2006: Wireless and security hot ticket items

WiMax and mesh get a chance to shine

Demand was high for wireless networks this year as more state and local governments, emergency responders, and the Defense Department tested or deployed the technology. A rise in thefts of government laptop PCs that contained sensitive information and the need to meet Homeland Security Presidential Directive 12 requirements spurred demand for information security technologies. 

Here are some highlights.

WiMax’s moment of truth
This was the year WiMax lived up to its billing as the next big thing in wireless technology.

WiMax aims to build on Wi-Fi’s popularity. Wireless hot spots employing the 802.11 Wi-Fi standard have proliferated nationwide, but each access point provides coverage to an area measured in feet. WiMax, on the other hand, can offer as much as 31 miles of coverage on a line-of-sight basis. The technology also offers greater bandwidth and supports higher-level networking protocols than Wi-Fi.

The arrival of standards and interoperable products coincides with local
governments’ pursuit of ambitious wireless projects. For example, Minneapolis, San Francisco and Philadelphia plan to launch municipal wireless networks to serve residents and attract businesses. WiMax could play a role in those
initiatives, government and industry executives say. Federal agencies, including DOD, have expressed interest in the technology.

Unfurling wireless mesh
The port city of Corpus Christi, Texas, has attached 300 wireless access points to traffic signals, streetlights, water and radio towers, and buildings to provide a blanket of IP network access across 24 square miles. Within five years, city officials plan to expand that to 1,600 wireless access points spread across 147 square miles.

The Corpus Christi network uses wireless mesh technology, a newer and more versatile version of the popular Wi-Fi gear that creates wireless hot spots. It promises to help public works crews, police officers, and fire and rescue squads communicate and access information, such as real-time video, city maps and inventory. Schoolchildren will also be able to use the network to access the Internet and keep in touch with teachers, and Internet service providers will resell it as wireless broadband connectivity to businesses, residents and visitors.

DOD pushes wireless to the edge
The Joint Task Force-Civil Support and the Joint Forces Command are testing wireless technology needed to assist first responders and civilian agencies during a chemical, biological, radiological or nuclear attack.

As part of the Northern Command, JTF-CS is the first military team on the ground during such crises. The unit must integrate its efforts with first responders and civilian agencies. Lives depend on its ability to deploy quickly and set up operations. But JTF-CS members are slowed by the thousands of feet of wires and cables they need to set up their command post. They must load, unload, install and maintain a web of wires, and those are time-consuming tasks.

JTF-CS officials say wireless networks are the solution. Only fixed military sites  can install wireless local-area networks. Tactical units on the front lines cannot set up WLANs quickly and securely. But now JTF-CS and the Joint Forces Command say they hope to fill that need with a program called Wireless for the Warfighter. The program provides a wireless extension for computer and phone lines that warfighters can set up in a crisis within minutes rather than hours.

Encryption from the database to the laptop PC

To encrypt or not to encrypt? When protecting sensitive data, that is not a question. Sensitive information, whether transmitted via a network or stored in databases or on laptops, must be encrypted to protect against theft and misuse.

After the data theft involving a Department of Veterans Affairs employee whose stolen laptop contained the Social Security numbers and other personal information of 26.5 million veterans, experts say organizations should be looking for products that can protect data regardless of its location.

RSA Security launched an initiative recently to offer companies and government agencies a more comprehensive approach to enterprise data protection. The aim
is to protect sensitive data wherever it resides: at the application level, within databases, in files and operating systems, on laptops and mobile devices, or in

Meanwhile, Ingrian Networks is taking a different approach by storing encryption keys on a security appliance rather than on servers where encrypted data resides, which is where most software-based encryption products store them.

It’s 4 a.m.! Do you know where your files are?

Every electronic document has three states of being: rest, transit and use. Typical security products have focused only on the first two states: protecting information while it resides in a repository or moves across a network. A new category of security software called enterprise rights management  is offering a way to protect information while it’s in use.

The emerging technology relies on encryption, audit trails and the application of fine-grained user controls that limit the data people can access and how they can use it, said Trent Henry, a senior analyst at the Burton Group.

HSPD-12 cards open new worlds
The government’s new identity credentials will provide better building security once agencies acquire card readers and other information technology infrastructure products.

But agencies and security vendors are already thinking of additional uses for the smart card identity credentials that HSPD-12 required agencies to begin issuing Oct. 27.

Security experts who advise federal agencies say the applications for secure identity credentials are nearly limitless, and the secret to their versatility is in the cards. 

About the Author

Connect with the FCW staff on Twitter @FCWnow.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.


  • computer network

    How Einstein changes the way government does business

    The Department of Commerce is revising its confidentiality agreement for statistical data survey respondents to reflect the fact that the Department of Homeland Security could see some of that data if it is captured by the Einstein system.

  • Defense Secretary Jim Mattis. Army photo by Monica King. Jan. 26, 2017.

    Mattis mulls consolidation in IT, cyber

    In a Feb. 17 memo, Defense Secretary Jim Mattis told senior leadership to establish teams to look for duplication across the armed services in business operations, including in IT and cybersecurity.

  • Image from Shutterstock.com

    DHS vague on rules for election aid, say states

    State election officials had more questions than answers after a Department of Homeland Security presentation on the designation of election systems as critical U.S. infrastructure.

  • Org Chart Stock Art - Shutterstock

    How the hiring freeze targets millennials

    The government desperately needs younger talent to replace an aging workforce, and experts say that a freeze on hiring doesn't help.

  • Shutterstock image: healthcare digital interface.

    VA moves ahead with homegrown scheduling IT

    The Department of Veterans Affairs will test an internally developed scheduling module at primary care sites nationwide to see if it's ready to service the entire agency.

  • Shutterstock images (honglouwawa & 0beron): Bitcoin image overlay replaced with a dollar sign on a hardware circuit.

    MGT Act poised for a comeback

    After missing in the last Congress, drafters of a bill to encourage cloud adoption are looking for a new plan.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group