Search Results for "" Homeland ""
Not finding what you’re looking for?
10 of 25000 Results
CONFLICTED
Several intelligence issues worthy of examination and discussion emerged in August. There's the NIE on the "Prospects for Iraq's Stability;" the Foreign Surveillance debate between the Congress and the DNI; and the Congressionally mandated release of CIA's Inspector General's 2005 report on the Agency's performance pre 9-11.
Employee Transfer Effort Taps Technical Expertise
A unique exchange program permits government and private sector organizations to exchange high-tech workers. The goal of the Information Technology Exchange Program (ITEP) is to provide both sectors with an opportunity to share best practices and to better understand each other’s operating practices and hurdles.
The Army's Network Revolution Ends
The U.S. Army's revolution in communications and information systems is winding down, but the frenetic activity that defined it is being replaced by a steadier progress toward a fully networked force. The result is a focus on capabilities rather than on enabling technologies as the Army continues to extend the benefits of the network down to the warfighter.
Engineering Network-Centric Warfare
After several changes in course, the U.S. Army is back on track for modernization and digitization. World events and priority shifts compelled the service to reassess its trajectory to take better aim at these moving targets whose pace quickens with the introduction of each new technology. Although the sheer size of the force and scale of the job amplifies the challenges, Army leaders say the service is now on a flexible yet stable path that leads to successful network centricity in the long term.
Little Computer Produces Big Results
A revamped tool integrates satellite and Global Positioning System communications to give commanders in the field improved situational awareness. It hosts Blue Force Tracking software and is designed to meet the needs of the dismounted user. The device will push resources formerly reserved for units with multiple vehicles to commanders and other individuals in light infantry units.
Cyberspace Command Logs In
The U.S. Air Force seeks to dominate networked warfare through a new command specializing in cyberspace operations. The organization will enable U.S. strategic efforts by providing a variety of services and capabilities from information assurance and network security to intelligence gathering and defensive and offensive cyber activities.
Building a Culture of Security
The commander of national cybersecurity has issued a call to arms to both private-sector and government organizations in the battle against cunning adversaries bent on wreaking havoc on U.S. critical infrastructures. During the past year, many sector-specific government agencies, including the U.S. Department of Homeland Security, have been working hand-in-glove with their industry counterparts to draft specific battle plans. Among the top priorities in the telecommunications and information technology sectors is conducting a national vulnerability assessment of all infrastructure. Similar plans also were designed for the other 15 component sectors covered by the department's National Infrastructure Protection Plan.
Agencies Review Effect Of Government Oversight
A new report grades the graders as computer security officers share how federal guidance and reporting are affecting their organizations. Many believe the regulations have improved their organizations' safety measures, but there is a disparity of opinion about effectiveness, and some contend that funding should be tied to the process.
Modernization Closes The Interoperability Gap
The U.S. military is moving its cryptographic capabilities into the 21st century with a major program to replace and upgrade legacy equipment and systems. The multiyear effort is introducing new algorithms designed to enhance interoperability and information sharing across the services and coalition allies. It also focuses on educating military customers about new technologies and coordinating with firms to include cryptographic systems in communications and computer systems.
More Than a Flash of a Pass
The U.S. Defense Department has established an identification authentication network between itself and private industry. The worldwide, federated system will protect physical access to military and secure locations while maintaining personnel privacy. The network ultimately will be used for logical access as well.