The U.S. Army Pacific trains with limited—but not eliminated—communications capabilities to learn how to operate in a degraded environment, whether caused by enemy action or by shortcomings among allies and partners.
While military planners are worried about communications and networking degradation by enemy forces, they instead should turn their attention to already-extant degradation—the lack of effective interoperability in a coalition operation.
Dealing with a degraded communications environment may require commanders to make their intent clear to their warfighters before a network collapses.
Government and industry are hard at work in what will be a tough job to incorporate commercial solutions in mobile military networking.
The adage is true: What’s old is new again, and while we think the technology of today might cure the ills of yesterday, some problems persist. It might be time to explore how methods that helped isolate insider threats from history can succeed in protecting modern infrastructure.
Across the entire Defense Department, situational awareness is mission critical. Real-time understanding of mission activities and the information delivered by intelligence, surveillance and reconnaissance (ISR) systems, in particular, is crucial for military commanders to make key decisions.
Cryptography is an old game of secrecy with a storied history that millennia later, secures information in the digital age. Encryption, or the conversion of data into another form, plays a critical role in cryptography, with encryption algorithms protecting data on numerous devices across many networks. As many ways as there are to protect information, however, there are also those willing to crack the code.
What does the CIA's Project Acoustic Kitty have in common with zombie home appliances? The answer can be found in three letters: IoT. Left unchecked, the Internet of Things poses notable threats, both commercially and militarily.
Despite the fact that they supposedly are fighting against Syrian rebels employing relatively unsophisticated equipment, Russian forces have brought some of their most advanced electronic warfare (EW) capabilities to the fight.
A mere seven emerging technologies, while each powerful on their own, have the synergistic potential to disrupt life as we know it. The changes are coming. But are we ready? Has humanity fully prepared for the impacts? Lives will be easier, but at what cost? Guest blogger Bob Gourley dusts off the crystal ball.
Using nanotechnology, researchers at the Georgia Institute of Technology develop a device for converting light to direct current electricity.
If you are not a fan of The Lord of the Rings, the executive summary is that you can simplify life and improve security for derived credentials if you only distribute one authorized credential, used by a thin client to access a centralized virtual operating system that holds all the other keys, guest blogger Justin Marston writes, connecting the popular cinematic wonder to the challenge of mobile authentication.
The Space Fence System, including the large-scale digital radar and turn-key facility, were deemed technically mature and provided evidence that all requirements will be met through the program's critical design review (CDR) conducted by the U.S. Air Force.
The Defense Department stands at a technological and financial crossroads, writes Juniper Networks' vice president of the defense sector. The department needs to accelerate the proliferation of new networks and applications while heeding budgetary concerns. Bob Fortna offers a solution.
Lawrence Livermore and Rensselaer Polytechnic Institute sign a memorandum of understanding to help industry adopt supercomputing in an effort to spur the economy.
With all the focus on cyber, electronic warfare (EW) often is overlooked. But its importance is increasing with the advances in electronics.
Cyberspace already is the new battlefield. Is the military ready?
Processing massive amounts of video and images has become a daunting task for many law enforcement agencies, which are turning to technology for help. The solution sets alone won't solve crime, writes blogger B. Scott Swann, but video analytics will play an increasingly important role in the daily lives of those who protect U.S. citizens.
One of the greatest security challenges for mobile apps running on mobile end points is attestation. In the context of secure mobility, the goal of attestation is to prove to a third party—an app or user—that a computing system is intact and trustworthy, an endeavor that is harder than it sounds, especially if you don’t “own” the end point device. How can you know it hasn’t been modified or infected by a bad actor, asks blogger Justin Marston. You can ask the system, but how do you know it isn’t lying to you, and the attacker cunningly covered his or her tracks?