Search Results for "" Intelligence ""
Not finding what you’re looking for?
10 of 25000 Results
Free World Nations Face Multifaceted Threats
Networked terror groups, domestic radicals, renegade states and terror for profit all threaten Western democracies to an unprecedented degree. Prospective targets might be high-profile infrastructure assets with the potential for high casualty totals, or they might simply take the form of attacks on public institutions to rapidly erode confidence in governments.
Legacy Organizations Hinder Intelligence Effectiveness
As successful as operation Enduring Freedom has been on the battlefields of Afghanistan, the lack of organizational reform in domestic U.S. agencies threatens the battle on the war's other front-the United States. Despite increased security measures and the heightened state of alert on the part of the public, the country is still highly vulnerable to further attacks by terrorists.
Afghanistan Is Only the Tip of the Network-Centric Iceberg
Years of designing, testing and deploying information architectures and technologies are paying off in the success of operation Enduring Freedom in Afghanistan. These successes in turn are laying the groundwork for future network-centric capabilities that will bring with them a considerable momentum for change in the U.S. defense infrastructure.
Marines Pursue Communications Systems Harmony
While operating forces are engaged on the front lines of defense and peacekeeping missions worldwide, some military commands and activities are at the forefront of a different type of battle-the one over information systems integration and interoperability. Like their combatant counterparts, these technology warriors have found that collaboration, cooperation and coordination are at the heart of a successful mission.
Linking the Farthest Shore
Recent U.S. Marine Corps deployments deep into Afghanistan for operation Enduring Freedom have demonstrated the service's growing digitalization. As troops disembarked to locations far from their amphibious ships, connectivity was maintained through a variety of mobile communications systems. On the tactical level, Marines used battlefield intranets to coordinate operations and send digital imagery to their commanders in near real time.
Old Technology Solves New Problems
Engineers have updated and improved a 60-year-old lens antenna technology to create a low-cost, high-gain steerable microwave antenna for satellite tracking applications. Conceived in 1944, the Luneberg lens currently is being employed to maintain two-way satellite contact when a satellite, a receiver or both are moving.
Hitting the Moving Technology Target
Rapid changes in both technology and U.S. military missions are mandating that information systems plans be comprehensive as well as flexible. Within this transformational environment, most organizations recognize the need for strategic plans that improve their ability to accomplish their goals; however, many times these plans fail to achieve the desired results.
Information Operations Begin at Home
The recent success of network-centric warriors in operation Enduring Freedom has shined the spotlight on information operations. News reports are flush with stories of how allied forces employed information for precise real-time targeting of enemy assets. The results of these operations stand in testimony to their effectiveness: a brutal totalitarian dictatorship overthrown and its terrorist cohorts routed from their places of sanctuary.
Technology Empowers Information Operations in Afghanistan
Satellite communications, Web services and imagery have come of age in the battlespace of operation Enduring Freedom. This first network-centric war has revealed an explosion in capabilities that has been matched by information demands at all levels of command.
Army Cyberwarriors Prepare for Broader Future
The menu for U.S. Army information operations now runs several courses long as the service integrates low-end news activities directed at local populace with high-end cyberspace defense and attack. As all of these elements come together in a common operational mode, the future cyberwarrior may see netwar visualization capabilities that provide cyberspace situational awareness akin to icon-driven battlefield monitoring systems.