INFORMATION SYSTEMS SECURITY
COMMUNICATIONS SECURITY
COMPUTER SECURITY
CRYPTOGRAPHY
INFORMATION SYSTEMS SECURITY
MULTILEVEL SECURITY
NETWORKS
ORGANIZATION PROCEDURES
SECURE VOICE
SMART CARDS
ORDER BACK ISSUES OF SIGNAL


COMMUNICATIONS SECURITY

"Modern Communications Shifts Require New Security Methods," Ronald D. Elliott, Oct. 1990, p. 69.

"Drug Curse Conquest Hinges On Secure Communications," Clarence A. Robinson, Jr., Jul. 1991, p. 58.

"National and Private Interests Clash Over Information Security Policy,"
Col. Alan D. Campen, USAF (Ret.), May 1994, P. 17.

"Group Vulnerabilities Demand Methods To Practice Safe Fax," Kevin Braun, Aug. 1994, p. 57.

"Data Security Looms Crucial in Changing World Climate," Aug. 1994, p. 63.

"Risk Management Provides Vital Information Security," Oct. 1994, p. 25.

"Local Area Networks Heighten Difficult Security Concerns," Oct. 1995, p. 41.

"Software Enables Secure Public Communications," Andrew C. Braunberg, Oct. 1995, p. 45.

"Secure Data Link Enhances Tactical Identification System," Oct. 1995, p. 55.

"Military Messaging Advances Turn New Page in Connectivity," Robert K. Ackerman, May 1996, p. 45.

"Information Systems, Networks Spark Major Security Challenges," June 1996, p. 43.

"Army Information Operations Protect Command and Control,"
Clarence A. Robinson, Jr., July 1996, p. 47.

"Secure Architectures Liberate Commercial Wireless Systems,"
Errol A. Haznedar, Mark E. Dark and Lt. Col. George R. Lanigan, USA, August 1996, p. 62.

"Art of the Small Supplies Secure Cellular Voice, Data," Sean Patrick Burgess, Sept. 1996, p. 60.

"Western Infrastructures Face Rogue Data Stream Onslaught," Jan. 1997, p. 31.

"Safeguarding Data Provides Network, Computer Security," Jan. 1997, p. 37.

"Digital Formats Complicate Information Security Tasks," Feb. 1997, p. 21.

"Internet Explores Multilevel Communication Security Realm," Mar. 1997, p. 45.

"Secure Wireless Initiative Targets Satellite, Cellular" Mar. 1997, p. 45.

"Global Network Commerce Rests On Trusted Cyberspace Security," Mar. 1997, p, 53.

"Commercial Systems Enhance Information Warfare Capability," Mar. 1997, p. 64.

"Cellular Cloning Succumbs to Recycled Defense Technology," Sean Patrick Burgess, Apr. 1997, p. 27.

"Secure Ties Bind Airborne Radar Surveillance, Users," May 1997, p. 67.

"Microscopic Magicians Wage Information Security Skirmish," Robert K. Ackerman, July 1997, p. 35.

"Science Board Task Force Challenges Defensive Information Warfare Status,"
Maryann Lawlor, Sept. 1997, p. 63.

"It's Vulnerability, Not Threat-Stupid!," Col. Alan D. Campen, USAF (Ret.), Sept. 1997, p. 69.

"Silicon Security Designs Drive Cryptography Key Size March," Sept. 1997, p. 77.

"Industry, Agencies Integrate Network Protection Solutions," Edward J. Walsh, Sept. 1997, p. 79.

"Electronic Commerce's Sparkle Depends on Herculean Security," Sept. 1997, p. 82.

"Government and Industry Pluck Common Security Technologies," Sept. 1997, p. 87.

"Federal Agency Network Solutions Require Innovative Encryption Tack," Sept. 1997, p. 89.

"Government Efforts Confound Commercial Wireless Security," David A. Brown, Mar. 1998, p. 29.

"International Agreement Lightens Government Security Testing Load,"
Clarence A. Robinson, Jr., Mar. 1998, p. 45.

"Government-Industry Gridlock Hampers Information Security," Robert K. Ackerman, May 1998, p. 25.

"Justice Department Readies Infrastructure Defense Plans," Robert K. Ackerman, July 1998, p. 17.

"Antijamming Satellite Signals Increase Global Tactical Utility," July 1998, p. 45.

"Combining Capabilities Accommodates End-to-End Protection Demands," August 1998, p.17.

"Programmable Cryptography Emerges From Advanced Chip," August 1998, p. 23.

"Pyrotechnics Provide Emergency Critical Information Destruction," Sept. 1998, p. 71.

"Secure Satellite Links Induce Potent Allied Crisis Response," Oct. 1998, p. 31.

