recommended reading

Army awards contract for long-range wireless system

The Army recently awarded a multimillion -dollar contract for a far-reaching secure wireless communication system using the same, but stronger, Wi-Fi technology found in neighborhood coffee shop to link support units on the front lines with supply depots miles away, according to a top official with the winning bidder.

Comment on this article in The Forum.Telos Corp. won the $43.5 million contract for the secure, tactical wireless communication system. The network will have a range of up to 32 miles compared with the 300-foot range of a standard Wi-Fi access point in a coffee shop, home or office, according to Tom Badders, director of wireless networking at Telos. The Army awarded the contract in January, but approved its release to the public this week.

The equipment, which Telos will furnish through its Combat Service Support Automated Information System Interface contract, will dramatically boost the range of standard Wi-Fi gear by using so-called mast mounted directional yagi antennas, which look similar to television antennas, Badders said. A so-called mast-mounted omnidirectional antenna will boost the range of the wireless network up to four miles.

The contract will support Army logistics worldwide, and Telos could deliver about 13,000 systems over the life of the three-year deal, which also has two option years. The equipment will link combat service support units deployed with forward Army maneuver units with supply depots miles in the rear. The system can reach back further through interfaces with satellite systems, Badders said.

Telos built its system around the ES520 wireless bridge from Fortress Technologies. The ES520 has built-in encryption which meets Defense Department Wi-Fi security standards with built-in Federal Information Standard 140-2 developed by the National Institute of Standards and Technology, said Chris Whalen, a spokesman for Fortress. Badders said the range from the access points can be extended by operating them in a mesh network, which allows users to move from access point node to another without losing connectivity.

The Telos contract is a follow-on to a project from the Army's Project Manager, Defense Wide Transmission Systems, which fielded more than 8,900 systems since 2002 based on Cisco 802.11b access points, with the Army buying Wi-Fi gear and then building the system itself. The Telos equipment has more flexibility and longer range than the original Army systems, Badders said.

In 2005, the Army installed its original logistics Wi-Fi system at a port in Beaumont, Texas, to track movement of cargo with a bar code scanning system. The network supported the use of wireless bar code scanners to feed data from tags attached to cargo back to a central database, and Badders said he could see similar uses for the new Telos system.

A spokesman for the Army Project Manager, Defensewide Transmission Systems said he could not answer a query before the story was posted.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.