School without walls: IEW maintenance training in the information age

Turner, Edward F.
July 1996
Military Intelligence Professional Bulletin;Jul-Sep96, Vol. 22 Issue 3, p40
Focuses on the application of information technology (IT) to intelligence and electronic warfare (IEW) maintenance training by the US Army Intelligence Center and Fort Huachuca. Core of current institutional IEW maintenance training; Initiatives with IT infrastructure; Classroom XXI Training Laboratory; Distance learning approach; Advances to expand training ability.


Related Articles

  • Technical intelligence: Added realism at the NTC. Outzen, Richard H.M. // Military Intelligence Professional Bulletin;Jul-Sep97, Vol. 23 Issue 3, p20 

    Talks about technical intelligence (TECHINT) as a key facet of National Training Center training. Technical Order of Battle Courses taught by analysts and LNOs from the 203d Military Intelligence Batallion; Experimental Force introduction to TECHINT; Close integration of measurements and...

  • CMF-98 restructure concept. Root, John P. // Military Intelligence;Apr-Jun93, Vol. 19 Issue 2, p31 

    Features the proposed restructure for signals intelligence (SIGINT) training course for CMF-98 soldiers at the US Army Intelligence Schools-Devens (USAISD) in Massachusetts. Possible consolidation or deletion; Factors that are driving the initiatives; Training strategy; Basic rules that will...

  • Mentorship: A personal and force multiplier. Fast, Barbara G. // Military Intelligence Professional Bulletin;Jul-Sep96, Vol. 22 Issue 3, p33 

    Focuses on mentorship and its applicability to military intelligence personnel of the US Army. Definition of mentorship; Career and psychological aspects of mentorship; Steps in finding a mentor; Importance of mentorship in military intelligence.

  • Strategic Intelligence Officers Course. Hoehne, Richard C. // Military Intelligence Professional Bulletin;Apr-Jun99, Vol. 25 Issue 2, p37 

    Provides information on the Strategic Officers Course (SIOC) for military intelligence officers of the United States Army. Approach of the military course; Topics covered in the course.

  • Intelligence And Electronic Warfare System Modernization. Redman, Douglas; Taylor, Jack // Army Magazine;Apr2002, Vol. 52 Issue 4, p57 

    Focuses on the modernization of the intelligence and electronic warfare system of the U.S. Army. Importance of the system in acquiring near perfect situational awareness for the Army; Structure of the Army intelligence team; Components of the all source analysis system intelligence fusion system.

  • Division Ready Brigade IEW: Don't Leave Home Without It. Taylor, Michael C. // Military Intelligence Professional Bulletin;Apr-Jun95, Vol. 21 Issue 2, p18 

    Reveals that intelligence and electronic warfare (IEW) was a crucial component of the military forces that ensure victory during the Allied Operation Desert Storm in Kuwait in 1991. Brigades and units of the United States (US) Marine and the US Army which spearhead the operation; Discussion on...

  • Army and Navy intelligence use COTS system from Action Systems. McHale, John // Military & Aerospace Electronics;Mar99, Vol. 10 Issue 3, p4 

    Reports that Action Systems engineers are using commercial-off-the-shelf (COTS) equipment to provide low-cost computers for US Army and Navy intelligence analysts. Use of the Action Systems Integrator; Components of the system; Protection for the system.

  • INTELLIGENCE TO THE POINT OF THE SPEAR. Phillips, Gary E. // Military Intelligence Professional Bulletin;Apr-Jun95, Vol. 21 Issue 2, p22 

    Explains that the United States Army force projection and evolving intelligence doctrine demand innovative solutions to produce intelligence in support of commanders at every echelons. Restructuring of the US Army; Importance of molding force structure and electronic warfare to meet challenges;...

  • E-Bombs Eyed. Fulghum, David A. // Aviation Week & Space Technology;2/15/2010, Vol. 172 Issue 7, p29 

    This article examines the impact of advanced electronic attack (EA) developments on the proposed 2011 military spending plan in the U.S. Examples of EA attack are networks and releasing beams of energy against improvised explosive devices (IEDs). It cites the cancellation by the Navy of the EP-X...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics