SIGNAL Connections

March 17, 2008
SIGNAL Staff

March 17, 2008
SIGNAL Staff

March 17, 2008
SIGNAL Staff

The nature of intelligence changes with national security threats and the evolution of warfare. As old enemies fade and new ones emerge, intelligence adjusts to deal with new adversaries. Similarly, the march of technology changes the nature of warfighting, and intelligence incorporates new technologies and methodologies to adapt to the changing ways of war. But the intelligence community today is encountering a force for change that goes beyond evolutionary developments or geostrategic shifts.

March 17, 2008
By Maryann Lawlor

March 17, 2008
SIGNAL Staff

February 15, 2008
by Henry S. Kenyon

A key Pacific ally of the United States has become the first foreign nation to field a sea-based ballistic missile interception system. The technology is a modification of the Aegis air defense weapons system designed to track and destroy short- and intermediate-range missiles. This capability permits Japanese warships to defend their island nation from attack by neighboring states.

February 15, 2008
by Amber Corrin

The Department of the Navy Chief Information Office used AFCEA’s West 2008 conference in San Diego as the platform to recognize a program key to supporting the joint mission in the Global War on Terrorism. The Knowledge Management (KM) Team of the Naval Personnel Development Command (NPDC) and the Support Team from the Navy Individual Augmentee Combat Training Center (NIACT) received the Department of the Navy Information Technology/Information Management Excellence Award for their combined efforts in establishing a comprehensive online community for sailors training to assist in U.S. Army missions.

February 15, 2008
SIGNAL Staff

 

February 15, 2008
SIGNAL Staff

February 15, 2008
SIGNAL Staff

February 15, 2008
SIGNAL Staff

Test preparation is not just for elementary, high school and college students anymore. Information security professionals seeking to obtain certifications now have the opportunity to use an online self-assessment tool to gauge their knowledge of information security topics prior to taking certification exams. The test-taking simulation could be particularly useful to defense contractors as the U.S. Defense Department requirement looms for certification of all personnel working on department systems in an information security role.

February 15, 2008
SIGNAL Staff

February 15, 2008
SIGNAL Staff

February 15, 2008
SIGNAL Staff

February 15, 2008
SIGNAL Staff

February 15, 2008
SIGNAL Staff

The U.S. Air Force is centralizing its network operations using IT Infrastructure Library (ITIL) best practices to increase efficiencies and to boost security. The move will bring 113 bases currently running individual networks into alignment and centralize the service’s help desk into a single point of support for all issues related to information technology equipment.

February 15, 2008
SIGNAL Staff

February 15, 2008
by Maryann Lawlor

The command that leads the U.S. military in experimentation is living on the cutting edge of Web 2.0 technology use. Led by a command staff that encourages innovation, the U.S. Joint Forces Command’s (JFCOM) communications department has designed a Web site that is the launch pad for blogs, podcasts and Really Simply Syndication (RSS) feeds. The goal is simple: Create a fresh dialogue with the people it serves and protects.

Pages