Defense Systems
Tactical apps arrive on Androids in Afghanistan
DARPA’s Transformative Apps program delivers apps built with soldier input to customized mobile devices on the battlefield.
Defense Systems
AF Cyber Command bulks up, slims down
The command is expanding its uniformed workforce while looking to simplify its architecture with the Joint Information Environment.
Defense Systems
Army crowdsources project to build mobile command center
The Rapid Equipping Force stages a Make-A-Thon with an online community and soldiers at Fort Benning to find a fast way of turning an Army ATV into a battlefield command center.
Defense Systems
Army graduates its first class of cyber network defenders
The service creates a new military occupational specialty to help meet the demand for cybersecurity experts.
Defense Systems
Navy launches first drone from submerged submarine
The results from the Naval Research Lab’s six-year project promise to expand the ISR ability of the submarine fleet.
Defense Systems
DARPA’s online games crowdsource software security
The agency launches Verigames to see if streamlining the software verification process can be fun.
Defense Systems
Army taking 3D electronic printing to the next level
Researchers at Picatinny Arsenal are exploring ways to print antennas onto a helmet, embed sensors into clothing and print a wing of a UAV — electronics and all — in a single pass
Defense Systems
Workaround boosts Teleport satellite access in Pacific
Army/DOD team gives forces access to a satellite that was previously out of reach, as part of DOD’s Network-Centric Teleport system.
Defense Systems
Air Force looks to solve wind farm radar interference
The service hires AGI to develop a specialized modeling tool to help radar system designers account for the dead zones and false signals caused by wind turbines.
Defense Systems
New details on Flame tie it to earlier cyberattacks
Researchers have found some similarities between Flame and Stuxnet/Duqu, while Iran says the malware was used in the April cyberattacks on its oil industry.
Defense Systems
As Congress weighs cyber law, Internet protests resume
Internet advocacy groups oppose the Cyber Intelligence Sharing and Protection Act, despite the fact that is has the support of some heavy industry hitters.
Defense Systems
Was double agent responsible for Stuxnet attack on Iran?
An Iranian dissident working for Israel is believed to have used a memory stick to implant the Stuxnet worm at Iran's Natanz nuclear processing facility, according to a published report.
Defense Systems
Alleged Chinese Facebook con dupes NATO officers
A fake profile for NATO's senior commander convinced other officers to accept a friend request, compromising personal information in the process. The scam has reportedly been traced to China.
Defense Systems
Is Duqu worm 'son of Stuxnet'?
The remote-access Trojan, found in European industrial systems, is gathering information that could be used in a Stuxnet-style attack.
Defense Systems
Virtual tours offer way to pay tribute on Memorial Day
Even if you're booked with other activities, you can honor the holiday by paying a virtual visit to some of the nation's memorials.
Defense Systems
Who's ahead in cyber espionage war between U.S., China?
The pace of cyber espionage between China and the United States has accelerated in recent years, and China, with a campaign investigators call 'Byzantine Hades,' may have taken the upper hand, according to recent State Department cables and security experts.
Defense Systems
Stuxnet had a full bag of tricks, report says
The Stuxnet worm targeted five organizations in Iran between June 2009 and May 2010, in an attempt to reprogram industrial control systems, according to a recent report from Symantec.
Defense Systems
'War consists largely of endless tinkering with PowerPoint slides'
An Army Reserve colonel in Afghanistan is fired after writing a column slamming the military's use of PowerPoint, saying days are spent preparing, presenting and viewing slide shows.
Defense Systems
GPS devices could put American soldiers at risk
Geotags in smart phones and cameras with GPS receivers, and a malware program that uploads a user's location every 15 minutes, are two examples of the potential, often unseen, threats from compromised devices.
Defense Systems
Why can't DOD consolidate?
Readers responding to our coverage of Defense Secretary Robert Gates’ plan to cut $100 billion from the defense budget over the next five years discuss the potential obstacles to DOD IT consolidation.
Almost There!
Help us tailor content specifically for you: