Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo
 

March 2013

Securing Critical Infrastructure Through Nontraditional Means

February 1, 2013
BY Rita Boland

A cloud project takes advantage of emerging concepts to protect energy against disruptive threats.

Researchers at Cornell University and Washington State University have teamed to create GridCloud, a software-based technology designed to reduce the time and difficulty involved with creating prototypes of smart-grid control paradigms. The system will help overcome hurdles of cloud computing in complex settings. The effort combines Cornell’s Isis2 platform, designed for high-assurance cloud computing, with Washington State’s GridStat technology for smart grid monitoring and control. The advent of this technology promises to boost both the security and the reliability of electrical services.

Developers aim to build a scalable software structure that is secure, self-healing and inexpensive to operate. They believe that by combining Isis2 and GridStat, a cloud-based grid can have all those factors as well as guarantee consistency. Infrastructure owners motivated by economies of scale and the desire to deploy the new smart-grid solutions end up with a system that also is more resistant to attack and likely to survive other disruptions.

Dr. Ken Birman, a professor at Cornell and co-principal investigator on the project, explains that several motivations drive the effort. One involves trying to find a solution to control a power grid when multiple organizations own and have access to the infrastructure. “A second challenge that’s emerged is that people have studied the power grid and found that we don’t operate it very efficiently,” Birman says. Power suppliers often are producing extra power, for example, or finding it difficult to take advantage of renewable sources. Sometimes renewable energy—such as the type that comes from solar panels on homes—is blocked from entering the power grid because officials lack the knowledge to access and use it safely.

Army Hones Smart Grid Into a Tactical Advantage

March 1, 2013
By Max Cacas

Significant fuel savings and operational efficiencies are some of the benefits of an intelligent power management system that includes multiple energy sources.

The U.S. Army has tested a proof of concept for a smart electrical grid that would support tactical operations in the field. The concept, which was tested last summer, could save potentially billions of dollars in fuel use at remote forward positions. By eliminating the need to transport fuel for generators at such encampments, the new Tactical Operations Smart Grid also carries with it the potential of saving the lives of warfighters.

The smart grid, which takes advantage of multiple off-the-shelf electrical energy technologies, is being developed and tested by the Army’s Research, Development and Engineering Command’s (RDECOM) Communications-Electronics Research Development and Engineering Center (CERDEC). Along with helping set specifications for a future vendor-developed system, data from the tests also are being compiled as part of the Defense Department’s longer-term program of reducing both manpower and fuel use for energy generation.

“These systems are designed to integrate existing military-standard tactical generators managed by portable electric power systems out in the field, providing the ability to intelligently work within a grid operation,” says Michael Zalewski, a project mechanical engineer with CERDEC’s Command, Power and Integration (CPI) directorate. The tactical microgrid is being developed as part of the HI Power program, for Hybrid Intelligent Power. Newly developed digital controllers allow the system to balance electrical production, storage and demand dynamically, he explains, “and by doing this, we’re able to right-size the production of power to the load and demand at that point in time.”

Cloud Industry Group Issues Mobile Computing Guidelines

March 1, 2013
By Max Cacas

When it comes to popular smartphones and tablets, security can be a many-layered and necessary endeavor

The growing use of advanced mobile devices, coupled with the increase in wireless broadband speed, is fueling demand by employees to bring their own devices to the job. This situation has opened a new set of security challenges for information technology staff, especially when it comes to the use of apps.

As the popularity and capability of mobile devices expands, standards are necessary to ensure that personal devices can function securely on enterprise networks. To address this need, the Cloud Security Alliance (CSA) organized its Mobile Working Group last year. The group recently released guidance to members on how enterprise administrators can successfully integrate smartphones and tablets into their work environment. The CSA is a not-for-profit organization of industry representatives focused on information assurance in the cloud computing industry.

U.S. Army Innovates on Cloud Computing Front

March 1, 2013
By George I. Seffers

Officials work to provide a new cloud approach across 
the service as well as the Defense Department.

U.S. Army officials estimate that by the end of the fiscal year, they will go into production on a new cloud computing solution that could potentially be made available across the Defense Department and could eventually be used to expand cloud capabilities on the battlefield. The platform-as-a-service product incorporates enhanced automation, less expensive software licensing and built-in information assurance.

During the past year, officials with the Army’s Communications-Electronics Command (CECOM) Software Engineering Center (SEC), Aberdeen Proving Ground, Maryland, have been working on a cloud computing approach known as Cloud.mil. A four-person team took about four months to deliver the first increment, which is now in the pre-production phase and is being touted to Army leaders, as well as to Defense Department and Defense Information Systems Agency (DISA) officials, as a possible Army-wide and Defense-wide solution.

