>From - Sat Mar 02 00:57:17 2024
X-Received: by 10.180.106.73 with SMTP id gs9mr3594046wib.2.1364500266523;
Thu, 28 Mar 2013 12:51:06 -0700 (PDT)
X-BeenThere: tscm-l2006_at_googlegroups.com
Received: by 10.180.189.166 with SMTP id gj6ls1015734wic.26.canary; Thu, 28
Mar 2013 12:51:04 -0700 (PDT)
X-Received: by 10.180.92.202 with SMTP id co10mr3634704wib.1.1364500264352;
Thu, 28 Mar 2013 12:51:04 -0700 (PDT)
Received: by 10.194.137.39 with SMTP id qf7mswjb;
Wed, 27 Mar 2013 21:42:22 -0700 (PDT)
X-Received: by 10.180.98.103 with SMTP id eh7mr2624290wib.3.1364445742490;
Wed, 27 Mar 2013 21:42:22 -0700 (PDT)
Return-Path: <chalced..._at_gmail.com>
Received: from mail-we0-x231.google.com ([2a00:1450:400c:c03::231])
by gmr-mx.google.com with ESMTPS id gi6si53186wic.2.2013.03.27.21.42.22
(version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128);
Wed, 27 Mar 2013 21:42:22 -0700 (PDT)
Received-SPF: pass (google.com: domain of chalced..._at_gmail.com designates 2a00:1450:400c:c03::231 as permitted sender) client-ip=2a00:1450:400c:c03::231;
Authentication-Results: gmr-mx.google.com;
spf=pass (google.com: domain of chalced..._at_gmail.com designates 2a00:1450:400c:c03::231 as permitted sender) smtp.mail=chalced..._at_gmail.com;
dkim=pass head..._at_gmail.com
Received: by mail-we0-f177.google.com with SMTP id o45so2969167wer.22
for <tscm-..._at_googlegroups.com>; Wed, 27 Mar 2013 21:42:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=gmail.com; s=20120113;
h=mime-version:x-received:date:message-id:subject:from:to
:content-type;
bh=q2uwtfALlfY5aX4ILvhw0MkCZubLxVgFgDYl2xNMEoA=;
b=jIlNCQajUMZEjjBYtltcAi5QtZsB7wu+DRPXm97jd/c2or+a0/9Ax6A64jKOeYX6UG
GGgeoSOBCkK+un8l8KXhB5dto6L4mzGniXHfQU3heCSTdjABQdm6UEByOztle7bAuIAD
CxI1QQ5VJF0C6oaudGHDzs1cvVOt8xy+H+1HP6Eo0GYFSOqSt38LGSsWVUsfYQ5NoGCz
iZ8oGATj5xRy2+qSgjhhFJeLMnMKUgZ1aTe5u3yFnexCNzTXFnD3JKDY3VLERNtLetkA
MFut/aIjBNMK7Au0A/O1i2zaZf/sZhx3XyjxiezXvExgrAZOnqR+RisFMmkkOQxu+H4E
Vd/g==
MIME-Version: 1.0
X-Received: by 10.194.21.233 with SMTP id y9mr35709846wje.47.1364445742316;
Wed, 27 Mar 2013 21:42:22 -0700 (PDT)
Received: by 10.194.14.8 with HTTP; Wed, 27 Mar 2013 21:42:22 -0700 (PDT)
Date: Thu, 28 Mar 2013 00:42:22 -0400
Message-ID: <CAC_BJ0tc6MkwsHVP6ZAE_mZ8nAA9zuBxVoAvfYk2A46n4k7xyw_at_mail.gmail.com>
Subject: Military Smartphone Technology
From: Linda Hull <chalced..._at_gmail.com>
To: tscm-l2006_at_googlegroups.com
Content-Type: multipart/alternative; boundary=047d7b5d2774c944d504d8f4c74c
--047d7b5d2774c944d504d8f4c74c
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable
http://www.military.com/daily-news/2013/03/27/army-set-to-introduce-smartph=
ones-into-combat.html
Army Set to Introduce Smartphones Into Combat
Mar 27, 2013
Military.com| by Brendan McGarry
FORT POLK, La. -- Soldiers assigned to the first U.S. Army brigade
scheduled to deploy to Afghanistan with the service=92s next generation
combat radio system called the technology a =93game-changer=94 as the 10th
Mountain trained here ahead of an upcoming tour.
The suite of radios, networking systems, and software -- known in Army
parlance as Capability Set 13 -- is designed to boost mobile connectivity.
Infantry troops will be able to use a smartphone tethered to a digital
radio to mark the locations of roadside bombs, share intelligence, and even
send text messages.
The system gives soldiers patrolling on foot or riding in vehicles a
similar level of connectivity as their counterparts back at headquarters.