"Multilevel Security Solutions Advance for Operating Systems," Feb. 1999, p. 38

"Digital Credentials Kick Off New Commerce Procedures," August 1999, p. 27.

"Adaptive Response Tool Foils Hacker Intrusion," Henry S. Kenyon, August 1999, p. 33.

"Advanced Radio Integrates Multiple Features in One Unit," August 1999, p. 45.

"Postal Service Makes Computer Systems Secure," August 1999, p. VG 9.

"Standards Institute Studies Encoding Formula Options," August 1999, p. 69.

"Prototype Code Connects Multitude of Security Devices," Henry S. Kenyon, November 1999, p. 63.

"Trusted Gate Closes on Thin-Client Computer Network Security Holes," Dec. 1999, p. 67.

"Technology Did Not Create and Cannot Resolve Privacy Dilemma,"
Col. Alan D. Campen, Jan. 2000, p. 39.

"Cyberspace Situational Awareness Demands Mimic Traditional Command Requirements,"
Tim Bass, Feb. 2000, p. 83.

"Agencies Race Technology to Ensure Security," Edward J. Walsh, Feb. 2000, p. VG 6.

"Deft Federal Burglar Alarms Receive Funding Jump-Start," Clarence A. Robinson, Jr., Mar. 2000, p. 17.

"Layered Approach Security Planning Offers Best Defense Against Attacks,"
Michelle L. Hankins, April 2000, p. 55.

"Electronic Commerce Commands Canny Insight Into Hacker Moves," May 2000, p. 53.

"Secure Remote Access System Unlocks Off-Site Availability," Roger Black, May 2000, p. 63.

"Collusion Detection Technology Hunts Down Insider Crime," Henry S. Kenyon, June 2000, p. 65.

"Secure Telephony Enters Handheld Cellular Realm," Robert K. Ackerman, June 2000, p. 73.

"Computer Security Experts Warn of Growing System Vulnerabilities,"
Robert K. Ackerman, August 2000, p. 17.

"Intrusion Detection Technology Closes in on Hackers," August 2000, p. 21.

"Internet-Based Attack Risk Distracts Organizations From Internal Trouble," August 2000, p. 25.

"Cyberthreat Increases With Technology Proliferation," December 2000, p. 23.

"Open Line, Hidden Key," December 2000, p. 57.

"New Tricks for Old Threats," January 2001, p. 43.

"Assessment Tool Bolsters Efforts to Enhance Security," February 2001, p. VG 6.

"Insider Cybercrime Finds No Place to Hide," February 2001, p. 57.

"Mobile Network Blocks Tappers," March 2001, p. 50.

"Space Warriors Defend Information Assets," Christian B. Sheehy, April 2001, p. 29.

"Commercial Forces Unite to Combat Cyberthreats," April 2001, p. 40.

"Regulators Change the Locks In Cyberspace," April 2001, p. 44.

"Taking the Search Out of Search and Rescue," May 2001, p. 37.

"Security Concerns Grow as Technology Tools Shrink," Maryann Lawlor, June 2001, p. 25.

"Cyberguardian Keeps Hackers, Insider Threats at Bay," June 2001, p. 61.

"Smart Software Sniffs Out Trouble," July 2001, p. 53.

"A Powerful Vision," Clarence A. Robinson, Jr. August 2001, p. 16

"Cyberspace Forces Gear Up," August 2001, p. 25.

"Human Element Key to Intrusion Detection,"
Maj. David P.Biros, USAF and Capt. Todd Eppich, USAF, August 2001, p. 31.

"Fusion Center Unites Diverse Research Groups," August 2001, p. 35.

"Transient Partnerships Stretch Security Policy Management," September 2001, p. 26.

"Wireless Tail Wags Infrastructure Dog," Clarence A. Robinson, Jr., September 2001, p. 31.

"Aircraft Calculations Boost Radio Frequency Networks," September 2001, p. 37.

"Watch Out, Mobile Agents," Clarence A. Robinson Jr., October 2001, p. 35.

"Physical Disaster Propels Cybersecurity Initiatives,"
Clarence A. Robinson Jr., November 2001, p. 17.

"Jolting Destruction Galvanizes U.S. Agencies To Walk the Walk," November 2001, p. 21.

"Preparing to Protect The Digital Force," November 2001, p. 45.

"Jam-Proof Signals To Guide Navigation," November 2001, p. 57.

"Attackers Placed At Scene of Crime Before They Arrive," Sharon Berry, December 2001, p. 27.

"Cyberspace Sleuths Uncover Covert Connections," May 2002, p. 53.

"Extending Cyberdefense To the Fiber Domain," Robert Fish, June 2002, p. 51.

"Government Enlists Industry for Information Security," Robert K. Ackerman, August 2002, p. 17.

"National Strategy Tackles Tough Security Issues," Maryann Lawlor, August 2002, p. 23.

