AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.
Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.
The United States SEEK EAGLE Office (AFSEO) is the center of excellence responsible for managing the aircraft store compatibility process. Get an insider's look at how AFSEO leveraged ML to accelerate time to insights by automating entity resolution, record duplication, and categorization. Learn how the office is able to increase ROI and utilization of Air Force aircraft.
Any comprehensive National Security Emergency Preparedness (NSEP) capability in the United States has atrophied amid the increase of threats that could cause a catastrophic disaster across the country. Of key interest is whether any of the DHS/FEMA critical infrastructure Information Sharing and Analysis Centers or Information Sharing and Analysis Organizations have been utilized in the dramatic effort to address COVID-19.
Author: Intelsat General
Ground forces and emergency responders often work in remote areas far from any communications infrastructure, or where that infrastructure has been destroyed. Our new FlexGround service provides seamless, reliable, global broadband connectivity for a host of applications, including converged voice, data and video. With FlexGround, users can even transmit high-definition, full-motion videos while on-the-pause or on-the-move. Learn more. Download our white paper here
Organizations today are leveraging data to drive more efficient processes and more effective outcomes. In a hybrid and multi-cloud world, organizations need data context - a single, coherent way to view and manage data processes across multiple architectures. A critical part of Cloudera Data Platform (CDP), Cloudera SDX (Shared Data Experience), applies centralized, consistent data context services across all platform deployments, enabling hundreds of different workloads to run against shared or overlapping sets of data.
Network data collection, analysis and sharing are core to cyber defense, and Tinisha McMillan is on a mission to improve all three.
Author: Attivo Networks
The world has changed in so many ways in 2020. Even with the best-laid plans and precautions, CISOs have had to quickly respond to the COVID-19 pandemic, revising strategies and transitioning from unprepared to prepared. Read on for a list of important things CISOs are tackling as they look to stay one step ahead in these rapidly changing times.
Cyber Situational Awareness, (SA) is top of mind for DoD decision makers. There is a critical need across defense information systems for cyber security SA that enables cyber professionals and decision makers to gain a clearer picture of what is happening across DoD networks and ultimately, a bird's-eye view of the entire digital ecosystem.
Over the past several years, Defense Information Systems Agency (DISA) and other DoD agencies have focused on converging functions such as cyber SA, defensive cyber operations, and network operations (NetOps) in order to reduc ...
Military services face a variety of challenges in sustaining their aging fleets of vehicles, aircraft, and ships, including determining the optimal times to schedule maintenance and repairs. Time-based maintenance is the current best practice, but that can result in parts being replaced when they still have useful life remaining. The military is seeking to implement Condition Based Maintenance Plus (CBM+) where tailored maintenance programs are created for each individual aircraft, vehicle, or weapon. The CBM+ vision can be brought together by integrating new internet o ...
Tactical programs and agencies continue to grapple with the challenge of communicating securely and accessing mission critical information over distributed mission and partner networks, while enabling mobility. As the DoD becomes increasingly more global and mobile, programs and agencies are turning to cross domain, virtual desktop infrastructure (VDI), and Commercial Solutions for Classified (CSfC) solutions to address these challenges.
This presentation introduces attendees to the fundamentals of VDI, cross domain solutions and CSfC. It covers a superior option ...
U.S. DoD tactical/expeditionary networking and command post
programs have a widely-acknowledged critical need to improve
mobility. This whitepaper compares various CSfC network architectures, and proposes several approaches for CSfC solutions optimized for mobility use cases.
The current state of the art for tent-based command posts requires
hours of setup, which includes thousands of feet of copper wiring
that delay network availability.
To enable mobility for warfighting, the National Security Agency
(NSA) established a program (with a set ...
Author: ViaSat, Inc.
The AH-64, as well as its many variants, have been widely adopted by both the U.S. Army and military armed forces around the world. It is a model for continuous platform improvement and is now in its fifth generation, with hundreds of technological upgrades. This case study showcases how the U.S. Army has leveraged a multi-channel Link 16 terminal capability to upgrade the latest version of its AH-64E Apache for improved air-to-ground communications.
Author: ViaSat, Inc.
With an increasing number of countries allowing Link 16 operations within their borders, this robust tactical data link is becoming a ubiquitous situational awareness and command and control tool that delivers both theater and localized data to all military stakeholders. This case study showcases how the German Air Force has leveraged a remote management system to monitor, troubleshoot and record all Link 16 activity across the German airspace.
Author: Intelsat General
Rapid-response government ground forces are increasingly deployed in areas far from any kind of communications infrastructure yet require broadband connectivity for Comms-on-the-move and Manpack applications. This white paper describes Use Cases for military and disaster-recovery teams and how FlexGround from Intelsat General addresses these teams' challenges with secure, always-on broadband connectivity for voice, data and high-definition full-motion video.
Author: Attivo Networks
This book provides a general introduction to deception technology and an overview of use cases from general detection to creating an active defense. You will gain a better understanding of how deception fits within your overall security architecture and the role it plays in detecting, identifying, and responding to threats
AFCEA International Cyber Committee The efficiencies of using and embedding open source software imply a number of risks. AFCEA Cyber Committee members have examined the origins of the OSS trend, its motivation and some of these risks and drawn an analogy to previous quality control experiences. Members offer suggestions for mitigating the risks when building systems they intend to trust.
AFCEA International Small Business Committee and Cyber Committee Rapid technology changes create new security vulnerabilities that require small businesses to expend resources to remain compliant. The fundamental problem is twofold: increasing technology complexity and competition for training security professionals. Members of the Small Business and Cyber committees suggest best practices, recommendations and information resources for small businesses to address these issues
Author: Fenix Group
Discussion points on the need for policy reform in edge data networking & sensor intelligence. This white paper offers a model for increasing cost efficiencies to keep up with near peer threats, and a focus on speed of data intelligence delivery to front line troops across all service branches.
The IT industry has seen a major increase of Distributed Denial of Service (DDoS) attacks over the past several years. The December 2019 New Orleans cyberattack is such an example: This attack combined a classic ransomware deployment with a DDoS attack. The DDoS upward trend promises to continue. DDoS attacks date back to the dawn of the public internet, but the force is strong with this one. According to a 2018 report from International Data Group (IDG), the median downtime caused by a DDoS attack is 7 to 12 hours. Using an estimate from Gartner of $5,600 per minute of ...
An annual presentation on current technology trends provided by the AFCEA International volunteer Technology Committee. Provides insights and expertise in emerging technology topics most relevant to Federal technology leaders.
Price is an important deciding factor, but many other quality and performance factors can affect the overall cost and effort to operating and maintaining a digital video wall. To consider the bigger picture, let us examine the key differences between LCD, direct-view LED and DLP technologies in the areas of image quality, ease of service/installation and lifetime performance