It will enhance front-line communications as the mission in Afghanistan
shifts from combating insurgents to advising and assisting the Afghan
security forces while also drawing down, said Col. Mark Elliott, who
oversees development of the Army's tactical network.
=93This is just in time for a retrograde mission,=94 he said, referring to =
the
process of removing military equipment from an operating area. =93We're
pulling cables out of buildings because we're trying to turn the lights
out.=94
The equipment includes smartphones such as the Motorola Atrix running
Google Inc.'s Android software; handheld AN/PRC-154 Rifleman Radios;
portable AN/PRC-117G Falcon III radios; satellite dishes, and other pieces
of hardware and software.
=93We are completely digital as an Army with this system,=94 said Lt. Col. =
Alan
Boyer, commander of the 2nd Battalion, 30th Infantry Regiment, 4th Brigade
Combat Team, 10th Mountain Division. The unit is training with the
technology here at its home base in preparation of a deployment to
Afghanistan this spring.
<snip>
The Army in the previous two fiscal years has spent more than half a
billion dollars on the so-called Network Integration Evaluations, according
to Paul Mehney, a spokesman for the service. It spent $272 million on the
effort in 2011, $247 million in 2012, and is projected to spend $218
million in 2013, ending Sept. 30.
The semi-annual evaluations are changing the way the Army buys
communications equipment, which has a shorter shelf-life than other types
of hardware. The service has already used the events to acquire routers and
satellite terminals.
The exercises have also led to scaling back troubled programs such as the
Joint Tactical Radio System, a family of digital radios in development
since the 1990s, and a renewed emphasis on holding competitions to get
better deals on products. Army officials said the service saved about $6
billion through the NIEs after soldiers identified development programs
that didn=92t make sense on the battlefield.
Related Topics Army <
http://www.military.com/topics/army>
=A9 Copyright 2013 Military.com. All rights reserved. This material may not
be published, broadcast, rewritten or redistributed.
RELATED ARTICLES
http://www.engadget.com/2012/06/24/military-smartphone-safety-malware-prote=
ction/
Military hunting smartphone safety to hold off enemy bugs, spooks
By *Steve Dent* <
http://www.engadget.com/about/editors/steve-dent/> posted =
Jun
24th, 2012 at 4:18 AM
http://abcnews.go.com/Technology/smartphones-military-pentagon-tests-apps-a=
ndroids-iphones-ipads/story?id=3D14615595
Army's New Secret Weapon: the iPad
http://www.armytimes.com/news/2012/09/military-personal-smartphones-for-mil=
itary-use-092712w/
DoD on smartphones: You can=92t have it your way
By Andrew Tilghman<atilghman_at_militarytimes.com?subject=3DQuestion%20from%20=
ArmyTimes.com%20reader>-
Staff writer
Posted : Thursday Sep 27, 2012 14:04:08 EDT
The day when troops are allowed to use their personal smartphones for
military business may still be a long way off, a top Pentagon official said=
.
=93We haven=92t cracked the code on mobile device management and the polici=
es
that go with them,=94 said Robert Carey, the Defense Department=92s deputy
chief information officer.
The military=92s top tech experts have spent years working on developing
standards to allow troops to use off-the-shelf commercial smartphones in
their everyday business.
But clearing the way for classified and operational data to flow onto the
hand-held devices has proven extraordinarily difficult. While many military
officials are eager to tap the potential convenience of smartphones, they
also fear that the devices can make the military=92s networks vulnerable to
security breaches or cyber attacks.
Earlier this year, the Pentagon issued a sweeping information technology
=93roadmap,=94 but it included few specifics on how to integrate the
smartphones already used by millions of troops into the Defense
Department=92s vast data network.
For now, it=92s likely that sensitive information will be permitted only on
government-approved phones so military tech officials can have centralized
control over the data.
=93I=92m not going to give you your [information technology] the Burger Kin=
g
way. Not everyone can have it their own way, their own style, to their own
tastes,=94 Carey told a crowd of several hundred technology experts at a
Washington conference sponsored by Telework Exchange, a telecommunications
advocacy group.
One issue: Given the risk of phones getting lost or stolen, military
technology experts want to be able to confirm users=92 identities, similar =
to
the way a Common Access Card is used on desktop computers.
=93I=92m going to give you access to your data based on who you are. Now, I=
=92m
not going to trust you to say who you are. I=92m going to give you somethin=
g
that [can be] verified,=94 Carey said.
Carey also said phones using military data should have settings that allow
a central administrator to delete or wipe out data if an individual phone
is compromised. Central administrators might also want the power to limit
some phone features such as cameras, screen grabs or geographical
identifiers to protect data.
