Technology Blog

Army Communications Training Includes Doing With Less

November 18, 2015
By Robert K. Ackerman

The U.S. Army Pacific trains with limited—but not eliminated—communications capabilities to learn how to operate in a degraded environment, whether caused by enemy action or by shortcomings among allies and partners.

Lack of Interoperability Equals Built-in Degradation

November 18, 2015
By Robert K. Ackerman

While military planners are worried about communications and networking degradation by enemy forces, they instead should turn their attention to already-extant degradation—the lack of effective interoperability in a coalition operation.



U.S. Forces Prepare for Degraded Networking

November 17, 2015
By Robert K. Ackerman

Dealing with a degraded communications environment may require commanders to make their intent clear to their warfighters before a network collapses.

A Mobile Military Mandates New Security Solutions

November 17, 2015
By Robert K. Ackerman

Government and industry are hard at work in what will be a tough job to incorporate commercial solutions in mobile military networking.

Communications Security Monitoring Can Reduce Insider Threats

November 13, 2015
By David E. Meadows

The adage is true: What’s old is new again, and while we think the technology of today might cure the ills of yesterday, some problems persist. It might be time to explore how methods that helped isolate insider threats from history can succeed in protecting modern infrastructure.

Enhancing Situational Awareness Throughout an IT Infrastructure

November 6, 2015
By Joel Dolisy

Across the entire Defense Department, situational awareness is mission critical. Real-time understanding of mission activities and the information delivered by intelligence, surveillance and reconnaissance (ISR) systems, in particular, is crucial for military commanders to make key decisions. 

Crypto and The Imitation Game

November 4, 2015
By Justin Marston

Cryptography is an old game of secrecy with a storied history that millennia later, secures information in the digital age. Encryption, or the conversion of data into another form, plays a critical role in cryptography, with encryption algorithms protecting data on numerous devices across many networks. As many ways as there are to protect information, however, there are also those willing to crack the code.

Acoustic Kitty and Zombie Home Appliances: Yesterday's Theories Shape Tomorrow's Technologies

October 15, 2015
By David Archer

What does the CIA's Project Acoustic Kitty have in common with zombie home appliances? The answer can be found in three letters: IoT. Left unchecked, the Internet of Things poses notable threats, both commercially and militarily.

Modern EW Capabilities Accompany Russian Forces Into Syria

October 13, 2015
By David E. Meadows

Despite the fact that they supposedly are fighting against Syrian rebels employing relatively unsophisticated equipment, Russian forces have brought some of their most advanced electronic warfare (EW) capabilities to the fight.

7 Technologies That Together Will Disrupt Humanity

October 8, 2015
By Bob Gourley
The iCub humanoid robot at IDSIA's robotics lab in Switzerland tries to reach for a blue cup.

A mere seven emerging technologies, while each powerful on their own, have the synergistic potential to disrupt life as we know it. The changes are coming. But are we ready? Has humanity fully prepared for the impacts? Lives will be easier, but at what cost? Guest blogger Bob Gourley dusts off the crystal ball.  

Device Converts Light into Direct Current

September 30, 2015
By George I. Seffers
Researchers predict the optical rectina, which converts light to direct current, could be a game changer.

Using nanotechnology, researchers at the Georgia Institute of Technology develop a device for converting light to direct current electricity.

Derived Credentials and The Lord of the Rings

September 29, 2015
By Justin Marston
Derived credentials are the latest attempt to address the challenge of mobile authentication.

If you are not a fan of The Lord of the Rings, the executive summary is that you can simplify life and improve security for derived credentials if you only distribute one authorized credential, used by a thin client to access a centralized virtual operating system that holds all the other keys, guest blogger Justin Marston writes, connecting the popular cinematic wonder to the challenge of mobile authentication.    

Space Fence Completes Critical Design Review

September 28, 2015
By George I. Seffers
More than 500,000 pieces of debris, or “space junk,” are tracked as they orbit the Earth. They all travel at speeds up to 17,500 mph, fast enough for a relatively small piece of orbital debris to damage a satellite or a spacecraft.

The Space Fence System, including the large-scale digital radar and turn-key facility, were deemed technically mature and provided evidence that all requirements will be met through the program's critical design review (CDR) conducted by the U.S. Air Force.

How and Why the DOD Should Adopt SDN

September 22, 2015
By Bob Fortna

The Defense Department stands at a technological and financial crossroads, writes Juniper Networks' vice president of the defense sector. The department needs to accelerate the proliferation of new networks and applications while heeding budgetary concerns. Bob Fortna offers a solution. 

Promoting Industry Adoption of Supercomputing

September 16, 2015
By George I. Seffers
The Lawrence Livermore-Rensselaer Polytechnic Institute agreement to promote supercomputing supports President Barack Obama's plan to spur the economy.

Lawrence Livermore and Rensselaer Polytechnic Institute sign a memorandum of understanding to help industry adopt supercomputing in an effort to spur the economy.

Electronic Warfare Is the Teeth-Clenching Defense of the Last Mile

September 16, 2015
By David E. Meadows
Two soldiers practice using electronic warfare equipment during a joint training exercise. EW often is overlooked, but its importance is increasing with advances in electronics.

With all the focus on cyber, electronic warfare (EW) often is overlooked. But its importance is increasing with the advances in electronics.

The Bottom Line: 5 Ways Technology Has Changed the World

September 14, 2015
Maryann Lawlor

Cyberspace already is the new battlefield. Is the military ready?

Video Analytics Challenges: Finding the Needles in the Haystack

September 11, 2015
By B. Scott Swann
Courtesy CanStockPhoto via MorphoTrak

Processing massive amounts of video and images has become a daunting task for many law enforcement agencies, which are turning to technology for help. The solution sets alone won't solve crime, writes blogger B. Scott Swann, but video analytics will play an increasingly important role in the daily lives of those who protect U.S. citizens.

Attestation and Inception: Deciphering Secure Reality from a Dream

September 8, 2015
By Justin Marston

One of the greatest security challenges for mobile apps running on mobile end points is attestation. In the context of secure mobility, the goal of attestation is to prove to a third party—an app or user—that a computing system is intact and trustworthy, an endeavor that is harder than it sounds, especially if you don’t “own” the end point device. How can you know it hasn’t been modified or infected by a bad actor, asks blogger Justin Marston. You can ask the system, but how do you know it isn’t lying to you, and the attacker cunningly covered his or her tracks?

MUOS-4 Satellite Up and Running

September 2, 2015
By George I. Seffers
MUOS-4 will enable near-global coverage for a new secure military communications network offering enhanced capabilities for mobile forces.

The U.S. Navy’s fourth Mobile User Objective System (MUOS-4) satellite is communicating from space to the satellite control team after its Florida launch this morning.