Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Cyber

Multiple Thrusts Define Geospatial Agency Big Data Efforts

August 1, 2014
By Robert K. Ackerman

Technology innovations, new roles and expanding missions are shaping the move toward big data in the National Geospatial-Intelligence Agency. A mix of tradecraft and technology is ensuing as the agency evolves from an organization that always has worked with voluminous imagery files to one in which big data represents a goal that promises to change many aspects of intelligence.

David Bottom is the director of the information technology services directorate at the National Geospatial-Intelligence Agency (NGA). He explains that, with its imagery library, the NGA has been generating and using large data files for some time. Imagery resolution, file complexity and the number of files continue to increase. Bottom allows that the agency must transition from dealing in large data files to incorporating the concept of big data. “There is a lot of information in those large data files that you could consider to be big data,” he offers. “So how do we actually transition the agency—not just to being a large data file provider, but to that big data environment where there is a lot going on in those image files?”

Big data is not fundamentally changing the NGA’s mission, Bottom states. The capability does allow the agency to function as a foundation for integrated intelligence. It also provides increased capabilities in terms of being able to deliver a better product more quickly. “If those data points—and their relationships—are portrayed in time and space in a way that enables the user to quickly make sense of something, that is the power,” he declares.

U.S. Army Explores Push-Button Networking

August 1, 2014
By George I. Seffers

The U.S. Army’s current tactical network delivers a wide range of capabilities for warfighters, including unprecedented communications on the move. But the complexity can overwhelm commanders who have countless critical tasks to complete and soldiers’ lives in their hands. Future tactical networks will automate many processes and may be smart enough to advise commanders, similar to JARVIS, Iron Man’s computerized assistant.

The Army’s current networking technology includes Capability Set 13, a package of network components, associated equipment and software that provides an integrated capability from the tactical operations center to the dismounted soldier. It supports Army warfighters in Afghanistan and provides a host of capabilities not offered by the wide area network in use as recently as 2012. The Army has fielded the capability set down to the company commander level with a package known as the Soldier Network Extension, which delivers some challenges along with the added capabilities. “The company commander is trying to maneuver around the battlefield, and he’s trying to command a company, and he has these new pieces of kit that he has to learn how to use, and it’s complicated. That’s part of the problem,” says Jennifer Zbozny, chief engineer for the Army Program Executive Office for Command, Control and Communications-Tactical. “If you had an iPhone with an interface you didn’t understand, and you had to do a million things and log on a million different ways, you’d probably get tired of it and decide it’s not worth the effort.”

McLaughlin Named Deputy Commander, U.S. Cyber Command

July 8, 2014

Maj. Gen. James K. McLaughlin, USAF, has been nominated for appointment to the rank of lieutenant general and for assignment as deputy commander, U.S. Cyber Command, at Fort Meade, Maryland. McLaughlin is currently serving as commander, 24th Air Force, Air Force Space Command; and commander, Air Forces Cyber, U.S. Cyber Command, Joint Base San Antonio-Lackland, Texas, according to a Defense Department press release.

DHS Releases Quadrennial Homeland Security Review

July 3, 2014
By Sandra Jontz

Cyber attacks are high on the Department of Homeland Security’s radar, but increasing reliance on network technology might be making the country more vulnerable to cyberthreats rather than less.

Defense Networks Can Expect Minimum Security

June 25, 2014
By Robert K. Ackerman

U.S. Defense Department networks will need to operate with the minimum security available as connectivity and the threat picture evolve, said a top defense official. Terry Halvorsen, acting Defense Department chief information officer, minced no words as he described how tight budgets are limiting options across the board.

Extending Cybersecurity in Romania

June 23, 2014
By Rita Boland

Companies Deep-Secure and Sweetwater s.r.l. signed a contract earlier this month that will extend cybersecurity measures in the Romanian market. The move should help address common cybercrime issues prevalent in former Eastern Bloc nations.

Start Thinking About Cloud and Spectrum Together

July 1, 2014
By Kent R. Schneider

Virtualization and cloud implementation are critical components of information technology planning, acquisition and management going forward. Cloud implementations are important to security, efficiency, effectiveness, cost savings and more pervasive information sharing, particularly among enterprises.

Catching Criminal Behavior on Cutting-Edge Devices

June 11, 2014
By Rita Boland

The National Institute of Standards and Technology has revised its "Guidelines on Mobile Device Forensics." Released seven years after the original guidance came out, the changes recognize the advances in technology during that time frame.

U.S. Army Researchers Beam Up Data

June 10, 2014
By George I. Seffers

Scientists at the U.S. Army's Research Laboratory have successfully demonstrated information teleportation capabilities in the laboratory using entangled photons.

Teams to Vie for $2 Million Prize in DARPA’s Cyber Grand Challenge

June 3, 2014
By Sandra Jontz

In the two-year Cyber Grand Challenge, 35 teams will vie for a $2 million grand prize and the honor of trying to devise a fully automated system to defend against cyber attacks.

Pages

Subscribe to RSS - Cyber