Did You Know?
Total Page:16
File Type:pdf, Size:1020Kb
Thursday, December 15, 2016 • APG News B7 ATEC Frompage B1 welcome to Charlton who comes to ATEC from the Joint Staff in Suffolk, Virginia where he served as the vice director for Joint Force Development. According to Allyn, Charlton is a sea- soned combat leader who brings over three decades of leadership experience in critical command and staff positions throughout the Army. “The most important reason behind John’s success is that throughout his career, he has demonstrated repeatedly an ability to focus on people while doggedly pursuing excellence,” Allyn said. “Leaders of charac- ter build trust within their units so that when the chips are down, Soldiers will continue to fight.” Following behind Allyn, Karbler, ex- pressed his gratitude to the ATEC team. “In my 30 years of service, this job takes the cake being the most professionally rewarding job I have had because of what the ATEC family has taught me,” Karbler said. “Thanks to the ATEC staff for being the embodiment of one Army indivisible by expertly and effortlessly moving back and forth across the military and civilian processes.” As the incoming commander, Charlton expressed that he was no stranger to ATEC due to his previous work with the team during previous operational exercises; namely the network integration evaluation exercises. “Everything that a Soldier could use or will use in combat has to come through this U.S. ARMY PHOTO BY LAMONT HARBISON, USAG APG organization to get the stamp of approval (From left) Maj. Gen. Daniel L. Karbler, outgoing commander; Gen. Daniel B. Allyn, Army vice chief of staff; and Maj. Gen. John W. Charlton, before it goes into an operational environ- ATEC Commander, sing the Army song at the conclusion of the ATEC change of command ceremony, Dec. 9, 2016 at Aberdeen Proving ment,” Charlton said. “I am confident that Ground, Maryland. this is the reason behind the dedication of this organization.” the challenges ahead in working with the “You know what impact you have across working with you all. Army Strong. Truth in Charlton shared that he looks forward to ATEC workforce. the Army,” Charlton said. “I look forward to testing.” Soldiers on the battlefield received mor- container of encrypted keys and secure Besides a card or dog tag, it might even be phine and the medic would, literally, put a data, or as a short-range communications woven into the fabric of a uniform. PATENT sticky note on them saying this person was device with the capability to communicate According to Toth, once the prototype Frompage B1 administered morphine at such and such a securely with a computer, a personal comes out, user testing would follow. For The card was so unique that a U.S. patent time, Toth said. If the note fell off, another electronic device, or a network in a wireless instance, a proof of concept to replace was granted for it last year, said Toth, medic might come by and give another shot capacity via Bluetooth or Near-Field Com- existing CACs with the invention for use Secure Voice technical lead for the CER- of morphine, and the Soldier would munications technology to pass credentials with laptops or other devices may be DEC Space and Terrestrial Directorate, overdose. The new smart card would do or data,” Toth said. performed. The prototype is targeted to Cyber Security and Information Assurance away with such antiquated procedures. Furthermore, the card “can restrict provide multi-factor authentication via a Division, Cryptographic Modernization Another application might apply to a access to sensitive containerized informa- Personal Identification Number (PIN) and Branch at APG. forward observer who has acquired a large tion by way of password protection or fingerprints, which may be used to define amount of intelligence data about the biometric recognition and is planned to be role- based access control of applications What it does enemy, but cannot transmit it back to powered by various methods including and files. friendly forces because he or she doesn’t solar energy,” he said. The card will use The card can potentially be used Gov- Toth, who is an electronics engineer, said want to compromise their position by solar energy to charge its internal battery ernment-wide for both civilians as well as the card may be used to act as a “security providing adversaries with the radio- when an external power source is not members of the military, he said. token” to access various levels of sensitive frequency signature, Toth said. available for charging. Civilian entities that would find this and non-sensitive information.” That In that case, the information could be “A secure token that the card affords, particularly useful include law enforce- means that the information contained in downloaded to the smart card, where it allows you