Search Results for "" Intelligence ""
Not finding what you’re looking for?
10 of 25106 Results
Flying Robots Share Battlefield Data
An airborne networking system may soon provide warfighters with real-time battlefield data gathered from sensors and reconnaissance platforms across a theater of operations. A high-altitude unmanned aircraft serving as a flying information exchange will link to a constellation of low-altitude robot air vehicles, making this capability possible. Users will be able to access data from battlefield computers and ground terminals.
Solution Delivers Information to Analysts
Investigators performing computer forensics can now do their jobs from the beach—or anywhere else. An emerging technology eliminates the need for experts to have hardware in hand before examining a system and works around legalities that prohibit the transport of information across borders. The technology has applications across law enforcement, the military, the intelligence community and private industry.
Misguided Policies Restrict Guaranteed Reliable Communications
The U.S. Defense Department is investing billions of dollars in new military satellite communications (MILSATCOM) systems such as the Advanced Extremely High Frequency (AEHF), Wideband Global Services (WGS) and Transformational Communications System (TCS) to transform the way U.S. forces communicate and operate in modern combat. Unfortunately, reliance on these expensive and delayed programs has hampered the networked capabilities of operating units. Specific programs
Should commercial infrastructure be given a bigger role in opening up the networked capabilities of operating units?
Misguided Policies Restrict Guaranteed Reliable Communications
Cmdr. Gregory E. Glaros, USN (Ret.)
Why Have a Lock If You Leave the Door Open?
We humans are very resourceful creatures. When faced with a threat we are able to create innovative, effective ways of protecting ourselves. Back at the dawn of time when humans were stalked by prowling predators, they leaned to build a roaring fire at the mouth of the cave to keep the threat at bay. Yet that fire needed to be strategically placed and well maintained to be useful. Let it die out and there was a good chance someone became a midnight snack for a creature with very big teeth. That’s why it is always amazing when somebody decides that a proven security device is inconvenient and devises a way, sometime a very resourceful way, of circumventing it.
WHAT WE HAVE HERE IS A FAILURE TO COLLABORATE!
I was in Chicago the week after Labor Day for the DNI's "Analytic Transformation - Moving Forward Together - Symposium" where 400 Intelligence Community (IC) "dignitary" gathered to affirm their belief that information sharing and collaboration enabled by technology can now truly transform intelligence analysis.
Information Sharing and Collaboration
Planning, Budgeting, and Execution
Is the African Command an altruistic effort to stop humanitarian ravages or a hypocritical attempt at regional hegemony?
The New Africa Command: A Hedge Against Neocolonialism or a True Agent of Change? By Cmdr. Gregory E. Glaros, USN (Ret.)
Reflecting on the Past, Viewing the Future
My involvement with AFCEA goes back 38 years. I have been in a number of volunteer leadership positions at the chapter and international levels, and I am excited about starting out on this journey as your association's president and chief executive officer.
Finland Revamps Its Military
Finland's military is facing its own force transformation as it alters its structure and its mission. The Baltic nation is looking at broad-based equipment modernization, substantial personnel cuts and a network-centric architecture to define its armed forces.