U.S. Marine Corps commanders will soon have a new mobile command and control (C2) capability that will be readily transferable from vehicle to vehicle without mounting or installation modifications. This new system is being created primarily from cost-effective, off-the-shelf digital communications equipment. In his article "Corps Command and Control on the Move" in this issue of SIGNAL Magazine, Defense Editor Max Cacas talks to the experts about the project.
Although fiscal year 2015 is the target time frame for full operational capability, personnel from the U.S. Army's 780th Military Intelligence Brigade--the service's first-ever cyber brigade--already are helping to secure the Defense Department's networks against cyber attacks. While the unit was officially activated on December 1, prep work for the group has been ongoing since at least 1998, according to Technology Editor George I. Seffers in his article, "Historic Cyber Unit Begins Daily Action," in this issue of SIGNAL Magazine. Seffers speaks with Col.
Perhaps it began with Y2K, this realization that the unseen operational grid could come crashing down by the mere numerical click from one century to the next-but the threats to operational functionality in all areas of human-machine interface are very real. A cyber exercise conducted again this year will incorporate some changes to simulate new challenges.
By the end of 2012, U.S. Marine Corps aviation experts plan to have the Corps equipped with a common command and control (C2) platform that not only will improve situational awareness and information assurance (IA), but also will ramp up mobility as well. The technology behind this advance is the Marine Corps' Common Aviation Command and Control System (CAC2S), which aims to provide closer coordination of the Marine ground and air C2 centers, allowing more speedy responses to changing battlefield conditions. Technology Editor George I.
Given some of the most shocking emergency events of the past decade, whether on school campuses, severe weather conditions, or the overall climate of hyper-awareness in the United States following 9/11, the ability to provide real-time public warnings has become a huge priority. The current Emergency Alert System (EAS), and its predecessor, the Emergency Broadcast System, or EBS, date back to 1951. But present-day capabilities, brought about by advanced satellite and other systems technologies-including the Internet and social media tools-provide the very capabilities necessary to deliver an alert with time enough to spare to enable proactive measures.
Much like the three propeller blades on a wind turbine, three U.S. government agencies are spinning together a program to produce a microgrid that will provide power that is independent of external sources. The departments of Defense, Energy, and Homeland Security want to enable military bases and other installations to continue operations in the event of power failure due to enemy actions or other events. A key element of this microgrid is network security, and it must be able to continue functions even in the face of cybermarauders, who could bring down an entire system.
How often have military service members been shuffled from one office to another-one organization to the next-before all of their records are pulled together and coordination of treatments or benefits can begin? The answer is too often. But here is the good news: The U.S. Defense Department and Department of Veterans Affairs (VA) have launched an effort to combine their two electronic health record systems into one. Known as the integrated Electronic Health Record, or iEHR, it aims to ensure that health care records will follow troops for their rest of their lives, beginning from the day they swear in to serve their country.
Technology transfer-a big buzzword some decades ago-is where companies found commercial uses for military technologies. Over the years, military and industry continue to share new ideas, programs and systems, and just about any otherwise awesome products that benefit both arenas. It's perhaps another anchor in the military-industrial complex. But when military technology is found to possibly fight cancer-that is welcoming news, as reported by George I.
It's an incredibly confusing world we now live in, with threats to the military and civilians posing vexing challenges that never truly existed before. There really is no "traditional" battleground anymore, because it continues to morph into a field of asymmetric warfare, violent conflict between a formal military and an informal, poorly equipped, but elusive opponent. According to Dr.
The worldwide budget crisis isn't just an oft-repeated catch phrase-it's the real deal-and it's affecting how nations procure and oversee their security measures and infrastructure. In fact, the economy is recognized as one of the major concerns for security provision.
...When the international mining community is aiming to shake off the absolute dominance held by the People's Republic of China in the market for rare earths, which are a series of elements in the periodic table. These elements are critical for the U.S. military's high-tech communications and weaponry, as well as those of other allied nations. According to Michael A. Robinson in his article, "Rare Earths to Become Less Scarce," in this issue of SIGNAL Magazine, new mines could be supplying U.S. military needs, along with those of other nations, in just a few years.
A recently released draft plan provides a road map for federal agencies and industry to navigate through the development of the cloud-computing model. In the January issue of SIGNAL Magazine, Technology Editor George I. Seffers explores the document in his article, "Hitting the Hard Spots on the Road to Cloud."
...When website spoofers do deceive-especially when the legitimate sites belong to the U.S. military. Untold damage could result should hackers glean crucial data, whether it involves service personnel, missions or daily operations. Earlier in the year, the U.S. Air Force faced this very scenario when its portal was spoofed. The best defense, in addition to the 24/7 protection provided by military cyberspace operators worldwide, is vigilance by every service member from the top echelons all the way down.
In what has been an extremely successful program on U.S. Navy submarines is now being readied for the surface fleet. The Navy's subs have been operating with the Common Submarine Radio Room (CSRR) concept, and now hope to harness the benefits for Navy surface vessels. In his article, "Underwater Communications Rise to Surface Fleet" in this issue of SIGNAL Magazine, Max Cacas talks with the Common Radio Room (CRR) program manager and others involved in this transition.
Having completed basic research and development (R&D) by its Naval Research Laboratory (NRL) creators, the Close In Covert Autonomous Disposable Aircraft (CICADA) is being primed to meet battlefield requirements. One NRL source refers to CICADA as a "dumb" sensor because of its simple design, but other lab officials say the system's genius lies in its simplicity.
It's said that necessity is the mother of invention-but experience can serve as the catalyst for action. In this issue of SIGNAL Magazine, Michael A. Robinson's article, "Putting Satellites in Soldiers' Hands," examines how a retired U.S. Army Signal Corps officer has parlayed his experience into developing more effective satellite apps for mobile devices. Jim Ramsey is that retired officer, and now he's president of MTN Government Services (MTNGS).
The Defense Department needs a fresh new approach to running its information technology (IT) systems. One idea is platform-as-a-service (PaaS) cloud computing, which would reduce the number of stovepipe systems. The biggest challenge ahead: convincing department decision makers to accept PaaS as a solution and to encourage its funding. The first step is separating the defense infrastructure from the applications, according to Paul A. Strassmann in his article, "Two Barriers Block New Architecture" in this issue of SIGNAL Magazine.
From circuit-switched networks (CSN), to Global System for Mobile Communications (GSM), to Enhanced Data Rates for GSM Evolution (EDGE), technology has reached the point where it is now feasible to secure mobile communications. Only recent mobile devices-witness the iPhone-can keep up with security demands required for secure communications. The National Security Agency (NSA) is developing a midterm pilot program aiming for the end goal of a mobile platform developed using only commercial off-the-shelf (COTS) components.
Although Guam's tropical locale renders it a go-to destination for U.S. military personnel, the island's sheer distance from the continental United States poses logistical challenges for troops deployed there. The 212-square-mile island of Guam is located seven time zones and more than 3,800 miles away from Hawaii and falls on the other side of the International Date Line. It is the largest and southernmost island of the Marianas Island chain. An unincorporated territory of the United States, the island supports tactical needs in the region.
The eyes may have it, but the brain takes it to another level in a new technology being developed by researchers for the U.S. Defense Department. Imagery is viewed by the human eye, and the breakthrough advance uses neurotechnology to narrow that data into smaller, more concentrated images for further interpretation. In his article, "Brainwaves Boost Intelligence," in this issue of SIGNAL Magazine, George I. Seffers looks at the Neurotechnology for Intelligence Analysts (NIA) program.