"Connections With Protections," August 2002, p. 35.

"Diverse Groups Share Information Assurance Quandaries," Joseph McKendrick, August 2002, p. 41.

"Virtual Token Leaves No Footprint," Sept. 2002, p. 58.

"Rethinking Joint Information Operations," Maj. Karlton D. Johnson, USAF, Oct. 2002, p. 57.

"Government Maps Cyberspace Security Program," Robert K. Ackerman, Apr 2003, p. 33.

"The Call to Action," Vice Adm. Herbert A. Browne, USN (Ret.), Aug 2003, p. 14.

"Advisory Board Blazes Security Professionals Trail," Aug 2003, p. 17.

"Pace of Innovation Gathers Momentum," Jan 2004, p. 23.

"Virtual Hackers Help Take a Byte Out of Cybercrime," Maryann Lawlor, Feb. 2004, p. 41.

"Information Systems See Red," Feb. 2004, p. 47.

"2004 Signal Magazine Security Directory," Feb. 2004, p. 68-92.

COMPUTER SECURITY

"Computer Warfare Weapons are Target of Researchers," Robert H. Williams, Feb. 1991, p. 43.

"Europe Pursues Different Computer Security Approach," Christian Jahl, Jan. 1991, p. 45.

"Higher Trusted Security Pending for UNIX System," Clarence A. Robinson, Jr., Jan. 1991, p. 61.

"Information Security Needs Improved Trusted Systems," Stephen T. Walker, Jan. 1991, p. 19.

"Low Cost Security Solutions for Personal Computers," James B. Schultz, Nov. 1989, p. 71.

"NIST Leads Development of Computer Security Standards,"
Dr. Dennis K. Branstad and Dr. Stuart W. Katzke, Jan. 1991, p. 37.

"Protecting Our Computers," Gen. John A. Wickham, Jr., USA (Ret.), Jan. 1989, p. 17.

"Security Criteria Evolves to Meet a Changing World," Theodore M. P. Lee, Jan. 1991, p. 29.

"Security--Stepchild of the Information Age," Alan D. Campen, Jan. 1991, p. 68.

"More Pernicious Computer Viruses Menace, Germinate," Doug Richardson, Dec. 1991, p. 64.

"New Approach Identifies Malicious System Activity," Maj. Patrick W. Phillips, USAF, Mar. 1992, p. 65.

"New Internet Security Model Offers Flexibility, Protection," Lewis E. Shadle, Feb. 1993, p. 32.

"Tactical Computers Vulnerable To Malicious Software Attacks," A. Padgett Peterson, Nov. 1993. p. 74.

"Low Emissions Portable Computer Overcomes Electromagnetic Fields," Sept. 1994, p. 63.

"Information Warfare Calculus Mandates Protective Actions,"
Adm. James B. Busey IV, USN (Ret.), Oct. 1994, p. 15.

"Software Security Protects Work Station, Laptop Data," Clarence A. Robinson, Jr., Oct. 1994, p. 19.

"New Rules, Customer Focus Awaken Security Innovation," Oct. 1994, p. 33.

"Trusted Data Base Management Executes Multilevel Protection," Oct. 1995, p. 25.

"Personal Computers Emrace Flexible, Scalable Security," Robert K. Ackerman, Oct. 1995, p. 29.

"Activating Firewall Security Lulls Attackers, Strikes Back," Oct. 1995, p. 32.

"Portable Computers Raise Security Management Stakes," Tim Craig, Oct. 1995, p. 49.

"New Secure Facsimile Magnifies Battlefield Image, Data Integrity," Oct. 1995, p. 51.

"Personal Information Watchman and Things That Go Bump in the Night,"
Col. Alan D. Campen, USAF (Ret.), Feb. 1996, p. 56.

"Military Messaging Advances Turn New Page in Connectivity," Robert K. Ackerman, May 1996, p. 45.

"Industry, Gopvernment Pursue Data Security Clearinghouse," Mar. 1997, p. 69.

"Antidote Thwarting Schemes Startle Pesky Virus Creators," Michael A. Robinson, Sept. 1997, p. 73.

"Electronic Commerce's Sparkle Depends on Herculean Security," Sept. 1997, p. 82.

"Government and Industry Pluck Common Security Technologies," Sept. 1997, p. 87.

"International Agreement Lightens Government Security Testing Load,"
Clarence A. Robinson, Jr., Mar. 1998, p. 45.

"Make-My-Day Server Throws Gauntlet to Network Hackers,"
Clarence A. Robinson, Jr., May 1998, p. 19.

"Government-Industry Gridlock Hampers Information Security,"
Robert K. Ackerman, May 1998, p. 25.

"Combining Capabilities Accommodates End-to-End Protection Demands," August 1998, p.17.

