Search Results for "" Intelligence ""
Not finding what you’re looking for?
10 of 25006 Results
Little Computer Produces Big Results
A revamped tool integrates satellite and Global Positioning System communications to give commanders in the field improved situational awareness. It hosts Blue Force Tracking software and is designed to meet the needs of the dismounted user. The device will push resources formerly reserved for units with multiple vehicles to commanders and other individuals in light infantry units.
Cyberspace Command Logs In
The U.S. Air Force seeks to dominate networked warfare through a new command specializing in cyberspace operations. The organization will enable U.S. strategic efforts by providing a variety of services and capabilities from information assurance and network security to intelligence gathering and defensive and offensive cyber activities.
Building a Culture of Security
The commander of national cybersecurity has issued a call to arms to both private-sector and government organizations in the battle against cunning adversaries bent on wreaking havoc on U.S. critical infrastructures. During the past year, many sector-specific government agencies, including the U.S. Department of Homeland Security, have been working hand-in-glove with their industry counterparts to draft specific battle plans. Among the top priorities in the telecommunications and information technology sectors is conducting a national vulnerability assessment of all infrastructure. Similar plans also were designed for the other 15 component sectors covered by the department's National Infrastructure Protection Plan.
Agencies Review Effect Of Government Oversight
A new report grades the graders as computer security officers share how federal guidance and reporting are affecting their organizations. Many believe the regulations have improved their organizations' safety measures, but there is a disparity of opinion about effectiveness, and some contend that funding should be tied to the process.
Modernization Closes The Interoperability Gap
The U.S. military is moving its cryptographic capabilities into the 21st century with a major program to replace and upgrade legacy equipment and systems. The multiyear effort is introducing new algorithms designed to enhance interoperability and information sharing across the services and coalition allies. It also focuses on educating military customers about new technologies and coordinating with firms to include cryptographic systems in communications and computer systems.
More Than a Flash of a Pass
The U.S. Defense Department has established an identification authentication network between itself and private industry. The worldwide, federated system will protect physical access to military and secure locations while maintaining personnel privacy. The network ultimately will be used for logical access as well.
Smart Encryption Hides Data in the Open
A prototype software security application encases data in an encrypted intelligent shell, allowing only an intended recipient to access the material. This software could permit warfighters, intelligence analysts and citizens to share information anonymously across the Internet and popular social networking Web sites. Users will be able to create online communities to communicate with other vetted individuals.
It's the Architecture!
This crude but highly effective approach might be just what U.S. federal information technology officials need. Those charged with managing the government's information technology networks—its vital nervous system—should remind themselves, "It's the architecture!" The present paradigm is hopelessly insecure and inefficient. No amount of federal largesse invested in the U.S. government's current Web-based architecture will ever take the nation where it needs to be. As the old Yankee once told the bewildered New York tourist seeking directions to Kennebunkport, Maine, "You can't get there from here."
Transformation Progressing For Intelligence Technology Backbone
The U.S. Department of Defense Intelligence Information System has completed phase one of a multiyear effort to transform into a more agile enterprise. This global information technology enterprise, led by the Defense Intelligence Agency, serves both analysts and warfighters and provides the backbone of intelligence technology for the Defense Department, combatant commands, the services and many other elements of the national security community. The transformation effort has enhanced the ability of the entire defense intelligence enterprise to serve the mission needs of the military.
Defense Firm Rebounds From Federal Penalty
Steve Gaffney vividly recalls the day he literally got a whack upside the head that gave him a lifelong lesson in success—one that would come in handy this year.