Networks

May 1, 2013
By Max Cacas
NATO coalition participants in CWIX 2012 man the Land Component Room at the Joint Forces Training Center in Bydgosczc, Poland. The facility will again host CWIX 2013 next month. (NATO Photo)

A military exercise designed to refine and improve the way coalition partners share vital information will, for the first time, include the network that is supporting troops in Afghanistan. Scheduled to take place in Poland next month, the event will feature military command and control communications experts from NATO, partner organizations and nations who share the goal of rigorously testing communications interoperability among coalition members. But one of the largest of those partners, the United States, is not taking a leading role in one of the newest, and most challenging areas, cybersecurity.

May 1, 2013
By Rita Boland
The U.S. Army continues to use its Network Integration Evaluations (NIEs) to examine how technologies work together on the service’s network. Future rounds are scheduled to include more joint and coalition partners to bring in additional perspectives and capabilities.

Moving forward through sequester, next fiscal year's evaluations include new contracts and contacts.

As the U.S. Army prepares its network of the future, it plans to make some changes to the way it approaches working with government and private partners. The moves will increase interoperability downrange while attempting to shorten the ever-frustrating acquisition cycle that keeps the military behind the curve in implementing cutting-edge technologies.

May 1, 2013
By Kent R. Schneider

Coalition interoperability has received a good deal of focus during the past few years. The Afghan Mission Network (AMN) has given many hope that a repeatable solution for coalition operations could be developed that would allow rapid deployment of a coalition-compatible network for future conflicts. The Future Mission Network (FMN) is envisioned to allow coalition partners to plug into a standards-compliant network with the functionality and security needed to support complex operations.

April 4, 2013
By Robert K. Ackerman

Future conflicts likely will be fought in degraded information technology environments, which will require the U.S. Navy to develop and exploit new capabilities to continue to operate in contested cyberspace. Technologies such as a flexible information grid, assured timing services and directed energy weapons must be part of the naval information system arsenal if the sea service is to maintain information dominance through the year 2028.

April 16, 2013
By George I. Seffers

Defense Department will decide on a path forward within 30 days.

Secretary of Defense Chuck Hagel told members of Congress on April 16 that he is personally committed to solving the database interoperability problems between the Defense Department (DOD) and the Department of Veterans Affairs (VA) that have left thousands of veterans waiting months while benefits claims are processed.

April 1, 2013
By Max Cacas
MARSOC Marines, above, prepare to board CH-47 Chinook helicopters as part of a two-day presence patrol with Afghan Commandos in Farah province.

After a special operations deployment, handling state-of-the-art communications technology tops the list.

Back from a nearly year-long deployment to Afghanistan, the 1st Marine Special Operations Battalion already is working to apply lessons learned to training for the next deployment. As the battalion prepares for its next mission, it is reflecting on what its Marines learned about how they train, how their equipment worked and how they will prepare themselves for the future.

March 26, 2013
By Max Cacas

The Defense Information Systems Agency (DISA) has begun internal discussions regarding a multiaward contract for cloud computing services.

Anthony Montemarano, DISA’s director of strategic planning and information, told a briefing of industry leaders Monday that he and his agency are firm believers in cloud computing. “When you look at some of the functions that we perform in government, a lot of it can be provided in the commercial cloud. We have to come to grips with the value proposition,” he explains. He believes that the Defense Department’s cloud computing strategy must include DISA cloud resources, commercial cloud services and privately owned cloud services where appropriate.

March 1, 2013
By Max Cacas

When it comes to popular smartphones and tablets, security can be a many-layered and necessary endeavor

The growing use of advanced mobile devices, coupled with the increase in wireless broadband speed, is fueling demand by employees to bring their own devices to the job. This situation has opened a new set of security challenges for information technology staff, especially when it comes to the use of apps.

March 1, 2013
By Robert K. Ackerman
Racks of gear provide Warfighter Information Network-Tactical (WIN-T) capability for the JOIN facility. The network can debug software upgrades as well as resolve interoperability issues.

The whole becomes greater than the sum of the parts in a networked software engineering realm.

A network built after its major move to a new base is allowing the U.S. Army Communications-Electronics Command to link diverse communications systems into an overarching network. This enables capabilities ranging from debugging software updates before they are sent to the front to a multinational exercise for validating operational activities.

February 26, 2013
By George I. Seffers

Homeland Security Conference 2013 Show Daily, Day 1

All too often, cyber and physical protection are considered separately, when really they go hand-in-hand, according to experts speaking at the first day of the AFCEA Homeland Security Conference in Washington, D.C., February 26, 2013. The conference opened with a half-day of conversation about hackers, terrorists and natural disasters and addressed concerns involving both physical infrastructure and the cyber environment for all kinds of attacks, be they physical, virtual or even natural in origin.

