Not finding what you’re looking for?
War Brings Intelligence Agency, Military Closer
The Central Intelligence Agency and the U.S. military are embarking on a path to combine their complementary assets in the war on terrorism. Both national security elements have been taking on each other's characteristics-the military is transforming its force along a common denominator of information, while the intelligence community increasingly is engaging in active, even paramilitary, operations in the field.
Low-Technology Foes Require High-Technology Detection
Greater urgencies in both conventional and asymmetrical warfare are accelerating the development and deployment of measurement and signature intelligence systems. This rapidly growing discipline is delving into more diverse sources of data, and experts are advancing ways of using it to help other intelligence sensor systems. Concurrently, laboratory researchers are seeking to develop a totally new family of sensor systems that can detect everyday energy emissions from artificial and organic sources.
Signal Intelligence System Uncovers Enemy Sites
The U.S. Army has a new tool in its arsenal that allows mobile troops to gather intelligence about the location and activities of adversaries by pinpointing the source of signal transmissions and intercepting communications. The system will replace legacy electronic warfare systems that were developed more than 30 years ago, and it has already been deployed in Afghanistan in support of operation Enduring Freedom.
The Earthly Realities Of Cyberspace
Information technology is widely and often wildly heralded as the key to rearming the U.S. military for networked conflict, marshaling a host of disparate and dispersed bureaucracies to secure the homeland, and exporting American principles of liberty and justice. But, cloaked by hubris is the indisputable fact that the worth of information technology is established not by how much it costs, but how intelligently it is employed and how well it satisfies user needs.
Plowshares to Shields
U.S. government research centers are applying existing technologies in new ways to help fight the war on terrorism. These new applications will permit better detection of radioactive materials or chemical and biological weapons and aid first responders in the event of a chemical or biological attack.
Modeling to Thwart Terrorism
An interactive wargaming program developed by the U.S. military for joint force exercises is helping to protect potential terrorism targets in the United States. The software was employed to model security scenarios for the 2002 Winter Olympic Games in Salt Lake City.
Aircraft Company Shifts Direction
In warfare, as in chess, victory often depends on the ability to foresee the opponent's next move. So, it seems more than a little appropriate that Lt. Gen. Carl G. O'Berry, USAF (Ret.), a chess enthusiast, is now vice president of a company that is helping the United States develop an integrated battlespace designed to redefine modern warfare.
Rethinking Joint Information Operations
Businesses and the U.S. military have between them a multitude of information assurance programs to protect against cyberattacks; however, a recent research project reveals significant gaps in national policies, procedures and relationships that must be addressed to ensure success. As the United States becomes more dependent on technology and near-real-time data, information operations are evolving into a critical national security matter that requires a joint approach.
In-Motion Connectivity Unifies Information Grid
Miniaturized routers have been merged with mobile technology to give the military uninterrupted high bandwidth connectivity to mission-critical data as forces move throughout a theater of operation, all via one small rugged device. The capability could network troops in unique ways and solve defense-identified challenges of achieving seamless communications mobility between networks while addressing what is known as the form factor-maintaining a small device size and configuration. It can provide interoperability within a group as well as among defense organizations.
Communications Under Fire
In the war against terrorism, ship and aircraft activity may be foremost on the nightly news and in the public eye, but in information-age conflicts an almost invisible force is just as critical to mission success. The military service members who build communications infrastructure from the ground up under combat conditions have become major contributors to winning battles fought by joint and coalition forces.