Tethered aerostats with Persistent Threat Detection Systems that fly over separate forward operating bases in Afghanistan received capability upgrades recently with the addition of new Kestrels. Unlike the former versions, the revamped technology includes electro-optical/infrared features, enabling users to have a 360-degree view of targets in a city-size area after sundown and during the day.
Securing the homeland will require closer cooperation among military and civilian government organizations as diverse threats adopt each others' tactics and techniques. Terrorists, smugglers and other organized crime entities have learned from each other and, in some cases, are joining forces to threaten Western democracies in new ways. Testifying before the U.S. Senate Armed Services Subcommittee on Emerging Threats and Capabilities, Michael A. Sheehan, assistant secretary of defense for special operations and low-intensity conflict, described a menacing trend in which "terrorism, drug trafficking and other types of transnational organized crime are increasingly intertwined."
Technical advances in the field of virtual reality, also known as virtual worlds (VWs), are making it possible for the U.S Navy to tap into the collective expertise of its best submariners to design and build the next generation of attack submarines.
The Air Force Office of Scientific Research (AFOSR) wrapped up its annual review earlier this month, during which the organization's program managers had a chance to showcase their work to authorities from defense, government, academia and the general public. Already personnel have identified areas where research will adjust to meet identified needs with more detailed plans expected soon.
AFCEA features an information resource for members of the military community and people who wish to support them: Homefront Help.
After an accident left Dawn Ottman with limited short-term memory, she tapped into her skills as an inventor to keep her passion for engineering alive.
Understanding the cloud will determine whether it helps organizations realize the efficiencies and cost savings it promises or the opportunities that float on by.
AFCEA International, the Cyber Conflict Studies Association (CCSA) and the Atlantic Council have collaborated to create a cyberconflict history case studies contest. Up to six prizes of up to $1,000 will be awarded for the best submissions.
The AFCEA Educational Foundation, in conjunction with its preferred education provider Cypherpath LLC, soon will offer a solution designed to assist information security experts maintain their U.S. Defense Department 8570.01-M (DOD 8570.1-M) Computing Technology Industry Association (CompTIA) certifications.
Less than one month after Brandon Oldenburg and Lampton Enochs of Moonbot Studios addressed the ArkLaTex Chapter of AFCEA and became members of the association, the company took home an Oscar for Best Animated Short Film.
It's not often that objects as small as battery chargers and solar blankets become the center of attention at a U.S. Senate budget hearing where multibillion-dollar programs are discussed, but for a few minutes of the March 8 Senate Armed Services Committee hearing, U.S. Army officials touted the need for such items to take a load off of the backs of soldiers.
Command and control is undergoing an evolution spawned by the information technology revolution. These changes may be both desired and immutable, as no military commander can either neglect new capabilities or turn back the technological clock when it comes to managing forces in the battlespace.
Significant changes lie ahead for U.S. Army forces as communicators move into the next era of battlespace communications. Smartphone technology is opening the door for individual networking devices for which signaleers already are laying the groundwork. And, the promise of cloud computing would enable large amounts of data to be moved among the battlefield without mobile databases.
We now have the U.S. Defense Department information technology enterprise strategy and roadmap. The new direction calls for an overhaul of policies that guide the department’s information systems. Yet, implementation is a challenge, and several issues require the reorientation of how the Defense Department manages information technologies.
The U.S.-led global cybersecurity exercise known as Cyber Storm will sport a new look and format when it takes place later this year. The changes reflect the constantly deviating nature of the threats posed daily to the world’s cyber infrastructure.
Cyber threats draw much of the focus in today’s information technology realm. The threat profile in cyberspace is growing and becoming more complex, more sophisticated and more diverse.
The U.S. Army's plan to revolutionize its approach to integrating advancements into the network is on track, according to senior leaders. These Network Integration Evaluations designed to facilitate this assimilation already have yielded results, offering a glimpse into the technology of the future and how soldiers will use it.
U.S. Marines are tasked with battling enemies in any environment or domain and increasingly that location is cyberspace. Information assurance officials around the Corps are striving to ensure the reliability and trustworthiness of the service’s systems, and though they are aware of the potential for attack from the outside, misuse from the inside is a more prevalent concern.
All computer systems are prone to attacks from various cyberthreats, but disruptions on few of those networks have the potential to cause calamitous damage to national infrastructures.To help prevent catastrophe, the U.S. Department of Homeland Security has an effort dedicated to countering these dangers through various partnerships and training opportunities.
The U.S. Marine Corps is testing a set of systems that would enhance communications between air assets and boots on the ground. Troops in Okinawa used the technology initially during U.S.-only evaluations before moving on to experiments in various multinational events. And though the personnel who have experienced the systems in action say work still remains to perfect the offering, they would like to see it fielded if it reaches its potential.