The Defense Department’s CIO has called for the enterprisewide implementation of unified capabilities to be fielded to DOD components by fiscal 2016. UC includes a broad set of voice-, video- and data-sharing capabilities that promise to enable unprecedented joint collaboration among the military services, combatant commands and defense agencies. IP-based solutions will enable DOD users to better collaborate via instant messaging, chat and Web-based conferencing, among other applications.
Africa (AFRICOM) command and its Identity Resolution Team now cooperate with US Immigration and Customs Enforcement (ICE) for conducting operations in Eastern Africa.Objective: to identify some “bad actors” (KST to known suspected terrorists, the SIA for special interest alien): traffickers, criminal, terrorists likely to attempt to travel to the United States.
The nationals of several countries of Eastern Africa are in the crosshairs: Kenya, Tanzania, Sudan, Uganda, Ethiopians, Somalis. But the Sahel and West Africa are now treated as sensitive areas.
The US Department of Homeland Security this week issued a call for unmanned systems makers to participate in a program that will ultimately determine their safety and performance for use in first responder, law enforcement and border security situations. In a twist that will certainly raise some eyebrows, the program’s results of the ironically named program — The Robotic Aircraft for Public Safety (RAPS) — will remain unavailable to the public
Congressional hearings and recently-introduced legislation have put the spotlight on the issue of U.S. taxpayer-funded labor trafficking, and the abuse of third-country nationals overseas by U.S. military contractors. One of the leading associations of U.S. overseas contractors has devoted the latest issue of its journal to the topic of trafficking – a sign that the contractor community is well-acquainted with the topic.
“The U.S. Congress’s newfound interest in addressing the problem of labor trafficking is certainly welcome, given that the issue has long plagued U.S.-led operations in Afghanistan and Iraq,” writes Doug Brooks, president of the International Stability Operations Association, in the May/June issue of its Journal of International Peace Operations.
Whether by land, sea or air, Defense Department leaders have long crafted rules of engagement to determine how, where and when forces can attack the enemy. They expect soon to complete the same for their newest domain: cyberspace, the assistant secretary of defense for global strategic affairs said today.
“We are working closely with the Joint Staff on the implementation of a transitional command-and-control model for cyberspace operations” while reviewing existing rules of engagement,Madelyn R. Creedon told the House Armed Services Committee’s subcommittee on emerging threats and capabilities.
Global Intelligence & Information Grid Goes Online: DI2E framework aims for streamlined intelligence sharing
If everything goes according to plan, sometime in the next few years the Defense Department and intelligence community members will begin reaping the benefits of a common cross-agency environment that’s designed to help users access and use a wide range of essential intelligence resources.
The planned Defense Intelligence Information Enterprise (DI2E) framework seeks to integrate currently disconnected systems, information, teams, tools and other technologies into a tightly unified environment. The common system will enable users to securely add, access and share information and other intelligence resources anytime, anywhere.