NOTE: There is one application form for all STEM Major Scholarships; applicants will be considered for all AFCEA STEM Major scholarship opportunities for which they are qualified. Undergraduate ...
See which topics SIGNAL readers were most interested in this past year, from generative AI to cyber defense.
The Deputy Chief of Naval Operations for Information Warfare (N2N6) / Director of Naval Intelligence, in collaboration with AFCEA Intelligence and the Naval Intelligence Professionals, is pleased to ...
With the current war in Ukraine, it’s clear that Russia’s modernization program has involved electronic warfare and signals intelligence and played a huge part in Russia’s combat advances and overall ...
Among the most pervasive changes of the past 60 years has been the cost of living. No costs or salaries could remain static during six decades of capitalism, as 1946 saw the beginning of the removal ...
In late 2022, the People’s Republic of China issued the world’s first deep fake regulation. The communist country sought to limit artificial intelligence creations, or deep synthesis, that went ...
Soldiers may soon be wearing equipment that physically strengthens and protects them, as well as potentially improves their cognitive abilities on the battlefield. Artillery soldiers carry heavy ...
Drug traffickers expand the use of submersible vessels to transport illicit substances as states struggle to detect them. This whack-a-mole game sees cartels improve the seaworthiness and technologies ...
For years, the cyber domain was perceived as a virtual one. However, every cyber attack leaves a tangible footprint—a compromised server, a disrupted infrastructure or a breached supply chain. When ...
In 2022, amidst the ongoing Russo-Ukrainian conflict, one of the largest cyber attacks fell upon Kyivstar, the largest telecommunications provider in Ukraine, leaving millions without mobile and ...
The rise of the drug cartel movement since the 1970s has ignited fear among many. From complex and undetected tunnel systems to leveraging ubiquitous technical surveillance (UTS), many of the recently ...
Today, with almost infinite sources and publicly available sensors, open-source intelligence (OSINT) collection has achieved high sophistication and allows, for example, the ability to follow ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results