Skip to main content
 
Close AD

Universal Utility Bar - Mobile

  • AFCEA
  • Signal Media
Home

AFCEA Main navigation - Mobile

  • Join
Close

Search AFCEA Site

Signal Main Navigation

  • All Topics
    • AFCEA Blog
    • Career Progressions
    • Chapter News
    • Contract Awards
    • Defense Operations
    • Event Coverage
    • Homeland Security
    • Intelligence
    • International
    • Technology
    • Videos
    • Webinars
      • Webinars on Demand 2023
      • Webinars on Demand 2022
      • All Webinars On Demand
  • The Cyber Edge
    • The Cyber Edge Writing Contest
      • Writing Contest Rules
      • Contest Winners
    • Cyber Security Month Articles
  • Intelligence
  • Thought Leadership
    • Guest Author Guidelines
    • Resource Library
    • Executive Videos
    • Sponsored Content
  • Magazine
    • Digital Issue and Archive
    • Awards Earned
    • Digital Reprints
    • Disruptive By Design
    • Meet the Staff
    • Guest Author Guidelines
    • SIGNAL Kids
  • Subscribe
  • Advertise

Universal Utility Bar

  • AFCEA
  • SIGNAL MEDIA
  • Brochure
  • Donate To Foundation
  • Events
  • International
  • Newsletters
  • Resources
  • Sign In

Universal Utility Bar

  • AFCEA
  • SIGNAL MEDIA
  • Brochure
  • Donate To Foundation
  • Events
  • International
  • Newsletters
  • Resources
  • Sign In
Home

Signal Main Navigation

  • All Topics
    • AFCEA Blog
    • Career Progressions
    • Chapter News
    • Contract Awards
    • Defense Operations
    • Event Coverage
    • Homeland Security
    • Intelligence
    • International
    • Technology
    • Videos
    • Webinars
      • Webinars on Demand 2023
      • Webinars on Demand 2022
      • All Webinars On Demand
  • The Cyber Edge
    • The Cyber Edge Writing Contest
      • Writing Contest Rules
      • Contest Winners
    • Cyber Security Month Articles
  • Intelligence
  • Thought Leadership
    • Guest Author Guidelines
    • Resource Library
    • Executive Videos
    • Sponsored Content
  • Magazine
    • Digital Issue and Archive
    • Awards Earned
    • Digital Reprints
    • Disruptive By Design
    • Meet the Staff
    • Guest Author Guidelines
    • SIGNAL Kids
  • Subscribe
  • Advertise

Search AFCEA Site

Recent Articles

Image
An intelligence specialist launches an RQ-20 Puma drone during an exercise in Australia in 2021 as part of the implementation of concepts of Force Design 2030. Photo: Cpl. Colton K. Garrett, U.S. Marine Corps.
Marines To Adopt More Autonomous Systems
Jun 06, 2023
  • Defense Operations
  • Marines
  • Autonomous Systems
Image
As the Department of the Air Force pursues air- and space-related joint all-domain command and control, it is asking industry to provide capabilities that they can integrate. “If you are a company that is providing more than a single product to the Department of the Air Force, then integrate them. Do the work on your side to integrate the capability across [our capabilities],” says the leader in charge of command, control, communications and battle management. Credit: SergeyBitos/Shutterstock

Illuminating the Department of the Air Force Battle Network

Jun 01, 2023
Technology
Air Force
Image
The Air Force is examining how humans make decisions while performing command and control and battle management functions. Their premise is that adding computers to automate some of those functions will advance decision-making. Credit: i3D/Shutterstock

Figuring Out the Human Side of Command and Control

Jun 01, 2023
Technology
Image
A U.S. Air Force F-16 Fighting Falcon aircraft, assigned to the 179th Expeditionary Fighter Squadron, carries out aerial operations in the U.S. Air Forces Central area of responsibility, April 28, 2022. The 179th EFS delivers airpower and showcases U.S. commitment to deterrence and regional stability.  U.S. Air Force photo by Master Sgt. Matthew Plew

On Point: Q&A With Gen. John Hyten, USAF (Ret.)

