February 2014

February 1, 2014
By Michael A. Robinson
The U.S. Office of Naval Research’s Situational Awareness System (SAWS) uses electro-optic/infrared sensors for 360-degree surveillance in the water and in the air. The greater variety of sensor capabilities is feeding big data, which in turn is spawning new types of sensor systems.

The emergence of big data combined with the revolution in sensor technology is having a synergistic effect that promises a boom in both realms. The ability to fuse sensor data is spurring the growth of large databases that amass more information than previously envisioned. Similarly, the growth of big data capabilities is spawning new sensor technologies and applications that will feed databases’ ever-increasing and diverse types of information.

February 1, 2014
By Lt. Gen. Daniel P. Bolger, USA (Ret.)

Military people like to look at themselves, and it has nothing to do with vanity. Rather, it is about improving, but the attention is not always welcome at the business end. Senior personnel offer the usual advice: Cooperate and learn. Do not be defensive. Looking at ourselves can only make us better, so we go along with it. And often—not always, but enough to matter—we find out important facts we did not know.

February 1, 2014
By Robert K. Ackerman

All the challenges vexing a modern military—budgetary limitations; information technologies; cyber; and joint and coalition interoperability—are defining operations in the Asia-Pacific region. Covering more than half the Earth’s surface and comprising dozens of nations, the vast area is rife with geopolitical rivalries that complicate efforts at regional security. And, the one domain that knows no geographic bounds—cyberspace—weighs heavily on the success of potential warfighting operations in that region.

February 1, 2014
By George I. Seffers
A U.S. Army UH-60 Black Hawk helicopter takes off in Kandahar province, Afghanistan. U.S. Army officials estimate the Better Buying Power initiative has saved more than $700 million on Apache and Chinook helicopters.

U.S. military officials may delay the next iteration of the Pentagon’s premier acquisition reform initiative, Better Buying Power 3.0, which likely will continue to improve service acquisition and exportability processes.

February 1, 2014
By Kent R. Schneider

This rarely happens, but for 2014, defense and technology analysts are in agreement that big data and cybersecurity are the two drivers in planning and investment for information technology, both in government and in industry. Most everything else will be enabling these two key capabilities. While much attention has been focused on the threats and work being done globally on cybersecurity, I want to focus on big data.

Big data is critical because, unless it is collected, analyzed, managed and made ubiquitously available, many analysts and decision makers will be buried in information they cannot use effectively in a timely fashion. It also is the starting and ending point for many of the technologies and capabilities we care about: networks, data centers, cloud initiatives, storage, search, analytics and secure access

February 1, 2014
By Rita Boland
U.S. sailors on the bridge of the USS Ramage monitor a Spanish frigate as it departs Souda Bay during their scheduled deployment supporting maritime security operations and theater security cooperation efforts in the U.S. 6th Fleet area of responsibility.

The U.S. Joint Chiefs of Staff has updated its maritime joint command and control guidance, reflecting changing practices across the fleet. Although the rewrite is part of regularly scheduled reviews, the timing is apt for world conditions. U.S. attention is moving east to a far more watery environment than the one the country has focused on for the last dozen or more years, and contentions among nations for waterway control continue to mount in areas such as the East China Sea.

February 1, 2014
By Robert K. Ackerman
A U.S. Navy officer communicates with the USS George Washington to coordinate airlift operations during Operation Damayan, the relief effort following the devastating Philippine typhoon in November 2013. Prepositioned equipment and early entry communications gear proved invaluable to rapid disaster relief in the stricken area.

The success of Operation Damayan, the massive Philippines typhoon relief effort by the U.S. Pacific Command, owes as much to preparation as to execution, according to a U.S. official involved in the operation. Military communications equipment designed for easy entry and quick activation provided essential networking capabilities. Longtime multinational and bilateral exercises laid the groundwork for interoperability, both technological and organizational, between U.S. and Philippine armed forces. 

February 1, 2014
By Rita Boland

The increasing presence of news sources on the Internet offers an unprecedented opportunity to access open-source intelligence for a variety of purposes. Researchers from several U.S. universities have collaborated to take advantage of these resources, creating a big data collection and distribution process applicable to disciplines ranging from social research to national security.

February 1, 2014
By George I. Seffers
An H-60S helicopter conducts deck landing qualifications on USS Milius destroyer off the coast of Guam. Milius was the first ship to begin installing CANES and will serve as the operational testing platform for the next-generation afloat network.

U.S. Navy officials expect to award a full-deployment contract for a new shipboard network this spring, and they plan to install the system on nine ships this year. The network provides commonality across the fleet, replacing multiple aging networks, improving interoperability and driving down costs. The Common Afloat Networks and Enterprise Services (CANES) program represents a new business model for delivering capability to the fleet, Navy officials say. The program consolidates five legacy networks into one, which enhances operational effectiveness and provides better quality of life for deployed sailors.

February 1, 2014
By George I. Seffers
The USCGC Waesche, the second of the National Security Cutter class, was outfitted in 2013 with a suite of technologies procured under the Coast Guard’s C4ISR project.

When the U.S. Coast Guard fields its newest cutter next year, the ship will be equipped with an information technology package that offers common tools and capabilities among the cutter and aviation fleets. The technology suite will improve interoperability across the service and with other agencies, and it enhances situational awareness while providing flexibility for future upgrades.

February 1, 2014
By Henry S. Kenyon

A new software tool allows federal agencies to scan mobile device applications for security and accessibility issues prior to publishing them. The automated process allows developers to check their code rapidly against a variety of government guidelines to ensure that new mobile applications keep personnel and their organizations safe from hacking and other malicious outside threats.

February 1, 2014
By Henry S. Kenyon
By fusing data streams from different UAS sensors, the Multi-INT system creates a single map and video image for the operator. The image, combined with the ability to control individual sensors to track different targets, enhances the abilities of smaller tactical UAS platforms.

An upgrade featuring a lightweight sensor and software system added to smaller unmanned vehicles can provide capabilities similar to those available on larger vehicles. As the Defense Department realigns its operational focus to the Pacific, deployable forces, such as special operations teams and Marine Corps expeditionary forces, need high-quality airborne intelligence, surveillance and reconnaissance. While such capabilities are normally provided by unmanned aircraft such as the MQ-1 Predator, smaller platforms have to meet this need for troops operating in remote areas. These smaller vehicles require fewer personnel and are easier to maintain, but they are also less capable.