"Pyrotechnics Provide Emergency Critical Information Destruction," Sept. 1998, p. 71.

"Minuscule Combination Lock Safeguards Silicon Capital," Maryann Lawlor, August 1999, p. 23.

"Digital Credentials Kick Off New Commerce Procedures," August 1999, p. 27.

"Adaptive Response Tool Foils Hacker Intrusion," Henry S. Kenyon, August 1999, p. 33.

"Trusted Gate Closes on Thin-Client Computer Network Security Holes," Dec. 1999, p. 67.

"Security Product Trust Demands Laboratory Test and Evaluation,"
Clarence A. Robinson, Jr., April 2000, p. 51.

"Layered Approach Security Planning Offers Best Defense Against Attacks,"
Michelle L. Hankins, April 2000, p. 55

. "Secure Remote Access System Unlocks Off-Site Availability," Roger Black, May 2000, p. 63.

"Collusion Detection Technology Hunts Down Insider Crime," Henry S. Kenyon, June 2000, p. 65.

"Computer Security Experts Warn of Growing System Vulnerabilities,"
Robert K. Ackerman, August 2000, p. 17.

"Intrusion Detection Technology Closes in on Hackers," August 2000, p. 21.

"Internet-Based Attack Risk Distracts Organizations From Internal Trouble," August 2000, p. 25.

"Coordination Center Serves as Federal Front Line in the Virus Wars,"
James R, Dukart, August 2000, VG 5.

"New Tricks for Old Threats," January 2001, p. 43.

"Assessment Tool Bolsters Efforts to Enhance Security," February 2001, p. VG 6.

"Insider Cybercrime Finds No Place to Hide," February 2001, p. 57.

"Commercial Forces Unite to Combat Cyberthreats," April 2001, p. 40.

"Cyberguardian Keeps Hackers, Insider Threats at Bay," June 2001, p. 61.

"Smart Software Sniffs Out Trouble," July 2001, p. 53.

"A Powerful Vision," Clarence A. Robinson, Jr. August 2001, p. 16

"Cyberspace Forces Gear Up," August 2001, p. 25.

"Human Element Key to Intrusion Detection,"
Maj. David P.Biros, USAF and Capt. Todd Eppich, USAF, August 2001, p. 31.

"Wireless Tail Wags Infrastructure Dog," Clarence A. Robinson, Jr., September 2001, p. 31.

"Watch Out, Mobile Agents," Clarence A. Robinson Jr., October 2001, p. 35.

"Jolting Destruction Galvanizes U.S. Agencies To Walk the Walk," November 2001, p. 21.

"Preparing to Protect The Digital Force," November 2001, p. 45.

"Attackers Placed At Scene of Crime Before They Arrive," Sharon Berry, December 2001, p. 27.

"Government Enlists Industry for Information Security," Robert K. Ackerman, August 2002, p. 17.

"Keeping Malicious Code at Bay," Henry S. Kenyon, August 2002, p. 29.

"Diverse Groups Share Information Assurance Quandaries,"
Joseph McKendrick, August 2002, p. 41.

"Virtual Token Leaves No Footprint," Sept. 2002, p. 58.

"Desktop Security System Hides Data From Interlopers," Oct. 2002, p. 68.

"Scout Tags Unknown Hackers," Nov. 2002, p. 62.

"Commercial Coalition Tackles Security Complexities," Maryann Lawlor, Feb. 2003, p. 47.

"Government Maps Cyberspace Security Program," Robert K. Ackerman, Apr 2003, p. 33.

"Locking the Door From the Inside," Kevin Holmes, John Henry and Ray Steffey, Aug 2003, p. 21.

"Virtual Hackers Help Take a Byte Out of Cybercrime," Maryann Lawlor, Feb. 2004, p. 41.

"2004 Signal Magazine Security Directory," Feb. 2004, p. 68-92.

CRYPTOGRAPHY

"Open Line, Hidden Key," December 2000, p. 57.

"Mobile Network Blocks Tappers," March 2001, p. 50.

"Regulators Change the Locks In Cyberspace," April 2001, p. 44.

"Vendors Adopt New Cipher," April 2001, p. 45.

"A Powerful Vision," Clarence A. Robinson, Jr. August 2001, p. 16.

"International Community Fortifies Information Security," August 2001, p. 60.

"Transient Partnerships Stretch Security Policy Management," September 2001, p. 26.

"Watch Out, Mobile Agents," Clarence A. Robinson Jr., October 2001, p. 35.

"Seeing in a Different Light," Henry S. Kenyon, Jan. 2003, p. 35.

INFORMATION SYSTEMS SECURITY

"Integral Security Mechanisms Are Priority, Not Afterthought,"
Adm Kames. B. Busey IV, USN (Ret.) Oct. 1995., p. 13.

