Search Results for "" Intelligence ""
Not finding what you’re looking for?
10 of 25006 Results
Future Combat Systems Makes the Grade
TThe U.S. Army’s ambitious transformation program is making headway with a series of successful tests and demonstrations. Designed to create an integrated family of vehicles, robots and weapons systems linked through a unified battlefield network, the program has been criticized as being overly complex and expensive. But Army officials hope that the recent tests, coupled with the initial deployment of components of the new system, indicate that the overall effort is on track.
Intelligence Cell Defends Cyberspace
A small yet dedicated cadre of network and intelligence experts is helping keep the U.S. Army’s network safe in Europe—and by extension, worldwide—by ferreting out the bad guys in cyberspace. This unique group of civilian soldiers characterizes the threat by examining how adversaries ping and attempt to infiltrate networks, and then it seeks to find their motives. Rather than simply identifying the techniques enemies employ, the group provides the service with the context surrounding attacks so cyberwarriors are better prepared to defend the Army’s information infrastructure.
The Corporate Cyberspace Menace You Don't Know
The business community may be both a back door and a front door to espionage activities that threaten U.S. national security. Hostile governments always have viewed companies that do business with their government as a possible conduit for valuable intelligence. But now that threat is extended to those companies’ own activities in the global economy.
Training Vital to Network Defense
U.S. military and government computer networks are under constant attack from a variety of shadowy online enemies. Until recently, these threats were individuals or small groups without any major financial support. But just as advances in technology are making solo hackers more dangerous, the nation also faces a growing cyber threat from well-funded and equipped groups backed by organized crime or nation-states.
Commercial Firm Warns of Threat to Federal Computers
Chalk it all up to Melissa, a computer virus that spread rapidly on the Internet and shut down entire e-mail systems. For both the computing public and the information security industry, the Melissa virus—named for a Florida lap dancer, of all things—was a huge wakeup call.
Countries Collaborate To Counter Cybercrime
It’s a small world after all. As the Internet continues to connect peoples across the globe, individuals and groups drawn to destruction find new ways to wreak havoc on communications and services. Now, government leaders are coming together with each other and the private sector to form a united front and fight back because a vulnerability in any region can wreak havoc globally. A new multilateral federation is combating cyberthreats and cyberterrorism, creating greater security in developing networks and stopping dangers before they spiral out of control.
Plan Revamps Security Clearance Process
Say the words “security clearance” in a conversation with defense contractors, and the vast majority has a tale to tell of long waits and missed opportunities. Those two words have people in Washington, D.C., talking too. For two years, the organizations in charge of the security clearance process have worked hard to improve it. But for many, the time for revamping the old is over, and the time for creating a new process has begun.
United Kingdom Sets up Electronic Borders
The United Kingdom is securing its border by throwing an electronic net around the entire nation. The U.K. Electronic Borders program, known as e-Borders, aims at keeping track digitally of every individual who enters or exits the country.
Guard Ready for Emergencies
Hurricanes here, manmade trouble there, disasters, disasters everywhere. Between Mother Nature running amok and human-borne disasters, Florida has its share of dangerous incidents. Fortunately, the state is putting new measures in place to protect its citizens, and sharing them with other states. A cutting-edge communications system has been developed to fill gaps in current capabilities and offer new resources to emergency responders, and it is ready to take on whatever the rest of 2008 (and beyond) decides to dish up.
Information Assurance is the Ultimate Joint Endeavor
Cyber warfare. Critical infrastructure. Increased threat. Information assurance—or information security—is not the endeavor it used to be. The democratization of the Internet has had the same, albeit unwelcome, effect on criminal cyberspace activities. The extensive incorporation of information systems and networks into every facet of our lives has created a web of vulnerability across the spectrum of society. A threat can emerge from anywhere at any time in virtually any form.