International tests demonstrate priority telecommunications and global interoperability.
Frank Suraci, technical director for the National Communications System’s (NCS’) Government Emergency Telecommunications Service (GETS), tests videoconferencing equipment for priority communications. The test was part of a 12-day interoperability exercise involving four countries.
Realignment streamlines integration of programs, projects and services.
Commanders in current operations rely on information technology to provide a common operational picture. Modernizing the acquisition processes at the Defense Information Systems Agency (DISA) will give warfighters the ability to build a user-defined operational picture by reusing capabilities in multiple ways.
Centers facilitate message transfer among legacy and defense systems.
Senior Airman John Ervin, USAF, 52nd Communications Squadron, Spangdahlem Air Base, Germany, configures a router to communicate with Croughton Royal Air Force from Dakar International Airport in Senegal. The National Gateway System improves the security of organizational messaging.
New policies and procedures address issues raised by inspector general report.
Transportation Security Administration (TSA) personnel use technology to screen and share operational data about its operations with airport personnel as well as other government agencies.
Decision makers can let their fingers do the talking.
The command center of the Cheyenne Mountain Operations Center, North American Aerospace Defense Command (NORAD), is the fusion center for data from other centers within the command. Portal technology will improve information sharing among personnel at NORAD, the U.S. Northern Command (NORTHCOM), other combatant commands and Canada The Multimedia Art Processing System (MAPS) is designed to automatically translate and transcribe foreign media broadcasts for analysis. The system's translation software provides a rough translation of a broadcast. MAPS can translate up to six media feeds simultaneously and perform key-word searches through live and recorded broadcasts. An HH-65 Dolphin stationed at Air Station Houston examines a ship inbound for the Houston Ship Channel. Patrolling from the air is one way the U.S. Coast Guard is incresing martime domain awareness (MDA).
Top-down intelligence will boost security.
The Washington, D.C., Metropolitan Police Department's Joint Operations Command Center, or JOCC, includes a wall of displays that can show informatoin ranging from three-dimensional simulated fly-throughs to live video feeds from around the district. On each side wall is a live radar feed from Reagan National Airport. An industry report by the Civitas Group LLC indicates that the market for homeland-security-related products and applications continues to grow. Consolidation among security service providers is driving much of this expansion.
Firms attract customers with packaged service offerings, move away from stand-alone products.
Data correlation technology enables tracking seemingly unrelated movements of terrorist cell members.
While U.S. military forces retaliate against terrorists for the horrific World Trade Center and Pentagon attacks, the Bush administration also is organizing to help shield the nation’s critical information infrastructure. The White House is establishing U.S. cybersecurity functions under a single individual. That person will function as the president’s special adviser for cybersecurity, reporting directly to both the new cabinet-level Office of Homeland Security and the National Security Adviser Condoleezza Rice.
Terrorists target homeland, civilian-owned infrastructures that are key to most military functions.
The Bush administration’s declaration of war on terrorism allows federal organizations such as the National Security Agency to expand their electronic intelligence-gathering practices. With initial deployment of U.S. forces to the Middle East, demand to locate hostile terrorist cells and their support mechanisms immediately is rising, both in the United States and overseas. In addition, what had been a gradually growing requirement for U.S. forces to conduct information operations, including computer network offense and defense, is now switching to fast forward.
U.S. military brings knowledge gained from experiments to bear on current challenges.
The war on terrorism and heightened homeland security are prompting the U.S. military to re-evaluate its priorities and accelerate the use of strategic concepts that only months ago were in the experimental stage. Although some of the tactical approaches are not in the polished form they would have been in several years from now, certain aspects can and are making their way into today’s efforts.
Network security detect-and-react model evolves into a system that forecasts and neutralizes cyberassaults.
Defensive information warfare posturing traditionally has taken the form of security—passwords, firewalls and locked doors. But with less than 100 percent confidence that intruders can be kept out of information systems, a U.S. Air Force and industry team is developing a fundamentally different defensive approach. They are creating a prototype that provides advanced warning of attacks on U.S. Defense Department systems so they are prepared when security is breached.
New technologies can unravel the complexities of global rogue organizations.
The United States has been using simulations for decades to explore the capabilities of its military forces and train soldiers to perform their missions better. In the war against terrorism, however, this technology can come out of the training centers and into the operations centers to support the country and its allies in fighting this new type of war and enhance homeland security.