Across the entire Defense Department, situational awareness is mission critical. Real-time understanding of mission activities and the information delivered by intelligence, surveillance and reconnaissance (ISR) systems, in particular, is crucial for military commanders to make key decisions.
Cryptography is an old game of secrecy with a storied history that millennia later, secures information in the digital age. Encryption, or the conversion of data into another form, plays a critical role in cryptography, with encryption algorithms protecting data on numerous devices across many networks. As many ways as there are to protect information, however, there are also those willing to crack the code.
What does the CIA's Project Acoustic Kitty have in common with zombie home appliances? The answer can be found in three letters: IoT. Left unchecked, the Internet of Things poses notable threats, both commercially and militarily.
Despite the fact that they supposedly are fighting against Syrian rebels employing relatively unsophisticated equipment, Russian forces have brought some of their most advanced electronic warfare (EW) capabilities to the fight.
A mere seven emerging technologies, while each powerful on their own, have the synergistic potential to disrupt life as we know it. The changes are coming. But are we ready? Has humanity fully prepared for the impacts? Lives will be easier, but at what cost? Guest blogger Bob Gourley dusts off the crystal ball.
Using nanotechnology, researchers at the Georgia Institute of Technology develop a device for converting light to direct current electricity.
If you are not a fan of The Lord of the Rings, the executive summary is that you can simplify life and improve security for derived credentials if you only distribute one authorized credential, used by a thin client to access a centralized virtual operating system that holds all the other keys, guest blogger Justin Marston writes, connecting the popular cinematic wonder to the challenge of mobile authentication.
The Space Fence System, including the large-scale digital radar and turn-key facility, were deemed technically mature and provided evidence that all requirements will be met through the program's critical design review (CDR) conducted by the U.S. Air Force.
The Defense Department stands at a technological and financial crossroads, writes Juniper Networks' vice president of the defense sector. The department needs to accelerate the proliferation of new networks and applications while heeding budgetary concerns. Bob Fortna offers a solution.
Lawrence Livermore and Rensselaer Polytechnic Institute sign a memorandum of understanding to help industry adopt supercomputing in an effort to spur the economy.
With all the focus on cyber, electronic warfare (EW) often is overlooked. But its importance is increasing with the advances in electronics.
Cyberspace already is the new battlefield. Is the military ready?
Processing massive amounts of video and images has become a daunting task for many law enforcement agencies, which are turning to technology for help. The solution sets alone won't solve crime, writes blogger B. Scott Swann, but video analytics will play an increasingly important role in the daily lives of those who protect U.S. citizens.
One of the greatest security challenges for mobile apps running on mobile end points is attestation. In the context of secure mobility, the goal of attestation is to prove to a third party—an app or user—that a computing system is intact and trustworthy, an endeavor that is harder than it sounds, especially if you don’t “own” the end point device. How can you know it hasn’t been modified or infected by a bad actor, asks blogger Justin Marston. You can ask the system, but how do you know it isn’t lying to you, and the attacker cunningly covered his or her tracks?
The U.S. Navy’s fourth Mobile User Objective System (MUOS-4) satellite is communicating from space to the satellite control team after its Florida launch this morning.
Electrical and computer engineers at North Carolina State University have developed prototypical embedded computing devices that use little power and cost less than current devices.
While federal agencies undertake laudable efforts to consolidate and modernize data centers, security remains an underlying concern that keeps information technology administrators awake at night. Professionals reportedly believe the government’s data center modernization process increased cybersecurity challenges—an assessment, says blogger Bill Lemons, that is hardly surprising.
Inmarsat Incorporated plans to launch the anticipated third satellite of its Global Xpress network August 28 from Kazakhstan, a re-do launch after a previous attempt this summer was delayed. The third satellite is needed for complete coverage of the international company’s program to heighten global communication capabilities on land, at sea and in the air.
The future for battlefield robotics is now, and many countries are committing to automated warfighting in a bid to catch up to the United States.
The 5G mmWave Channel Model Alliance will focus on 3D channel modeling at high frequencies, or millimeter wavelengths, addressing how a wireless signal would propagate in different bands of the spectrum. The alliance will also focus on directional channel sounding, which involves measuring whether signals are distorted or lost in a given channel.