Communications Labs JOIN Forces Remotely

March 1, 2013
By Robert K. Ackerman

The whole becomes greater than the sum of the parts in a networked software engineering realm.

A network built after its major move to a new base is allowing the U.S. Army Communications-Electronics Command to link diverse communications systems into an overarching network. This enables capabilities ranging from debugging software updates before they are sent to the front to a multinational exercise for validating operational activities.

When the Communications-Electronics Command (CECOM) relocated from Fort Monmouth, New Jersey, to Aberdeen Proving Ground, Maryland, under the Base Closure and Realignment program (BRAC), it used the opportunity to consolidate capabilities and build new facilities from the ground up that would allow the command to take advantage of the latest technologies. Among these facilities is the Joint On-demand Interoperability Network, or JOIN. This network connects with other laboratories and communications facilities, including some in theater, to share resources and solve problems by using all of their capabilities.

The network has existed in some form for more than two decades. Today’s JOIN community includes research, development, testing and evaluation as well as life-cycle support. JOIN serves as the nexus for these diverse elements. It provides two capabilities: services and interconnectivity as a technical hub.

John Kahler, chief of JOIN, allows that the network was established to integrate the entire command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) community and to provide a technical hub so that organizations could exploit each other’s resources as well as work in “a collaborative, common operating environment.” Participants can conduct research, development, testing and engineering along with life-cycle support.

Army Communications Facility Centralizes Key Elements

March 1, 2013
BY Robert K. Ackerman

Aberdeen Proving Ground becomes the home of high-techology development, validation and deployment.

Consolidating its communications-electronics assets in a single location has given the U.S. Army vital resources and flexibility that it needs to address its changing information technology demands during a time of transition. This transition is twofold: not only is Army communications absorbing new commercial technologies and capabilities, the Army itself also is facing substantial changes as a force that has been overseas for more than a decade is redeploying back to its U.S. bases.

Some long-established programs have evolved to, or have been transitioned into, wholly new programs. These programs lend themselves to the new centralized approach, which is improving their implementation processes. Having research elements in the same location, as well as access to networked laboratory facilities at distant locations, is generating efficiencies that continue to be discovered as advanced communications and electronics technologies are developed for incorporation into the force.

The Base Closure and Realignment, or BRAC, process consolidated several Army elements, including the Communications-Electronics Command (CECOM), at Aberdeen Proving Ground, Maryland. They are grouped under the umbrella Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) Center of Excellence. One of these elements, the Program Executive Office (PEO) Command Control Communications-Tactical (C3T), is tasked with providing soldiers with tactical communications and computer systems.

Air Asset to Send Critical Material to Forces Faster

March 1, 2013
By Rita Boland

The plug-and-play technology will close large capability gaps in the field.

The U.S. Army is developing the first airborne intelligence, surveillance and reconnaissance platform fully enabled to connect analysts with the Distributed Common Ground System-Army. That system will help remedy problems currently hindering soldiers from having all data feed into a single repository. With the new aircraft, the process will be streamlined from the flying support, so information reaches ground commanders faster to facilitate more timely decision making.

Units will begin enjoying these connected benefits of the Enhanced Medium Altitude Reconnaissance and Surveillance System (EMARSS) aircraft in 2014, with the Army accepting deliveries from Boeing beginning later this year. In the past, all airborne intelligence platforms employed their own unique processing, exploitation and dissemination procedures that transmitted to specific ground stations. Personnel then had to find workarounds to share it with the troops who needed it. Through the Distributed Command Ground System-Army (DCGS-A), analysts can query the single system and retrieve the sensor data remotely.

Soldiers have used the DCGS-A extensively throughout their operations in both Iraq and Afghanistan. However, the Defense Acquisition Executive only approved the system for full deployment across the force in mid-December of last year.

The Army’s Guardrail platform is also DCGS-A capable, but it does not have operators of the system on board nor does it have imagery intelligence (IMINT) capability. Guardrail is designed to support only signals intelligence (SIGINT) to the DCGS-A, while EMARSS will bring in the imagery piece at the secret Internet router protocol network level. In addition, EMARSS will be the first platform that can provide data from secret to top secret immediately into the Army's distributed system.

U.S. Nuclear Agency Enhances Cybersecurity With Cloud Computing


March 1, 2013
By George I. Seffers

Officials aim to have a solution in place by year's end.

