Search Results for "" Homeland ""
Not finding what you’re looking for?
10 of 24995 Results
Tactical Concepts Come to Life
Emerging technologies and new strategies may result in as much as a tenfold increase in the U.S. military's operations planning capabilities. In what has been touted as the largest military experiment in history, participants analyzed how the armed forces will fight in the future and what tools they will need to wage war more effectively. Although many of the systems and concepts are aimed at a 2007 battlespace, several of them may bring more immediate benefits for warfighters.
Pacific Command Fights Terrorists On Multiple Fronts
Already tasked with maintaining a steady menu of operations covering one-third of the Earth's surface, the U.S. Pacific Command now is fully engaged in the war on terrorism. The command is fighting disparate al Qaida groups in different countries concurrent with supporting operation Enduring Freedom in the Afghanistan region.
A Pacific Nation Fights a Global War
When U.S. trade and military alliances are mentioned, Europe usually is the first region that comes to mind. That continent has been a long-established trading partner, and the nations ringing the North Atlantic set the global standard for democratic capitalism in the post-World-War-II years. In foreign affairs, NATO stands tall with more than half a century of security and peacekeeping that defines it as the most successful alliance in history.
Systems, Processes Digitize in the East
Communications system upgrades planned for the Korean theater will support network-centric warfare, transforming the Asia-Pacific region into a cutting-edge digital environment in both theory and practice. Armed with a vision of how information technology creates a common operational understanding of the battlespace, military leaders on the Korean peninsula are using lessons of the past to chart a new course for the future.
China Taps Many Resources For Coastal Defense
The interception of a U.S. Navy EP-3 signals intelligence reconnaissance aircraft over Chinese coastal waters early last year highlighted the activities of the People's Republic of China coastal defense forces, which have been low-profile and largely remain so today. Such interceptions and intrusions over Chinese waters and nearby coastal areas have occurred for decades, as with the former Soviet Union. In addition to the expected People's Liberation Army Navy assets, a surprising array of non-navy units are integrated into offensive and defensive military coastal roles, in part because the People's Republic of China has no force comparable to the U.S. Coast Guard. These units include coastal air defense as well as nonmilitary naval forces from a variety of paramilitary organizations.
Intelligence Re-engineers for Homeland Security
The Central Intelligence Agency is reallocating vital resources to address the urgent and long-term needs of the war on terrorism. In addition to transferring substantial numbers of analysts and increasing overseas operational activities, the agency is establishing new links with nontraditional domestic customers.
Signaleers Hit the Digital Ground Running
Rapidly changing technology, along with the high demand for well-trained communicators to support current operations, is testing the limits of the U.S. Army's human resources and training facilities. To meet this challenge, the service is moving quickly to ensure that the people who keep communications up and running have the skills they need for the systems they will use.
Broadcast Manager Circumvents Communications Traffic Jam
The U.S. Army is deploying a transportable satellite broadcast management and uplink system that features greater bandwidth than traditional satellite systems, reduces transmission time and frees space on other tactical communications equipment.
One Wavelength For Readiness
U.S. civilian emergency management and law enforcement agencies are becoming increasingly capable of interoperating with the U.S. Defense Department. By enhancing communications and computer networking systems, organizations are readying themselves for flexible multiagency and multiservice joint operations in the event of a natural or man-made disaster.
Scout Tags Unknown Hackers
A new type of defensive software protects computer networks by actively identifying reconnaissance probes and blocking subsequent attacks. The program operates in front of a firewall by marking all incoming scans and probes. The mark consists of false data about servers and other applications. Any attempts to penetrate the system using the distorted information is treated as an attack and automatically stopped.