Jun 01, 2023
Defense Operations
Image
Army Col. Christopher Caldwell, the J3 operations director assigned to Joint Task Force Civil Support (JTF-CS), details the capabilities of the JTF-CS common operating picture to Commanding General Maj. Gen. Jeff Van and JTF-CS staff during a Joint All-Domain Command & Control System demonstration.  U.S. Navy photo by Mass Communication Specialist 2nd Class Michael H. Lehman/Released

President's Commentary: The Evolution From Caveman Combat to JADC2

Jun 01, 2023
Defense Operations

More Articles

Doctors Engage Trauma as Battlefield Enemy

Jun 01, 2023
Image
Medical technicians tend to simulated injured personnel after a mock aircraft crash at Misawa Air Base, Japan, in 2017. Credit: Staff Sgt. Deana Heitzman, U.S. Air Force

Narco-Subs: A Game of Hide-and-Seek

Jun 01, 2023
Image
U.S. Coast Guard members on the deck of the self-propelled, semisubmersible craft they seized in 2008. The estimated street value of the cocaine was more than $187 million at the time. This seized vessel had the capability to travel from Ecuador to San Diego. Credit: Petty Officer 1st Class Nico Figueroa, U.S. Coast Guard

The U.S. Army Turns Focus to the Division Level

May 26, 2023
Image
Vice Chief of Staff of the U.S. Army, Gen. Randy George, who is slated to become the Army’s next Chief, speaks to 1,200 Army and industry officials during the service’s Technical Exchange Meeting in Philadelphia on May 24.

U.S. Army Is Considering AI Bill of Materials

May 25, 2023
Image
Similar to a software bill of materials (BOMs), an artificial intelligence BOMs could potentially provide an understanding of the traceability of algorithm creation to reduce cybersecurity risks and improve data aspects. Credit: Drozd Irina/Shutterstock

Companies Can Improve Solicitation Responses

May 25, 2023
Image
Danielle Moyer, executive director, Army Contracting Command-Aberdeen Proving Ground speaking at the Technical Exchange Meeting X in Philadelphia on May 24, sees industry making preventable mistakes in contracting solicitations.

Project Linchpin Aims to Be the Keystone for Army Artificial Intelligence

May 25, 2023
Image
U.S. Army Maj. Eric Sturzinger, assigned to Artificial Intelligence Integration Center, gives a capability brief in 2021 at Project Convergence in Yuma, Arizona. The Army’s Program Executive Office for Intelligence, Electronic Warfare and Surveillance is building on the service’s initial success in artificial intelligence and is designing an AI solutions pipeline. Credit: Patrick Hunter, Army Futures Command

Confirmed: USAF Lt. Gen. Timothy Haugh to Lead U.S. Cyber Command and NSA

May 23, 2023
Image
Lt. Gen. Timothy Haugh, USAF, has been nominated to serve as the next leader of U.S. Cyber Command and the NSA.

Researchers Do the Math on Planning Helicopter Operations

May 22, 2023
Image
A Navy MH-60S Sea Hawk helicopter prepares to land aboard the USS Nimitz during routine operations in the South China Sea, April 17, 2023. Researchers at North Carolina State University have developed a computational model and heuristic to dramatically shorten the amount of time it takes to plan helicopter operations. Photo by Navy Petty Officer 1st Class Nathan Laird

Special C3BM Air Force Team Takes on JADC2

May 22, 2023
Image
The U.S. Air Force has embedded as special team at Nellis Air Force Base, Neveda, to get a first-hand look at command and control solutions. The team, working with leaders from the base’s Shadow Operations Center-Nellis, will examine capabilities in the operational environment. Pictured: The Agile Control Integration Team demonstrates a mobile C2 capability in 2022. Credit: Shelton Keel, 505th Command and Control Wing

Navy Purchases TAGOS-25 Class Ocean Surveillance Ships

May 22, 2023
Image
Austal USA teamed with  L3Harris Technologies (NYSE:LHX), Noise Control Engineering (NCE), TAI Engineering (TAI), and Thoma-Sea Marine Constructors (TMC) for execution of the TAGOS program.

