SIGNALScape

Lockheed Martin to Support Airborne Mine Countermeasures

September 18, 2013
George I. Seffers
E-mail About the Author

Lockheed Martin Mission Systems & Training, Owego, N.Y., is being awarded $7,037,522 for firm-fixed-price delivery order #4090 against a previously issued basic ordering agreement (N00019-09-G-0005) for ten organic airborne mine countermeasures technical insertion common console kits in support of the MH-60S program. The Naval Air Systems Command, Patuxent River, Md., is the contracting activity.

Northrop Supports E-2D Hawkeye

September 18, 2013
George I. Seffers
E-mail About the Author

Northrop Grumman Corp., Aerospace Systems, Bethpage, N.Y., is being awarded $11,655,626 for firm-fixed-price delivery order #0009 against a previously issued basic ordering agreement (N68335-10-G-0021) for the design, development, first article, and production units for ten pieces of peculiar support equipment (PSE); and the procurement of 29 additional pieces of previously developed PSE for the E-2D Advanced Hawkeye aircraft. The Naval Air Warfare Center Aircraft Division, Lakehurst, N.J., is the contracting activity.

Do You Control Your Identity?

September 18, 2013
By Rita Boland



 

“We are in an era where biometric data is proliferating,” Dr. Joseph Atick, chairman, Identity Council International, said today at the Biometric Consortium Conference. That expansion is taking place in the civilian world in addition to increases in the military and public safety sectors. “Biometrics in daily life has arrived,” Atick explained.

Societal changes regarding how people view privacy and how they use social media are helping to drive changes in the biometrics field. In fact, social changes are driving a revolution in the industry. Reputation of people is becoming pervasive, indelible and inescapable in large part because of the Internet. Data about individuals can be culled simply through performing a Google search and remains available indefinitely. As such, officials, or others, can link more and more pieces of information to individuals, including pieces not collected through a formal means. Atick used the example of two British citizens who were sent home after arriving in the United States and having their identities verified. They were linked to joking tweets saying they would destroy the United States and dig up Marilyn Monroe.

Social media has many implications with identity management. For one, it makes it dramatically easier to determine social identities. Through various platforms, people’s choices show their dynamic relationships, give context to parts of their lives and offer trust by affiliation. A person who has 1,000 highly respectable LinkedIn contacts, for example, should receive some weighting for trustworthiness from that, Atick said. Social media also allows for social résumés. Individuals can post whatever they want, but other people vet them. Atick explained that the upshot of what is happening in the world is that increasingly identification is being derived from data external to the biometrics enrollment process.

Raytheon Receives Airborne Sonar Funds

September 18, 2013
George I. Seffers
E-mail About the Author

Raytheon Integrated Defense Systems, Portsmouth, R.I., has been awarded a maximum $45,179,000 undefinitized contractual action (5026) against basic ordering agreement (SPRPA1-09-G-001Y) for the manufacture and delivery of airborne low frequency sonar helicopter dipping sonar systems. The contracting activity is the Defense Logistics Agency Aviation, Philadelphia, Pa.

BAE Continues to Support Perimeter Defense Radar

September 18, 2013
George I. Seffers
E-mail About the Author

BAE Systems Technology Solutions & Services, Rockville, Md., has been awarded a $7,300,000 modification (P00106) to previously awarded contract (FA2517-09-C-8000) for the fifth option-year renewal. BAE shall provide non-personal services to operate, maintain, and support the perimeter acquisition radar attack characterization system and site. The 21st Contracting Squadron, Peterson Air Force Base, Colo., is the contracting activity.

Cybersecurity Technologies Ready for Prime Time

September 18, 2013

Eight emerging cybersecurity technologies ready for transition into commercial products will be unveiled at the Mayflower Renaissance Hotel on October 9. The U.S. Department of Homeland Security (DHS) Science and Technology Directorate is hosting the event, which will feature intrusion detection, removable media protection, software assurance and malware forensics capabilities.