"Defense Organization Safeguards War Fighters' Information Flow,"
Clarence A. Robinson, Jr., Oct. 1995, p. 15.

"Emergency Communications Assets Respond as Disasters, Crisis Loom," Oct. 1995, p. 20

"Information Security Handicappers Prefer Risk Management Chargers," Oct. 1995, p. 23.

"Cooperative Effort Encourages Safe Information Highway Travel,"
Col. Alan D. Campen, USAF (Ret.), Oct. 1995, p. 43.

"Programmable Security Reduces Risk and Cost,"
John P. Vetrano and Capt. Robert S. Durst, USAF, Oct. 1995, p. 57

. "Personal Information Watchman and Things That Go Bump in the Night,"
Col. Alan D. Campen, USAF (Ret.), Feb. 1996, p. 56.

"Firewall Consortium Expands Cyberspace Security Sagacity,"
Clarence A. Robinson, Jr., Mar. 1996, p. 17.

"Public Networks Require Tailored Security Action," Mar. 1996, p. 23.

"Information Systems, Networks Spark Major Security Challenges," June 1996, p. 43.

"Security Safeguards Primary Battlefield Support Criterion," Nov. 1996, p. 40.

"Western Infrastructures Face Rogue Data Stream Onslaught," Jan. 1997, p. 31.

"Safeguarding Data Provides Network, Computer Security," Jan. 1997, p. 37.

"It's Vulnerability, Not Threat-Stupid!," Col. Alan D. Campen, USAF (Ret.), Sept. 1997, p. 69.

"Antidote Thwarting Schemes Startle Pesky Virus Creators," Michael A. Robinson, Sept. 1997, p. 73.

"Industry, Agencies Integrate Network Protection Solutions," Edward J. Walsh, Sept. 1997, p. 79.

"Electronic Commerce's Sparkle Depends on Herculean Security," Sept. 1997, p. 82.

"Government and Industry Pluck Common Security Technologies," Sept. 1997, p. 87.

"Federal Agency Network Solutions Require Innovative Encryption Tack," Sept. 1997, p. 89.

"International Agreement Lightens Government Security Testing Load,"
Clarence A. Robinson, Jr., Mar. 1998, p. 45.

"Make-My-Day Server Throws Gauntlet to Network Hackers," Clarence A. Robinson, Jr., May 1998, p. 19.

"Government-Industry Gridlock Hampers Information Security," Robert K. Ackerman, May 1998, p. 25.

"Justice Department Readies Infrastructure Defense Plans," Robert K. Ackerman, July 1998, p. 17.

"Tenacious Security Vigilance Disarms Technology Terrorists," Maryann Lawlor, July 1998, p. 37.

"Combining Capabilities Accommodates End-to-End Protection Demands," August 1998, p.17.

"Programmable Cryptography Emerges From Advanced Chip," August 1998, p. 23.

"Enterprise Maneuvers Deter Software Soldiers of Fortune," Maryann Lawlor, June 1999, p. 27

"Defense DepartmentÍs AchillesÍ Heel Targeted for Heightened Protection," July 1999, p. 57.

"Hidden Hazards Menace U.S. Information Infrastructure," Robert K. Ackerman, August 1999, p. 17.

"Minuscule Combination Lock Safeguards Silicon Capital," Maryann Lawlor, August 1999, p. 23.

"Digital Credentials Kick Off New Commerce Procedures," August 1999, p. 27.

"Adaptive Response Tool Foils Hacker Intrusion," Henry S. Kenyon, August 1999, p. 33.

"Postal Service Makes Computer Systems Secure," August 1999, p. VG 9.

"German Firm Aims Antennas At Security Communications," August 1999, p. 75.

"Security Agency Transitions From Backer to Participant," October 1999, p. 23.

"Integrated Circuit Chip Provides Secure, Rapid Data Encryption,"
Michelle L. Hankins, October 1999, p. 47.

"Safeguard Contract Provides Information Security," October 1999, p. VG 10.

"Prototype Code Connects Multitude of Security Devices," Henry S. Kenyon, November 1999, p. 63.

"Trusted Gate Closes on Thin-Client Computer Network Security Holes," Dec. 1999, p. 67.

"Technology Did Not Create and Cannot Resolve Privacy Dilemma,"
Col. Alan D. Campen, Jan. 2000, p. 39.

"Cyberspace Situational Awareness Demands Mimic Traditional Command Requirements,"
Tim Bass, Feb. 2000, p. 83.

"Agencies Race Technology to Ensure Security," Edward J. Walsh, Feb. 2000, p. VG 6.

"Deft Federal Burglar Alarms Receive Funding Jump-Start,"
Clarence A. Robinson, Jr., Mar. 2000, p. 17.

