Home

Technology

 

 
 
PREV
1 2 3 4 5
NEXT
Communication
INTERCEPTION CAPABILITIES 2000  

Communications intelligence (Comint) involving the covert interception of foreign communications has been practised by almost every advanced nation since international telecommunications became available. Comint is a large-scale industrial activity providing consumers with intelligence on diplomatic, economic and scientific developments. The capabilities of and constraints on Comint activity may usefully be considered in the framework of the intelligence cycle.Globally, about 15-20 billion ...Read more >

39 Pages
1.41 MB
THE FUTURE OF HIGH FRUEQUNCIES IN CRYPTOLOGY PART-II  

High Frequency, nominally 3-30 MHz, provides an effective communications medium over distances from kilometers to the antipode (20,000 K.M).To a good extent the choice of frequency is a fuction fo range.Thus,for short distances the lower end and for long distances the higher end of the band are utilized.This fact is directly reflected in SIGINT target assignments,the army and Marine Corps concentrate on short range battlefield communications transmitted below about 10 MHz,the navy on long range ...Read more >

19 Pages
1.79 MB
THE FUTURE OF HIGH FREQUENCIES IN CRYPTOLOGY  

Cryptology is now beset by many difficult problems at a time of curtailed funds and rapid technological innovations in comunications.It is imperative to reexamine traditional operations and introduce concepts designed to meet challenges of the future in SIGINTs three main areas, interccept,analysis,and timely distribution of significant end product reports.This paper attmpts to address only one portion fo the first item, high frequencies.For SIGNIT,HF is intensive in manpower and costly in ...Read more >

15 Pages
1.69 MB
TACTICS, TECHNIQUES AND PROCEDURES (TTPS) FOR THE JOINT NETWORK NODE-NETWORK (J-NN-N)  

The Army is quickly and continually transforming to the Land Warrior Network (LandWarNet). The overarching focus of LandWarNet is the Army’s transformation into joint, network-enabled, interoperable, knowledge-based warfare. A key enabler for transforming these operational capabilities is information superiority. Information superiority is the capability to collect, process and disseminate an uninterrupted flow of information while exploiting or denying an adversary ability to do the same. ...Read more >

145 Pages
4.53 MB
THE EVOLUTION OF SIGNAL DOCTRINE  

With the Information age upon us, many are proposing new signal doctrine based on technology.So now it is important to review signal doctrine and to see what,if any,lessons can be learned form tracking its evolution.While signal doctrine has evolved through conflict,changing along with Army doctrine and technology, certain key principles of signal communications are so universal that they have endured for world war II to the present ...Read more >

50 Pages
2.12 MB
MAKING GIG IA ARCHITECTURE REAL WITH AFG  

The IA and knowledge communities are active and this edition of the IAnewsletter is full of interesting and valuable information starting with a short article about IATAC’s latest SOAR—The Insider Threat to Information Systems: A State-of-the-Art Report (SOAR). The SOAR was written by IATAC Subject Matter Experts (SMEs) after extensive coordination with government, industry,and academic experts in this field. It provides a comprehensive look at the most significant of today efforts in ...Read more >

32 Pages
2.98 MB
WIDEBAND RADIO FREQUENCY MODULATION  

The proposed wideband based systems are readily reprogrammable in the field and are inherently agile in space, frequency, time and coding. The Joint Tactical Radio System (JTRS) is but a first step towards these agile wideband systems. Investment in wideband systems will positively impact necessary high capacity data links, critical missions and adaptation to the varied and changing spectrum policy and regulation environment on a global scale.The wideband communications/network management ...Read more >

107 Pages
1.29 MB
TECHNOLOGY AND MILITARY DOCTRINE : ESSAYS ON A CHALLENGING RELATIONSHIP  

The armed forces of a nation are maintained principally to provide the means by which external threats can be countered.These forces function in two ways: they may resist attack by the direct application of force or they may seek to deter would-be aggressors from attacking by maintaining a military potential sufficiently powerful to dissuade them from initiating such a move. To prevail in a resort to force or to ensure the credibility of the deterrence, the armed forces of a nation must have a ...Read more >

165 Pages
1.49 MB
THE UNIVERSAL CORE INFORMATION EXCHANGE FRAMEWORK  

An important aspect of the DoD data strategy is understandability, which requires both semantic and syntactic elements to achieve a working data model. Widespread adoption of a small set of common syntactic or XML standards, such as UCore, will improve understandability,especially for the unanticipated user. However, UCore is not a complete data model and by itself will not meet the interoperability needs of the Navy or the broader DoD. Extensions to UCore, such as Command and Control Core, ...Read more >

46 Pages
276.97 KB
PLANNING GUIDE AND ROADMAP TOWARD IPV6 ADOPTION WITHIN THE US GOVERNMENT  

the US Department of Defense (DoD) and the Office of Management and Budget (OMB)stakeholders drove agencies to demonstrate progress in areas of standardization and testing/certification to prepare for eventual government-wide IPv6 integration and transition. As of July 2008, all major agencies met the June 30, 2008 deadline for successfully emonstrating their adoption of IPv6 technology. As the result of these efforts, it is important to understand the various IPv6 transition initiatives ...Read more >

64 Pages
2.23 MB
ARMY NETWORK-ENABLED OPERATIONS  

The U.S. Army is investing heavily in networks—including the technology to bring them to fruition and the practical steps necessary to embed them in tactical Army units. The concept of network-enabled operations and the power it potentially brings to the battlefield was developed when the U.S. military’s focus was still very much on major combat operations (MCOs). This study assessed the utility of that concept as the Army moves to a combination of MCOs; stability, security, transition and ...Read more >

245 Pages
1.47 MB
ELECTROMAGNETIC SPECTRUM OPERATIONS  

New technologies and services have created explosive demand for radio spectrum, not only within the military sector, but also in the civilian sector. Spectrum is a finite natural resource more cannot be made—and under current rules, demand is outstripping supply. Fortunately, the same technologies that create exploding demand can provide the solution to this problem, by letting more devices use spectrum than is now possible. The realization of these capabilities is essential to achieving the ...Read more >

72 Pages
1.77 MB
MAKING BETTER USE OF BANDWIDTH : DATA COMPRESSION AND NETWORK MANAGEMENT TECHNOLOGIES  

All digital data is stored as a series of bits containing ones and zeros. A single bit could be used to encode two distinct messages. That is, a zero can be used for one possible message and a one can be used for another possible message. Two bits can encode up to four distinct messages, represented by 00, 01, 10 and 11. A series of eight bits is a byte and a byte can encode 28, or 256 distinct messages. Information theory states a general relationship between the size of the encoding and the ...Read more >

56 Pages
779.63 KB
PREV
1 2 3 4 5
NEXT