Not finding what you’re looking for?
AFCEA Service Is a Timely Contribution
The decision to assume the helm of AFCEA International was one I made very easily. This is a prestigious organization with an honorable mission and an exciting future, both of which would present anyone with a strong sense of opportunity.
Conflict Accelerates Deployment of Conceptual Techniques
The war on terrorism and heightened homeland security are prompting the U.S. military to re-evaluate its priorities and accelerate the use of strategic concepts that only months ago were in the experimental stage. Although some of the tactical approaches are not in the polished form they would have been in several years from now, certain aspects can and are making their way into today's efforts.
Attackers Placed At Scene of Crime Before They Arrive
Defensive information warfare posturing traditionally has taken the form of security-passwords, firewalls and locked doors. But with less than 100 percent confidence that intruders can be kept out of information systems, a U.S. Air Force and industry team is developing a fundamentally different defensive approach. They are creating a prototype that provides advanced warning of attacks on U.S. Defense Department systems so they are prepared when security is breached.
Modeling and Simulation Adds Insight on Terrorism
The United States has been using simulations for decades to explore the capabilities of its military forces and train soldiers to perform their missions better. In the war against terrorism, however, this technology can come out of the training centers and into the operations centers to support the country and its allies in fighting this new type of war and enhance homeland security.
Anchors Aweigh on Servicewide Intranet
Despite a delayed launch, the first year of the maiden voyage of a different approach to military acquisition of information technology products and services has been mostly smooth sailing. The Navy/Marine Corps Intranet is well underway, and key leaders from both industry and the U.S. Defense Department say they are pleased with the progress that has been made so far.
Human Support Element Added to Technology Mix
The U.S. Navy is shoring up its information systems capabilities with the creation of a new restricted line designation for its officers. The information professional community will concentrate on space systems, information technology, network operations and protection, and enhanced fighting techniques. This new group joins the ranks of two long-established specialties in intelligence and cryptography.
Future Carrier Designed for Evolution
The next generation of U.S. Navy aircraft carriers will feature evolutionary rather than revolutionary advances in technologies and capabilities. The new vessels are being designed with an open architecture to permit growth in virtually every key component and system, and special allowances are being made for adding complex electronics systems as the Navy focuses on network-centric warfare.
Waiting for 3G
Regulatory and spectrum issues may delay widespread release of third generation wireless technologies in the United States and Europe. The root of the difficulty is the lack of available bands for new applications in North America and questions surrounding rule-making authority in the European Union.
Software Breaks Down Cellular Barriers
Cellular telephone users may be closer to achieving their dream of making telephone calls or accessing messages and services from anywhere in the world. Researchers have developed a software architecture that allows global roaming across all types of wireless systems. The technology offers the potential for upcoming third generation wireless telecommunications systems to operate beyond the current patchwork of regional and national networks.
WolfPack Hunts Down Enemy Emitters
An innovative research program may provide future warfighters with a flexible, highly accurate tactical jamming and signals intelligence system. Researchers are designing lightweight devices that can be seeded across a battlefield. Once in place, they will function individually or in concert to selectively detect, study and counter enemy communications networks and radar systems.