Crossing the Valley of Death: Estonia's Innovation-driven Defense Technologies Amid Cyber Threats

May 19, 2023
Image
Expanding Knowledge and Accelerating Change: U.S. Air Force Airmen at Ämari Air Base, Estonia, honing their skills in satellite assembly during NATO's collective defense mission. Photo: Staff Sgt. Megan M. Beatty, U.S. Air Force.

SIGNAL Executive Video: Your Identity Is Your Access

May 15, 2023
Image
IDEMIA National Security Solutions (NSS) representative Evan Bays speaks about ID2Access during a SIGNAL Media Executive Video episode.

Doctors Engage Trauma as Battlefield Enemy

Jun 01, 2023
Image
Medical technicians tend to simulated injured personnel after a mock aircraft crash at Misawa Air Base, Japan, in 2017. Credit: Staff Sgt. Deana Heitzman, U.S. Air Force

Narco-Subs: A Game of Hide-and-Seek

Jun 01, 2023
Image
U.S. Coast Guard members on the deck of the self-propelled, semisubmersible craft they seized in 2008. The estimated street value of the cocaine was more than $187 million at the time. This seized vessel had the capability to travel from Ecuador to San Diego. Credit: Petty Officer 1st Class Nico Figueroa, U.S. Coast Guard

The U.S. Army Turns Focus to the Division Level

May 26, 2023
Image
Vice Chief of Staff of the U.S. Army, Gen. Randy George, who is slated to become the Army’s next Chief, speaks to 1,200 Army and industry officials during the service’s Technical Exchange Meeting in Philadelphia on May 24.

U.S. Army Is Considering AI Bill of Materials

May 25, 2023
Image
Similar to a software bill of materials (BOMs), an artificial intelligence BOMs could potentially provide an understanding of the traceability of algorithm creation to reduce cybersecurity risks and improve data aspects. Credit: Drozd Irina/Shutterstock

Companies Can Improve Solicitation Responses

May 25, 2023
Image
Danielle Moyer, executive director, Army Contracting Command-Aberdeen Proving Ground speaking at the Technical Exchange Meeting X in Philadelphia on May 24, sees industry making preventable mistakes in contracting solicitations.

Project Linchpin Aims to Be the Keystone for Army Artificial Intelligence

May 25, 2023
Image
U.S. Army Maj. Eric Sturzinger, assigned to Artificial Intelligence Integration Center, gives a capability brief in 2021 at Project Convergence in Yuma, Arizona. The Army’s Program Executive Office for Intelligence, Electronic Warfare and Surveillance is building on the service’s initial success in artificial intelligence and is designing an AI solutions pipeline. Credit: Patrick Hunter, Army Futures Command

Confirmed: USAF Lt. Gen. Timothy Haugh to Lead U.S. Cyber Command and NSA

May 23, 2023
Image
Lt. Gen. Timothy Haugh, USAF, has been nominated to serve as the next leader of U.S. Cyber Command and the NSA.

