SIGNAL Online Exclusives

January 29, 2014
By George I. Seffers
Smugglers used a makeshift ramp to attempt to drive over a border fence in 2012 but fled when the truck didn’t make it over. Jeh Johnson, secretary of the Homeland Security Department, is calling for a 2015 appropriations bill to fund more technology to help secure the southern border.

Jeh Johnson, secretary of the Homeland Security Department, is calling on Congress to pass a 2015 appropriations bill to fund additional security measures for border protection and homeland security.

January 29, 2015
By George I. Seffers
An EA-18G Growler (top) and EA-6B Prowler (bottom) fly together. The Navy is developing a next-generation jammer to be integrated onto the EA-18G, but Frank Kendall warns the United States is falling behind potential adversaries on electronic warfare systems.

The U.S. is falling behind potential adversaries, such as China and Russia, in key technological areas, warned Frank Kendall, undersecretary of defense for acquisition, technology and logistics, while testifying before the House Armed Services Committee.

January 14, 2015
By Sandra Jontz

President Barack Obama has put the cybersecurity ball into Congress’ court, seeking legislation that pushes what some industry experts have clamored for in the quest to better protect the nation’s information network. The president has unveiled details for new laws toward better cybersecurity, which includes a heavy focus on increased information sharing between government and industry. Some experts have said better protections lacking a robust information-sharing plan—and the related safeguards—between the private sector and government. It's a good start, but not quite enough. 

January 12, 2015
By Sandra Jontz
Screen shot of CENTCOM's Twitter page, which had been hacked January 12, 2015.

The Twitter and YouTube accounts for the U.S. Central Command, the Defense Department branch responsible for operations in the Middle East and Afghanistan, were hacked by sympathizers of the Islamic State militant group, prompting U.S. officials to suspend the accounts and launch yet another round of investigations into a cybersecurity breach.

January 9, 2015
By George I. Seffers

Georgia Tech researchers work toward a scanner—similar to a virus scan—for side channel emissions.

January 7, 2015
By Sandra Jontz

As China, Russia and Iran continue to develop capabilities that could circumvent U.S. missile defenses, technology under development by one defense industry contracting giant has piqued the interest of the U.S. Missile Defense Agency.

December 29, 2014
By Sandra Jontz

The U.S. military can get a bird's-eye view of a battlefield or humanitarian mission via use of unmanned aerial vehicles. Now, DARPA is asking for technology that would let the military get into buildings without having troops actually step foot inside.

December 12, 2014
By George I. Seffers

With the National Geospatial-Intelligence Agency's interactive Map of the World now residing in the cloud, the intelligence agency plans to expand the tools and content.

December 10, 2014
By Sandra Jontz
Maj. Mark Jacobsen, USAF, tests an unmanned aerial vehicle as part of the Syria Airlift Project, which he hopes one day will use drones to deliver food and medicine to war-torn countries.

After witnessing the depressing impact of starvation and lack of medicine for Syrian refugees encamped in Turkey, Maj. Mark Jacobsen, USAF, embarked on a project that he hopes one day will use unmanned aerial vehicles to airdop lifesaving supplies for victims of war-ravaged nations.

December 5, 2014
By Sandra Jontz

Behavioral analytic tools might just open new horizons for better cybersecurity that would let experts better prioritize alerts and collect actionable intelligence, giving them an advantage for more rapid responses to breaches. Or might they open new doors for hackers?

November 18, 2014
By George I. Seffers

The National Institute of Standards and Technology (NIST) has published for public review draft recommendations to ensure the confidentiality of sensitive federal information residing on the computers of contractors and other nonfederal organizations working for the government.

November 18, 2014
By Sandra Jontz

Technology plays a central role in helping the Department of Veterans Affairs work smarter, not harder, to medically treat veterans, particularly those who live in rural areas of the nation.

November 14, 2014
By Sandra Jontz
Michelle Dennedy (r), chief privacy officer for Intel Security, talks about a new program to teach children safe cyberpractices in partnership with Discovery Education, led by Bill Goodwyn, (c). Penny Baldwin, CMO of Intel Security, moderated the discussion.

Intel Security partnered with Discovery Education to launch a three-year national education initiative with a goal of reaching at least 35 million students with a brand new program to teach safe cyberpractices. “Think Before You Link” is the first and only Discovery Education-supported initiative to focus on cybersecurity education with a first of its kind digital safety curricula.

November 6, 2014
By Sandra Jontz

The U.S. Army has not begun using a 3-D printer for food—yet. But scientists at the Natick Research Center have the idea and the funding to research the potential capabilities of 3-D food printers.

October 29, 2014
George I. Seffers

The Defense Department is expected very soon to release a new policy revising the role DISA plays in brokering cloud services. The changes are designed to speed cloud service acquisitions. DISA no longer will be the sole acquisition agency, but it will continue to ensure network access to cloud service providers is secure and reliable, agency officials say.

October 28, 2014
By Sandra Jontz
Northrop Grumman Corporation and DARPA are recognized by Guinness World Records for developing the world's fastest integrated circuit amplifier and reaching an operating speed of 1 terahertz. Pictured from l-r are Dale Burton, Arati Prabhakar, Philip Robertson, Dev Palmer and William Deal.

A five-year project funded by the Defense Department’s research arm and developed by Northrop Grumman Corporation has netted the world’s fastest integrated circuit amplifier and a place in the record books.

October 16, 2014
By Sandra Jontz

Might the recurring data breaches plaguing one large retailer after another be a dress rehearsal for a catastrophic attack that could cripple, if not destroy, the United States and its critical infrastructure? The doomsday rhetoric presented by cybersecurity experts at an issue forum Thursday hosted by the Fairfax County Chamber of Commerce, while not so calamitous, served as a wake-up call to the enduring cybersecurity vulnerabilities.

October 15, 2014
By Sandra Jontz
An unmanned boat from Naval Surface Warfare Center Carderock operates autonomously during a demonstration of swarmboat technology being developed by the Office of Naval Research.

The U.S. Navy is capitalizing on a first-of-its-kind autonomous technology that can transform just about any surface vessel into an unmanned platform able to protect other ships or “swarm” hostile vessels.

October 14, 2014
By George I. Seffers

The U.S. Army’s Rapid Equipping Force (REF), which quickly fields technologies to meet urgent warfighter needs, intends by the end of November to open an office in Kuwait that will serve warfighters in the Middle East and Southwest Asia.

October 10, 2014
By Sandra Jontz

The recent rash of cyber attacks on major U.S. companies has drawn renewed focus on network vulnerabilities, both in commercial and governmental sectors, and not just on external attackers but on potentially more ominous threats posed by insiders. Hackers are looking for self-identified privileged users who broadcast on social media sites their career positions.

Pages