The services have begun to explore the use of smartphones under pilot
programs. For example, the Army this year is issuing smartphone-like
devices to eight brigade combat teams for use in communicating with and
tracking friendly troop.
The Navy is also testing a system that uses smartphones to track sailors as
they move around large ships, but that program is limited to Navy-issued
phones; and sailors cannot use their personal devices.
Current rules allow troops to use Blackberry phones made by Research in
Motion and Android phones made by Dell, but they are mainly limited to
military-specific models and require additional security measures beyond
those typically available to civilian consumers, according to the Defense
Information Systems Agency, or DISA
Apple iPhones are not widely approved for use on Defense Department
networks, but military technology officials can approve specific pilot
programs, according to DISA.
--047d7b5d2774c944d504d8f4c74c
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable
<a href=3D"
http://www.military.com/daily-news/2013/03/27/army-set-to-introd=
uce-smartphones-into-combat.html">
http://www.military.com/daily-news/2013/0=
3/27/army-set-to-introduce-smartphones-into-combat.html</a><br><br><h1>Army=
Set to Introduce Smartphones Into Combat</h1>
<p class=3D"timestamp">Mar 27, 2013</p>
<p class=3D"byline">
Military.com<span class=3D"divider">|</span>
=20
by Brendan McGarry</p><br><p>FORT POLK, La. -- Soldiers assigned to=
the first U.S. Army brigade=20
scheduled to deploy to Afghanistan with the service=92s next generation=20
combat radio system called the technology a =93game-changer=94 as the 10th=
=20
Mountain trained here ahead of an upcoming tour.</p>
<p>The suite of radios, networking systems, and software -- known in=20
Army parlance as Capability Set 13 -- is designed to boost mobile=20
connectivity. Infantry troops will be able to use a smartphone tethered=20
to a digital radio to mark the locations of roadside bombs, share=20
intelligence, and even send text messages.</p>
<p>The system gives soldiers patrolling on foot or riding in vehicles a=20
similar level of connectivity as their counterparts back at=20
headquarters. It will enhance front-line communications as the mission=20
in Afghanistan shifts from combating insurgents to advising and=20
assisting the Afghan security forces while also drawing down, said Col.=20
Mark Elliott, who oversees development of the Army's tactical network.<=
/p>
<p>=93This is just in time for a retrograde mission,=94 he said, referring=
=20
to the process of removing military equipment from an operating area.=20
=93We're pulling cables out of buildings because we're trying to tu=
rn the=20
lights out.=94</p>
<p>The equipment includes smartphones such as the Motorola Atrix running
Google Inc.'s Android software; handheld AN/PRC-154 Rifleman Radios;=
=20
portable AN/PRC-117G Falcon III radios; satellite dishes, and other=20
pieces of hardware and software.</p>
<p>=93We are completely digital as an Army with this system,=94 said Lt.=20
Col. Alan Boyer, commander of the 2nd Battalion, 30th Infantry Regiment,
4th Brigade Combat Team, 10th Mountain Division. The unit is training=20
with the technology here at its home base in preparation of a deployment
to Afghanistan this spring.</p><p><snip><br></p><div class=3D"body1"=
><p>The Army in the previous two fiscal years has=20
spent more than half a billion dollars on the so-called Network=20
Integration Evaluations, according to Paul Mehney, a spokesman for the=20
service. It spent $272 million on the effort in 2011, $247 million in=20
2012, and is projected to spend $218 million in 2013, ending Sept. 30.</p>
<p>The semi-annual evaluations are changing the way the Army buys=20
communications equipment, which has a shorter shelf-life than other=20
types of hardware. The service has already used the events to acquire=20
routers and satellite terminals.</p>
<p>The exercises have also led to scaling back troubled programs such as
the Joint Tactical Radio System, a family of digital radios in=20
development since the 1990s, and a renewed emphasis on holding=20
competitions to get better deals on products. Army officials said the=20
service saved about $6 billion through the NIEs after soldiers=20
identified development programs that didn=92t make sense on the=20
battlefield.</p></div>
<table class=3D"relatedKeywords">
<tbody><tr>
<td>
<h3>Related Topics</h3>
</td>
<td>
<a href=3D"
http://www.military.com/topics/army">Army</a=
>
</td>
</tr>
</tbody></table>
<div class=3D"copyright">
=A9 Copyright=A02013=A0Military.com. All rights reserved. This=
=20
material may not be published, broadcast, rewritten or redistributed.<br><b=
r>RELATED ARTICLES<br><br><a href=3D"
http://www.engadget.com/2012/06/24/mil=
itary-smartphone-safety-malware-protection/">
http://www.engadget.com/2012/0=
6/24/military-smartphone-safety-malware-protection/</a><br>
