Cyber

January 31, 2014
By George I. Seffers

Scientists and engineers from MITRE Corporation and Harvard University published a paper this week revealing the development of what they call the most dense nanoelectronic system ever built. The ultra-small, ultra-low-power processor could be used for tiny robotics, unmanned vehicles and a broad range of commercial applications, including medical sensors.

February 1, 2014
By Michael A. Robinson
The U.S. Office of Naval Research’s Situational Awareness System (SAWS) uses electro-optic/infrared sensors for 360-degree surveillance in the water and in the air. The greater variety of sensor capabilities is feeding big data, which in turn is spawning new types of sensor systems.

The emergence of big data combined with the revolution in sensor technology is having a synergistic effect that promises a boom in both realms. The ability to fuse sensor data is spurring the growth of large databases that amass more information than previously envisioned. Similarly, the growth of big data capabilities is spawning new sensor technologies and applications that will feed databases’ ever-increasing and diverse types of information.

February 1, 2014
By Robert K. Ackerman

All the challenges vexing a modern military—budgetary limitations; information technologies; cyber; and joint and coalition interoperability—are defining operations in the Asia-Pacific region. Covering more than half the Earth’s surface and comprising dozens of nations, the vast area is rife with geopolitical rivalries that complicate efforts at regional security. And, the one domain that knows no geographic bounds—cyberspace—weighs heavily on the success of potential warfighting operations in that region.

February 1, 2014
By George I. Seffers
An H-60S helicopter conducts deck landing qualifications on USS Milius destroyer off the coast of Guam. Milius was the first ship to begin installing CANES and will serve as the operational testing platform for the next-generation afloat network.

U.S. Navy officials expect to award a full-deployment contract for a new shipboard network this spring, and they plan to install the system on nine ships this year. The network provides commonality across the fleet, replacing multiple aging networks, improving interoperability and driving down costs. The Common Afloat Networks and Enterprise Services (CANES) program represents a new business model for delivering capability to the fleet, Navy officials say. The program consolidates five legacy networks into one, which enhances operational effectiveness and provides better quality of life for deployed sailors.

January 13, 2014
By Rita Boland

The Department of Homeland Security has expanded its Secretary’s Honors Program Cyber Student Volunteer Initiative to more agencies. Applications are due by Friday.

January 9, 2014
By George I. Seffers

The U.S. intelligence community has taken some flak lately for infiltrating online games, such as Second Life and World of Warcraft. A just-released report commissioned by the Office of the Director of National Intelligence, however, posits that the technology could be abused by extremists.

December 20, 2013
By George Seffers

The U.S. Army announced today that the Army Cyber Command (ARCYBER) headquarters will be located at Fort Gordon, Georgia, consolidating and coordinating Army cyber and network operations under one commander for the first time in its history.

December 16, 2013
By Maryann Lawlor

In an open letter to decision makers in Washington, D.C., last week, several superpowers of the Web called for global government surveillance reform. A bit of the pot calling the kettle black, isn’t it?

December 11, 2013
By Henry S. Kenyon

New details are available on the Cyber Grand Challenge, a contest designed to push the boundaries of software development with the goal of creating programs that can analyze, diagnose and repair flaws they detect in computer networks.

December 6, 2013
By Robert K. Ackerman

The U.S. Navy faces some hard decisions as it girds for a changing global security environment that features new and diverse threats and a greater demand for its presence in the Asia-Pacific region. The choices offered the Navy include developing a new way of obtaining needed technologies and capabilities; changing the way it establishes priorities in acquisition; applying social media to networking practices; and even turning back the clock to the era before modern network-centric warfare.

December 5, 2013
By Robert K. Ackerman

For years, the U.S. Navy built its force around the concept of network-centric operations. Now that it has some of the most advanced information technology capabilities in the military realm, the U.S. Pacific Fleet must re-learn how to operate without them in a disconnected, intermittent, low-bandwidth (DIL) environment.

December 5, 2013
By Robert K. Ackerman

With the new Joint Information Environment looming as the basis for networking across the force, planners must consider how to add coalition allies and nontraditional partners. Establishing communities of interest may be the answer.

December 5, 2013
By Robert K. Ackerman

Reductions in defense funding are having a greater effect on the force than simply instilling fiscal belt-tightening. Already strapped for cash, the services are exploring innovative ideas for cost-efficient information technology acquisition.

 

December 5, 2013
By Robert K. Ackerman

The move to the cloud offers great potential for U.S. Navy information technology efforts. Yet, other aspects such as applications and integrated capability sets must work their way into the sea service cyber realm.

December 5, 2013
By Robert K. Ackerman

Instead of deciding where to spend its money, the Pentagon now must decide where not to spend its increasingly scarce cash resources. This entails risk assessment that focuses on how not to hurt the warfighter.

December 5, 2013
By Robert K. Ackerman

Cyber has provided the means for rapidly assembling and operating military coalitions in the post-Cold-War era. Now, the very nature of the domain may require coalitions to save it from a growing menu of threats. These threats can range from annoying hackers to organized crime to malicious nation-states and even geopolitical movements to restrict the flow of ideas. While the panoply of perils is diverse, the actions to defend against them may have to spring from the well of government and organizational cooperation.

December 4, 2013
By Robert K. Ackerman

South Korea didn't merely react when it suffered two extensive cyber attacks earlier this year. It established a national cyber policy and formed a government/military/commercial partnership to protect against future intrusions.

December 4, 2013
By Robert K. Ackerman

The best intentions among international cyber experts may be foiled simply because they don't understand each other's cultural differences. Priorities and even the way of thinking can inhibit progress without cyber experts even realizing it.

December 4, 2013
By Robert K. Ackerman

The national laws that ensure freedom in modern democracies are preventing effective international cybersecurity measures. Hackers hide behind borders as they ply their malice around the world, and authorities are hard-pressed to reach them.

December 4, 2013
By Robert K. Ackerman

Maintaining Internet security--and ensuring its continued freedom--likely will depend on like-minded nations forming coalitions that help formulate international regulations and rules of governance.

Pages