Not finding what you’re looking for?
Virtual Exposition Crosses International Borders
Speakers in five Baltic countries recently used cyberspace to address security, global cooperation in the face of crisis, education challenges and the expanding use of technology. More than 40 presentations composed the first-of-its-kind online international conference and exhibition. TechNet Baltic 2001, organized by the AFCEA Stockholm, Oslo and Helsinki chapters and the Visby Telemedicine subchapter, took place September 24 through 28. The event was hosted by Finland, Lithuania, Norway, Russia and Sweden and featured a virtual exhibition where participants from anywhere in the world could view exhibitors' products and services.
One Plan,140 Actions, 500 Days to Execute
Information assurance, preserving radio spectrum, ensuring interoperability and establishing secure wireless links are just some of the tasks on the menu for the Defense Information Systems Agency. The agency's Defense Department-wide mandate has placed it at the nexus of the infosphere that increasingly is defining military operations worldwide.
Preparing to Protect The Digital Force
The U.S. Army is pushing to ensure that the people in charge of the latest tools in warfare are up to date in defending its information and computer networks. Personnel who are key to the service's transformation and its move to digitizing the force are being trained to install, configure, operate and maintain the latest communications systems and are learning to identify evolving threats to these systems.
Physical Disaster Propels Cybersecurity Initiatives
While U.S. military forces retaliate against terrorists for the horrific World Trade Center and Pentagon attacks, the Bush administration also is organizing to help shield the nation's critical information infrastructure. The White House is establishing U.S. cybersecurity functions under a single individual. That person will function as the president's special adviser for cybersecurity, reporting directly to both the new cabinet-level Office of Homeland Security and the National Security Adviser Condoleezza Rice.
Jolting Destruction Galvanizes U.S. Agencies To Walk the Walk
The Bush administration's declaration of war on terrorism allows federal organizations such as the National Security Agency to expand their electronic intelligence-gathering practices. With initial deployment of U.S. forces to the Middle East, demand to locate hostile terrorist cells and their support mechanisms immediately is rising, both in the United States and overseas. In addition, what had been a gradually growing requirement for U.S. forces to conduct information operations, including computer network offense and defense, is now switching to fast forward.
Technologists Plan Tactical Future
Unattended sensors in a future theater of operation detect enemy movements, identify and locate targets, and feed that information via unmanned aerial vehicle communications network nodes to the command center. Commanders collate their data with other information from space and U.S.-based sources, then signal unattended battlefield and airborne weapons to launch against enemy assets. These networked weapons keep track of battle damage and trade-off targets as they are destroyed.
Dressing the Wired Warrior
Warfighters soon may be wearing clothing with built-in radio antennas and global positioning system receivers. These items would be embedded in uniforms and equipment harnesses laced with internal wiring and circuitry that connect personal communications devices, computers and power supplies to form a single network.
Aerial View Sharpened By Data-Sharing System
The U.S. Air Force is examining technology that would enhance a B-1B Lancer crew's situational awareness while in the air and simultaneously record data that can be shared with other mission commanders or used to train future aircrews. The capability would provide pilots with information about existing threats, which would allow them to execute appropriate threat avoidance maneuvers.
Challenges Loom for Network-Centric Warfare
Several key impediments must be conquered if network-centric warfare is to achieve its potential for revolutionizing military operations. Long-standing concerns such as interoperability and cultural resistance are joined by issues of understanding human behavior and research and development investment. These elements threaten to slow or even derail efforts to incorporate the full advantages of network-centric warfare into U.S. forces by 2025.
U.K. Communications On Target
The British government has launched its ambitious program to create a state-of-the-art tactical communications infrastructure for its military. When complete, the United Kingdom's armed forces will have a secure radio system that operates a battlefield Internet jointly across multiple ground, air and sea platforms.