The National Security Agency’s third annual Best Scientific Cybersecurity Paper competition is now open. Deadline for submissions is March 31.
Researchers at the National Institute of Standards and Technology are developing measurement tools for new mobile communications channels that could offer more than 1,000 times the bandwidth of today’s cellphone systems.
The three sea services are facing different challenges with cyber operations, but they are adopting some similar solutions as they wrestle with the newest warfighting domain.
Already dealing with an expanded mission set, the U.S. Coast Guard is facing new challenges as economic conditions generate different types of stresses on existing assets and capabilities.
The Navy’s mission set is likely to continue to grow over the foreseeable future, but the same cannot be said of the fleet. Both surface ships and submarines will need to be replaced or complemented, but budget restrictions severely hinder the Navy’s ability to meet those goals.
The U.S. Marine Corps needs more amphibious ships as it returns to its roots amid tight budgets. The Corps also needs to lighten the load its warfighters bear, and it wants to be able to access advanced intelligence data from its most sophisticated platform.
China is flexing its muscles and projecting power far beyond its traditional realm, but North Korea poses a bigger threat by nature of its irrational leadership.
Humanitarian assistance/disaster relief (HA/DR) has become so important a part of U.S. operations in the Asia-Pacific region that experts now are viewing it as a military doctrine and striving to improve it.
India, a nonaligned nation long reluctant to involve itself in the geopolitics of the Asia-Pacific region, has begun to increase its involvement with the United States and other nations of the dynamic region.
Viewed as an indispensable force for peace and security in the Asia-Pacific region, the United States risks losing the support it enjoys from nearly every nation in that hemisphere if it is ambiguous and not willing to take a stand during crises, said defense experts.
The U.S. Navy is exploiting its own assets and other capabilities to defend and protect against cyberthreats. Some of these internal assets include automated triggers in networks as well as advanced intelligence sources.
The U.S. Navy is facing new and better cyber adversaries as it expands its own cyber footprint. These threats face the fleet and the nation, and the Navy may be called upon to respond in both cases.
The U.S. Navy is focusing on five long-term goals in its cyber operations that involve other service and national assets.
The U.S. Marine Corps is focusing on six different capability areas as it looks to modernize its force amid personnel reductions. Each area has subsets of activity, and their focal points range from operational to technological.
As if it did not have enough new missions added to its responsibilities, the U.S. Coast Guard may find itself adding more emphasis to an old activity. The recent boom in U.S. fossil fuel extraction and production offers to increase the traffic of energy products on U.S. rivers.
At least one U.S. Navy information technology leader believes the service can benefit from the severe budget constraints imposed by sequestration. Rear Adm. David H. Lewis USN, commander, Space and Naval Warfare Systems Command (SPAWAR), explained how this might come to pass.
Information technology systems, elements and methodologies are becoming more of a factor in U.S. naval aviation. Virtual capabilities are supplanting physical training, and new architectures may allow faster incorporation of new technologies.
The sequestration bill that has been the bane of military procurement may be on its last legs, although its reach still has some distance to go. That is the prediction of a Washington, D.C., attorney who specializes in defense procurement.
Adopting commercial practices in military acquisition would help both the Defense Department and the companies that serve it. Both entities have slipped into risk-averse behavior that benefits neither and hurts the warfighting customer, said industry and former government experts.
Archaic acquisition regulations designed to reduce risk, teamed with commercial technology controls, are inhibiting efforts to procure information technology systems quickly and effectively, according to military and civilian experts.