Search Results for "" Homeland ""
Not finding what you’re looking for?
10 of 25541 Results
Cultural Changes Drive Intelligence Analysis
New collection and storage technologies, along with the need for greater collaboration across the intelligence community, are changing the nature of intelligence analysis. But obstacles that stand in the way of that change could prevent intelligence analysis from achieving its full—and necessary—potential to serve national requirements in the Global War on Terrorism.
China Deploys New Littoral Ships
The People's Republic of China has launched a new series of frigates that provide an effective modern capability for littoral operations. Known as the Type 054 series, these new frigates can be categorized into two classes—the 054 Jingkai and the newer, much more capable 054A. The first appeared about four years ago, but China could be gearing up to produce both variants in large numbers.
Towed Buoys Bring Network Centricity to Submarines
As vastly improved surveillance capabilities and long-range, low-observable, precision-guided weaponry proliferates, the nuclear-powered submarine is emerging as the most likely platform to reach congested regions rapidly, to enter them covertly and to survive there for long periods. In today's FORCEnet environment, better near-real-time connectivity with submarines has become a goal of both technical and operational entities within the U.S. submarine force.
System Ensures Munitions Hit Their Mark
Forward observers are trading in their pencils and voice communications systems for a more digitized approach to calling for fire. A handheld technology reduces the chance for human error, enhances accuracy and saves troops valuable time.
Allies Make Room at the Communications Table
Interagency is the new joint. The U.S. military branches are shifting focus from developing methods for working with one another to determining the technologies and policies necessary to collaborate with other U.S. agencies and international partners. As warfare moves into the fourth generation, with an asymmetric, transnational enemy and battlefield, the need for better cooperation among allies and better understanding of a smart and technically savvy foe will be the keys to victory in a long war.
Data Fusion Secures The Nation's Borders
Information is a key weapon for combating an illusive and a decentralized enemy. By collecting, analyzing and sharing data among key organizations, the United States enhances its ability to outmaneuver and strike at its adversaries and to defend its shores against attack.
Rust Belt Lessons for the Defense Department
Last month I toured an industrial site once famous for its manufacturing proficiency. In its heyday, this steel and shipbuilding facility dominated the industrial world. Sparrows Point, in Baltimore's harbor, was a symbol of U.S. manufacturing might. But, it also has a special personal connection. This former world-class facility of Bethlehem Steel—my hometown's namesake—was responsible for building the USS Saratoga, which was the post-World-War-II aircraft carrier on which I embarked for a nine-month nugget cruise as an Intruder pilot during operation Desert Storm.
Does DOD even address the primary concerns?
Rust Belt Lessons for the Defense Department. By Cmdr. Gregory E. Glaros, USN (Ret.)
Defense Intelligence Assumes More Diverse Missions
The unforgiving world that has taken shape after September 11, 2001, is changing both the nature of defense intelligence and its means of operations. Virtually every aspect of intelligence operations—collection, processing, analysis and dissemination—is changing to address new global threats and the transformation gripping the national security community.
Military Jointness Grows Up
The orderly structure of established nations' mighty militaries differs intensely from the structure of terrorist force organizations. In terrorist cells, distinctions between warfighters who trigger improvised explosive devices and those who detonate car bombs are miniscule. Battle cells may comprise as few as two or three people or as many as several dozen. Information sharing takes place incessantly, using everything from the Web to cell phones. As a force, terrorist groups are inherently flexible.