"Information Operations Absorb Traditional Service Activities," Mar. 2000, p. 23.

"Military Leaders Formulate Virtual Organization Plans," Mar. 2000, p. 27.

"Security Product Trust Demands Laboratory Test and Evaluation,"
Clarence A. Robinson, Jr., April 2000, p. 51.

"Layered Approach Security Planning Offers Best Defense Against Attacks,"
Michelle L. Hankins, April 2000, p. 55.

"Electronic Commerce Commands Canny Insight Into Hacker Moves," May 2000, p. 53.

"Secure Remote Access System Unlocks Off-Site Availability," Roger Black, May 2000, p. 63.

"Collusion Detection Technology Hunts Down Insider Crime," Henry S. Kenyon, June 2000, p. 65.

"Computer Security Experts Warn of Growing System Vulnerabilities,"
Robert K. Ackerman, August 2000, p. 17.

"Intrusion Detection Technology Closes in on Hackers," August 2000, p. 21

"Internet-Based Attack Risk Distracts Organizations From Internal Trouble," August 2000, p. 25.

"Coordination Center Serves as Federal Front Line in the Virus Wars,"
James R, Dukart, August 2000, VG 5.

"Cyberthreat Increases With Technology Proliferation," December 2000, p. 23.

"Open Line, Hidden Key," December 2000, p. 57.

"New Tricks for Old Threats," January 2001, p. 43.

"Insider Cybercrime Finds No Place to Hide," February 2001, p. 57.

"Crossed Wires Cause International Sparks," Henry S. Kenyon, March 2001, p. 35.

"Space Warriors Defend Information Assets," Christian B. Sheehy, April 2001, p. 29.

"Commercial Forces Unite to Combat Cyberthreats," April 2001, p. 40.

"Security Concerns Grow as Technology Tools Shrink," Maryann Lawlor, June 2001, p. 25.

"Cyberguardian Keeps Hackers, Insider Threats at Bay," June 2001, p. 61.

"Smart Software Sniffs Out Trouble," July 2001, p. 53.

"A Powerful Vision," Clarence A. Robinson, Jr. August 2001, p. 16

"Technology Challenges Vex Security Agency," August 2001, p. 21.

"Cyberspace Forces Gear Up," August 2001, p. 25.

"Human Element Key to Intrusion Detection,"
Maj. David P.Biros, USAF and Capt. Todd Eppich, USAF, August 2001, p. 31.

"Fusion Center Unites Diverse Research Groups," August 2001, p. 35.

"International Community Fortifies Information Security," August 2001, p. 60.

"Transient Partnerships Stretch Security Policy Management," September 2001, p. 26.

"Wireless Tail Wags Infrastructure Dog," Clarence A. Robinson, Jr., September 2001, p. 31.

"Aircraft Calculations Boost Radio Frequency Networks," September 2001, p. 37.

"Watch Out, Mobile Agents," Clarence A. Robinson Jr., October 2001, p. 35.

"Physical Disaster Propels Cybersecurity Initiatives," Clarence A. Robinson Jr., November 2001, p. 17.

"Jolting Destruction Galvanizes U.S. Agencies To Walk the Walk," November 2001, p. 21.

"Preparing to Protect The Digital Force," November 2001, p. 45.

"Attackers Placed At Scene of Crime Before They Arrive," Sharon Berry, December 2001, p. 27.

"Government Enlists Industry for Information Security," Robert K. Ackerman, August 2002, p. 17.

"Keeping Malicious Code at Bay," Henry S. Kenyon, August 2002, p. 29.

"Diverse Groups Share Information Assurance Quandaries," Joseph McKendrick, August 2002, p. 41.

"Services Safeguard Burgeoning Information Infrastructure," August 2002, p. 53.

"Virtual Token Leaves No Footprint," Sept. 2002, p. 58.

"Desktop Security System Hides Data From Interlopers," Oct. 2002, p. 68.

"Scout Tags Unknown Hackers," Nov. 2002, p. 62.

"Dark Screen Sheds Light on Cyberspace Security Issues,"
Dr. Gregory B. White and Joe H. Sanchez Jr., Jan 2003, p. 45.

"Commercial Coalition Tackles Security Complexities," Maryann Lawlor, Feb. 2003, p. 47.

"Government Maps Cyberspace Security Program," Robert K. Ackerman, Apr 2003, p. 33.

"Information Assurance--Train Now or Pay Later,"
Vice Adm. Herbert A. Browne, USN (Ret.), June 2003, p. 14.

"Guarding Virtual Borders," Maryann Lawlor, June 2003, p. 30.

"Authenticating With Distinction," Christopher Hekimian and Sue Adamkiewicz, June 2003, p. 62.

"Advisory Board Blazes Security Professionals Trail," Aug 2003, p. 17.

