Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...


U.S. Air Force Expedites Mission Capabilities Leveraging ML
Author: TAMR   Send Email to POC   View Content
The United States SEEK EAGLE Office (AFSEO) is the center of excellence responsible for managing the aircraft store compatibility process. Get an insider's look at how AFSEO leveraged ML to accelerate time to insights by automating entity resolution, record duplication, and categorization. Learn how the office is able to increase ROI and utilization of Air Force aircraft.

Author: AFCEA   Send Email to POC   View Content
Any comprehensive National Security Emergency Preparedness (NSEP) capability in the United States has atrophied amid the increase of threats that could cause a catastrophic disaster across the country. Of key interest is whether any of the DHS/FEMA critical infrastructure Information Sharing and Analysis Centers or Information Sharing and Analysis Organizations have been utilized in the dramatic effort to address COVID-19.

High-Speed Broadband for Remote Government Operations and Emergency Responders
Author: Intelsat General   Send Email to POC   View Content
Ground forces and emergency responders often work in remote areas far from any communications infrastructure, or where that infrastructure has been destroyed. Our new FlexGround service provides seamless, reliable, global broadband connectivity for a host of applications, including converged voice, data and video. With FlexGround, users can even transmit high-definition, full-motion videos while on-the-pause or on-the-move. Learn more. Download our white paper here

Author: Cloudera   Send Email to POC   View Content
Organizations today are leveraging data to drive more efficient processes and more effective outcomes. In a hybrid and multi-cloud world, organizations need data context - a single, coherent way to view and manage data processes across multiple architectures. A critical part of Cloudera Data Platform (CDP), Cloudera SDX (Shared Data Experience), applies centralized, consistent data context services across all platform deployments, enabling hundreds of different workloads to run against shared or overlapping sets of data.

The Cyber Edge July 2020
Author: AFCEA   Send Email to POC   View Content
Network data collection, analysis and sharing are core to cyber defense, and Tinisha McMillan is on a mission to improve all three.

9 Notable 2020 CISO Challenges - Are They The Same As Yours?
Author: Attivo Networks   Send Email to POC   View Content
The world has changed in so many ways in 2020. Even with the best-laid plans and precautions, CISOs have had to quickly respond to the COVID-19 pandemic, revising strategies and transitioning from unprepared to prepared. Read on for a list of important things CISOs are tackling as they look to stay one step ahead in these rapidly changing times.

Meeting Cyber SA and NetOps Challenges with IQ-Core Software
Author: PacStar   Send Email to POC   View Content
Cyber Situational Awareness, (SA) is top of mind for DoD decision makers. There is a critical need across defense information systems for cyber security SA that enables cyber professionals and decision makers to gain a clearer picture of what is happening across DoD networks and ultimately, a bird's-eye view of the entire digital ecosystem.

Over the past several years, Defense Information Systems Agency (DISA) and other DoD agencies have focused on converging functions such as cyber SA, defensive cyber operations, and network operations (NetOps) in order to reduc ...

Realizing the CBM+ Vision to Improve Operational Readiness
Author: Microstrategy   Send Email to POC   View Content
Military services face a variety of challenges in sustaining their aging fleets of vehicles, aircraft, and ships, including determining the optimal times to schedule maintenance and repairs. Time-based maintenance is the current best practice, but that can result in parts being replaced when they still have useful life remaining. The military is seeking to implement Condition Based Maintenance Plus (CBM+) where tailored maintenance programs are created for each individual aircraft, vehicle, or weapon. The CBM+ vision can be brought together by integrating new internet o ...

Leveraging Thin Clients and CSfC to Improve Remote & Tactical Communications Across the DoD
Author: PacStar   Send Email to POC   View Content
Tactical programs and agencies continue to grapple with the challenge of communicating securely and accessing mission critical information over distributed mission and partner networks, while enabling mobility. As the DoD becomes increasingly more global and mobile, programs and agencies are turning to cross domain, virtual desktop infrastructure (VDI), and Commercial Solutions for Classified (CSfC) solutions to address these challenges.

This presentation introduces attendees to the fundamentals of VDI, cross domain solutions and CSfC. It covers a superior option ...

Secure Wireless Solutions for Tactical, Expeditionary and Deployable Communications
Author: PacStar   Send Email to POC   View Content
U.S. DoD tactical/expeditionary networking and command post
programs have a widely-acknowledged critical need to improve
mobility. This whitepaper compares various CSfC network architectures, and proposes several approaches for CSfC solutions optimized for mobility use cases.

