The U.S. Army is fielding its Vigilant Pursuit system to reduce the time necessary to combine data gathered from human and signals intelligence assets.
SIGNAL Connections is your source for news about your chapter, your region and your profession. Redesigned last year to include a personal touch, the e-newsletter not only features the latest industry activities but also pulls events information from the AFCEA calendar and Chapter News from SIGNAL Online.
This month, all AFCEA corporate member points of contact (POCs) will receive a package that includes their current corporate profile and details about how to update this information.
For just over two weeks, people around the world were talking about nation facing nation, not on the field of combat, but rather in the spirit of competition. Every two years, the Olympic Games provide the opportunity for the global population to rally around their respective country's best-of-the-best.
As comfortable traveling the world as she is nurturing at home, Lexley Bender is bringing a sense of enthusiasm to the Aberdeen Chapter as it continues to grow in part as the result of BRAC 2005. Bender truly can be called a renaissance woman.
The 2012 Olympics may be over in London, but the Defense Advanced Research Projects Agency (DARPA) has laid down a competitive challenge of a different sort, this time for the world's robotics experts.
The U.S. Army's Communications-Electronics Research, Development and Engineering Center (CERDEC) is building a prototype network capable of morphing over time to confuse cyber intruders and thwart attacks on military networks. The Morphing Network Assets to Restrict Adversarial Reconnaissance (MORPHINATOR) prototype is scheduled to be available in the 2014 fiscal year and will be capable of pulling a cyber bait-and-switch on unsuspecting network intruders.
Civilian and military leaders had cited urgency in need for bill passage.
One of the nation’s most critical multibillion-dollar next-generation satellite communications programs is being restructured. After shifting to a fixed-price contract, the U.S. Defense Department is inviting new industry competition for the Air Force’s advanced beyond-line-of-sight terminal program.
Once viewed by many as a security liability, wireless has become a security asset for the U.S. Marine Corps Forces Pacific. In its effort to identify valuable items and devices inside its facilities at all times, the command recently implemented its first wireless system ever accredited for use in secure areas. This system soon could transition to the tactical world.
The Defense Information Systems Agency's Host-Based Security System is evolving to handle today's wide range and high number of cyberthreats as well as to accommodate the prevalence of emerging mobile platforms. With a new contract in place, the experts who employ the system to keep networks safe will train more often in realistic scenarios, preparing them for attacks that would disrupt operations.
Sharing medical information among public and private entities during emergency situations is entering a new age. A consortium of partners has laid the foundation for a national center that will develop protocols and methodology necessary to enhance current capabilities for handling crisis situations.
U.S. officials attending a United Nations meeting this month will try to sway other nations to agree to a set of international norms of behavior in the cyber realm. The U.S. approach is at odds with that preferred by Chinese and Russian officials, who argue that new treaties or international codes are needed for cyber.
A new technology aimed at finding unauthorized wireless devices on critical infrastructure networks could be fielded within a matter of months.
Having experienced more than a decade of hot and humid Washington, D.C., summers, I thoroughly enjoyed the pleasant start we experienced this year. Warm temperatures, cooling breezes and clear skies made for delightful days and evenings. It doesn’t get much better than that. Unfortunately, the political climate in no way resembles that pattern. The storm clouds of dissent have moved from the horizon to a perch directly overhead, and there are no clearer skies in the forecast.
In last month’s column, I reported that there were 2,904 separately funded fiscal year 2012 information technology budgets. Many of these would be set up to operate their own and incompatible networking, storage, server, operating systems, middleware or control commands.
The United States and its allies have at their disposal an existing defense capability that can be employed as an effective weapon at the highest levels of conflict. The West's installed base of expertise in communications electronics can be harnessed as a strategic offensive weapon to constrain nation-states that seek to bypass the overwhelming superiority that the United States and its allies possess in conventional warfare.
A significant modernization effort underway across the national electric grid is seeking a balance between strong cybersecurity capabilities and affordable protections across the sector.
A predicted increase in the number and intensity of solar storms is forecast for 2013, and solar weather experts are advising both the public and private sector to make preparations.
No one can accuse Dennis Muilenburg of shying away from a big challenge. Muilenburg is the president and chief executive officer of Boeing’s Defense, Space and Security division. The unit counts $32 billion in sales and a global work force of 62,000. He must navigate the division through uncertain waters amid potentially large government budget cuts and increased competition.