Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo

information operations

Cyberspace Command Logs In

August 2007
By Henry S. Kenyon

The U.S. Air Force seeks to dominate networked warfare through a new command specializing in cyberspace operations. The organization will enable U.S. strategic efforts by providing a variety of services and capabilities from information assurance and network security to intelligence gathering and defensive and offensive cyber activities.

Data Repository and Forum Expedites Information Exchange

December 2005
By Henry S. Kenyon

A knowledge-sharing effort is helping the U.S. Defense Department's information operations community overcome complex operational challenges. Administered by the U.S. Air Force, this information exchange mechanism permits analysts and warfighters to access relevant data from government, academic and corporate experts. The undertaking also gathers subject matter experts together to discuss and to solve specific issues then stores their findings in an online repository.

Information Operations Specialists Move to Mission Planners' Table

December 2005
By Maryann Lawlor

Although centuries old, information operations is fast becoming the newest strategic weapon in the U.S. military's arsenal. The reformation has come about more by evolution than revolution, bringing individual specialties such as electronic warfare, operations security, military deception, psychological operations and computer network operations under one umbrella. But the result of this synthesis is a military capability that can be a force multiplier when integrated early, often and continuously throughout mission planning and execution.

Intelligence Information Drives Army Operations At a Faster Pace

December 2005
By Robert K. Ackerman

Flattening a network instead of a city may be the key to successful urban combat operations. U.S. Army intelligence is restructuring its information architecture both to suit the ongoing force transformation and with an eye on the joint arena. The Army's goal is to create a network that extends the reach of vital information across the breadth of the force and down to the individual warfighter.

Fourth Wave Advanced Technologies Affect Electronic Intelligence, Warfare

June 1999
By Dr. Jude E. Franklin, Bruce B. Biggs and Darrell L. Ramey

Next-century warriors will face a radically different electronic warfare and electronic intelligence environment in the information age battlespace. Rapid advances in technology will profoundly influence 21st century conflicts because highly advanced systems will provide greater situational awareness, higher quality threat assessment, and more accurate, timely automated matching of active signals with the resources of widely distributed libraries. Operators and analysts will be able to collaborate in real time within a distributed virtual environment. They will configure, launch and control highly efficient software agents to conduct geographically widespread tasks and accomplish complex analyses within a changing operational context efficiently and quickly.

Electronic Threats Fall Prey to Fast Moving Simulation Laboratory

June 1999
By David A. Brown

As a first point in the United States' electronic combat test process, researchers strive to re-create electronic warfare accurately to challenge the effectiveness of hardware against hostile threats. A major link in this process is the U.S. Air Force Electronic Warfare Evaluation Simulator in Fort Worth, Texas, which can evaluate defensive systems against most known threats and can respond quickly to newly discovered threats.

Commercial Components Feed Electronic Warfare Systems

June 1999
By Robert K. Ackerman

Integrated signal processors are the buzzword for new electronic warfare suites designed for adaptability across a broad range of threat environments. Embedding these commercial off-the-shelf devices in sea- and airborne signals intelligence platforms both increases interoperability and reduces the likelihood of rapid obsolescence.

Information Age Warfare Must Enlist Civilian Partnerships

June 1999
By Col. Alan D. Campen, USAF (Ret.)

Not since the second American revolution has the United States had to defend its homeland, yet the country is not much better prepared today than it was when much of Washington, D.C., was torched by an invading military force during the War of 1812.

Self-Inflicted System Malfunctions Threaten Information Assurance

July 1999
By Lt. Col. Glenn D. Watt, USAF

While the security industry concentrates on protecting systems from external threats, a danger to information access is brewing from within organizations. The expansion of and growing reliance on networks is jeopardizing military information technology by exposing numerous sectors and even entire commands to errors that are introduced internally by a single entity.

Defense Department's Achilles' Heel Targeted for Heightened Protection

July 1999
By Michelle L. Hankins

The U.S. Department of Defense is not fully exploiting information technology in military operations and departmental procedures. For an organization that relies on information superiority and technological capabilities to put U.S. national defense at an advantage, the department is lax in thwarting potentially devastating threats to its information systems.


Subscribe to RSS - information operations