"Locking the Door From the Inside," Kevin Holmes, John Henry and Ray Steffey, Aug 2003, p. 21.

"Security Solutions Ride Wi-Fi Wave," Michael A. Robinson, Aug 2003, p. 25.

"Pace of Innovation Gathers Momentum," Jan 2004, p. 23.

"Army Reserve Trains for Information Assurance," Travis Good, Jan. 2004, p. 53.

"Virtual Hackers Help Take a Byte Out of Cybercrime," Maryann Lawlor, Feb. 2004, p. 41.

"Virtual Hackers Help Take a Byte Out of Cybercrime," Maryann Lawlor, Feb. 2004, p. 41.

"2004 Signal Magazine Security Directory," Feb. 2004, p. 68-92.

MULTILEVEL SECURITY

"Navy Educates Business With Multilevel Security," May 1993, p. 51.

"Evolving Security Technologies Offers Multilevel User Privacy," Oct. 1994, p. 47.

"Multilevel Security Embraces Data Bases, Grants Flexibility," Robert K. Ackerman, Oct. 1994, p. 51.

"Trusted Data Base Management Executes Multilevel Protection," Oct. 1995, p. 25.

"Multilevel Security Solutions Advance for Operating Systems," Feb. 1999, p. 38

"Prototype Code Connects Multitude of Security Devices," Henry S. Kenyon, November 1999, p. 63.

"Diverse Groups Share Information Assurance Quandaries," Joseph McKendrick, August 2002, p. 41.

"Horizontal Integration Challenges Intelligence Planners," Oct. 2003, p. 29.

NETWORKS

"Flexible Network Encryption Offers Classified Processing," Clarence A. Robinson, Jr., Jun. 1990, p. 92.

"Network Security Becomes Information Age Oxymoron,"
Col. Alan D. Campen, USAF (Ret.), May 1990, p. 31.

"Open Systems Help to Enforce Security Policies," Paul A. Karger, Jan. 1991, p. 23.

"User-to-User Protection Enhances Network Security," William C. Barker, Jan. 1991, p. 53.

"Software Enables Secure Public Communications," Andrew C. Braunberg, Oct. 1995, p. 45.

"Personal Information Watchman and Things That Go Bump in the Night,"
Col. Alan D. Campen, USAF (Ret.), Feb. 1996, p. 56.

"Public Networks Require Tailored Security Action," Mar. 1996, p. 23.

"It's Vulnerability, Not Threat-Stupid!," Col. Alan D. Campen, USAF (Ret.), Sept. 1997, p. 69.

"Antidote Thwarting Schemes Startle Pesky Virus Creators," Michael A. Robinson, Sept. 1997, p. 73.

"Industry, Agencies Integrate Network Protection Solutions," Edward J. Walsh, Sept. 1997, p. 79.

"Electronic Commerce's Sparkle Depends on Herculean Security," Sept. 1997, p. 82.

"Government and Industry Pluck Common Security Technologies," Sept. 1997, p. 87.

"Federal Agency Network Solutions Require Innovative Encryption Tack," Sept. 1997, p. 89.

"Make-My-Day Server Throws Gauntlet to Network Hackers," Clarence A. Robinson, Jr., May 1998, p. 19.

"Justice Department Readies Infrastructure Defense Plans," Robert K. Ackerman, July 1998, p. 17.

"Tenacious Security Vigilance Disarms Technology Terrorists," Maryann Lawlor, July 1998, p. 37.

"Combining Capabilities Accommodates End-to-End Protection Demands," August 1998, p.17.

"Virtual Sleuth Sniffs Out Network Security Flaws," August 1998, p. 27.

"Automated Security Products Become Key Network Tools," Fred V. Reed, August 1998, p. 30.

"Electronic Commerce Stimulates Total Network Security Approach,"
Clarence A. Robinson, Jr., Feb. 1999, p. 33

"Defense DepartmentÍs AchillesÍ Heel Targeted for Heightened Protection," July 1999, p. 57.

"Hidden Hazards Menace U.S. Information Infrastructure," Robert K. Ackerman, August 1999, p. 17.

"Digital Credentials Kick Off New Commerce Procedures," August 1999, p. 27.

"Commercial Broadcast System Extends Military Reach," Ramon Segura, February 2002, p. 29.

"Standardization Offers High Efficiency," Lt. Col. Likka J. Korkiamaki, FDF, March 2002, p. 59.

"Extending Cyberdefense To the Fiber Domain," Robert Fish, June 2002, p. 51.

"Keeping Malicious Code at Bay," Henry S. Kenyon, August 2002, p. 29.

"Services Safeguard Burgeoning Information Infrastructure," August 2002, p. 53.

ORGANIZATION PROCEDURES

"Information Security Shortfall Needs Integrated Approach," Dr. James J. Hearn, Sept. 1991, p. 89.

