AT and T, Vienna, Virginia; EWA, Herndon, Virginia; Macaulay Brown, Dayton, Ohio; Northrop Grumman, Chantilly, Virginia; SAIC, McLean, Virginia; SRC Incorporated, Chantilly, Virginia; Scientific Research Company, Atlanta, Georgia; and URS, Germantown, Maryland, are being awarded a firm-fixed-price multiple award contract for professional, technical, and analytical support in the mission areas of information assurance and information operations (IO). Support services include the core capabilities of IO: electronic warfare, computer network operations, psychological operations, military deception, and operations security. The contract includes support for missions, functions, and tasks related to signal intelligence; strategic, operational
MacAulay-Brown Incorporated, Dayton, Ohio, is being awarded a $24,891,000 cost-plus-fixed-fee, indefinite-delivery/indefinite-quantity contract to design, develop, and test innovation involving apertures, receivers, exciters, signal processing, and algorithms for signal intelligence, threat warning, direction finding, information operations, electronic attack, electronic support, and electronic protection applications. The Air Force Research Laboratory, Wright-Patterson Air Force Base, Ohio, is the contracting activity.
PacificTech-Sauer J.V., Jacksonville, Florida, was awarded a more than $9 million firm-fixed-price contract for the construction of an operational communications facility to be used as the Joint Communication Unit Headquarters and Information Operations Facility at Fort Bragg, North Carolina. The U.S. Army Corps of Engineers, Savannah, Georgia, is the contracting activity.
As the U.S. Navy modernizes information systems across the fleet, one organization is responsible for researching, developing and fielding the full range of technologies in the Asia-Pacific region, providing complete life cycle development and support for systems, from concept to fielded capability.
U.S. Defense Department and interagency special operators are scheduled to begin receiving new tactical mesh networking equipment this month. The kit provides a mobile, ad hoc, self-healing network that offers a full range of situational awareness data, including intelligence, surveillance and reconnaissance feeds, blue force tracking and a voice over Internet protocol capability.
Fiscal year 2015 marks the official kickoff of a U.S. Army program to develop a foliage-penetrating radar that will simultaneously locate still objects and track moving objects from a fast-moving fixed-wing aircraft. The next-generation system is designed specifically for jungle environments such as the Asia-Pacific region, South America and Africa, and by combining multiple capabilities onto one platform, it will allow the service to cut down the number of sensors currently needed.
The U.S. military’s increased reliance on global positioning satellite (GPS) technologies has triggered adversarial forces to improve upon technology to disrupt the warfighters’ usage in the age-old war games of one-upmanship.
U.S. Army engineers developed technology prototypes aimed at weaning U.S. forces from reliance on GPS systems. The Warfighter Integrated Navigation System (WINS), while intended to serve as a backup to GPS usage, not as a replacement, can operate independently and free of a satellite link and still give warfighters precise positioning and timing data.
Where human analysis might fail in the intelligence community, technological solutions are at the ready to fill the void. Companies are ginning up software programs that can prove to be key for intelligence analysts as they track the bad guys, so to speak—be they insider threats or an outside enemy.
The amount of data produced in the increasingly connected and virtual world makes it difficult for human beings to scour, catalog and process and mounting information and produce actionable intelligence. So industry is devising technological workarounds or complementary programs to ease the workload and make their efforts more effective.
U.S. Defense Department officials intend to complete a departmentwide spectrum strategy road map this month, which will make more frequencies available to warfighters, provide greater flexibility—especially for international operations—and ultimately allow warfighters to conduct their missions more effectively. At the same time, however, some are suggesting a nationwide strategy to allow for more innovative and effective spectrum management and sharing across government and industry.
The first graduates are emerging from centers of excellence for cyber operations that teach the in-depth computer science and engineering skills necessary to conduct network operations. The program better prepares graduates to defend networks and should reduce the on-the-job training needed for new hires, saving both time and money.
Homeland Security Conference 2014 Online Show Daily, Day 2
It is not surprising that cybersecurity would dominate the discussion on the second day of the AFCEA Homeland Security Conference in Washington, D.C. But the depth and breadth and variety of topics surrounding cybersecurity and information protection in all its forms indicates the degree to which the information security mission has engulfed every department and agency at all levels of government.
U.S. Army officials are standardizing the information technology architecture on many current and future ground combat vehicles. The effort is designed to reduce the size, weight and power of electronics; reduce life-cycle costs; and improve interoperability while providing warfighters all of the data and communications capability required on the modern battlefield.
Intelligence needs cyber, and cyber needs intelligence. How they can function symbiotically is a less clear-cut issue, with challenges ranging from training to legal policy looming as government officials try to respond to a burgeoning cyber threat.
The cyber threat is growing, and the defense and homeland security communities must strive to keep up with new ways of inflicting damage to governments and businesses. Many experts believe the cyber threat has supplanted terrorism as the greatest national security issue, and new technologies are only one avenue for blunting the menace. Intelligence must expand its palette to identify and detect cyber threats before they realize their malicious goals.
U.S. Army researchers are developing a software program that will provide signal corps officers will an improved common operating picture of the network, enhance the ability to manage the plethora of electronic systems popping up on the modern battlefield, advance information sharing capabilities and allow warfighters to make more informed and more timely decisions. In short, the system will assist in planning, building, monitoring and defending the network.
Officials at Auburn University, Auburn, Alabama, are developing a program that allows students from any academic discipline to work closely with the U.S. intelligence community in a variety of actual national security-related problems. The university is on track to begin offering a minor in intelligence analysis in the relatively near future and a major in the next five years.
Amidst dire threat warnings, cyber warriors grow increasingly adept.
While many cybersecurity experts preach the gloom and doom of more advanced adversaries attacking U.S. networks, one government official contends that U.S. network defenders can meet the challenge. Training, education and technological improvements are showing dividends in a better-prepared cyber workforce.
Industry officials foresee changes in network security.
Cyber industry experts predict a number of coming developments in the cyber realm, driven in part by government strategy and funding uncertainties. The future may include a greater reliance on law enforcement to solve state-sponsored hacks, increased automation and more outsourcing.
NATO and eight coalition nations participating in the Coalition Warrior Interoperability eXploration, eXperimentation and eXamination, eXercise (CWIX) are working to reduce the amount of time it takes to join coalition networks in the future. On average, it took a year or more for a nation to join the Afghan Mission Network, but officials hope to trim that down to a matter of weeks, says Lt. Col, Jenniffer Romero, USAF, the CWIX Future Mission Network focus area lead.
Dealing with virtual challenges may require a meeting of different disciplines.
Future conflicts likely will be fought in degraded information technology environments, which will require the U.S. Navy to develop and exploit new capabilities to continue to operate in contested cyberspace. Technologies such as a flexible information grid, assured timing services and directed energy weapons must be part of the naval information system arsenal if the sea service is to maintain information dominance through the year 2028.