signalarticles

Navy Exploits the Power of the Force

May 2002
By Maryann Lawlor
E-mail About the Author

The U.S. Navy is launching a new initiative that expands the concept of network-centric warfare from the purely technical world to the operations doctrine domain. The paradigm will affect every aspect of the Navy-from acquisition processes to transportation, from information sharing to targeting. Military leaders believe this new approach will increase combat effectiveness and better support joint and coalition operations.

Pushing the Ultrawideband Envelope

May 2002
By Henry S. Kenyon

Researchers are investigating the use of alternative radio transmission methods for military information systems. A recently launched program examines the use of ultrawideband technology in robust, scalable communications devices and networks, in radar and in collision avoidance sensors.

War Game to Unleash Interoperability Surge

May 2002
By Maryann Lawlor
E-mail About the Author

An event that has become a staple of advancements in military technology has undergone an evolution and now aims at providing theater commanders with immediate solutions to operational interoperability problems before systems move into the field and are tested under fire-live fire.

Creating a Knowledge-Based First-Responder Force

May 2002
By Patrick S. Guarnieri

Before September 11, only a few brave organizations were dedicated to authorizing and funding programs to test advanced technologies for state and federal disaster first responders and train key personnel in their use. For scenarios involving weapons of mass destruction, even fewer offered unclassified-level training in the skills and technology needed by law enforcement and health care personnel. Among those few are the U.S. Air Force Research Laboratory's Homeland Defense Technology Center in Albuquerque, New Mexico; the U.S. Department of Justice's Office of Justice Programs, Washington, D.C.; and the New Mexico Institute of Mining and Technology, Socorro. In times of crisis, it has been their experts who arrived on the scene toting a combination of "Men in Black" suitcase technology and advanced supercomputing capabilities to assist the nation's first responders.

Linking Military And Commercial Communications

May 2002
By Kyle A. Gerlitz

A recently developed technology will allow military and local community first responders to take advantage of all available communications assets. The gateway-bridging equipment provides interoperability between commercial and military networks. Specialized military network cards support the connectivity to tactical equipment, allowing commercial traffic to travel over those assets.

Federal Government Equips First Responders

May 2002
By Henry S. Kenyon

The U.S. government is researching technologies to help state and local police, along with public safety organizations, coordinate and manage resources and personnel in the event of a terrorist attack or natural disaster. These applications are being selected through an interagency effort designed to provide nonfederal entities with the latest systems and equipment.

Cyberspace Sleuths Uncover Covert Connections

May 2002
By Maryann Lawlor
E-mail About the Author

The Federal Bureau of Investigation is turning to 21st century tools to solve today's crimes and move from a primarily reactive law enforcement approach to one that will allow agents to anticipate, then prevent, illegal acts. Data management capabilities will enable bureau personnel to identify relationships between cases as well as various sources of criminal activities.

Collaborative Tool Buddy-Lists Coalition Partners

May 2002
By Sharon Berry

International military partners are signing on and interfacing with each other instantaneously by using a prototype system that merges real-time chat capabilities with a language translator to enable cross-domain information exchange. The project addresses the need for collaboration and interoperation at the command level in allied environments.

Biometric Defense In Depth

May 2002
By Henry S. Kenyon

A recently developed software application will allow organizations to design layered access systems that scan individuals to recognize facial features, voices and lip movement characteristics. The program permits the deployment of a variety of digital-camera-based devices in kiosks and stations or desktop and laptop computers to control and monitor admittance to secure areas, networks or individual pieces of equipment.

Pages