In keeping with its approach to incorporating blue-water-navy technologies for possible littoral uses, China is deploying a number of antisubmarine warfare systems to support potential conflicts against adversaries equipped with the most advanced submarines under the sea. As with most of China's military, these systems constitute a mix of legacy import technologies with indigenous developments.
U.S. government computer scientists are studying how computer grids react to volatile conditions to understand how events such as virus attacks, sudden changes in workload and cyberattacks can affect linked groups of hundreds or thousands of geographically dispersed machines.
After serving as AFCEA International's president for the past five and a half years, I have decided to retire. While a decision such as this is never made without reflection and deliberation, this decision was particularly difficult because AFCEA is more than an organization-it is a network of talented, dedicated and committed individuals.
The march of technology is improving interoperability and increasing capabilities among NATO and Partnership for Peace nations. New systems and bridging components are allowing forces to share information to a greater degree and under more circumstances than ever. However, the same new technologies are spawning a new generation of capabilities that are complicating efforts for true alliance interoperability.
The adoption of network-based operations combined with commercial information technology and telecommunications products is enhancing the interoperability of North Atlantic Treaty Organization and Partnership for Peace nations' military forces. These developments also are allowing many smaller and former Eastern Bloc countries to rapidly evolve their militaries into modern information-based organizations.
The U.S. Defense Department is coordinating a multidimensional effort to seek out technologies that would bring order to the oftentimes chaotic environment of a coalition operation. Among the top priorities is identifying information security approaches that ensure continued communications when the composition of the coalition changes or the ad hoc area network is attacked.
Assuring the integrity of information in radio frequency tactical networks is rapidly becoming a linchpin for the success of the U.S. Defense Department's Global Information Grid. Without cyberdefense advances, wireless domain devices cannot function properly in the face of information warfare, raising vulnerability issues for the entire U.S. communications infrastructure.
Internet access may soon be as close as the nearest electrical outlet. New power-line networking technology allows voice, data and video signals to travel through standard electrical lines, turning building or campus electrical grids into ready-made communications pathways. Connected by devices similar to modems that are plugged into wall sockets, computers and smart appliances can be linked together or to existing fiber optic lines without extensive installation costs.
Networking technology currently under development will allow users to monitor and operate sensors from a single, central, distant location. In tactical scenarios, this capability will reduce the need to send soldiers into the field to check or activate sensors. The system features an optional radio communication module that enables it to operate much like a wide area network, and ease of installation and portability make it a candidate for use in military training exercises.
The extended littoral battlespace is beginning to shrink as commanders acquire the capability to monitor force operations from greater distances in near-real and real time. Recent exercises held on and off the California coast demonstrated a number of different approaches to linking offshore commanders with onshore events.