Search Results for "" Intelligence ""
Not finding what you’re looking for?
10 of 25004 Results
System Protects Video Communications
Demands to increase information sharing and collaboration among government agencies are creating a growing requirement for easy-to-use security products that facilitate classified communications. Many organizations are now realizing the benefits of videoconferencing; however, information protection in this area generally involves support from communications security-certified personnel, and moving from unclassified to classified conferences requires cumbersome procedures.
Lt. Gen. Steven W. Boutelle, USA
The U.S. Army and the commercial sector are very much engaged in new and emerging technologies, and the service is extending the edge of the network. In the past, the Army network went to the tactical brigades through mobile subscriber equipment. With the deployment of the Joint Network Transport Capability-Spiral One (JNTC-S) providing some of the Warfighter Information Network–Tactical (WIN-T) capabilities to one of the next units to deploy to Iraq (the 3rd Infantry Division), the Army will be extending the network down to the battalion level. And, now the information technology network reaches in some cases down to the platform-the soldier and/or the weapon.
Off the Shelf, Into Battle
A few weeks ago, there was a story on the evening news about a waitress in Texas whose son is a Marine stationed in Iraq. Although his unit could communicate with the higher echelons, its members were having difficulty communicating with each other while on the battlefield. He asked his mom to go to a local electronics store, buy a set of walkie-talkies and send them to him. She was happy to help the war effort, but what she didn't anticipate was the hit the equipment would be with her son's buddies who wanted walkie-talkies of their own.
Digitization Brings Quantum Growth in Geospatial Products
The National Geospatial-Intelligence Agency, fresh from assuming a new name less than a year ago, is striving to meet several self-imposed goals to address shortcomings and to confront the challenges of 21st century network-centric warfare. On its to-do list are converting fully to digital products and services; pursuing an e-business model; and transforming its architecture. It also seeks to pursue advanced forms of geospatial intelligence, including electromagnetic spectrum, and to mature the ability to capitalize on airborne collection. And, the agency's leadership foresees a need for two new headquarters facilities to deal with burgeoning responsibilities and an increased terror threat.
Geospatial Data Aids Emergency Response
A Web-based decision support system developed by private industry and university researchers allows government and military emergency responders to build situational awareness pictures of an unfolding crisis. The support tool taps data from diverse sources, translates it to a common database and presents it according to user needs.
Congress Scrutinizes Information Security Efforts
U.S. legislators are fighting to secure information systems on two fronts: the federal government and the private sector. And, they are worried that the government is underachieving badly at a most crucial time for information security.
Wireless Security Takes Shape at Defense
The future of the network may be wireless, but without security there can be no wireless network access for the military, according to the U.S. Defense Department. The department has issued a set of guidelines establishing policy for the use of commercial wireless technologies in the Global Information Grid, or GIG. The goal is to exploit the advantages of emerging wireless technologies without compromising the very core of the military's network-centric doctrine.
Security Processes Cross Lines
The U.S. Defense Department and defense contractors are learning a lesson about security from the financial world. In a current government-industry project, authentication experts in both communities are examining how to create a cross-credentialing approach that will facilitate access to military, government and corporate facilities while at the same time boost security. The effort does not focus on issuing yet another security token but rather on establishing standard processes. These processes foster a level of trust that can be accepted between agencies and companies.
Spyware Stymies Network Operators
The U.S. government is growing concerned about a family of computer programs that can infiltrate and compromise system integrity. These programs attach to a host computer during Internet browsing and send data to a third party about how that machine is operated. Although most of this code is used for legitimate business or marketing purposes, many types can circumvent firewall protections, leading to security breaches.
Keeping Troops Virtually in the Loop
An experimental Internet-based system could allow future warfighters to direct satellites and unmanned aerial vehicles and to acquire reconnaissance data and imagery immediately from tactical battlefield positions. The software-based technology treats space and air assets like Internet addresses, permitting remote users to request information from them or to monitor the status of platforms.