<h1 class=3D"h1">Military hunting smartphone safety to hold off enemy bugs,=
spooks
</h1>
=09<p class=3D"byline">
=09=09By
=09=09<a href=3D"
http://www.engadget.com/about/editors/steve-dent/"><strong=
>Steve Dent</strong></a>
=09=09posted
=09=09<span class=3D"time">Jun 24th, 2012 at 4:18 AM</span></p><p class=3D"=
byline"><br><span class=3D"time"></span></p><p class=3D"byline"><span class=
=3D"time"><a href=3D"
http://abcnews.go.com/Technology/smartphones-military-=
pentagon-tests-apps-androids-iphones-ipads/story?id=3D14615595">
http://abcn=
ews.go.com/Technology/smartphones-military-pentagon-tests-apps-androids-iph=
ones-ipads/story?id=3D14615595</a> </span><br>
</p><h1 class=3D"headline">Army's New Secret Weapon: the iPad</h1><p><a=
href=3D"
http://www.armytimes.com/news/2012/09/military-personal-smartphone=
s-for-military-use-092712w/">
http://www.armytimes.com/news/2012/09/military=
-personal-smartphones-for-military-use-092712w/</a></p>
<h2>DoD on smartphones: You can=92t have it your way</h2><br><div class=3D"=
info">By <a href=3D"mailto:atil..._at_militarytimes.com?subject=3DQuestion%20f=
rom%20ArmyTimes.com%20reader">Andrew Tilghman</a> - Staff writer<br>Posted =
: Thursday Sep 27, 2012 14:04:08 EDT<br>
<br><p>The day when troops are allowed to use their personal smartphones fo=
r
military business may still be a long way off, a top Pentagon official=20
said.</p><p>=93We haven=92t cracked the code on mobile device management an=
d
the policies that go with them,=94 said Robert Carey, the Defense=20
Department=92s deputy chief information officer.</p><p>The military=92s top=
=20
tech experts have spent years working on developing standards to allow=20
troops to use off-the-shelf commercial smartphones in their everyday=20
business.</p><p>But clearing the way for classified and operational data
to flow onto the hand-held devices has proven extraordinarily=20
difficult. While many military officials are eager to tap the potential=20
convenience of smartphones, they also fear that the devices can make the
military=92s networks vulnerable to security breaches or cyber attacks.</p=
><p>Earlier
this year, the Pentagon issued a sweeping information technology=20
=93roadmap,=94 but it included few specifics on how to integrate the=20
smartphones already used by millions of troops into the Defense=20
Department=92s vast data network.</p><p>For now, it=92s likely that=20
sensitive information will be permitted only on government-approved=20
phones so military tech officials can have centralized control over the=20
data.</p><p>=93I=92m not going to give you your [information technology] th=
e Burger=20
King way. Not everyone can have it their own way, their own style, to=20
their own tastes,=94 Carey told a crowd of several hundred technology=20
experts at a Washington conference sponsored by Telework Exchange, a=20
telecommunications advocacy group.</p><p>One issue: Given the risk of=20
phones getting lost or stolen, military technology experts want to be=20
able to confirm users=92 identities, similar to the way a Common Access=20
Card is used on desktop computers.</p><p>=93I=92m going to give you access=
=20
to your data based on who you are. Now, I=92m not going to trust you to=20
say who you are. I=92m going to give you something that [can be]=20
verified,=94 Carey said.</p><p>Carey also said phones using military data=
=20
should have settings that allow a central administrator to delete or=20
wipe out data if an individual phone is compromised. Central=20
administrators might also want the power to limit some phone features=20
such as cameras, screen grabs or geographical identifiers to protect=20
data.</p><p>The services have begun to explore the use of smartphones=20
under pilot programs. For example, the Army this year is issuing=20
smartphone-like devices to eight brigade combat teams for use in=20
communicating with and tracking friendly troop.</p><p>The Navy is also=20
testing a system that uses smartphones to track sailors as they move=20
around large ships, but that program is limited to Navy-issued phones;=20
and sailors cannot use their personal devices.</p><p>Current rules allow
troops to use Blackberry phones made by Research in Motion and Android=20
phones made by Dell, but they are mainly limited to military-specific=20
models and require additional security measures beyond those typically=20
available to civilian consumers, according to the Defense Information=20
Systems Agency, or DISA</p><p>Apple iPhones are not widely approved for=20
use on Defense Department networks, but military technology officials=20
can approve specific pilot programs, according to DISA.</p><p><br></p><p><b=
r></p><p><br></p><br></div><p><br></p><p class=3D"byline"><span class=3D"ti=
me"><br></span></p><p class=3D"byline"><span class=3D"time"><br></span></p>=
<br>
</div>
--047d7b5d2774c944d504d8f4c74c--
Received on Sat Mar 02 2024 - 00:57:17 CST