are tasked with battling enemies in any environment or domain and increasingly that location is cyberspace. Information assurance officials around the Corps are striving to ensure the reliability and trustworthiness of the service’s systems, and though they are aware of the potential for attack from the outside, misuse from the inside is a more prevalent concern.

March 2012
By Rita Boland, SIGNAL Magazine

All computer systems are prone to attacks from various cyberthreats, but disruptions on few of those networks have the potential to cause calamitous damage to national infrastructures.To help prevent catastrophe, the U.S. Department of Homeland Security has an effort dedicated to countering these dangers through various partnerships and training opportunities.

March 2012
By Rita Boland, SIGNAL Magazine

The U.S. Marine Corps is testing a set of systems that would enhance communications between air assets and boots on the ground. Troops in Okinawa used the technology initially during U.S.-only evaluations before moving on to experiments in various multinational events. And though the personnel who have experienced the systems in action say work still remains to perfect the offering, they would like to see it fielded if it reaches its potential.

Pages