Search Results for "" Homeland ""
Not finding what you’re looking for?
10 of 25000 Results
Smart Encryption Hides Data in the Open
A prototype software security application encases data in an encrypted intelligent shell, allowing only an intended recipient to access the material. This software could permit warfighters, intelligence analysts and citizens to share information anonymously across the Internet and popular social networking Web sites. Users will be able to create online communities to communicate with other vetted individuals.
It's the Architecture!
This crude but highly effective approach might be just what U.S. federal information technology officials need. Those charged with managing the government's information technology networks—its vital nervous system—should remind themselves, "It's the architecture!" The present paradigm is hopelessly insecure and inefficient. No amount of federal largesse invested in the U.S. government's current Web-based architecture will ever take the nation where it needs to be. As the old Yankee once told the bewildered New York tourist seeking directions to Kennebunkport, Maine, "You can't get there from here."
Transformation Progressing For Intelligence Technology Backbone
The U.S. Department of Defense Intelligence Information System has completed phase one of a multiyear effort to transform into a more agile enterprise. This global information technology enterprise, led by the Defense Intelligence Agency, serves both analysts and warfighters and provides the backbone of intelligence technology for the Defense Department, combatant commands, the services and many other elements of the national security community. The transformation effort has enhanced the ability of the entire defense intelligence enterprise to serve the mission needs of the military.
Defense Firm Rebounds From Federal Penalty
Steve Gaffney vividly recalls the day he literally got a whack upside the head that gave him a lifelong lesson in success—one that would come in handy this year.
Experts Consider Data Collaboration Strategies
Views about sharing and retaining classified and sensitive information are changing as the U.S. government pushes to become more network centric. A recent gathering of information technology professionals found that although many technical hurdles remain to providing enterprise-level services across large organizations, the primary challenge is cultural.
NATO Ponders Web Effects
The extensive thrust to Web services in the military is raising as many issues as promised new capabilities. The broad-based effort is complicated by nations' differing approaches as well as by the rapid changes that characterize the 21st century Web.
Reflection, Hope and Victory in Iraq
A remarkable young Marine officer named Maj. Douglas A. Zembiec was killed in action on May 11, 2007, during his fourth tour in Iraq. What makes his story so compelling is not the fact that he was referred to as the "Lion of Fallujah" as a result of heroic actions during operation Vigilant Resolve in 2004 or as an "unapologetic warrior" featured in a Los Angeles Times interview three years ago. He was remarkable because his life and untimely death are emblematic of the men and women who serve our nation selflessly, without hesitation, quietly volunteering as Maj. Zembiec had done. How can each of us, from the comfort and security of home, meaningfully contribute to the common good of our nation?
Will failure to secure and stabilize Iraq threaten our way of life?
Reflection, Hope and Victory in Iraq By Cmdr. Gregory E. Glaros, USN (Ret.)
It's the Architecture! Do you agree?
It's the Architecture! By Christopher Mellon
DEEP PENETRATION
Like many of you I have just read (OK, I listened to the book tape) George Tenet's AT THE CENTER OF THE STORM My Years at the CIA, and like some of you I was in the audience on 19 June to hear Bill Studeman's remarks as he accepted the Baker Award. Both speak to the state of America's Intelligence Community (IC) ----- Tenet in terms of explanation and Studeman in terms of prescription. ---- in an unintended issue/response complimentary way.