Researchers Do the Math on Planning Helicopter Operations

May 22, 2023
Image
A Navy MH-60S Sea Hawk helicopter prepares to land aboard the USS Nimitz during routine operations in the South China Sea, April 17, 2023. Researchers at North Carolina State University have developed a computational model and heuristic to dramatically shorten the amount of time it takes to plan helicopter operations. Photo by Navy Petty Officer 1st Class Nathan Laird

Special C3BM Air Force Team Takes on JADC2

May 22, 2023
Image
The U.S. Air Force has embedded as special team at Nellis Air Force Base, Neveda, to get a first-hand look at command and control solutions. The team, working with leaders from the base’s Shadow Operations Center-Nellis, will examine capabilities in the operational environment. Pictured: The Agile Control Integration Team demonstrates a mobile C2 capability in 2022. Credit: Shelton Keel, 505th Command and Control Wing

Navy Purchases TAGOS-25 Class Ocean Surveillance Ships

May 22, 2023
Image
Austal USA teamed with  L3Harris Technologies (NYSE:LHX), Noise Control Engineering (NCE), TAI Engineering (TAI), and Thoma-Sea Marine Constructors (TMC) for execution of the TAGOS program.

Crossing the Valley of Death: Estonia's Innovation-driven Defense Technologies Amid Cyber Threats

May 19, 2023
Image
Expanding Knowledge and Accelerating Change: U.S. Air Force Airmen at Ämari Air Base, Estonia, honing their skills in satellite assembly during NATO's collective defense mission. Photo: Staff Sgt. Megan M. Beatty, U.S. Air Force.

SIGNAL Executive Video: Your Identity Is Your Access

May 15, 2023
Image
IDEMIA National Security Solutions (NSS) representative Evan Bays speaks about ID2Access during a SIGNAL Media Executive Video episode.

The Cyber Edge

The Cyber Edge is SIGNAL Media’s home for the expanding world of cyber technologies. The Cyber Edge highlights threats and solutions built around interviews with key government/military and cyber leaders. The Cyber Edge is written by SIGNAL Media journalists and subject matter experts specifically for AFCEA's core audience of cyber and communications professionals. The content is relevant, focused and mission driven.

More The Cyber Edge Articles
Associated Content:
The Cyber Edge
Green Background for The Cyber Edge Brand
Image
Credit: Diyajyoti/Shutterstock

Disruptive by Design: Preparing for the Industry-wide Shakeup of CMMC

Image
Deep faking creates synthetic people who may resemble existing individuals. This combination of artificial intelligence technologies can animate and imitate the voice of a human being. Credit: Igor Link/Shutterstock

China’s Deep Fake Law Is Fake

Image
Cloud solutions improve user experience and allow users to access data and applications from any location and device. Credit: Jirsak/Shutterstock

Nine Steps Toward Tactical Cloud

Image
 A soldier talks to his higher headquarters during the Freedom Shield training exercise in South Korea, March 19. The Defense Information Systems Agency’s modernized command and control capabilities are made available to coalition partners and allies at the same time they are available to U.S. forces. Credit: U.S. Defense Department photo

DISA’s Modernized C2 Systems Enter Web-Based Era

Trending Videos

Italian and American Soldiers Swap Rations

Every army in NATO has its own field ration, commonly known as MREs (meals-ready-to-eat). While perhaps not the height of culinary expression, these rations give soldiers the calories they need to power through a hard day in the field. From Ally to Ally, their contents differ in small, interesting ways.

Youth Leading the Way for DevSecOps

Gabe Solomon, a cloud engineer with DISA’s Hosting and Compute Center, discusses Global Federated User Domain (GFUD) and DevSecOps at TechNet Cyber 2023. Lt. Gen. Robert J. Skinner, USAF, DISA director and commander of the JFHQ-DODIN, asked him to speak to the capability during his luncheon keynote.

A look at Fortitude Hall

A fly-through look at Fortitude Hall, U.S. Army Cyber Command's headquarters facility.

Intelligence

More Intelligence Articles
Associated Content:
Intelligence
Exploring new solutions and revisiting the fundamental human factors that influence information design is an integral part of this evolving technical field. Shutterstock/pinkeyes
Image
U.S. Army War College students with Penn State Dickinson Law School students analyzed international norms for illegal cyber events. Photo: Robert Martin, U.S. Army War College Public Affairs.

