Listing 1 - 7 of 7 |
Sort by
|
Choose an application
Navy analysts are struggling to keep pace with the growing flood of data collected by intelligence, surveillance, and reconnaissance sensors. This challenge is sure to intensify as the Navy continues to field new and additional sensors. The authors explore options for solving the Navy's "big data" challenge, considering changes across four dimensions: people, tools and technology, data and data architectures, and demand and demand management.
Electronic intelligence -- United States. --- Electronic intelligence. --- United States. -- Navy. --- Military & Naval Science --- Law, Politics & Government --- Military Administration --- Electronic intelligence --- United States. --- Electronic spying --- ELINT (Electronic intelligence) --- Intelligence, Electronic --- U.S. Navy --- Electronic surveillance --- Intelligence service --- Military intelligence --- Electronic countermeasures --- E-books
Choose an application
The United States is increasingly participating in coalition military operations. Coalition support may be required for successful military operations and in most such operations the United States desires to share the burden. U.S. allies recognize the increased security that coalition operations can bring. Because interoperability is a key element in coalitions, RAND undertook research to help the Air Force identify potential interoperability problems that may arise in coalition air operations and to suggest nonmateriel and technology-based solutions. The research focus is on command, control, communications, intelligence, surveillance, and reconnaissance (C3ISR) systems in out-of-NATO-area operations. The authors' review of recent coalition air operations found that interoperability problems arose because of differences in doctrine, incompatible communications, different planning and execution systems, and different weapon system capabilities. For example, allies may lack sufficient all-weather, day and night precision-guided weapons. The authors suggest the following to increase interoperability in coalition operations: (1) common or harmonized doctrine for combined joint task force operations, from planning through assessment, (2) compatible or adaptable concepts of operation for airborne surveillance and control, (3) common information-sharing standards and compatible tactical communication systems, and (4) expert, experienced personnel who understand the capabilities of coalition partners. From a technology perspective and cost considerations, C3ISR initiatives appear to offer the best opportunities for interoperability enhancements.
Choose an application
The U.S. Air Force's electronic warfare integrated reprogramming (EWIR) enterprise examines intelligence on adversary threats that emit in the electromagnetic spectrum (EMS) (in particular, radars and jammers) and configures electronic warfare software and hardware to enable aircraft or other resources to react to and/or respond to adverse changes in the EMS environment. With the growing advancements in U.S. adversaries' electronic warfare assets that enable complex and diverse EMS capabilities, identifying, tracking, and responding to these threats requires much faster updates than the existing EWIR enterprise was designed for. The research team conducted four interrelated technology case studies that together comprise the fundamental elements necessary for creating a near-real-time, autonomous, inflight software reprogramming capability and, more specifically, artificial intelligence–enabled cognitive electronic warfare capabilities—the use of machine learning algorithms that enable platforms to learn, reprogram, adapt, and effectively counter threats in flight. The research team also highlighted important continuing roles for the existing EWIR enterprise even as the U.S. Air Force moves toward a cognitive future.
Electronics in military engineering --- Electronic countermeasures. --- Radar --- Artificial intelligence --- Electronic intelligence --- Interference. --- Military applications --- United States. --- United States. --- United States.
Choose an application
Les révélations Snowden confirment qu’aux États-Unis le tiraillement entre impératifs du secret et exigences de transparence demeure vivace. Grâce aux révélations ponctuelles de ce genre et surtout à la mise à disposition régulière de fonds d’archives, il est possible de rendre compte de l’histoire du renseignement américain contemporain, jusqu’aux transformations qu’il a connues depuis les attentats du 11 septembre 2001.
Electronic intelligence --- Espionage, American --- Electronic surveillance --- Renseignement électronique --- Espionnage américain --- Surveillance électronique --- United States. --- United States --- Political Science --- C.I.A. --- renseignement --- espionnage --- surveillance électronique --- États-Unis --- États-Unis, Central intelligence agency --- Divulgation d'informations --- Opérations secrètes
Choose an application
Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population. In Privacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original - and prescient - discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy.
Wiretapping --- Data encryption (Computer science) --- Privacy, Right of --- Law and legislation --- Electronic intelligence --- Electronic surveillance --- Telecommunication --- Political aspects --- INFORMATION SCIENCE/Communications & Telecommunications --- INFORMATION SCIENCE/Technology & Policy --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Remote sensing --- Electronic spying --- ELINT (Electronic intelligence) --- Intelligence, Electronic --- Intelligence service --- Military intelligence --- Electronic countermeasures --- Human rights, civil rights --- Communications engineering / telecommunications
Choose an application
During the Second World War, Australia maintained a super-secret organisation, the Diplomatic (or `D’) Special Section, dedicated to breaking Japanese diplomatic codes. The Section has remained officially secret as successive Australian Governments have consistently refused to admit that Australia ever intercepted diplomatic communications, even in war-time. This book recounts the history of the Special Section and describes its code-breaking activities.
History - General --- History & Archaeology --- World War, 1939-1945 --- Cryptography. --- Secret service --- Electronic intelligence --- Military intelligence --- Sissons, D. C. S. --- Allied Forces. --- European War, 1939-1945 --- Second World War, 1939-1945 --- World War 2, 1939-1945 --- World War II, 1939-1945 --- World War Two, 1939-1945 --- WW II (World War, 1939-1945) --- WWII (World War, 1939-1945) --- History, Modern --- Indian code talkers --- Communications
Choose an application
Intelligent agents (Computer software) --- Remote sensing. --- Military intelligence --- Photographic interpretation (Military science) --- Video surveillance. --- Electronic intelligence. --- Research. --- Science --- Science research --- Scientific research --- Information services --- Learning and scholarship --- Methodology --- Research teams --- Electronic spying --- ELINT (Electronic intelligence) --- Intelligence, Electronic --- Electronic surveillance --- Intelligence service --- Electronic countermeasures --- Video recording --- Aerial photograph reading --- Photo interpretation --- Aerial photography --- Photogrammetric pictures --- Photography, Military --- Remote-sensing imagery --- Remote sensing systems --- Remote terrain sensing --- Sensing, Remote --- Terrain sensing, Remote --- Aerial photogrammetry --- Aerospace telemetry --- Detectors --- Space optics --- Information warfare --- Deception (Military science) --- Agents, Autonomous (Computer software) --- Agents, Cognitive (Computer software) --- Agents, Intelligent (Computer software) --- Assistants, Cognitive (Computer software) --- Assistants, Intelligent software --- Autonomous agents (Computer software) --- Cognitive agents (Computer software) --- Cognitive assistants (Computer software) --- IAs (Computer software) --- Intelligent agent software --- Intelligent software agents --- Intelligent software assistants --- Software agents (Computer software) --- Special agents (Computer software) --- Artificial intelligence --- Research --- Computer programs
Listing 1 - 7 of 7 |
Sort by
|