Corporate America is helping assemble the homeland defense jigsaw puzzle that includes thousands of pieces being put together by hundreds of people looking at a multitude of different pictures. Industry leaders agree that the biggest challenge is the complexity of the problem and the plethora of solutions being proposed by companies with a range of specialties taking widely varying approaches.
Military doctrines about fighting in cities and towns are evolving, and the U.S. Army is turning to high technology systems to teach and evaluate how warfighters will adapt to the new objectives in an emerging battlespace. The service is examining tactics, techniques and procedures and developing concepts that support maneuvers that can transition from offense and defense to stabilization and support.
Having established new procedures and incorporated new technologies for surface and air situational awareness, the U.S. Navy now is looking to extend that capability underwater. The sea service is working with the private sector to apply new data fusion techniques to antisubmarine warfare.
By Cmdr. Deborah R. Kern, USN; Debra Nissenbaum; and Robert Putes
Interoperability between service, state and federal agencies and coalition forces is vital to securing the Asia-Pacific region. Equally important is the implementation of information assurance measures to get information to the right place at the right time. And, a streamlined acquisition process is needed that delivers joint systems that adhere to standards and policy.
My first year as your AFCEA International president was a "super-deluxe" experience. Although I tend to spend only a small part of my time reflecting on the past, I now look back on this past year with the same positive feeling that I have when I look ahead to the future. My heartfelt thanks go to all of you who have taken the time to support AFCEA by providing me with the necessary education to lead our association. I hope to build on that education as I work with the Board of Directors, the regional vice presidents and the chapters to improve the service that we provide as AFCEANs.
When the first commercial imaging satellite rocketed into outer space, few realized that a quiet revolution leading to total transparency had begun. Like the introduction of television, the advent of commercial satellite imagery has facilitated the dissemination of information to the world in graphic detail. But experts warn that this new capability could be a double-edged sword. Commercial satellite imagery is unveiling previously secretive activities to the court of public opinion where it can be scrutinized in a way never before possible.
The U.S. Defense Department is developing miniaturized infrared detectors and sensors that do not require bulky cooling systems. These devices will be compact enough to fit in small robotic vehicles and microaircraft or will be manportable. The technology also may improve night vision and missile seeking equipment. Recent advances in physics and materials science are moving these devices from the laboratory to the battlefield.
The U.S. military may one day obtain detailed reconnaissance imagery with laser light that has never touched a target. By using two laser beams and taking advantage of a unique characteristic of quantum mechanics that permits one beam to mirror the state of its twin, researchers are developing low-power systems that can measure, or illuminate, objects across a variety of frequencies, yet generate detailed pictures in the visible spectrum.
The U.S. Army's infostructure is falling into formation under a new command that is responsible for the operation, management and defense of that service's information systems worldwide. The organization's mission-provide a high-speed, secure, interoperable knowledge enterprise across the Army and around the globe that plugs into joint systems and the Global Information Grid.
A recent exercise in San Antonio revealed how homeland security cooperation among civil authorities and the military involves more than hardware and software interoperability. Issues such as military capabilities, obligations and restrictions weighed heavily as participants sought to establish procedures to counter a potential cyberattack.