More than 10 years of hardware, software and signal processing upgrades have transformed the Patriot missile system into an effective defensive shield against short-range and theater tactical missiles. The original system that achieved partial success in the 1991 Gulf War became a bulwark in the Iraq War, effectively neutralizing Saddam Hussein's theater ballistic missile threat.
Information security researchers at George Washington University are studying new ways to strengthen identification authentication processes while keeping transactions as simple as possible. The techniques involve deliberate perturbations of traditional authentication processes and can be applied to password, token and biometric systems alike.
Technology may be the key to ensuring that the public can respond quickly if a chemical or biological weapons attack occurs. Until recently, the U.S. population, protected by two oceans, had not given much thought to terrorism or to the intentional release of chemical, biological, radiological or nuclear materials. Occasionally, industrial or hazardous material accidents occur. However, these types of situations are usually dealt with through local emergency response teams to minimize the impact on the lives and health of the surrounding population.
The Washington, D.C., Beltway sniper shootings, military campaigns abroad and steadily increasing terrorist alerts have inspired the creation of a law enforcement tool that promises to improve security in local jurisdictions and on the battlefield.
The U.S. Coast Guard is using a nautical tracking and collision avoidance system to monitor cargo ships entering American ports. Operating on internationally accepted standards, the technology permits law enforcement and intelligence agencies to automatically query data such as a vessel's cargo, crew roster, port of origin and destination.
The debates over information operations have shifted from academia and Pentagon studies, military exercises and computer simulations to joint warfare over the sands of Iraq. This is the first opportunity to document and evaluate the role information actually plays in evolving military transformation into truly joint operations.
Information operations are coming of age, moving through the exploration stage of adolescence and forward toward a future that some experts believe should feature ubiquitous integration. Although computer systems have already proved their ability to influence the nature of warfare, the maturation of doctrine and technologies is likely to bring with it even more substantial changes in the way the military conducts operations.
The U.S. Defense Department is introducing a new tool to protect military installations by transforming force-protection information sharing from a hierarchical, service-centric model to a network-centric model. The system will allow subscribers to have a common awareness of all suspicious events that are taking place in their vicinity.
Sky marshals, metal detectors and multiple identification checks may increase security in the corporeal world, but guarding the nation's information superhighway requires different tactics. And in the information age, homeland security must extend into the digital realm, or even a tiny crack could allow adversaries into some of the most important systems in the world today.
The battlespace network trialed in the woods of Kentucky and grown from the sands of Kuwait provided the necessary connectivity for the U.S. Army's 101st Airborne Division (Air Assault) to strike deep into Iraq. Not all of the assets assembled and deployed by the division's 501st Signal Battalion were exploited to their fullest, and some proved more important than originally envisioned. Yet, the network linked the air assault division as its location and mission changed with the flow of battle.
The deep thrust into Iraq by the U.S. Army's 101st Airborne Division in operation Iraqi Freedom was enabled as much by kilobytes as by helicopters. An advanced command, control and communications architecture allowed the geographically dispersed mobile forces to remain in contact with their individual commanders as well as with the division headquarters.
Last year, I discussed in my commentary how information must be available-as freely as oxygen in the air-to virtually everyone. In presenting this point of view, I offered that power lies in how one uses information.
U.S. Defense Department researchers are developing software that may be capable of accurately understanding the nuances of human language. The technology promises to greatly enhance a spectrum of computer-based systems-from commercial Web browsers and personal virtual assistants to advanced intelligence gathering and command and control systems.