August 2002

August 2002
By Robert K. Ackerman

But different approaches may be needed for specific applications.

Government and private industry are struggling to grasp different aspects of the same challenges as they implement network-centric operations. Whether involved with e-commerce or battlefield situational awareness, organizations stand to gain substantially from a networked information infrastructure. However, some solutions—architectures, protocols or security measures—that work in some areas may not be applicable to others.

August 2002
By Maryann Lawlor, Henry S. Kenyon and Robert K. Ackerman

Leaders brace for unrelenting terrorist threat, warn against complacency and inflexibility.

Battlefield applications of 21st century communications and information technology capabilities allow commanders to assess their own positions as well as the locations of enemies. Soldiers in the field can receive orders and take action in record time. However, an intense dialogue is in progress on how best to employ these technologies to win the war against terrorism.

August 2002
By Maryann Lawlor, Henry S. Kenyon, Robert K. Ackerman, Tanya S. Alexander

While weaving the thread of homeland security throughout the panel discussions at TechNet International 2002, speakers also expressed candid views about the problems that must be solved to make the best use of today’s technical capabilities. Topics included network-centric warfare, biometrics, smart cards and emergency communications.

Donald L. Zimmerman, chief executive officer, Synergy Incorporated, moderated a panel that discussed how technology can support homeland security. Presenters agreed that many of the required technical solutions are available; however, the government must acquire them then integrate them within many agencies.

August 2002
By Henry S. Kenyon

Super-sensitive imaging systems cover new ground.

In the near future, laser-based detection systems will allow military aircraft to identify enemy ground vehicles accurately in battle zones and permit spacecraft and robotic vehicles to navigate safely through unfamiliar terrain. The technology is built around highly sensitive optical detectors that measure minute amounts of reflected laser light. These systems do three-dimensional modeling of scanned objects in real time, offering missile defense systems the capability to differentiate between re-entry vehicles and decoys.

August 2002
By Henry S. Kenyon

Scientists seek to provide computers with greater understanding of dynamic visual data.

Advances in visual processing may soon allow robot vehicles to travel autonomously across battlefields and city streets. Researchers are developing mathematical models that offer insight into how mechanical and biological systems interpret images for movement and navigation. The answers will provide a key to designing more sophisticated automated guidance systems for commercial and military use.

August 2002
By Joseph McKendrick

Open systems require multilevel security solutions.

Government agencies and commercial companies that are striving to share data to protect citizens or improve service to customers are discovering that as access to data increases, information security challenges grow exponentially. To address this concern, trusted security approaches emerging from government applications offer information assurance at both the operating-system and relational-database-management levels.

August 2002
By Maryann Lawlor

Network protection takes top priority in Navy/Marine Corps Intranet rollout.

Defense in depth is the key to securing what will be one of the world’s largest intranets. The U.S. Navy is using a layered approach to protect the systems that will connect all of its land commands and, through satellites, its ships at sea.     

August 2002
By Maryann Lawlor

Stage is set for capability surge.

August 2002
By Henry S. Kenyon

Changing threats, technologies redefine notions of network security.

Research is extending the boundaries of information assurance technology to include the operational reliability of individual systems and the ability of tactical wireless networks to remain secure. Scientists are developing agile solutions to counter new types of cyberassaults and to protect vulnerabilities detected in emerging technologies.

August 2002
By Maryann Lawlor

Software facilitates shielded collaboration between agencies.

Technology is now available that allows various organizations to share information from their databases without compromising their sources or individual agency policies. The software would enable national security and law enforcement groups to coordinate their efforts by facilitating the tracking of suspicious individuals and their activities.

Auust 2002
By Vice Adm. Herbert A. Browne, USN (Ret.)

The challenge of providing secure information is not new. Since the early days of computer networking, we have been striving to ensure the sanctity of bits and bytes. As computer and communications technologies advanced exponentially, so did the security challenges facing our information community. Now, information systems are everywhere and have become essential elements in the daily operations of industry, civil government, the intelligence community and military forces.

We must view information in today’s world much like we think of oxygen in the air. It is an essential part of life, it is ubiquitous, and its denial or contamination can be life-altering or even fatal.

August 2002
By Robert K. Ackerman

The long-desired cooperative relationship now is a matter of national survival.

The United States has recruited private industry to help fight the war on terrorism on the home front. The next battlefield may be cyberspace, and the government is working with its operators to protect and defend crucial assets in that realm against attacks that could potentially cripple the country.

August 2002
By Maryann Lawlor

Agency funding contingent upon systems’ protection.

While military combatants continue to fight the war against terrorism on the battlefield, U.S. government officials are stepping up work to protect the borders of cyberspace. Information infrastructure security is such a high priority that government agencies are now required to provide reports on risk assessments, system security needs and security plans before they receive program funding.

August 2002
By Henry S. Kenyon

Initial contract covers units for ground vehicles, helicopters.

The U.S. military’s goal of a network-centric warfare capability is a step closer to reality with the recent contract award for the development of a long-awaited family of advanced radios. The devices will eliminate communications difficulties between terrestrial and airborne units through the use of common waveforms, creating greater situational awareness and enhanced survivability for warfighters.