Lawyers Are Not Spies

Image
The aircraft carrier USS Nimitz streaming through the South China Sea. Photo: Seaman Carson Croom, U.S. Navy.

Intelligence Threat Assessment: China and Russia Are a Dangerous Team

Image
A Chinese trawler uses a grapple hook in an apparent attempt to snag the towed acoustic array of the surveillance ship USNS Impeccable. The ship was conducting routine survey operations in international waters 75 miles south of Hainan Island when it was harassed by five Chinese vessels in March 2009. Credit: U.S. Navy

Uncovering China’s Fishy Activities at Sea

Image
Sailors prepare material recovered from a Chinese high-altitude surveillance balloon for transport to federal agents at Joint Expeditionary Base Little Creek, Virginia, during operations in the Atlantic Ocean. Photo by U.S. Navy Petty Officer 1st Class Ryan Seelbach

Intelligence Considerations of PRC Surveillance Balloon

International

International News

More International Articles
Associated Content:
International
U.S. military personnel participate in a German cyber/information technology exercise, or CITEF. Credit: Bundeswehr
Image
U.S. Coast Guard members on the deck of the self-propelled, semisubmersible craft they seized in 2008. The estimated street value of the cocaine was more than $187 million at the time. This seized vessel had the capability to travel from Ecuador to San Diego. Credit: Petty Officer 1st Class Nico Figueroa, U.S. Coast Guard

Narco-Subs: A Game of Hide-and-Seek

Image
Deep faking creates synthetic people who may resemble existing individuals. This combination of artificial intelligence technologies can animate and imitate the voice of a human being. Credit: Igor Link/Shutterstock

China’s Deep Fake Law Is Fake

Image
Expanding Knowledge and Accelerating Change: U.S. Air Force Airmen at Ämari Air Base, Estonia, honing their skills in satellite assembly during NATO's collective defense mission. Photo: Staff Sgt. Megan M. Beatty, U.S. Air Force.

Crossing the Valley of Death: Estonia's Innovation-driven Defense Technologies Amid Cyber Threats

Image
The Geneva-based International Committee of the Red Cross, CICR by its French acronym, provides humanitarian assistance around the world. One of its missions is to document human rights and humanitarian law violations. Credit: Martin Good, Shutterstock

International Agreements Guard Against Illegal Cyber Weapons

Sponsored Articles

5G: Bringing Bandwidth to the Tip of the Spear

Sponsored
Image
Nokia Photo

Massive Disaggregated Processing for Sensors at the Edge

Sponsored
Image
Sponsored Content - Massive Disaggregated Processing for Sensors at the Edge

Unlocking the Power of Unstructured Data

Sponsored
Image
Credit: Marklogic

Visibility and Analytics: Keys to Zero-Trust Success

Sponsored
Image
Visibility and Analytics should be a key component of your zero-trust strategy, making sure your defensive cyber operators have the tools, data and analytics required to quickly identify, stop and remediate threats.

Enabling Operations With Cross-Domain Transfer and Access

Sponsored
Image
Multidomain collaboration is an important part of enabling operations.

Managing Open Source Data in Cross-Domain Environments

Sponsored
Image
Credit: kentoh/Shutterstock

After Weathering COVID-19, a Cloud Transition Is Ahead for the DLA

Sponsored
Image
Credit: Bumble Dee/Shutterstock

Establishing the Engineering Data Fabric

Sponsored
Image
ManTech Information Wave

Telemetry Technology Advances, Yields Real-Time Aircraft Diagnostics

Sponsored
Image
Credit: Quardia/Shutterstock

Taking 911 Services to the Next Level

Sponsored
Image
Credit: Pavel Ignatov/Shutterstock

SOAR Can Change the Game on Strengthening DoD Cybersecurity

Sponsored
Image
Credit: Shutterstock/ArtemisDiana

Putting Trust in Zero Trust

Sponsored
Image
Trend Micro Vision One displays risk visibility as well as agent and policy management.