"Commission Advocates Risk Management to Meet Changing World Conditions,"
Jeffrey H. Smith and Daniel J. Ryan, Jun. 1994, p. 59.

"Army Information Operations Protect Command and Control,"
Clarence A. Robinson, Jr., July 1996, p. 47.

"Key Position, Navigation Signal Demands Jamming Suppression," August 1996, p. 31.

"Western Infrastructures Face Rogue Data Stream Onslaught," Jan. 1997, p. 31.

"Safeguarding Data Provides Network, Computer Security," Jan. 1997, p. 37.

"Digital Formats Complicate Information Security Tasks," Feb. 1997, p. 21.

"Internet Explores Multilevel Communication Security Realm," Mar. 1997, p. 45.

"Global Network Commerce Rests On Trusted Cyberspace Security," Mar. 1997, p, 53.

"Commercial Systems Enhance Information Warfare Capability," Mar. 1997, p. 64.

"Industry, Gopvernment Pursue Data Security Clearinghouse," Mar. 1997, p. 69.

"Global Network Commerce Rests On Trusted Cyberspace Security," Mar. 1997, p, 53.

"Science Board Task Force Challenges Defensive Information Warfare Status,"
Maryann Lawlor, Sept. 1997, p. 63.

"It's Vulnerability, Not Threat-Stupid!," Col. Alan D. Campen, USAF (Ret.), Sept. 1997, p. 69.

"Antidote Thwarting Schemes Startle Pesky Virus Creators," Michael A. Robinson, Sept. 1997, p. 73.

"Silicon Security Designs Drive Cryptography Key Size March," Sept. 1997, p. 77.

"Industry, Agencies Integrate Network Protection Solutions," Edward J. Walsh, Sept. 1997, p. 79.

"Electronic Commerce's Sparkle Depends on Herculean Security," Sept. 1997, p. 82.

"Government and Industry Pluck Common Security Technologies," Sept. 1997, p. 87.

"Security Agency Transitions From Backer to Participant," October 1999, p. 23.

"Security Product Trust Demands Laboratory Test and Evaluation,"
Clarence A. Robinson, Jr., April 2000, p. 51.

"Collusion Detection Technology Hunts Down Insider Crime," Henry S. Kenyon, June 2000, p. 65.

"Commercial Forces Unite to Combat Cyberthreats," April 2001, p. 40.

"Biometrics Charts Course to Secure Future," May 2001, p. 66.

"Human Element Key to Intrusion Detection,"
Maj. David P.Biros, USAF and Capt. Todd Eppich, USAF, August 2001, p. 31.

"Fusion Center Unites Diverse Research Groups," August 2001, p. 35.

"Transient Partnerships Stretch Security Policy Management," September 2001, p. 26.

"Challenges Loom for Network-Centric Warfare," November 2001, p. 37.

"Securing the Perimeter Virtually," February 2002, p. 57.

"Government Enlists Industry for Information Security," Robert K. Ackerman, August 2002, p. 17.

"Dark Screen Sheds Light on Cyberspace Security Issues,"
Dr. Gregory B. White and Joe H. Sanchez Jr., Jan 2003, p. 45.

"Commercial Coalition Tackles Security Complexities," Maryann Lawlor, Feb. 2003, p. 47.

"Government Maps Cyberspace Security Program," Robert K. Ackerman, Apr 2003, p. 33.

"Protecting America With Information Technology,"
Lt. Gen. Joseph K. Kellogg Jr., USA and Mark Powell, June 2003, p. 35.

"Army Reserve Trains for Information Assurance," Travis Good, Jan. 2004, p. 53.

SECURE VOICE

"Open Line, Hidden Key," December 2000, p. 57.

SMART CARDS

"Super Smart Cards Promise More Power and Versatility,"
Dr. Ravi Sandhu and Gary W. Kincaid, Feb. 1991, p. 98.

"Smart Cards Execute Security, Arrest Intruders' Data Access," Oct. 1995., p. 37.

"Internet Explores Multilevel Communication Security Realm," Mar. 1997, p. 45.

"Multilevel Security Ensures Hardy Information Integrity," Jun 1997, p. 93.


BACK ISSUES OF SIGNAL

A single copy of SIGNAL: February through December issues: $5.00 plus $2.00 shipping and handling for the first copy. Add $1.00 shipping and handling for each additional copy.

January Source Book Issue: $50.00 plus $3.00 shipping and handling for the first copy. Add $1.50, shipping and handling, for each additional copy.

Prepayment is required.
Allow 15 working days for delivery.


Mail your order to:
AFCEA Customer Service
4400 Fair Lakes Court
Fairfax, VA 22033

Or call: (703) 631-6153

 

 
"SIGNAL: Reading Loud and Clear."