The U.S. Army, which purchases vast numbers of tactical radios, will no longer do so through sole-source contracting, vows Maj. Gen. Daniel Hughes, USA, PEO-C3T. Competing every single contract is designed to create a radio marketplace that fosters innovation while saving time and money.
The U.S. Air Force is striving to become a multi-domain warfighting unit in the air, in space and in cyber, according to its chief information officer. However, attaining the same degree of supremacy in cyber that it currently enjoys in the air domain may prove a far more daunting task.
An intelligence network being developed at the Pentagon will enable military leaders to monitor disasters as they happen. The network will provide a common operating picture, allowing officials to better plan for and react to events adversely affecting the critical infrastructure and the military mission.
The next big cyber attack likely will strike critical infrastructure assets in the United States, which could bring the world’s remaining superpower to its knees, according to cybersecurity experts. This would constitute a crippling assault against national assets such as power facilities, transportation networks, nuclear plants or the drinking water supply, these experts warn.
Much has been said and written about the U.S. Defense Department’s move to the cloud. This migration could provide enhanced security and better information access, say many experts. But it could provide another huge benefit, helping the Defense Department finally curb information infrastructure costs and apply badly needed funds where they would be most useful.
U.S. DHS Science and Technology Directorate officials are helping other nations create cyber testbeds that can be linked, forming one large, international virtual laboratory for cyber systems. In addition, they already have in place bilateral agreements with a number of countries and are in discussions with France, Spain, Germany, Mexico and South Korea, which ultimately could expand international cooperation on cybersecurity research and development.
The U.S. Department of Homeland Security’s Continuous Diagnostics and Mitigation program is beginning a new thrust in which it addresses a growing concern of cybersecurity: identity management. The program aims to drive the overhaul of cyber risk management across federal, state, local, tribal and territorial governments and to do so cost-effectively by leveraging the technology acquisition processes—essentially buying in bulk.
As scientists sleuth to enhance U.S. military air mission capabilities through automation and alternative technologies, some in the Office of Naval Research want to find ways for aircraft—manned or unmanned—to operate in even the worst kinds of weather. Experts are exploring how these vehicles could function in the most unfavorable conditions.
In recent decades, air power has been NATO’s first, and sometimes only, military response to a threat. But tightened budgets and dwindling resources are placing air power in a death spiral driven by declining readiness, a shrinking force structure and an ever-smaller residual fighting capacity, say NATO’s foremost experts on air and space power.
Having focused a great deal on innovation throughout my career—particularly as the leader of “Deep Blue,” the Navy’s innovation think tank immediately after the September 11, 2001, attacks, and as commander of U.S. Southern Command—I would offer some important advice to the innovators as they get started.