February 1, 2013
By George I. Seffers
Border patrol personnel use horses to navigate remote terrain.

The U.S. agency responsible for customs and border protection has suffered from an unreliable infrastructure and network downtimes but already is seeing benefits from a fledgling move to cloud computing. Those benefits include greater reliability and efficiency and lower costs.

February 1, 2013
By Max Cacas

To meet the challenge of implementing big data, a new international scientific organization is forming to facilitate the sharing of research data and speed the pace of innovation. The group, called the Research Data Alliance, will comprise some of the top computer experts from around the world, representing all scientific disciplines.

Managing the staggering and constantly growing amount of information that composes big data is essential to the future of innovation. The U.S. delegation to the alliance’s first plenary session, being held next month in Switzerland, is led by Francine Berman, a noted U.S. computer scientist, with backing from the National Science Foundation (NSF).

February 1, 2013
By Maj. Jose Gonzalez, USAF

Commanders wrestling with control of cyberspace elements now have a new tool to help them secure their corner of cyberspace in an operational setting. The Adaptive Network Defense of Command and Control concept of operations enables joint force commander control of key terrain in cyberspace, based on assessments at an operational tempo. To achieve a joint force command objective, network operators concentrate cybersecurity and monitoring of command and control systems to maintain the initiative against adversarial attacks and provide enhanced situational awareness.

January 31, 2013
By Robert K. Ackerman
John Smart, president of the Acceleration Studies Foundation, tells the keynote luncheon audience that dramatic change is evolutionary and inevitable.

West 2013 Online Show Daily, Day 2

Quote of the Day: “How can you help me make the least-dumb decisions quicker?”—Terry Halvorsen, chief information officer (CIO) for the Department of the Navy, requesting cyber security solutions from industry

February 1, 2013
By Robert K. Ackerman

West 2013 Online Show Daily, Day 3

January 23, 2013
By George I. Seffers

Over the past month, the U.S. Army has consolidated two directorates in an effort to continue improving agile acquisition. Combining the offices is designed to allow more efficient and effective cooperation, enhance long-term planning capabilities and boost the service’s ability to acquire an overall system of systems.

December 21, 2012
By George I. Seffers

The U.S. Navy’s next-generation tactical afloat network recently received approval to enter the production and deployment phase, Navy officials announced this week. The San Diego-based destroyer USS Milius (DDG 69) was selected for first installation. The program was approved for limited fielding of 29 CANES units with 23 installations, eight of which are expected in the 2013 fiscal year.

Ultimately, CANES will be deployed to more than 190 ships, submarines and Maritime Operations Centers by 2020. Officials say they hope to reach a full-rate production decision in the 2014 fiscal year.

December 1, 2012
By Paul A. Strassmann

A few staff experts can formulate new strategies in a short time. Over the years, the U.S. Defense Department has accumulated a large collection of long-range planning documents. However, none of the plans ever was fully implemented, as new administrations kept changing priorities.

The just announced Defense Department Cloud Computing Strategy presents a long list of radically new directions. Ultimately, it will take hundreds of thousands of person-years to accomplish what has been just outlined. Several points stand out.

November 1, 2012
By Paul A. Strassmann

 

The Defense Business Board is the highest-level committee advising the U.S. Secretary of Defense. Its report on “Data Center Consolidation and Cloud Computing” offers advice on what directions the Defense Department should follow.
 

However, the Defense Business Board (DBB) report is incomplete. It does not offer actionable solutions; it only raises policy-level questions. As components are formulating budget requests through fiscal year 2018, they will find nothing in this report to guide them on what type of realignments are needed to advance the Defense Department toward cloud computing.

November 1, 2012
By Capt. Mike Stephens, USAF, and Frank Klucznik
 Gen. Stephane Abrial, FRA, Supreme Allied Commander Transformation (ACT), observes part of the Coalition Warrior Interoperability Exercise (CWIX) 12 held in June. The exercise helped validate the effectiveness of the new Tactical Edge Data Solutions (TEDS) joint capability technology demonstration (JCTD).

A new message exchange framework offers
 potential across department and coalition assets.

Different command and control systems are closer to enjoying Web interoperability as a result of experiments performed in coalition exercises. Protocols and processes developed by defense information technology experts can enable data to be exchanged among the services as well as in coalition operations.

Pages