Not finding what you’re looking for?
Data Fusion Secures The Nation's Borders
Information is a key weapon for combating an illusive and a decentralized enemy. By collecting, analyzing and sharing data among key organizations, the United States enhances its ability to outmaneuver and strike at its adversaries and to defend its shores against attack.
Rust Belt Lessons for the Defense Department
Last month I toured an industrial site once famous for its manufacturing proficiency. In its heyday, this steel and shipbuilding facility dominated the industrial world. Sparrows Point, in Baltimore's harbor, was a symbol of U.S. manufacturing might. But, it also has a special personal connection. This former world-class facility of Bethlehem Steel—my hometown's namesake—was responsible for building the USS Saratoga, which was the post-World-War-II aircraft carrier on which I embarked for a nine-month nugget cruise as an Intruder pilot during operation Desert Storm.
Does DOD even address the primary concerns?
Rust Belt Lessons for the Defense Department. By Cmdr. Gregory E. Glaros, USN (Ret.)
Defense Intelligence Assumes More Diverse Missions
The unforgiving world that has taken shape after September 11, 2001, is changing both the nature of defense intelligence and its means of operations. Virtually every aspect of intelligence operations—collection, processing, analysis and dissemination—is changing to address new global threats and the transformation gripping the national security community.
Military Jointness Grows Up
The orderly structure of established nations' mighty militaries differs intensely from the structure of terrorist force organizations. In terrorist cells, distinctions between warfighters who trigger improvised explosive devices and those who detonate car bombs are miniscule. Battle cells may comprise as few as two or three people or as many as several dozen. Information sharing takes place incessantly, using everything from the Web to cell phones. As a force, terrorist groups are inherently flexible.
Warfighters Connect Without Cables
The U.S. military is expanding its options for creating secure wireless networks in urban and remote areas. The capability will increase the speed at which networks can be created in an emergency while reducing the amount of materiel troops need to haul into an area.
Collaborative Environment Connects Coalition Networks
The U.S. military is developing a suite of software applications that will allow secure communications between different national computer networks. This capability is essential to both coalition operations and disaster relief missions.
Technology Converges At Information Agency
The convergence of media and services in commercial cyberspace has its counterpart in the defense arena, where experts are tapping commercial technologies and standards to provide seamless information access to warfighters and decision makers.
Organization Targets Bandwidth Battles
Invisible conflicts are erupting on the battlefield as U.S. and coalition troops compete for precious electromagnetic spectrum. These e-turf wars may be silent, but they can be as deadly as enemy fire when warfighters have to choose between disarming an improvised explosive device and calling for close-air support. To resolve this conflict, the U.S. Defense Department now has an organization whose primary mission is to ensure that all warfighters have the spectrum they need when they need it.
Armed Forces Pay Per Use
The U.S. military is reducing excess and providing capabilities to personnel faster by implementing nontraditional contracts. The new arrangements allow the military to pay only for what it needs when it needs it and to take advantage of existing tools instead of duplicating efforts. The contracts enable the force to skip the cumbersome acquisition process and scale up services more quickly.