High-speed communications call for multi layered protection.
Software locates spoken words and phrases at maximum velocity.
Analysts who must search hours of audio recordings for key words of particular importance to a mission now can find them in a matter of seconds with nearly 100 percent accuracy. Because the technology supports any task that requires the search, analysis and monitoring of voice content, potential customers for the capability range from intelligence organizations looking for terrorist code words to customer service personnel seeking to improve client relations. Additional applications include knowledge management, training and education.
Commercial sector and government agencies share military’s protect-and-defend mission.
Technology’s role in the worldwide war against terrorism and the critical part it plays in homeland security will be the focus of TechNet International 2002. Attendees will be privy to a wealth of information and view hundreds of technical solutions that address the key concerns of today’s military, government and industry leaders.
Telecommunications gurus join forces to take emergency preparedness into the cyberdomain.
Communication is the lifeline during crises, and as the world transforms its communications backbone from traditional telephony to voice over the Internet, a movement is underway to expand priority services to the Internet. Many countries already have telephony priority access capabilities in place to expedite emergency services and recovery operations, and they are using these capabilities as a starting point.
Military superiority, diplomatic deftness and economic clout are measurable and globally respected instruments of U.S. national power. Information, on the other hand, while a potent strategic resource and foundation for national power, has not earned equal recognition. Nowhere is this better illustrated than in the failure to win the battle for hearts and minds of Arab and Muslim populations. The world’s superpower is, in the view of most commentators, losing the propaganda war.
Command and communications no longer are a military exclusive.
Emergency responders to civilian crises soon may have the same command, control and communications capabilities that the armed forces use on the battlefield. Long-tested military communications technologies are being combined with state-of-the-art civilian systems to provide emergency communications when accidents, natural disasters or terrorist attacks damage or overwhelm an existing communications infrastructure.
Program puts battle management tools at commanders’ fingertips.
Researchers are developing a prototype technology that may replace traditional command posts. The system consists of manportable, lightweight computers loaded with battle management software and collaboration tools. The devices will permit commanders to conduct highly mobile operations while maintaining situational awareness and connectivity to superiors and subordinates across the battlefield.
Digital maps worth a thousand words in theaterwide system.
A prototype command and control technology allows joint task force commanders to plan and coordinate air defenses across broad operational areas quickly. The system combines a task force’s radars and datalinks into an easily understood graphic representation of the combat zone. Hostile aircraft as well as cruise and theater ballistic missiles are identified, and their headings and impact zones are indicated in near real time, providing officers with a complete view of the action.
Information technology’s role in homeland security and the defense of freedom cannot be overestimated. It is going to take an internationally coordinated effort to defeat terrorism, and information technology will be the key enabler that ties our efforts together. Indeed, one of the most oft-cited needs is for a network that allows local, state and federal government to work together in a major crisis or disaster—a challenge that encompasses networking, interoperability, security, collaborative tools and knowledge management.
New directions spur in-house research, industry outreach.
The war on terrorism has added a new sense of urgency to the Central Intelligence Agency’s science and technology development. The agency is accelerating its work in a number of key areas both to serve ongoing operations against al Qaida and to ensure long-term vigilance against asymmetric adversaries who are constantly changing their ways of operating.
Voice XML standard ready for mainstream use.
A voice-recognition protocol may be on the verge of widespread market acceptance. Developed by a consortium of major telecommunications and technology firms, the standard creates a set of programming rules that can be easily incorporated into existing telephone and wireless networks.
Sea and shore systems share applications.
The U.S. Navy is moving full-speed ahead on the tide of transformation by using the Web to address the military’s incessant problems with interoperability. The approach is called Web-enabling, and it is the same technique that allows consumers to transfer funds from a savings account to a checking account or register for a class at a local high school.