Search Results for "" Intelligence ""
Not finding what you’re looking for?
10 of 25099 Results
Global Threats Demand Credible Response in Less Time
The complexity of the command, control, communications, computers, intelligence, surveillance and reconnaissance environment has increased significantly during the diverse operations the U.S. military has supported in recent years. From the battlefields of Afghanistan and Iraq to the devastation in the Gulf Coast region, the ability to share information has been instrumental in saving lives and carrying out effective operations. However, the fast tempo of activity within such a short period of time has brought to light the challenges that still exist in sharing data among organizations.
M.J. Pizzella, U.S. General Services Administration
There was a time when federal agencies were required to buy their goods and services from the U.S. General Services Administration (GSA). The GSA's business was pretty much guaranteed. Like the days of the 10-cent postage stamp, however, that time has passed.
The Significance of the PATRIOT Act Transcends Politics
The headline-driven controversy over the PATRIOT Act tends to obscure many of the key issues that buttress this important element in the war on terrorism. The Free World is facing an unyielding enemy that is using every aspect of Western society-from its liberties and protections to its technological infrastructure-to suit its twisted ideology that lauds mass murder of innocents. The United States faces a difficult task in that it must adjust its institutions and its way of life to prevent further mass casualties, but it must do so without destroying the very foundation of our 230-year-old society.
Vital Data Stem Maritime Threats
Consistently locating and tracking the world's commercial vessels, their cargos and crews is like hoisting a halyard with a large holiday ensign during a nor'easter-tricky but not impossible. More than 80,000 commercial ships from more than 100 nations ply the seas at any given moment, making maritime domain awareness critical for the nation's protection.
Transportation Security Tackles Network Security
The Transportation Security Administration is doing more than just making sure travelers have a safe trip; it also is ensuring the security of the data, video and voice communications that travel on its network. In response to the deficiencies raised in a report issued by the U.S. Department of Homeland Security's inspector general last year, the administration acknowledged its network flaws and moved forward quickly to correct them. Among the issues that needed to be addressed were policies, processes and procedures concerning security testing, audits, and configuration and patch management.
One Card Fits All
A U.S. government effort will lighten the load of identification badges personnel must carry, but both federal officials and industry representatives now realize that they have run into a few snags. While substantial progress has been made, challenges in technology as well as economics, policy and testing continue to surface. Deadlines have been set and pragmatic plans put into place; however, it is still questionable whether one card can replace numerous identification badges in the near future.
Security Initiatives Drive Technology Development
Biometric scanners, gamma ray detectors and unmanned underwater vehicles seem like topics reserved for futuristic action-adventure movies. However, these technologies are being embraced by agencies under the U.S. Department of Homeland Security's umbrella. Technologies that serve to track, trace and contain or detain potentially harmful materials and individuals are being studied, tested and integrated into many homeland security activities.
Cybersecurity Demands Physical Security
In the United States, both corporate and Defense Department telecommunications have developed along a path of increasing complexity to support global geopolitical or commercial requirements. The paradox is that while this complexity improves the ability to support worldwide operations, the underlying network is becoming more vulnerable.
Warriors and Engineers Partner
The large hexagonal building's Tidewater architecture blends well with its placid Hampton Roads surroundings. Indeed, this bucolic Virginia setting belies the beehive of combat-related activity inside-experiments that are profoundly transforming the way this nation fights wars and protects its citizens.
NATO Undergoes Massive Transformation
Since launching its first offensive operation in Kosovo in 1999, NATO has been changing its command structure and improving its ability to deploy small troop units quickly to anywhere in the world. It has shifted from a regional focus to a global focus and from its traditional tendency of taking an immediate action outlook for the more proactive approach of preparing a vision for future operations.