By 2015, U.S. Army officials hope to begin fielding elements of a new electronic warfare system designed to significantly improve operational effectiveness in the electromagnetic spectrum. The system is expected to better address electronic warfare in an era of remotely detonated explosives, but it is only one element in the service's plans to overhaul the full spectrum of electronic warfare capabilities.
SIGNAL Online Exclusives
Defense customers are driving change; this effort tries to map the future.
The new Defense Information Systems Agency (DISA) strategic plan lines up many of the diverse information technology thrusts that are whirring throughout the Defense Department, according to an agency official. Tony Montemarano, director for strategic planning and information at DISA, states that the plan’s main goal is to codify where DISA is headed. This direction is fueled by demand signals from the Defense Department, particularly in high-mileage areas such as the Joint Information Environment, mobility initiatives and cloud services.
The U.S. Army is fielding its Vigilant Pursuit system to reduce the time necessary to combine data gathered from human intelligence (HUMINT) and signals intelligence (SIGINT) assets. Forces and unit maneuver commanders on the battlefield will receive the joint information quickly, enabling more timely response to situations, especially those involving the detection and capture of high-value targets.
The 2012 Olympics may be over in London, but the Defense Advanced Research Projects Agency (DARPA) has laid down a competitive challenge of a different sort—this time for the world's robotics experts.
This fall, the Pentagon's top science and research organization officially launches the DARPA Robotics Challenge. The goal, according to DARPA's broad agency announcement posted on FedBizOps, is "to develop ground robotic capabilities to execute tasks in dangerous, degraded, human engineered environments."
The failure of a cloture motion on Thursday ended any chance of the U.S. Senate passing the Cybersecurity Act of 2012 before the August recess.
Four high-ranking federal officials on Wednesday had urged the U.S. Senate to pass the cybersecurity bill by Friday, August 3. The four officials—John Brennan, assistant to the President for Homeland Security and Counterterrorism; Gen. Keith Alexander, USA, commander, U.S. Cyber Command, and director, National Security Agency; Jane Holl Lute, deputy secretary of the Department of Homeland Security; and Eric Rosenbach, deputy assistant secretary of defense for cyber policy, had called for the Senate to pass the legislation quickly.
MORPHINATOR prototype will be designed to discombobulate cyber attackers.
The U.S. Army’s Communications-Electronics Research, Development and Engineering Center (CERDEC) is building a prototype network capable of morphing over time to confuse cyber intruders and thwart attacks on military networks. The Morphing Network Assets to Restrict Adversarial Reconnaissance (MORPHINATOR) prototype is scheduled to be available in the 2014 fiscal year and will be capable of pulling a cyber bait-and-switch on unsuspecting network intruders.
The agency sets lofty goals for its personnel to serve customers.
|The iRobot Packbot 510 equipped with the User Assist Package.|
Systems and technologies undergoing scrutiny at the U.S. Army’s next Network Integration Evaluation this fall will first have to pass muster in the service’s newly opened laboratory at Aberdeen Proving Ground, Maryland. The new lab facility is expected to reduce the risk associated with some new technologies and systems. It also is designed to save time, money and integration headaches during future evaluation exercises.
UPDATED 6/18/2012: The U.S. Defense Department announces winner of new defense network operations contract.
The Defense Information Systems Agency (DISA) has announced that Lockheed Martin Information Systems & Global Solutions Division, Manassas, Virginia, has won to the potential $4.6 billion Global Information Grid Services Management-Operations contract.
The new plan lists goals and objectives for exploiting commercial technologies.
Advanced 4G mobile service, the use of personal mobile devices and its own dedicated apps are among the objectives of Version 2.0 of the U.S. Defense Department’s Mobile Device Strategy. Released Friday, June 15, 2012, the strategy lists three major goals and several subset objectives designed to bring the benefits of mobile systems to the department.
As U.S. military organizations and the private companies that support them struggle to adjust to decreases in funding, they are searching for efficiencies even in seemingly small matters. One area easily overlooked is office printers, but by making thoughtful selections through a well-planned process, information technology administrators can cut costs while simultaneously enhancing security.
As recently as a few years ago, Second Life was a vital, flourishing virtual community in which users carried on their lives, interacting with others and “living” fully imagined existences within the memory of a large computer server.
In fact, Second Life caught the imagination of the U.S. military, and in some cases, members of the services began using Second Life for real-world collaboration and to solve problems shared by all services.
More cyber attacks launch from within the United States than anywhere else according to the latest threat report from McAfee, but the implications of the statistics are less obvious than they appear. Cybercriminals from other nations are routing their aggression through vulnerable U.S. Internet protocol (IP) addresses because outdated domains make easy targets. So while the country might not be the biggest breeding ground for hackers, its infrastructure has troubling weaknesses.
The U.S. Army is making good on the mantra "train as you fight" by connecting units in garrison with the same mission command systems they use during deployments. Breaking through the bureaucracy inherent in putting these tactical technologies on a strategic network means that soldiers will be better prepared for their work in theater.
In recent weeks, federal officials have alerted the operators of natural gas pipelines that their computer networks have been the targets of a series of cyber attacks.
Officials with the U.S. Department of Homeland Security confirm that their Industrial Control Systems Cyber Emergency Response Team, along with the FBI and other agencies, have been working with pipeline companies to answer the threats.
Hard and fast objects form the foundation for the Pentagon’s newest effort at a C4 enterprise.
The U.S. Defense Department’s Joint Information Enterprise (JIE), launched by the Joint Chiefs of Staff Operational Deputies, will be built on “five big rocks,” according to the assistant to the chairman of the Joint Chiefs of Staff. Vice Adm. Harry B. Harris Jr., USN, told the audience at the AFCEA NOVA Naval IT Day on May 3 that big rocks must serve as the foundation so that little rocks can be implemented atop them.