Search Results for "" Homeland ""
Not finding what you’re looking for?
10 of 24997 Results
Fleet Boosts Cyber Might
With the ascension to full operational capability, the U.S. Fleet Cyber Command/10th Fleet is moving the U.S. Navy’s role in cyberspace alongside the ranks of space, air, surface and subsurface in defending the United States from attack. No longer viewed merely in a support role, information professionals are in operational mode worldwide. Their mission is to protect U.S. networks while contributing as a force multiplier by assisting in kinetic warfare and wielding nonkinetic effects.
Redefining the Battlespace
I spent some time last month in London at the AFCEA TechNet International event run by our AFCEA Europe office. This conference dealt with integrating the cyber domain into our concept of battlespace. It occurred to me during this discussion that our understanding of battlespace has changed fundamentally even before we add the cyber domain. Would we have considered the World Trade Center in New York part of the battlespace before 9/11? Would we have considered the London Underground part of the battlespace before 7/7? Probably not. In this age of asymmetric warfare, the boundaries of the physical battlespace are unclear. In this context, adding the cyber domain, which is broader than the Internet, is perhaps not as much of a stretch as it might have been prior to this redefinition of the physical battlespace.
Data Collection Resources Expand in Afghanistan
As conflict in Afghanistan intensifies, coalition allies are employing all elements of information-gathering technology to win battles while protecting themselves and civilians. Intelligence, surveillance and reconnaissance activity is at an all-time high as experts try to coordinate the largest armada of these capabilities ever deployed.
Practicing En Masse on the Open Sea
Sailors assigned to the USS Abraham Lincoln and USS Nimitz carrier strike groups had an uncommon training opportunity recently when they conducted a joint exercise in the waters near Southern California. Though carrier groups often operate together to respond to real-world events, disparate taskings and locations usually prevent combined rehearsals. But thanks to fortuitous schedules, the Lincoln and Nimitz assets were able to meet up in the vast Pacific, enabling personnel to combine resources in preparation for future mission requirements.
Digital Navy Poised to Set Sail
The U.S. Navy is steaming full speed toward attaining its dream of a digital force, but the most difficult part of the journey may lie just ahead. The sea service has its technological map, and its course has the endorsement of the top leadership. However, it must deal with a new set of challenges as its info-centric force evolves into a new form.
Navy Prepares to Take An Important First Step
It is the objective of the U.S. Navy’s Information Dominance Corps to manage a global network that delivers instant integration of military data across a number of separate specializations such as geographic, intelligence, logistics and manpower, as well as provide information about red or blue forces. The semantic Web will be the engine needed to power the effort.
Navy Delays Starting the NGEN
After 10 years of service, it is time to say goodbye to the Navy/Marine Corps Intranet—almost. The massive network serves more than 700,000 sailors, Marines and civilians and makes up about 70 percent of the total Navy information technology footprint ashore. It originally was supposed to finish its time with the Navy in early fall to make way for the Next Generation Enterprise Network. Instead, the sea service has extended the life of the Navy/Marine Corps Intranet and will spend $3.4 billion on a continuity-of-services contract to keep the network around for another 43 months.
Maneuver in the Global Commons—The Cyber Dimension
Much has been written about maneuver in various domains of conflict—land, sea and air. As in many other fields, the thinking owes much to the late Col. John Boyd, USAF, who is well known for his concept of the OODA loop (observe, orient, decide, act), and who contributed materially to thinking about maneuver warfare vice attrition warfare.
Information Security Organization Extends International Reach
(ISC)2 has created an application security advisory board that includes information professionals from the Asia-Pacific region, Europe and the Americas. The board will recommend ways to increase awareness of software that is not secure and help software developers understand how to introduce security directly at the software development level.