The Department of Energy’s national laboratories developed the technologies that the DHS’ Transition-to-Practice program will showcase during the Technology Demonstration for Investors, Integrators and IT Companies East event.

Cybersecurity professionals and technology investors from private industry will learn about these new technologies through presentations, demonstrations and discussions with the research teams that produced them. Attendees also will have an opportunity to schedule a private one-on-one discussions with the researchers to discuss opportunities for commercializing the technologies and areas of interest to drive further cybersecurity research.

Attendance is free, but registration must be received by October 7.

NATO Forwards Biometrics

September 17, 2013
By Rita Boland



NATO is investing time, talent and treasure into advancing biometrics, Col. Bernard Wulfse, Dutch Army, commander, Joint Task Force Counter Improvised Explosive Device (C-IED), explained at the Biometric Consortium Conference. The alliance has named biometrics a critical capability shortfall to address. Key to achieving goals for biometrics is bringing all the partner nations together—not only the few currently supporting the efforts. Methods that proved useful against IEDs have applications in the biometrics realm, and lessons can be applied from the former to the latter.

Current conflicts generate from within states, not between them, so identifying enemies is difficult. More investment in rooting out the bad guys is necessary, Col. Wulfse explained. This anonymity in the physical and cyber realms makes it impossible for traditional forces to deploy their best capabilities. “Asymmetric threats … have rendered our strengths ineffective,” Col. Wulfse said.

Identity management of friend and foe can help mitigate the threats of these types of adversaries and not only in the military context. Other applications include C-IED, counterintelligence, counterterrorism, access control and more. Unlike in times past, biometrics efforts now truly have support from the highest headquarters, the colonel stated.

Despite this support, the basic challenges remain the same. The potential of biometrics for military use is not fully understood. NATO lacks harmonization in guidance, procedures and standards. Capabilities among the various armed forces are unbalanced. There is a lack of knowledge and trust in the biometrics arena, and many of the troops collecting biometric information today will not see the benefits from their work because it often takes years for the data to become a usable resource.

Biometrics: Changing the Game and Facing Challenges

September 17, 2013
By Rita Boland



Biometrics has advanced significantly over the past decade, altering the lives of people across the globe, especially in developing countries. But the field faces many concerns as it looks toward the future.

Ken Gantt, acting deputy director, Office of Biometric Identity Management, outlined the challenges he sees at the Biometric Consortium Conference Tuesday in Tampa, Florida. The first is direction. Members of the biometrics community need to determine where they want to be in 2025. The second challenge is a combination of policy, privacy and perception. “What is right to share and with whom?,” Gantt asked. Third is operations in terms of improving the employment of biometrics. Fourth is technology. “We can’t do what we do without technology,” Gantt says. However, this comes with problems because of resource constraints. Developers have to make technology affordable.

The fifth and final challenge is identity, or rather, the definition of identity. Gantt explained that the term has different meanings for different people. The lack of uniformity presents challenges when groups try to work together. Gantt made several recommendations to resolve the issues he presented. One basic measure calls for a standardization of definitions and vocabulary to decrease confusion. Most of the other solutions revolve around increasing communications within and outside of the biometric community. Sharing ideas, insights and the benefits of adopting biometrics will advance the field internally as well as encouraging its acceptance by the general populace.

Cool App-titude: Call Dibs

September 17, 2013
By Rachel Lilly
E-mail E-mail the Author


In the military community, moving is often a part of life, and that includes buying and selling items along the way. The free Call Dibs app makes that process easier by providing a convenient space for active duty, Reserve, Guard, veterans, U.S. Defense Department civilians and their families to offload or find goods.

An alternative to sites like Craigslist, Call Dibs focuses exclusively on the military community to add a layer of trust and a sense of security to the process.

Use the app to post items quickly from your phone, browse listings by others, and send and receive messages. You must have a .mil email address to be validated as a military user.

Download the app from the iTunes App Store or participate through the Call Dibs website.

These sites are not affiliated with AFCEA or SIGNAL Magazine, and we are not responsible for the content or quality of the products offered. When visiting new Web sites, please use proper Internet security procedures.

Pages