5G: Bringing Bandwidth to the Tip of the Spear

Sponsored
Image
Nokia Photo

Massive Disaggregated Processing for Sensors at the Edge

Sponsored
Image
Sponsored Content - Massive Disaggregated Processing for Sensors at the Edge

Unlocking the Power of Unstructured Data

Sponsored
Image
Credit: Marklogic

Visibility and Analytics: Keys to Zero-Trust Success

Sponsored
Image
Visibility and Analytics should be a key component of your zero-trust strategy, making sure your defensive cyber operators have the tools, data and analytics required to quickly identify, stop and remediate threats.

Enabling Operations With Cross-Domain Transfer and Access

Sponsored
Image
Multidomain collaboration is an important part of enabling operations.

Managing Open Source Data in Cross-Domain Environments

Sponsored
Image
Credit: kentoh/Shutterstock

After Weathering COVID-19, a Cloud Transition Is Ahead for the DLA

Sponsored
Image
Credit: Bumble Dee/Shutterstock

Establishing the Engineering Data Fabric

Sponsored
Image
ManTech Information Wave

Telemetry Technology Advances, Yields Real-Time Aircraft Diagnostics

Sponsored
Image
Credit: Quardia/Shutterstock

Taking 911 Services to the Next Level

Sponsored
Image
Credit: Pavel Ignatov/Shutterstock

SOAR Can Change the Game on Strengthening DoD Cybersecurity

Sponsored
Image
Credit: Shutterstock/ArtemisDiana

Putting Trust in Zero Trust

Sponsored
Image
Trend Micro Vision One displays risk visibility as well as agent and policy management.

Thought Leadership

President's Commentary: The Evolution From Caveman Combat to JADC2

On Point: Q&A With Gen. John Hyten, USAF (Ret.)

Disruptive by Design: Preparing for the Industry-wide Shakeup of CMMC

By Lauren Beward
Image
Lauren Beward

Securing the Federal Software Supply Chain

By Brian Hajost
Image
Brian Hajost, SteelCloud Founder and COO

Popular Topics

Technology

5G: Bringing Bandwidth to the Tip of the Spear
Illuminating the Department of the Air Force Battle Network
Narco-Subs: A Game of Hide-and-Seek
See Recent Technology Articles

Defense Operations

Marines To Adopt More Autonomous Systems
President's Commentary: The Evolution From Caveman Combat to JADC2
On Point: Q&A With Gen. John Hyten, USAF (Ret.)
See Recent Defense Operations Articles

Homeland

Narco-Subs: A Game of Hide-and-Seek
CISA’s Cybersecurity Advisory Committee Pivots to Meet the Threat
DHS Seeks Small Business Creativity
See Recent Defense Operations Articles

Intelligence

Lawyers Are Not Spies
Intelligence Threat Assessment: China and Russia Are a Dangerous Team
Uncovering China’s Fishy Activities at Sea
See Recent Defense Operations Articles

     
     

Search AFCEA Site

Stay Connected

  • Facebook
  • LinkedIn
  • Twitter
  • Flickr
  • YouTube
  • Instagram

Signal Footer

  • AFCEA
    • Join AFCEA
    • Membership
    • AFCEA Chapters
    • AFCEA Small Business
    • Member Login
  • About Us
    • About SIGNAL
    • Meet the Staff
    • SIGNAL's Awards
    • Writer's Guide
    • SIGNAL Kids
    • Advertise
  • Legal
    • AFCEA Privacy Policy
    • Copyright
    • Disclaimers

Contact Us

Editorial
703.631-6192

Customer Service:
703-631-6100

Advertising:
703-631-6181

Email Us:
Contact Form

Newsletters

  • AFCEA Weekly Digest
  • SIGNAL Connections
  • The Cyber Edge
  • Resource Library
  • RSS Feed

Copyright © 2023, AFCEA International