The current state of the art for tent-based command posts requires
hours of setup, which includes thousands of feet of copper wiring
that delay network availability.

To enable mobility for warfighting, the National Security Agency
(NSA) established a program (with a set ...

U.S. Army AH-64E Apache: Deploying a Multi-Channel Link 16 Terminal Capability
Author: ViaSat, Inc.   Send Email to POC   View Content
The AH-64, as well as its many variants, have been widely adopted by both the U.S. Army and military armed forces around the world. It is a model for continuous platform improvement and is now in its fifth generation, with hundreds of technological upgrades. This case study showcases how the U.S. Army has leveraged a multi-channel Link 16 terminal capability to upgrade the latest version of its AH-64E Apache for improved air-to-ground communications.

Viasat's Link 16 Software Tool Enables Real-Time Frequency Clearance Agreement (FCA) Compliance Monitoring for the German Air Force
Author: ViaSat, Inc.   Send Email to POC   View Content
With an increasing number of countries allowing Link 16 operations within their borders, this robust tactical data link is becoming a ubiquitous situational awareness and command and control tool that delivers both theater and localized data to all military stakeholders. This case study showcases how the German Air Force has leveraged a remote management system to monitor, troubleshoot and record all Link 16 activity across the German airspace.

FlexGround High-speed Broadband for Remote Government Operations
Author: Intelsat General   Send Email to POC   View Content
Rapid-response government ground forces are increasingly deployed in areas far from any kind of communications infrastructure yet require broadband connectivity for Comms-on-the-move and Manpack applications. This white paper describes Use Cases for military and disaster-recovery teams and how FlexGround from Intelsat General addresses these teams' challenges with secure, always-on broadband connectivity for voice, data and high-definition full-motion video.

Deception-Based Threat Detection
Author: Attivo Networks   Send Email to POC   View Content
This book provides a general introduction to deception technology and an overview of use cases from general detection to creating an active defense. You will gain a better understanding of how deception fits within your overall security architecture and the role it plays in detecting, identifying, and responding to threats

Open Source Software and Mission-Critical Applications: A Cautionary Tale
Author: AFCEA   Send Email to POC   View Content
AFCEA International Cyber Committee The efficiencies of using and embedding open source software imply a number of risks. AFCEA Cyber Committee members have examined the origins of the OSS trend, its motivation and some of these risks and drawn an analogy to previous quality control experiences. Members offer suggestions for mitigating the risks when building systems they intend to trust.

Small Business Cybersecurity
Author: AFCEA   Send Email to POC   View Content
AFCEA International Small Business Committee and Cyber Committee Rapid technology changes create new security vulnerabilities that require small businesses to expend resources to remain compliant. The fundamental problem is twofold: increasing technology complexity and competition for training security professionals. Members of the Small Business and Cyber committees suggest best practices, recommendations and information resources for small businesses to address these issues

In Data Intelligence Too, Speed is Life
Author: Fenix Group   Send Email to POC   View Content
Discussion points on the need for policy reform in edge data networking & sensor intelligence. This white paper offers a model for increasing cost efficiencies to keep up with near peer threats, and a focus on speed of data intelligence delivery to front line troops across all service branches.

The Who, What, Why and How of DDoS Attacks: A Guide for IT Pros
Author: AFCEA   Send Email to POC   View Content
The IT industry has seen a major increase of Distributed Denial of Service (DDoS) attacks over the past several years. The December 2019 New Orleans cyberattack is such an example: This attack combined a classic ransomware deployment with a DDoS attack. The DDoS upward trend promises to continue. DDoS attacks date back to the dawn of the public internet, but the force is strong with this one. According to a 2018 report from International Data Group (IDG), the median downtime caused by a DDoS attack is 7 to 12 hours. Using an estimate from Gartner of $5,600 per minute of ...

Summer 2020 Technology Vectors Update by the AFCEA Technology Committee
Author: AFCEA   Send Email to POC   View Content
An annual presentation on current technology trends provided by the AFCEA International volunteer Technology Committee. Provides insights and expertise in emerging technology topics most relevant to Federal technology leaders.

LED Video Wall Technology Choices
Author: Daktronics   Send Email to POC   View Content
Price is an important deciding factor, but many other quality and performance factors can affect the overall cost and effort to operating and maintaining a digital video wall. To consider the bigger picture, let us examine the key differences between LCD, direct-view LED and DLP technologies in the areas of image quality, ease of service/installation and lifetime performance