Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo
 

November 2001

Privacy vs. Protection: A Delicate Balance

November 2001
By Maryan Lawlor

It is hard to resist the Big Brother analogy to describe law enforcement agencies' use of new technologies for catching lawbreakers. From thermal scanners that monitor the amount of heat emanating from a suspect's house to hidden cameras that catch red-light runners to software that leads to the capture of cybercriminals, new capabilities have brought with them new privacy questions.

Jam-Proof Signals To Guide Navigation

November 2001
By Robert K. Ackerman

New algorithms and signal processing technologies may reduce the vulnerability of global positioning system devices to electronic countermeasures. Antijam systems already are in production and are being incorporated into the latest U.S. Defense Department weaponry. Future iterations may bring signal assurance to even the smallest handheld consumer devices.

Researchers Locate Satellite Options

November 2001
By Maryann Lawlor

Although global positioning system technologies are being used widely in both the military and commercial arenas, research currently underway could broaden their reach by making the capability better, smarter, faster and less costly. One project, which is near completion, combines inertial navigation with global positioning system navigation to increase effectiveness. The second, a longer term program, is aimed at increasing users' ability to operate successfully in the face of enemy jammers or countermeasures.

One Plan, 140 Actions, 500 Days to Execute

November 2001
By Sharon Berry

Information assurance, preserving radio spectrum, ensuring interoperability and establishing secure wireless links are just some of the tasks on the menu for the Defense Information Systems Agency. The agency's Defense Department-wide mandate has placed it at the nexus of the infosphere that increasingly is defining military operations worldwide.

U.K. Communications On Target

November 2001
By Henry S. Kenyon

The British government has launched its ambitious program to create a state-of-the-art tactical communications infrastructure for its military. When complete, the United Kingdom's armed forces will have a secure radio system that operates a battlefield Internet jointly across multiple ground, air and sea platforms.

Challenges Loom for Network-Centric Warfare

November 2001
By Robert K. Ackerman

Several key impediments must be conquered if network-centric warfare is to achieve its potential for revolutionizing military operations. Long-standing concerns such as interoperability and cultural resistance are joined by issues of understanding human behavior and research and development investment. These elements threaten to slow or even derail efforts to incorporate the full advantages of network-centric warfare into U.S. forces by 2025.

Aerial View Sharpened By Data-Sharing System

Novemer 2001
By Maryann Lawlor

The U.S. Air Force is examining technology that would enhance a B-1B Lancer crew's situational awareness while in the air and simultaneously record data that can be shared with other mission commanders or used to train future aircrews. The capability would provide pilots with information about existing threats, which would allow them to execute appropriate threat avoidance maneuvers.

Dressing the Wired Warrior

November 2001
By Henry S. Kenyon

Warfighters soon may be wearing clothing with built-in radio antennas and global positioning system receivers. These items would be embedded in uniforms and equipment harnesses laced with internal wiring and circuitry that connect personal communications devices, computers and power supplies to form a single network.

Technologists Plan Tactical Future

November 2001
By Robert K. Ackerman

Unattended sensors in a future theater of operation detect enemy movements, identify and locate targets, and feed that information via unmanned aerial vehicle communications network nodes to the command center. Commanders collate their data with other information from space and U.S.-based sources, then signal unattended battlefield and airborne weapons to launch against enemy assets. These networked weapons keep track of battle damage and trade-off targets as they are destroyed.

Jolting Destruction Galvanizes U.S. Agencies To Walk the Walk

November 2001
By Clarence A. Robinson Jr.

The Bush administration's declaration of war on terrorism allows federal organizations such as the National Security Agency to expand their electronic intelligence-gathering practices. With initial deployment of U.S. forces to the Middle East, demand to locate hostile terrorist cells and their support mechanisms immediately is rising, both in the United States and overseas. In addition, what had been a gradually growing requirement for U.S. forces to conduct information operations, including computer network offense and defense, is now switching to fast forward.

Pages

Subscribe to RSS - November 2001