The Defense Department drive toward its Joint Information Environment is picking up speed as it progresses toward its goal of assimilating military networks across the warfighting realm. Individual services are developing solutions, some of which are targeted for their own requirements, that are being applied to the overarching goal of linking the entire defense environment.
Early successes in Europe have advanced Joint Information Environment (JIE) efforts elsewhere, including the continental United States. Some activities have been accelerated as a result of lessons learned, and they have been implemented ahead of schedule in regions not slated to receive them for months or even years.
The U.S. Air Force Space Command (AFSPC) is helping the service put its joint modernization plans into place. As the command responsible for handling cyberspace, communications and information missions, it is the Air Force’s instrument in meeting major Defense Department technology goals, such as establishing the Joint Information Environment (JIE).
Warfighters on foot equipped with night vision systems now can give their commanders a real-time glimpse of what they’re seeing in the field. A new system that combines a portable radio with night vision goggles allows the optical imagery to be captured and sent across the same radio channels used for voice and data communications.
Each piece of hardware—the portable radio and the night vision system—is in service with the armed forces of several countries around the world. Engineers basically combined the two functions to produce a single system that allows commanders to remotely view a night scene from the warfighter’s eye view accompanied with geolocation information.
Homeland Security Conference Show Daily, Day 1
Information sharing and interoperability have come a long way since the terrorist attacks of September 11, 2001, but challenges still remain, agreed speakers and panelists on the first day of the AFCEA Homeland Security Conference in Washington, D.C.
A new software tool allows federal agencies to scan mobile device applications for security and accessibility issues prior to publishing them. The automated process allows developers to check their code rapidly against a variety of government guidelines to ensure that new mobile applications keep personnel and their organizations safe from hacking and other malicious outside threats.
The Defense Information Systems Agency (DISA) expects to have its Defense Department Mobile Unclassified Capability (DMUC) ready for initial operational capability in the first quarter of fiscal year 2014. Dr. Jennifer Carter, DISA’s component acquisition executive, said she expects 100,000 users in fiscal 2014 and “well beyond” that number after 2014. The DMUC will support multiple devices and carriers, she noted.
Two ongoing military programs, one getting ready to deploy and another still in the prototype stage, aim to connect troops at the very tactical edge back to larger military data and communications networks. These programs—one service-oriented, the other an agency effort—are part of the Defense Department’s thrust to make warfighters, especially individual soldiers in small units, more connected.
A massive telecommunications infrastructure modernization effort in Afghanistan is designed to contribute to socioeconomic development; provide entry into the global information society; and support national prosperity, sustainability and stability. A key part of that effort is coming to fruition: officials with a telecommunications advisory group in that country expect the completion very soon—possibly this month—of a fiber-optic ring around the nation’s perimeter.
Scientists at the U.S. Defense Department’s top research and development agency are seeking the best new ideas to provide a larger-scale mobile network to support an increasing array of bandwidth-hungry mobile computing devices for warfighters.
The Defense Advanced Research Projects Agency (DARPA) has issued a Request for Information (RFI) for new technical approaches that would expand the number and capacity of Mobile Ad Hoc Networks (MANETs) nodes available in the field.
Rear Adm. Robert Day Jr., USCG, assistant U.S. Coast Guard commandant for command, control, communications and information technology, sees the Joint Information Environment as an opportunity to resolve some of the most pressing information technology problems in the years to come as he faces a future with more challenges and fewer resources. He says a military-wide common operating environment will establish “enterprisewide mandates that programs cannot ignore.”
Project Fishbowl spurs industry to meet military and intelligence community needs.
U.S. intelligence and defense officials are wrapping up a mobile device pilot program known as the Fishbowl project and are planning over the next year to expand on the capabilities it provides. Doing so is part of a larger strategy to wean the agency and the Defense Department off of government-designed mobile device technology, which will save time and money while providing secure, cutting-edge electronics for high-level government officials and to individual soldiers.
Amidst dire threat warnings, cyber warriors grow increasingly adept.
While many cybersecurity experts preach the gloom and doom of more advanced adversaries attacking U.S. networks, one government official contends that U.S. network defenders can meet the challenge. Training, education and technological improvements are showing dividends in a better-prepared cyber workforce.
From handheld to the cloud, new technologies are driving new approaches to data assurance.
The increasing use of readily available and inexpensive commercial technologies by the military is changing the way the Defense Information Systems Agency provides information assurance. As these technologies are integrated into the Defense Department information infrastructure, the agency is adjusting its approaches to providing security for its networks and the data that reside on them.
Recent developments in advanced materials bring the Army closer to next-generation displays for a new breed of warfighter mobile devices.
A coalition of military, academic and industry scientists is approximately one year away from the first working prototypes of mobile devices using newly developed flexible display technologies. The goal is to demonstrate that manufacturing the displays can be done economically, and in quantity, so that they can be widely adopted by mobile device makers, benefitting both the military and consumers. Project managers ultimately hope to introduce mobile devices that are lighter, more reliable and less expensive.
Soldiers in austere environments are closer to enjoying cellular capabilities in part because of a program bridging the developments in Nett Warrior and the Warfighter Information Network-Tactical (WIN-T). The Multi-Access Cellular Extension (MACE) project develops the foundational architecture to integrate the equivalent of commercial cellular technologies into future force networks to enable communications by filling in gaps in fixed infrastructure.
Dealing with virtual challenges may require a meeting of different disciplines.
The revision reflects efforts of government-wide joint task force.
Managers of information technology systems for the federal government have new mandatory guidance on security and privacy controls used to manage and protect those systems from cyber attack.
The same approach used to test and implement the Army’s single largest networking system is laying the groundwork for extending the network down to the individual soldier. As laboratory tests and field exercises validate the interoperability of separate elements in a network, system conflicts are giving way to greater commonality among different elements.
This effort has borne fruit in the evolution of the Warfighter Information Network–Tactical (WIN–T). The last fielding of WIN–T Increment 1 took place in August 2012, and WIN–T Increment 2 is taking the final steps toward deployment. Meanwhile, WIN–T Increment 3 is beginning to take shape.
The U.S. agency responsible for customs and border protection has suffered from an unreliable infrastructure and network downtimes but already is seeing benefits from a fledgling move to cloud computing. Those benefits include greater reliability and efficiency and lower costs.