The U.S. agency responsible for the management and security of the nation’s nuclear weapons, nuclear proliferation and naval nuclear reactor programs is racing to put unclassified data on the cloud this year. Cloud computing is expected to provide a wide range of benefits, including greater cybersecurity, lower costs and networking at any time and from anywhere.

Officials at the National Nuclear Security Administration (NNSA), an agency within the Department of Energy, expect to have a cloud computing capability this year. The solution, known as Yourcloud, will provide the NNSA with its own cloud computing environment to manage data more securely, efficiently and effectively. It is part of an overall effort to modernize the agency’s information infrastructure. Yourcloud replaces an aging infrastructure that resulted in too many data centers and an inability to refresh equipment as often as necessary.

The Yourcloud infrastructure will be built and owned by industry, while the NNSA will control the data residing in the cloud. “We’ll be using a commercial data center space with a managed cloud provider as well as a managed security provider to offer us fee as a service back to our customer base,” says Travis Howerton, NNSA chief technology officer.. I don’t want to own my own infrastructure on the unclassified side, but I do want to own my own data. That’s why we’ve been pushing the innovation agenda around security, taking advantage of the lower-cost industry options while not compromising our security posture. What we really have to do is figure out how to insource security and outsource computing, to keep the keys of the kingdom inside, to protect the crown jewels, to make sure we own the security of our data, but then to take advantage of low-cost computing wherever it may be. We are evolving to that model.”

The Budget Is Dominating the Dialogue--Especially That of the Security Community

March 1, 2013
by Kent R. Schneider

Anyone who has attended an AFCEA conference in the past two months has heard the constant drumbeat from senior government leadership on the limitations on operations and readiness likely to occur in defense, intelligence and homeland security. At the AFCEA/USNI West 2013 Conference in San Diego January 29-31, the vice chairman of the Joint Chiefs of Staff told a packed audience that the U.S. Defense Department did not know how much money it would receive, when it would receive it or what the restrictions on its use would be.

While we are getting a similar message from defense, intelligence and homeland security leaders, the most concise statement of the problem comes from Deputy Secretary of Defense Dr. Ashton Carter. In a January 10 memorandum, “Handling Budgetary Uncertainty in Fiscal Year 2013,” Carter points out that the department faces two elements of economic uncertainty in this fiscal year. First, the department, as are all U.S. federal agencies, is operating under a continuing resolution (CR) that expires March 27. While the Defense Department is working with Congress to get appropriations bills, the possibility exists that it will operate under a CR for the remainder of the fiscal year.

Under a CR, the department is limited to prior-year funding levels, and there can be no new starts. In addition, transfer of funds among categories is very limited. Second, Congress deferred potential sequestration under the American Taxpayer Relief Act of 2012 from January 2, 2013, to March 1. If sequestration does occur this late in the year, the approximately $46 billion in reductions would occur in a very concentrated period. Remember too that the reductions under sequestration have few exceptions and must be applied across all program elements.

China Employs Ships As Weapon Test Platforms

March 1, 2013
BY James C. Bussert

A handful of designs serves to validate indigenous and reverse-engineered technologies.

The People’s Republic of China has been introducing diverse new classes of ships into its navy for decades, but it also has employed some as vessels for weapons trials. Three ships distinctly have served as test platforms for many of the new technologies that entered service with the People’s Liberation Army Navy, or PLAN. An examination of these trial ships can illustrate the next generation of technologies about to be incorporated in the navy.
 

The first nominal weapon trial ship was the 1,200-ton Yanxi class AGE hull 701 Hsun, built in Shanghai in 1970. It carried no systems other than anti-aircraft guns and radars, but it did support Soviet Styx surface-to-surface missile (SSM) launch and recovery during tests.

In March 1997, the Zhonghua Shipyard in Shanghai launched the 6,000-ton Dahua class ship Shiyan for testing modern naval weapon systems. The ship, hull 970 (experimental), initially was hull 909, which was built as a weapon range test ship. It deployed to the South China Sea test range in January 1998. The trial equipment tested included electronic countermeasures (ECM), a prototype vertical launching system on the bow and several copies of the Russian MR-90 Front Dome fire control radar to illuminate air targets. The 970 operated off of Japan in February 2000 as an electronic intelligence (ELINT) ship prior to PLAN East China Sea exercises.

The lead Dahua class ship frequently changed hull numbers. Launched as 909, the hull number was changed to 970 by the time of its completion in August 1997. The hull number was changed again to 891 as a weapon trial ship in October 2002. China’s changing of ship hull numbers and even names makes determining the actual history of one particular hull difficult, which certainly is a reason for this practice.

Subscribe to RSS - March 2013