October 2007

October 2007
By Cmdr. Gregory E. Glaros, USN (Ret.)

October 2007
By Rita Boland

 
With Remote Forensics, computer forensics analysts can use a mobile telephone to perform investigations. The system enables forensics analysts to remain at one location and carry out analyses on computers anywhere in the world.
Rather than sending experts to the computers, organizations use hardware and the Internet to disseminate data around the world.

October 2007
By Rita Boland

 
High-ranking U.S. Department of Homeland Security officials review key information during a teleconference briefing. The ability for government agencies to share and protect sensitive information may be key to effective disaster response as well as other internal and external operations.
Consortium offers answers in the form of architecture.

October 2007
By Henry S. Kenyon

 
Project Marti will use a high-flying unmanned platform to collect data from a variety of low-flying unmanned aerial systems (UASs) such as this ScanEagle. Hovering high over the theater of operations, the system will collect sensor information and transmit it to users below.
Linked unmanned platforms to offer troops instant mobile information architecture.

October 2007
By Maryann Lawlor

October 2007
By Maryann Lawlor

October 2007
By Robert K. Ackerman

 
The system continues to evolve, but its adoption is not universal.

The intelligence community’s one-year-old Intellipedia already is paying benefits to its users, according to Central Intelligence Agency officials. However, a majority of the community remains unfamiliar with its benefits and uncomfortable with its use.

October 2007
By Rita Boland

 
Intelligence experts from nine nations work together in the Coalition Intelligence Fusion Cell in Bahrain. The cell develops intelligence that coalition naval task forces can use to maintain security and stability in the region.
As warfare and problems change, people and procedures adjust as well.

October 2007
By Henry S. Kenyon

 
The United Kingdom’s Dabinett program seeks to link all of the nation’s intelligence, surveillance, target acquisition and reconnaissance (ISTAR) platforms, such as this Sentinel airborne stand-off radar aircraft, into a single architecture capable of providing continuous battlefield surveillance.
New structure will manage, control platforms and spread data to services.

October 2007
By James C. Bussert

 
A Chinese Type 051C destroyer is serviced in a shipyard. This destroyer has been equipped with an adapted land-based air defense system for fleet defense. Note the aircraft carrier in the background.
The Middle Kingdom’s new north star shifts the delicate sea balance of power.

October 2007
By Kent R. Schneider

We are seeing a level of partnership and collaboration in information sharing that we never have seen before. The national security community, now expanded to include homeland security, long has recognized the need for information sharing, and we have had some interfaces among these elements for some time. But only in the past few years has this requirement received appropriate priority. Homeland security, the Global War on Terrorism and increased emphasis on nontraditional missions have placed a premium on information sharing. However, this remains a work in progress.

October 2007
By Robert K. Ackerman

 
An antisubmarine SH-60F helicopter with the USS John C. Stennis takes part in exercise Valiant Shield 2007 in the Pacific Ocean. The U.S. Pacific Command is conducting joint and coalition exercises to improve operations and extend security efforts throughout the vast Asia-Pacific region.
Coalitions key to large-area security.

October 2007
By Rita Boland