Dark Screen Sheds Light on Cyberspace Security Issues

January 2003
By Dr. Gregory B. White and Joe H. Sanchez Jr.

A recent exercise in San Antonio revealed how homeland security cooperation among civil authorities and the military involves more than hardware and software interoperability. Issues such as military capabilities, obligations and restrictions weighed heavily as participants sought to establish procedures to counter a potential cyberattack.

Examining Management By Mouse

January 2003
Staff Report

Placing the concept of management into a military context allows the art of both management and command and control to be examined. Both involve the same processes of sensing one's environment, understanding one's place and role in that environment, deciding what needs to be done and ensuring that action is carried out to achieve the intended effect. Information technology has a profound influence on these components, enabling the commander to retain the appropriate focus on the mission, improving the quality and speed of decisions, but increasing the need to take care not to be seduced by information for its own sake.

Satellite Images Capture Picture Perfect Future

March 2001
By Maryann Lawlor
E-mail About the Author

A combination of faster computing capabilities, lower cost storage and improved software is opening new markets for commercial satellite imagery in the 1-meter and, in the future, 0.5-meter resolution range. Although these images were once reserved for U.S. government and military uses, today a wide range of organizations is purchasing them to support their missions. From monitoring activity in other countries and creating accurate simulation models to mapping underwater environments, pictures taken from space have become a valuable tool and have ushered the world into what some have termed the age of transparency.

Open Line, Hidden Key

December 2000
By Henry S. Kenyon

By manipulating the slippery and elusive qualities of matter's smallest components, scientists have developed a way to encode and send data along unsecured public fiber optic lines. The method relies on the unique nature of atomic behavior-any attempt by an outside party to analyze the coded material changes the atoms' characteristics, rendering the transmission useless.

TechNet International 2003 Is About Knowledge

April 2003
By Vice Adm. Herbert A. Browne, USN (Ret.)

With the capabilities of today's information technology systems, military, government and industry leaders are nearly overwhelmed with data. The desktop computer has become more than a machine: It's a window to and a connection with the world. Senior government decision makers increasingly are taking advantage of commercial tools, and transformation is the umbrella term used to describe how we are evolving from the industrial age to the information age. In the past, control belonged to the organization that massed forces; today, it belongs to the group that efficiently turns data into useful information.

Think Joint, Fight Joint, Train Joint

April 2003
By Maryann Lawlor
E-mail About the Author

The U.S. Defense Department is reconfiguring its training approach so service personnel can learn the same way as they will fight-in a joint environment. To ensure that this is achievable, the department is looking to the U.S. Joint Forces Command to provide active management of joint training systems and capabilities across the armed forces and across the nation.

Coping With Crisis Communications

April 2003
By James Stiefvater

Rapidly deployable, reliable and secure communications are helping sort through the inherent communications chaos surrounding emergency situations. The technology was instrumental in providing communications capabilities after the terrorist attacks and also was useful in debris recovery operations after the space shuttle Columbia disaster.