{"title":"Future law enforcement and internal security communications architectures employing advanced technologies","authors":"G. M. Stone, K. Bluitt","doi":"10.1109/CCST.1993.386802","DOIUrl":null,"url":null,"abstract":"The requirements for advanced multi-dimensional tactical communications architectures are discussed. In addition, attention is given to practical means of specifying and quantifying advanced digital system performance in the planning, design, and implementation of these systems, and to the intelligence process needed to back-stop these technologies. A unified virtual architecture is considered. It is concluded that to be effective in this area, our use of technology must be guided by a master stratagem. Globally, this mindset requires both a policy and concept of operations integration of CI (counterintelligence) and OPSEC (operations security) and the migration to a communications architecture that facilitates seamless information transfer in a fashion that protects sensitive LE (law enforcement) and IS (internal security) operations.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1993.386802","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The requirements for advanced multi-dimensional tactical communications architectures are discussed. In addition, attention is given to practical means of specifying and quantifying advanced digital system performance in the planning, design, and implementation of these systems, and to the intelligence process needed to back-stop these technologies. A unified virtual architecture is considered. It is concluded that to be effective in this area, our use of technology must be guided by a master stratagem. Globally, this mindset requires both a policy and concept of operations integration of CI (counterintelligence) and OPSEC (operations security) and the migration to a communications architecture that facilitates seamless information transfer in a fashion that protects sensitive LE (law enforcement) and IS (internal security) operations.<>