Search Results for "" Intelligence ""
Not finding what you’re looking for?
10 of 25000 Results
Bits and Bytes Save Lives
Information operations are coming of age, moving through the exploration stage of adolescence and forward toward a future that some experts believe should feature ubiquitous integration. Although computer systems have already proved their ability to influence the nature of warfare, the maturation of doctrine and technologies is likely to bring with it even more substantial changes in the way the military conducts operations.
Information Operations May Find Definition And Validation in Iraq
The debates over information operations have shifted from academia and Pentagon studies, military exercises and computer simulations to joint warfare over the sands of Iraq. This is the first opportunity to document and evaluate the role information actually plays in evolving military transformation into truly joint operations.
Navigating Against Terrorism
The U.S. Coast Guard is using a nautical tracking and collision avoidance system to monitor cargo ships entering American ports. Operating on internationally accepted standards, the technology permits law enforcement and intelligence agencies to automatically query data such as a vessel's cargo, crew roster, port of origin and destination.
Sound Surveillance Locates Shooters
The Washington, D.C., Beltway sniper shootings, military campaigns abroad and steadily increasing terrorist alerts have inspired the creation of a law enforcement tool that promises to improve security in local jurisdictions and on the battlefield.
Putting a Face on Invisible Danger
Technology may be the key to ensuring that the public can respond quickly if a chemical or biological weapons attack occurs. Until recently, the U.S. population, protected by two oceans, had not given much thought to terrorism or to the intentional release of chemical, biological, radiological or nuclear materials. Occasionally, industrial or hazardous material accidents occur. However, these types of situations are usually dealt with through local emergency response teams to minimize the impact on the lives and health of the surrounding population.
Authenticating With Distinction
Information security researchers at George Washington University are studying new ways to strengthen identification authentication processes while keeping transactions as simple as possible. The techniques involve deliberate perturbations of traditional authentication processes and can be applied to password, token and biometric systems alike.
Upgrades Give Antimissile System the Upper Hand
More than 10 years of hardware, software and signal processing upgrades have transformed the Patriot missile system into an effective defensive shield against short-range and theater tactical missiles. The original system that achieved partial success in the 1991 Gulf War became a bulwark in the Iraq War, effectively neutralizing Saddam Hussein's theater ballistic missile threat.
Army's Muddy Laboratory Sparkles
At first glance, Hummer sport utility vehicles, more associated with yuppie urban commandos, would seem unrelated to the U.S. Army's radical force transformation plans. Nevertheless, in a highly innovative approach, the service bought commercial Hummers, cut them apart, stretched their length, and installed leading-edge communications and information technology systems.
Demonstrations Focus on Coalition Communications
The U.S. military will conduct its annual search for interoperability solutions next month with a renewed sense of urgency as nations continue to pull together to fight terrorism and government agencies pursue collaboration in homeland security efforts. Once again, this year, the focus will be on examining dozens of technologies that commands can employ to address immediate interoperability problems.
Air Force Looks At the Big Picture
The U.S. Air Force is embracing force transformation at the operational and organizational levels and moving away from platform-based modernization. To meet its requirements, the service is selecting new technologies and equipment based on the ability to enhance a variety of capabilities instead of a few narrowly defined missions.