2006: Wireless and security hot ticket items

WiMax and mesh get a chance to shine

Demand was high for wireless networks this year as more state and local governments, emergency responders, and the Defense Department tested or deployed the technology. A rise in thefts of government laptop PCs that contained sensitive information and the need to meet Homeland Security Presidential Directive 12 requirements spurred demand for information security technologies. 

Here are some highlights.

WiMax’s moment of truth
This was the year WiMax lived up to its billing as the next big thing in wireless technology.

WiMax aims to build on Wi-Fi’s popularity. Wireless hot spots employing the 802.11 Wi-Fi standard have proliferated nationwide, but each access point provides coverage to an area measured in feet. WiMax, on the other hand, can offer as much as 31 miles of coverage on a line-of-sight basis. The technology also offers greater bandwidth and supports higher-level networking protocols than Wi-Fi.

The arrival of standards and interoperable products coincides with local
governments’ pursuit of ambitious wireless projects. For example, Minneapolis, San Francisco and Philadelphia plan to launch municipal wireless networks to serve residents and attract businesses. WiMax could play a role in those
initiatives, government and industry executives say. Federal agencies, including DOD, have expressed interest in the technology.

Unfurling wireless mesh
The port city of Corpus Christi, Texas, has attached 300 wireless access points to traffic signals, streetlights, water and radio towers, and buildings to provide a blanket of IP network access across 24 square miles. Within five years, city officials plan to expand that to 1,600 wireless access points spread across 147 square miles.

The Corpus Christi network uses wireless mesh technology, a newer and more versatile version of the popular Wi-Fi gear that creates wireless hot spots. It promises to help public works crews, police officers, and fire and rescue squads communicate and access information, such as real-time video, city maps and inventory. Schoolchildren will also be able to use the network to access the Internet and keep in touch with teachers, and Internet service providers will resell it as wireless broadband connectivity to businesses, residents and visitors.

DOD pushes wireless to the edge
The Joint Task Force-Civil Support and the Joint Forces Command are testing wireless technology needed to assist first responders and civilian agencies during a chemical, biological, radiological or nuclear attack.

As part of the Northern Command, JTF-CS is the first military team on the ground during such crises. The unit must integrate its efforts with first responders and civilian agencies. Lives depend on its ability to deploy quickly and set up operations. But JTF-CS members are slowed by the thousands of feet of wires and cables they need to set up their command post. They must load, unload, install and maintain a web of wires, and those are time-consuming tasks.

JTF-CS officials say wireless networks are the solution. Only fixed military sites  can install wireless local-area networks. Tactical units on the front lines cannot set up WLANs quickly and securely. But now JTF-CS and the Joint Forces Command say they hope to fill that need with a program called Wireless for the Warfighter. The program provides a wireless extension for computer and phone lines that warfighters can set up in a crisis within minutes rather than hours.

Encryption from the database to the laptop PC

To encrypt or not to encrypt? When protecting sensitive data, that is not a question. Sensitive information, whether transmitted via a network or stored in databases or on laptops, must be encrypted to protect against theft and misuse.

After the data theft involving a Department of Veterans Affairs employee whose stolen laptop contained the Social Security numbers and other personal information of 26.5 million veterans, experts say organizations should be looking for products that can protect data regardless of its location.

RSA Security launched an initiative recently to offer companies and government agencies a more comprehensive approach to enterprise data protection. The aim
is to protect sensitive data wherever it resides: at the application level, within databases, in files and operating systems, on laptops and mobile devices, or in

Meanwhile, Ingrian Networks is taking a different approach by storing encryption keys on a security appliance rather than on servers where encrypted data resides, which is where most software-based encryption products store them.

It’s 4 a.m.! Do you know where your files are?

Every electronic document has three states of being: rest, transit and use. Typical security products have focused only on the first two states: protecting information while it resides in a repository or moves across a network. A new category of security software called enterprise rights management  is offering a way to protect information while it’s in use.

The emerging technology relies on encryption, audit trails and the application of fine-grained user controls that limit the data people can access and how they can use it, said Trent Henry, a senior analyst at the Burton Group.

HSPD-12 cards open new worlds
The government’s new identity credentials will provide better building security once agencies acquire card readers and other information technology infrastructure products.

But agencies and security vendors are already thinking of additional uses for the smart card identity credentials that HSPD-12 required agencies to begin issuing Oct. 27.

Security experts who advise federal agencies say the applications for secure identity credentials are nearly limitless, and the secret to their versatility is in the cards. 

About the Author

Connect with the FCW staff on Twitter @FCWnow.

The Fed 100

Read the profiles of all this year's winners.


  • Then-presidential candidate Donald Trump at a 2016 campaign event. Image: Shutterstock

    'Buy American' order puts procurement in the spotlight

    Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market.

  • OMB chief Mick Mulvaney, shown here in as a member of Congress in 2013. (Photo credit Gage Skidmore/Flickr)

    White House taps old policies for new government makeover

    New guidance from OMB advises agencies to use shared services, GWACs and federal schedules for acquisition, and to leverage IT wherever possible in restructuring plans.

  • Shutterstock image (by Everett Historical): aerial of the Pentagon.

    What DOD's next CIO will have to deal with

    It could be months before the Defense Department has a new CIO, and he or she will face a host of organizational and operational challenges from Day One

  • USAF Gen. John Hyten

    General: Cyber Command needs new platform before NSA split

    U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head of Strategic Command told Congress, but it cannot be separated from the NSA until it has its own cyber platform.

  • Image from Shutterstock.

    DLA goes virtual

    The Defense Logistics Agency is in the midst of an ambitious campaign to eliminate its IT infrastructure and transition to using exclusively shared, hosted and virtual services.

  • Fed 100 logo

    The 2017 Federal 100

    The women and men who make up this year's Fed 100 are proof positive of what one person can make possibile in federal IT. Read on to learn more about each and every winner's accomplishments.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group