Disruptive by Design

December 1, 2020
By Maj. Brian Kerg, USMC

As the capabilities of networked technologies continue to increase exponentially, so too does the speed and impact of the narrative. Recordings, images and commentary about an event can be uploaded within seconds. Based on how visceral any event might be, it could go viral within moments. By the end of the hour, a dominant narrative about that event could be echoed across the Internet, television and radio, and remain wedged in the minds of the audience for weeks, months or years.

Especially if it isn’t true.

November 1, 2020
By Jennifer Miller

Misinformation is the spreading of wrongful information without intentionally doing so. It can be a simple matter of getting the facts wrong, misremembering some details or sharing a meme.

Disinformation, on the other hand, is deliberate and without regard for second or third-order effects. Russia spreading conspiracy theories on social media to sow discord in other countries is one example; fraud scams are another. Intent makes all the difference. Malice or nefarious intent generally accompanies disinformation while misinformation stems from a generally innocent source.

Disinformation, like misinformation, is everywhere. Plain and simple. It is plentiful in all communities—especially intelligence—and across the globe.

October 1, 2020
By Brian Kerg

As a way to provide sea denial in support of naval operations, expeditionary advanced base operations are the Marine Corps’ bid for success in disrupting the fait accompli strategies of great power competitors. While highly promising, this concept possesses a critical vulnerability: signature management.

Detection or denial of command and control systems will hamstring expeditionary advanced base operations. Any misstep in communications discipline will reveal the locations of expeditionary advanced bases, putting them at risk. But emerging communications techniques and technologies provide viable solutions to signature management, validating the concept and ensuring the sea services will maintain a critical edge.

September 1, 2020
By Maj. Ryan Kenny, USA

The first lesson of economics is scarcity. When supply is low and demand high, prices soar, and some will go without. In the U.S. Defense Department, both the demands and costs for reliable, resilient, and robust communication services continue to grow. As the services consider options to privatize aspects of communication, both the opportunities and challenges require thorough consideration.

August 1, 2020
By Maj. Ryan Kenny, USA

A recent posting of a satellite image from the U.S. National Training Center by Col. Scott Woodward, USA, raised a lot of eyebrows. The image shows a cluster of electromagnetic signals emitted from a battalion-sized unit participating in a large-scale training event. These signals were captured as part of the exercise from more than 10 kilometers away. This picture showed what many of us already know: we have an electromagnetic emission discipline problem.

July 1, 2020
By Ryan René Rosado

The 2020 election may be the most vulnerable yet. Last year, several federal agencies released a joint statement identifying election security as a “top priority for the U.S.” However, some have proposed mail-in ballots due to the COVID-19 pandemic and consequences associated with not social distancing. Why are we going backward instead of forward? Reverting backward during a disaster only adds challenges and difficulties with an already broken voting system. We need to be proactive, not reactive, when electing leaders at all levels across the country.

June 1, 2020
By Maj. Ryan Kenny, USA

Many experts have imagined a future in which the Department of Defense deploys an army of gadgets to track the health of individual warfighters in real time. However, most did not envision a global pandemic being the tipping point for the large-scale adoption of devices.

As the world faces the coronavirus pandemic, leaders want to better understand the health of soldiers, Marines, airmen and sailors in real time, securely while maintaining some semblance of privacy. As leaders and program managers wrestle with decisions to employ these technologies, they must address information security, privacy and the need to know.

May 1, 2020
By Jennifer Miller

The Air Force Cost Analysis Agency (AFCAA) offers multiple examples of data visualization tools being actively used for cost analysis, including the Air Force Total Ownership Cost (AFTOC) program decision support system, the Flying Hour Program and an array of research projects. However, these are far from the only examples. Data visualization tool power is popping up everywhere.

March 1, 2020
By Theresa Fox

The Office of Management and Budget’s (OMB’s) Memorandum M-19-18, “Federal Data Strategy - A Framework for Consistency” acts as a foundation of guiding principles and best practices to help agencies update the way they manage and use data and improve on information delivery, service and consistency. The intent is to pull government into the modern technological times in which we live while focusing on the ethical and compliance challenges of governing, managing and protecting data.

February 1, 2020
By Maj. Ryan Kenny, USA

Over the past few months, I have participated in a forum to help competitive graduates find quality internships and jobs after earning bachelor’s and master’s degrees from Carnegie Mellon University’s prestigious engineering and computer science programs. Listening to the next generation of technologists, innovators and leaders has helped me understand their concerns and desires in the hiring process. I have also gained new perspectives on what applicants think employers do right and wrong.

The following tactics, techniques and procedures (TTPs) are meant to help those in the government and defense sectors attract tech talent today.

