Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

signalarticles

Airborne Mission Planner Highlights Network-Centric Capabilities

December 2004
By Henry S. Kenyon

The French army soon may benefit from a prototype command and control system for helicopters that allows low-flying aircraft to share data in a tactical network. The technology features detailed digital terrain maps that can be viewed in the cockpit or from a groundstation before a mission. Mission-planning information and text messaging also can be transmitted via this airborne system.

Plastic Antennas Mold Flexible New Frontier

December 2004
By Henry S. Kenyon

An electrically conductive resin technology may soon free warfighter and civilian wireless devices from bulky aerials. The proprietary recipe can be added to any of the thousands of polymers used to manufacture cases and components, turning the entire bezel of a cellular telephone or handheld radio into an antenna.

Experts Examine Business Continuity Challenges

December 2004

The diverse nature of threats in the 21st century calls for advanced planning strategies and international cooperation. As governments and the private sector face both physical and cyber attacks, organizations must focus not only on defense but also on how to recover after a disaster has occurred.

David M. Wennergren, U.S. Department of the Navy

December 2004
By David M. Wennergren, Chief Information Officer, U.S. Department of the Navy

The pace of technological change is relentless. Living in a networked world offers tremendous opportunities to leverage emerging technologies to improve national defense capabilities and the quality of work and life for sailors, Marines and civilians. The advent of the Internet age opened the door for the U.S. Navy to move away from stand-alone solutions to a world of authoritative data sources that are available anywhere, anytime through self-service transactions. It is an age of knowledge, where Web services and portal technologies are allowing dramatically improved productivity and effectiveness, while eliminating the unnecessary cost of building and maintaining duplicate information solutions.

Small Business Is Big Business in AFCEA

April 2001
By Lt. Gen. C. Norman Wood, USAF (Ret.)

Small businesses constitute a major element of AFCEA International's membership. Their breadth of activity in many ways reflects AFCEA's areas of interest, and the association is paying heed to their impact as well as to their needs.

Using Information Mandates A Military of One

April 2001
By Maryann Lawlor

Although experts agree that the vast majority of future military operations will be fought by joint forces, the U.S. military's information technology continues to be somewhat fragmented. To take advantage of all the benefits of information operations during a mission, systems used by all the forces and at all levels must be able to talk to each other. Numerous technologies have been developed that enable this capability; however, the challenge is larger than technology.

Space Warriors Defend Information Assets

April 2001
By Christian B. Sheehy

The U.S. Defense Department is refocusing efforts to protect military communications from computer network threats. By shifting its network operations emphasis from exclusively defensive to a more offensive stance, the government seeks to ensure the integrity of coalition operations. Preparations for projecting a greater disruptive potential to adversaries are underway.

Swarming Attacks Challenge Western Way of War

April 2001
By Col. Alan D. Campen, USAF (Ret.)

Asymmetric tactics and network-centric warfare demand a new look at command and control. Information now is a weapon of choice; software, radio frequencies and bandwidth are critical commodities; networks are essential delivery platforms; and access controls are mandatory. All must be melded into operational art. The foremost challenge for commanders and staffs in this new battlespace environment may be the command and control (C2) of the infostructure.

Balancing Capability Protection and Mission Readiness

April 2001
By Capt. Philip Ray, USN

In Case of Emergency, Break Glass. That phrase calls to mind the image of a firefighter's axe in a glass box on a wall. It also is an appropriate analogy for the U.S. Defense Department's approach to information operations, wherein powerful capabilities often are locked away from the hands of the warfighter. But unlike the firefighter, who is trained in the use of the axe, warfighters have virtually no opportunity to train with U.S. information operations capabilities or to factor them into their plans. Tight security controls that are designed to ensure the protection of many capabilities are, as an unintended consequence, locking the armed forces out of opportunities to learn to use them effectively. This, in a nutshell, is the problem of overprotection.

Commercial Forces Unite to Combat Cyberthreats

April 2001
By Maryann Lawlor

The military is not the only entity that knows information is a powerful weapon. Companies that both develop and depend on communications technologies now recognize that strength increases with numbers and cooperation benefits individual firms and protects overall economic growth. Despite the competitive nature of commerce, information operations have moved from the public to the private sector.

Pages

Subscribe to signalarticles