to do multifactor authentica- ment, the medical community, manufac- the card can be shared with other Soldiers, would be stored securely via encryption, he tion,” he said. The authentication method turing, the financial industry, or any other Army contractors and civilians who have said. Even if the card is lost, the data may include voice recognition, fingerprint entity needing access control or the ability been granted access to its contents. remains protected within the card since it’s scanning, or other biometric recognition. to store and retrieve data securely, he The beauty of this is that the information encrypted. That’s very important, Toth Some laptops and smartphones have noted. contained in the card can be compart- pointed out. fingerprint scanners, but nothing on that For instance, in the medical field medical mentalized in a “need-to-know” manner, Another asset of the card is that it can be scale,” he elaborated. data could be entered on the card so that a he said. For instance, a medic could access used for control of access to networks or Since they are Field Programmable Gate person going into surgery has information medical data, but a contractor might not for physical locations, he said. For an example Array (FPGA) based, the cards can be such as which part of the body needs to be privacy concerns, depending on who the of the latter, a commander could determine tailored for specific applications. Addi- operated on, medication requirements, Army deems has a “need to know.” Access who is allowed access within his or her tional memory will be included within the allergies, and so forth. In the past, mistakes is controlled by the credentials presented sector based on the information on the card providing the capability to securely have been made by bad handwriting or by the person attempting to write to or card, and he can also allow specific store large amounts of data. miscommunications. This would make the retrieve data from within the card. individuals to go from point A to point B. procedure much less prone to error, Toth In this particular example, having in- This would provide enhanced security for Timeline said. stant access to a Soldier’s medical data the force. The inventors listed on the Multi- might make the difference in saving his or Aprototype of the card is now in Function Smart Communication Card pat- her life, Toth added. So this does much How it works development, Toth said. The target is to ent are, in order: Bill Toth, Stanley Fong, more than a CAC card. have a working prototype by the spring of Todd Lutton, Uday Shenvi, Ghanshyam We were told years ago that injured The card can function as a “secure 2017. The final design is up to the Army. Dave, and Matthew Lazzaro. DID YOU KNOW? Though most know Dec. 24 as Christmas Eve, plenty of other significant events have happened on this day. On Dec. 24, not everyone has been tucked in their beds with visions of sugar plums dancing in their heads. While this day, together with Dec. 25, are considered one of the most culturally significant celebrations in Christendom and Western society plenty of other happenings on this famous eve have had nothing to do with the celebration. 1800 – The assassination plot of the rue Saint-Nicaise fails to kill Napoleon Bonaparte. 1814 – Representatives of Britain and the United States sign the Treaty of Ghent, ending the War of 1812. COURTESY PHOTO 1818 – The first performance of “Silent Night” This artist’s impression of the Christmas Truce of Dec. 24, 1914, during World War I, appeared in “The Illustrated London takes place in the church of St. Nikolaus in News” of Jan. 9, 1915 and was titled, "British and German Soldiers Arm-in-Arm Exchanging Headgear: A Christmas Truce Oberndorf, Austria. between Opposing Trenches" 1826 – The Eggnog Riot at the United States around the Moon, becoming the first humans to do died 2004. Military Academy begins this night, wrapping up the so. They performed ten lunar orbits and broadcast 1924 – Lee Dorsey, 1960s Pop and R&B singer, following morning. live TV pictures. died 1986. 1851 –A fire at the Library of Congress burns 1973 – The District of Columbia Home Rule Act is 1927 – Mary Higgins Clark, American author of two-thirds of its books. passed, allowing residents of Washington, D.C. to suspense novels 1906 –Canadian inventor Reginald Fessenden elect their own local government. 1930 – Robert Joffrey, American dancer, transmits the first radio broadcast; consisting of a 1980 – Witnesses report the first of several choreographer, and cofounder of Joffrey Ballet, died poetry reading, a violin solo, and a speech. sightings of unexplained lights near RAF 1988 1911 – The Lackawanna Cut-Off railway line Woodbridge, in Rendlesham Forest, Suffolk, 1961 – Jay Wright, Villanova University basketball opens in New Jersey and Pennsylvania.