September 2013

September 1, 2013
By Lt. Ben Kohlmann, USN

 

Bureaucracies are slow to change, and few may be more anemic than the military services. With a foundational and personnel structure optimized for the Cold War and the industrial age, this unfortunate reality is acutely evident as the information age accelerates into ever more complex manifestations.

While some leadership principles remain constant regardless of the era, quite a few must be adapted to the realities of their time. Some of the characteristics already have defined, and will continue to define, effective 21st century military leadership.

September 1, 2013
By Max Cacas

 

In the next few years, usernames and passwords could gradually fade from popular use as a way to conduct business online. A public/private coalition is working on a new policy and technical framework for identity authentication that could make online transactions less dependent on these increasingly compromised identity management tools. A second round of federal grants from the group, expected this fall, will lead to continued work on what is expected to become a private sector-operated identity management industry.

September 1, 2013
By George I. Seffers
The FBI is studying the business case for using iris recognition, which so far is used primarily by state prisons and county jails for keeping track of prisoners. The Defense Department also is expected to be a major user of iris recognition.

The FBI is on schedule to finish implementing next-generation biometric capabilities, including palm, iris and face recognition, in the summer of next year. New technology processes data more rapidly, provides more accurate information and improves criminal identification and crime-solving abilities.

September 1, 2013
BY Rita Boland

Scientists are enabling DNA analysis to function as a virtual sketch artist to figure out who people are and what they look like even in situations with no eyewitnesses. The developments have particular application to counterterrorism but could affect a wider array of fields as well. Even more importantly, the personnel are developing bioinformatic software solutions databases to manage quick interpretation of data for usability.

September 1, 2013
By George I. Seffers
NATO forces destroyed a military compound in Libya during recent operations. Under the new network infrastructure, commanders will be able to expand information technology capabilities virtually rather than bringing in truckloads of new equipment.

 

NATO officials are laying the groundwork for a centralized enterprise networking architecture with invitations to bid expected to be released by year’s end. The new approach is expected to offer a number of benefits, including cost savings, improved network reliability, enhanced cybersecurity and greater flexibility for warfighters.

September 1, 2013
By Robert K. Ackerman
Increased use of iris recognition has spawned a host of deceptive countermeasures. A new technique promises to detect these masking efforts. (Photo: Petr Novak, Wikipedia)

 

A simple capability found in most cameras may enable security experts to counter efforts by terrorists and other security threats to spoof iris recognition systems. The new approach focuses on eye function in addition to appearance, thus unmasking several types of deception that either would conceal a real iris or would fool a detection system into false acceptance.

September 1, 2013
By Robert K. Ackerman
Adm. Jose Saldanha Lopes, PON, is the chief of the Portuguese Naval Staff.

 

The economic and technological challenges facing Western militaries are magnified for Portugal as it tries to ensure the viability of its navy. The small maritime nation that regularly participates in NATO naval operations is facing severe budgetary constraints as its domestic economy contracts, but it must improve and even increase its capabilities as a result of a growing mission set.

September 1, 2013
By George I. Seffers
A computer lab in Jalalabad is one piece of a broader effort to educate train a technology-savvy workforce.

A massive telecommunications infrastructure modernization effort in Afghanistan is designed to contribute to socioeconomic development; provide entry into the global information society; and support national prosperity, sustainability and stability. A key part of that effort is coming to fruition: officials with a telecommunications advisory group in that country expect the completion very soon—possibly this month—of a fiber-optic ring around the nation’s perimeter.

September 1, 2013
By Robert K. Ackerman
Two signal soldiers set up an antenna at a training site in Fort Gordon, Georgia. Keeping signaleers up-to-date is a primary challenge, as the development of new technologies is outpacing the ability to train.

The U.S. Army Signal Corps is expanding the work its personnel conduct while dealing with technology and operational challenges that both help and hinder its efforts. On the surface, Army signal is facing the common dilemma afflicting many other military specialties—it must do more with fewer resources.

September 1, 2013
By Rita Boland

 

The exponential expansion of geolocation technology throughout all levels of society is presenting a range of challenges for policy makers eager to take advantage of the benefits while protecting personal privacy. Unfortunately, much of the discussion surrounding the challenges is fragmented or lacking in authority.

September 1, 2013
By Paul A. Strassmann

In his June interview with SIGNAL Magazine, Gen. Keith B. Alexander advocated bringing together the signal community, signals intelligence and the cyber community. In that interview, he said, “We need to think of ourselves not as signals, not as intelligence, not as cyber, but instead as a team that puts us all together.” Yet, that goal raises several questions. How can these concepts be achieved? How can a combination of more than 15,000 system enclaves from the U.S. Army, Navy, Marine Corps and Air Force become interoperable? What technologies are needed in the next five years while insufficient budgets make consolidations difficult?

September 1, 2013
By Robert K. Ackerman
A Spanish soldier leads a patrol as part of the International Security Assistance Force (ISAF) in Afghanistan. Lessons learned in that operation are guiding the NATO Headquarters Consultation, Command and Control (C3) Staff as it strives to develop an enterprise network environment for the alliance. (Photo: Spanish Ministry of Defense)

NATO is adopting an enterprise approach to networking so it can take advantage of new defense information system capabilities as well as recent developments gleaned from Southwest Asia operations. This approach would allow different countries participating in alliance operations to network their own command, control and communications systems at the onset of an operation.

September 1, 2013
By George I. Seffers
U.S. Marines from 3rd Light Armored Reconnaissance Company train the turret of their Light Armored Vehicle toward targets at the Shoalwater Bay Area Training Area in Queensland, Australia. Australia is one country in the Asia Pacific region expected to join the Coalition Interoperability Assurance and Validation working group.

The working group that helped solve the coalition interoperability puzzle in Afghanistan is working across the U.S. Defense Department and with other nations to ensure that the lessons learned will be applied to future operations around the globe. Experience in creating the Afghan Mission Network may benefit warfighters worldwide, such as those in the Asia Pacific, and may even be applied to other missions, including homeland security and humanitarian assistance.