April 2014

April 1, 2014
By George I. Seffers
The sensor data subsystem of the Common Aviation Command and Control System, which is being evaluated and tested by MCTSSA personnel, will fuse sensor input from a variety of sensors and weapon systems, including unmanned aerial vehicles and the F35B Joint Strike Fighter.

A tactical technology support organization that has been serving the U.S. Marines for decades is beginning to find a role in the cyber domain. The group offers a broad range of services, including test and evaluation, engineering and network integration. It also supports users across the Defense Department, U.S. government and allies.

April 1, 2014
By Henry S. Kenyon
PEALDS builds on the work of preceding efforts to advance the state of data analysis, sensor fusion and storage retrieval technologies. The program’s goal is to combine these advances into a system that will enable users to predict the potential
movements and actions of enemy forces based on their previous actions.

The U.S. Air Force is using big data analysis tools to create a picture of a battlefield or area of interest that can be monitored in real time as well as stored and replayed. By merging sensor streams with data tagging and trend detection software, this capability will allow analysts and warfighters to observe, track and potentially predict enemy force operations based on their observed behavior.

April 1, 2014
By Rita Boland
The U.S. Marine Corps is testing security options that will enable personally owned corporate enabled devices for use by personnel.

U.S. Marines are testing novel solutions to provide the necessary security and legal safeguards that will allow commercial, personally owned devices on their networks. If successful, the service could recognize a substantial monetary savings in mobile phone expenses and open the door to future cost decreases in other areas.

April 1, 2014
By Robert K. Ackerman

The rise of new global flashpoints along with a strategic rebalancing are presenting the U.S. Navy with a new set of challenges and obligations concurrent with significant force reductions. The sum of the budget cuts would be enough to tax the service under any circumstances, but they are being implemented against a backdrop of a broader mission set and increased activities by potential foes.

April 1, 2014
By Lt. Gen. Daniel P. Bolger, USA (Ret.)

Nuclear weapons are back in the news. Those concerned about the Middle East watched warily as the United States and others labored to rein in Iran’s budding nuclear ambitions. Interested citizens heard of low morale and troubling disciplinary issues afflicting our nuclear missile launch teams. On a somewhat lighter note, film fans marked 50 years since the premiere of Stanley Kubrick’s satiric gem, Dr. Strangelove or: How I learned to Stop Worrying and Love the Bomb. We sure do not love the bomb—we never did, really—but we also do not worry much about it these days. Perhaps we should.

April 1, 2014
By Kent R. Schneider

Open source intelligence, which is gained from the public domain, is certainly not new. Intelligence professionals have used open sources as long as intelligence has been gathered and utilized. So what is different today? Why is open source intelligence (OSINT) getting more attention and the commitment of more resources?

April 1, 2014
By M. Thomas Davis

Over the past decade, I have participated nearly each year in the Association of the U.S. Army Industry Day at the United States Army War College. In the afternoon, an industry representative spends about three hours in each student seminar of about 20 officers. I have always participated in this seminar portion. One item that has emerged over the years in these meetings is that many who spend their professional careers in the public sector have an uncomfortable sentiment about the concept of profit.

April 1, 2014
By George I. Seffers
The U.S. Marine Corps Warfighting Laboratory works with the Defense Advanced Research Projects Agency on the Tactically Exploited Reconnaissance Node program, which seeks to develop an unmanned aircraft capable of launching from a small ship.

To address a changing mission amid broader challenges, the U.S. Marines are implementing the service’s future warfighting strategy this year through training, war gaming and experimentation. The strategy calls for forces to be dispersed over wide areas and will require technologies that enhance warfighters’ effectiveness over greater distances.

April 1, 2014
By Rita Boland
The Tactical Signals Intelligence Collection System helps boots on the ground by giving units more flexibility with their communications while conserving increasingly constrained resources.

The U.S. Marine Corps has combined two signals intelligence programs as part of its efforts to drive efficiency and enhance expeditionary operations. Streamlining activities for manpackable and vehicle-borne versions of similar capabilities increases both flexibility and redundancy in the field for the users.

April 1, 2014
By Robert K. Ackerman
Three soldiers from different forces are equipped with the Integrated Soldier System (ISS) that links the i-Aware TM-NVG night vision system with the SpearNet radio. Combining night vision with radio communications allows warfighters to send real-time battlefield imagery back to their headquarters as well as receive other situational awareness imagery and information from their commands.

Warfighters on foot equipped with night vision systems now can give their commanders a real-time glimpse of what they’re seeing in the field. A new system that combines a portable radio with night vision goggles allows the optical imagery to be captured and sent across the same radio channels used for voice and data communications.

April 1, 2014
By George I. Seffers
Albanian soldiers are attacked in a simulated riot during training at the Joint Multinational Readiness Center in Hohenfels, Germany. Researchers working with the Intelligence Advanced Research Projects Agency use open source intelligence to predict social upheaval events.

Researchers working on behalf of the U.S. intelligence agencies can use reams of open source, anonymous data to foretell social turmoil such as disease outbreaks or international political unrest. Once fully developed, the capability to predict coming events may allow U.S. officials to more effectively respond to public health threats; to improve embassy security before an imminent attack; or to more quickly and effectively respond to humanitarian crises.

April 1, 2014
By Rita Boland

The open source domain has a set of vulnerabilities unique in the intelligence world in terms of both what enemies can misuse and critical pieces that might be absent. Because of the public nature of open source, some experts tend to discount its value, while that same feature means that patient malefactors can put together different sources of data leaking through various measures until they develop a comprehensive, damaging picture. Different technologies are helping to mitigate the dangers as the public and private sectors also work to educate their people on safer practices.