January 1, 2020
By Jennifer Miller

Like me, you may have thought black is black and as dark as it gets. However, courtesy of carbon nanotubes (CNTs), individuals are creating blacker and blacker, even blackest versions of black. A quick Google or YouTube search yields all sorts of interesting results from BMWs painted in Vantablack, to the “blackest little black dress.”

In practice, CNTs are materials that can be vertically aligned to capture light in the 99.9XX percent range and produce blacker versions of the blackest black. CNTs are microscopic filaments of carbon that can be grown on surfaces for various uses.

December 1, 2019
By Jennifer Miller

When it comes to acquisition reforms, many know of the talent management, leader development and other transaction authority endeavors, but in this column I want to highlight a lesser-known effort, Army Directive 2018-26 (Enabling Modernization Through the Management of Intellectual Property), which will be incorporated into a number of other Army regulations covering acquisition, technology transfer and integrated product support.

November 1, 2019
By Maj. Ryan Kenny, USA

When Google announced it was acquiring Nest for a little over $3 billion in 2014, analysts thought the company wanted to enter the home appliances market.

Wrong.

It was all about the data.

Google gained access to a treasure trove of information about consumer demands for heating and cooling. The company learned when people turned on their furnaces and shut off their air conditioners. Google could pair this information with the type of household, neighborhood and city.

September 1, 2019
By Jennifer Miller

A deepfake is an artificial intelligence-based technology used to produce content that presents something that didn’t actually occur. This includes text, audio, video and images. Deepfakes are a recent disruptive development in the technology world, and both the House and Senate are investigating the phenomena and have introduced bills to combat these potentially dangerous creations.

June 1, 2019
By Maj. Ryan Kenny, USA
Credit: Shuttersotck/metamorworks

In the cyber realm, organizations need the means to rapidly identify emerging threats, immediately respond to mitigate risk, and systematically learn from these encounters—just as the immune system responds to a virus.

A single tool, process or team cannot deliver true cybersecurity. Collecting, analyzing and disseminating intelligence requires a converged organization that fuses expertise across domains. As adversaries possessing sophisticated expertise and considerable resources target multiple attack vectors—cyber, electromagnetic and physical, for example—cyber leaders must develop teams and systematic processes to rapidly transform analysis into action.

August 1, 2019
By Maj. Ryan Kenny, USA

Want to be disruptive, I mean truly disruptive? Try delving into history while surrounded by software engineers and app developers. Watch how the presence of a book on Charles Babbage and Ada Lovelace in the 19th century raises eyebrows at your next scrum team meeting. Be passionate about the history of technology, and you will disrupt.

I recently completed a short course on the history of computer science. Accounts of generations of scientists and engineers stepping from one advancement to the next through iterative problem solving efforts provided rich details about how computers progressed and the thinking of those working to advance the broader field of study.

July 1, 2019
By Anders Klintäng

There has been a quiet revolution in the television industry thanks to the vision of Adde Granberg, chief technology officer and head of production at Swedish Television SVT.

When we watched Lindsey Vonn retire in February of this year after an amazing career as an alpine skier, a quiet revolution happened behind the cameras. What looked like a normal, well-produced live TV event on the surface was, in fact, the world’s first remotely produced large-scale live TV production. In the world of live TV production, this is almost considered a quantum leap.

April 1, 2019
By Maj. Ryan Kenny, USA

Benefits associated with agility, scalability, ease of management and increased security justify the Defense Department’s investments in a transition to cloud services. As each military service rolls out new cloud capabilities, however, they may find that simply building these solutions will not attract organizations to use them. A misalignment of various motivations and an array of complex factors will impose costs that limit leaders’ freedom of movement in deploying any universal cloud solution. Getting the people and processes right matters just as much as the right technology.

Server Farm to Tabled Agreements

March 1, 2019
By Lindsay Clarke

In his famous poem, “The Road Not Taken,” Robert Frost writes, “Two roads diverged in a yellow wood.” If you have read the poem or analyzed it, as many a high school English teacher has required, you know that Frost suggests taking the road less traveled is the better choice. And while this may be true for adventure seekers and wanderers out there, here in the world of IT I recognize the benefits of not wandering off on my own. The life cycle of network equipment can be five to seven years, or even longer, so on this cusp of 400G it is important to choose optics that offer interoperability for the long term.

February 1, 2019
By Maj. Ryan Kenny, USA

What’s smaller than small? Nano. One nanometer is a billionth of a meter. At a scale smaller than a grain of salt, a blood cell or a virus, resides the nanoverse. Nanoparticles range from one to 100 nanometers. For perspective, a sheet of paper is about 100,000 nanometers thick.

Many believe the development of nanotechnologies will forever change our world. Rather than taking what the planet provides, we can make what we want, beginning at the smallest scales. From microprocessors to minuscule organ-on-a-chip devices, the forefront of creation begins with some of the tiniest objects. With nano, a new era in capabilities is moving from the horizon to the now.

Pages