The U.S. military is increasingly deploying airborne video surveillance applications to aid in a variety of operations, such as natural disaster assessment, homeland defense and protection, as well as military intelligence, surveillance and reconnaissance missions. Only satellite networks can provide unconstrained coverage over land and water, enabling critical information to be shared in real-time with command and control locations. Whether your mission is to secure our country\'s borders, operate UAV networks, or provide situational awareness beyond-the-line-of-sight, Hughes has the scalable airborne solution to meet your requirements, anywhere in the world. Hughes commercial Airborne Broadband Solutions are interoperable, can work seamlessly within your current operational network, and fit into your tightly constrained budget. Hughes solutions are ideal for both fixed wing and rotary aircraft.
Only satellite can support real-time communications everywhere in the field - whether in the air, on the ground, or at sea. Hughes provides advanced communications-on-the-move solutions with global coverage. Their solutions meet U.S. government security requirements, including FIPS and TRANSEC, and operate on multiple bands and waveforms. Hughes products comply with open, commercial standards enabling easy integration with existing systems. Their team of highly-skilled and cleared engineers stands ready to work with you to meet your mission requirements.
March 23rd, 2011 at 11 AM Criminal enterprises operating globally - so-called \"Transnational Criminal Organizations\" -- have spent years refining their approaches to all types of illicit trafficking including narcotics, weapons, illicitly gained and laundered money, and even modern day slavery. In many ways, these organizations can be considered multi-national corporations, given their size, reach, and sophistication. Indeed, their production and logistics operations rival best practices in the commercial sector, with highly resilient supply chains driven by the need to minimize the risk of seizure. TCOs often directly and indirectly enable, support, and facilitate insurgencies and terrorism; undermine state stability, security, and sovereignty; and corrupt legitimate global financial and trade networks. The stakes are high. U.S. Law Enforcement, Homeland Security, and the Department of Defense (DoD) find themselves at the front lines of this global security issue. As criminal organizations adapt to traditional interdiction methodologies, stakeholders across government are coming together to stem the tide, looking at what new technologies and whole of government approaches can be brought to bear to address this complex threat.
The international military intervention in Libya is likely to last \"awhile,\" a top French official said Monday, echoing Moammar Gadhafi\'s warning of a long war ahead as rebels said they were fighting to reclaim a city under the Libyan leader\'s control. We get an update from the AP\'s Sagar Meghani.
The bullet that killed President Lincoln is one of many cool items on the move at the National Museum of Health and Medicine. NMHM\'s Tim Clarke gives us an update.
Cyber Command gave no reason for the turnabout in policy.
Despite a 2006 mandate to secure mobile devices and implement two-factor authentication, only just over half of federal agencies have managed to do so. OMB submits its annual FISMA report to Congress detailing the steps the government has taken to improve cybersecurity, including spending $12 billion on cybersecurity last year.
Susan Lawrence, the Army\'s newly-appointed Chief Information Officer members of the IT and communications industry that the service is focused on creating an end-to-end IT infrastructure, eliminating structures that required soldiers to train and live on one network, and deploy on another.
We get details from the Defense Intelligence Acquisition Conference from DIA\'s Mark Bogart.
The suicide rate for female soldiers triples when they go to war, according to data from an Army study.
Shay Assad, director of the office of Defense Procurement and Acquisition Policy, told industry professionals Thursday that DoD would provide them with a clearer picture of what the Pentagon wants when it issues solicitations to industry. Past acquisition processes, he said, had forced vendors to guess what factors DoD thought were truly important.
Retired Air Force Colonel Chet Richards says DoD has missed the mark in several of its big decisions during recent years. He says defense leaders are making choices that leave people scratching their heads.
Cadets at West Point are on the cyber-front lines. How are they preparing for these new roles?
VA\'s Roger Baker discussed how to advance IT projects amidst uncertain budget times.
It\'s that time of year again when you have to fill out your March Madness brackets. But not for the basketball tournament -- for the cyber defense contest.