Not finding what you’re looking for?
New Tools Keep Terrorists at Bay
Smart surveillance systems soon will make it difficult for militants to infiltrate mass transit facilities and secure installations. These technologies, along with advanced foreign-media monitoring and first-responder training applications, provide government and law enforcement organizations with a crucial edge against terrorism.
Debunking Information Security Myths
Viruses, worms, hackers, spam, disgruntled employees, flawed software, terrorists-cyberspace is rife with danger, but defending information has some pitfalls of its own. Information security specialists are the front-line warriors in this battlespace, and they may be making important decisions about which weapons to use based on misconceptions often promulgated by security product vendors. Industry experts have taken a closer look at some commonly held information assurance beliefs and claim that many are little more than myths.
Air Force Flies Into Network-Centric Airspace
The U.S. Air Force is building on new capabilities tested in Afghanistan and Iraq with a push for networked operations that exceeds many of the dreams of air combat planners of only a few years ago. New warfighting technologies in the pipeline for years are being melded with advanced sensors, data processing and information systems to produce a networked force that increasingly resembles a multicellular organism working to be the dominant life form in its environment.
Electronics Experts Chart Air Force Future
The U.S. Air Force is building its future around an info-centric force that must solve a myriad of problems related to networking of facilities, platforms and people. With new capabilities being tested and validated in combat operations over Iraq and Afghanistan, the Air Force is streaking headlong into becoming a networked force that operates around the concept of information as a constant throughout the battlespace. But, until challenges such as security, data commonality and funding are met, the future of the network-centric Air Force remains up in the air.
Satellite Modularity Soars to New Heights
The final frontier is about to become home to another layer of military capabilities with the launch of TacSat-1 and lift-off of a new concept for space-based assets. The launch, which is scheduled for late this month, is the first step toward tactically exploiting space and represents a dramatic change of the entire business model for designing and purchasing space-based systems. Providing warfighters with operationally responsive satellite communications, the scheme will enable military commanders to act more quickly and effectively in battle.
Surveillance Slips Into Cyberspace
Allied intelligence agencies engaged in computer-to-computer signals intelligence exploration are closely examining Internet protocol network intercepts and forensics analysis as a new weapon in the war against terrorism. Traditional signals intelligence professionals, who have shied away from this type of intelligence gathering for more than a decade, are realizing that the computer-to-computer intelligence gap can be filled. The fact that computer-to-computer signals intelligence is a weakness in current allied intelligence-gathering efforts is no secret. But after decades of denial, the intelligence community and emerging technologies are changing the old ways of looking at network surveillance.
Experimental Technology Connects Warriors
A prototype over-the-horizon communications system and an on-the-move command post that allows commanders to conduct fully mobile operations could help the U.S. Marine Corps maintain connectivity and situational awareness on the battlefield. Developed by the U.S. Marine Corps Warfighting Laboratory in Quantico, Virginia, both systems support the service's doctrine of ship-to-objective maneuver, which calls for the rapid deployment of troops and equipment from the seat to staging areas deep inside enemy territory.
The Front Line Is Less Clear On a 360-Degree Battlefield
Battlespace digitization was the focus of a number of leading experts as they debated the reality and trends evolving from this concept. The discussions were part of a recent international symposium in Paris presented by the AFCEA Paris Chapter and conducted under the patronage of the French Minister of Defense.
Steve Cooper, U.S. Department of Homeland Security
The U.S. Department of Homeland Security became the 15th cabinet department in January 2003, consolidating 22 agencies and more than 180,000 people under one unified organization. Prior to creation of the department, no single federal department had homeland security as its primary objective. One can only imagine the challenges it faces as a brand new department in this age of technology. The department's staff is confronted every day with building the enterprise architecture, developing its geospatial capabilities, enhancing its cybersecurity and improving its wireless technologies.
Tuesday, February 1, 2005
West 2005, the annual conference and exposition sponsored by AFCEA International and the U.S. Naval Institute, opened with a series of controversial speeches and panel discussions. The three days of conferences, speakers, panels and courses began with the Marine Band playing music ranging from marches to swing jazz. This proved to be something of a metaphor for the ideas that were exchanged on this first day. Being held February 1-3 in San Diego, this year's event mixed current events with prognostications in its program, "Beyond Iraq; How Do We Get Transformation Right?"