Not finding what you’re looking for?
Vital Data Stem Maritime Threats
Consistently locating and tracking the world's commercial vessels, their cargos and crews is like hoisting a halyard with a large holiday ensign during a nor'easter-tricky but not impossible. More than 80,000 commercial ships from more than 100 nations ply the seas at any given moment, making maritime domain awareness critical for the nation's protection.
Transportation Security Tackles Network Security
The Transportation Security Administration is doing more than just making sure travelers have a safe trip; it also is ensuring the security of the data, video and voice communications that travel on its network. In response to the deficiencies raised in a report issued by the U.S. Department of Homeland Security's inspector general last year, the administration acknowledged its network flaws and moved forward quickly to correct them. Among the issues that needed to be addressed were policies, processes and procedures concerning security testing, audits, and configuration and patch management.
One Card Fits All
A U.S. government effort will lighten the load of identification badges personnel must carry, but both federal officials and industry representatives now realize that they have run into a few snags. While substantial progress has been made, challenges in technology as well as economics, policy and testing continue to surface. Deadlines have been set and pragmatic plans put into place; however, it is still questionable whether one card can replace numerous identification badges in the near future.
Security Initiatives Drive Technology Development
Biometric scanners, gamma ray detectors and unmanned underwater vehicles seem like topics reserved for futuristic action-adventure movies. However, these technologies are being embraced by agencies under the U.S. Department of Homeland Security's umbrella. Technologies that serve to track, trace and contain or detain potentially harmful materials and individuals are being studied, tested and integrated into many homeland security activities.
Cybersecurity Demands Physical Security
In the United States, both corporate and Defense Department telecommunications have developed along a path of increasing complexity to support global geopolitical or commercial requirements. The paradox is that while this complexity improves the ability to support worldwide operations, the underlying network is becoming more vulnerable.
Warriors and Engineers Partner
The large hexagonal building's Tidewater architecture blends well with its placid Hampton Roads surroundings. Indeed, this bucolic Virginia setting belies the beehive of combat-related activity inside-experiments that are profoundly transforming the way this nation fights wars and protects its citizens.
NATO Undergoes Massive Transformation
Since launching its first offensive operation in Kosovo in 1999, NATO has been changing its command structure and improving its ability to deploy small troop units quickly to anywhere in the world. It has shifted from a regional focus to a global focus and from its traditional tendency of taking an immediate action outlook for the more proactive approach of preparing a vision for future operations.
In NATO, Technology Challenges Yield to Political Interoperability Hurdles
The greatest challenge facing NATO interoperability is the desire of individual nations to safeguard information and technology from their allies, according to the general manager of the agency tasked with enabling coalition interoperability.
Kabul Facility Brings Big Picture to Coalition Commanders
A new, state-of-the-art command center is coordinating the operations of allied forces in Afghanistan. It provides officers with enhanced connectivity and situational awareness and features a specially built network to share sensitive coalition data. A large on-site staff of liaison officers helps speed inter-organizational information sharing and decision making, allowing for more rapid and streamlined operations.
System Weaves Many Strands Into One Picture
The U.S. military has deployed a command and control technology that allows warfighters to view, store and act on information provided by a variety of sources such as cameras, unattended ground sensors and unmanned aerial vehicles. The system can superimpose live video images onto a three-dimensional map to create a persistent surveillance capability in a specific area, and it allows users to issue alerts based on specific activities such as people or vehicles entering restricted areas.