Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

signalarticles

Low-Technology Foes Require High-Technology Detection

October 2002
By Robert K. Ackerman

Greater urgencies in both conventional and asymmetrical warfare are accelerating the development and deployment of measurement and signature intelligence systems. This rapidly growing discipline is delving into more diverse sources of data, and experts are advancing ways of using it to help other intelligence sensor systems. Concurrently, laboratory researchers are seeking to develop a totally new family of sensor systems that can detect everyday energy emissions from artificial and organic sources.

Signal Intelligence System Uncovers Enemy Sites

October 2002
By Maryann Lawlor

The U.S. Army has a new tool in its arsenal that allows mobile troops to gather intelligence about the location and activities of adversaries by pinpointing the source of signal transmissions and intercepting communications. The system will replace legacy electronic warfare systems that were developed more than 30 years ago, and it has already been deployed in Afghanistan in support of operation Enduring Freedom.

The Earthly Realities Of Cyberspace

October 2002
By Col. Alan D. Campen, USAF (Ret.)

Information technology is widely and often wildly heralded as the key to rearming the U.S. military for networked conflict, marshaling a host of disparate and dispersed bureaucracies to secure the homeland, and exporting American principles of liberty and justice. But, cloaked by hubris is the indisputable fact that the worth of information technology is established not by how much it costs, but how intelligently it is employed and how well it satisfies user needs.

Plowshares to Shields

October 2002
By Henry S. Kenyon

U.S. government research centers are applying existing technologies in new ways to help fight the war on terrorism. These new applications will permit better detection of radioactive materials or chemical and biological weapons and aid first responders in the event of a chemical or biological attack.

Modeling to Thwart Terrorism

October 2002
By Henry S. Kenyon

An interactive wargaming program developed by the U.S. military for joint force exercises is helping to protect potential terrorism targets in the United States. The software was employed to model security scenarios for the 2002 Winter Olympic Games in Salt Lake City.

Aircraft Company Shifts Direction

October 2002
By Michael A. Robinson

In warfare, as in chess, victory often depends on the ability to foresee the opponent's next move. So, it seems more than a little appropriate that Lt. Gen. Carl G. O'Berry, USAF (Ret.), a chess enthusiast, is now vice president of a company that is helping the United States develop an integrated battlespace designed to redefine modern warfare.

Rethinking Joint Information Operations

October 2002
By Maj. Karlton D. Johnson, USAF

Businesses and the U.S. military have between them a multitude of information assurance programs to protect against cyberattacks; however, a recent research project reveals significant gaps in national policies, procedures and relationships that must be addressed to ensure success. As the United States becomes more dependent on technology and near-real-time data, information operations are evolving into a critical national security matter that requires a joint approach.

In-Motion Connectivity Unifies Information Grid

October 2002
By Sharon Berry

Miniaturized routers have been merged with mobile technology to give the military uninterrupted high bandwidth connectivity to mission-critical data as forces move throughout a theater of operation, all via one small rugged device. The capability could network troops in unique ways and solve defense-identified challenges of achieving seamless communications mobility between networks while addressing what is known as the form factor-maintaining a small device size and configuration. It can provide interoperability within a group as well as among defense organizations.

Communications Under Fire

October 2002
By Staff Sgt. Timothy Volkert, USA

In the war against terrorism, ship and aircraft activity may be foremost on the nightly news and in the public eye, but in information-age conflicts an almost invisible force is just as critical to mission success. The military service members who build communications infrastructure from the ground up under combat conditions have become major contributors to winning battles fought by joint and coalition forces.

Desktop Security System Hides Data From Interlopers

October 2002
By Robert K. Ackerman

A new approach to personal computer security confounds internal thieves and external hackers by making data disappear without a trace. The new security system effectively conceals the very existence of critical files and applications from all except the authorized user.

Pages

Subscribe to signalarticles