Almost 50 years after the end of the Korean War, Korea remains one of the world's flash points-a place where the flames of the Cold War have yet to be fully extinguished. Although progress has been made during the recent North-South summit in Korea, North Korea still maintains one of the largest forward-deployed armies in the world. Its offensive posture, coupled with its recent development of ballistic missiles, lethal special operations forces and weapons of mass destruction, causes the Korean peninsula to be very volatile.
While various Internet consumer privacy protection bills steadily make their way through U.S. congressional committees, businesses are taking a stab at self-governance. The work is based on the premise that commercial relationships demand trust, and the best way to gain customers' trust is to assure consumers that the information they provide, both automatically and intentionally, will not be shared without their permission. However, unless Web site visitors read published privacy policies, they may not be aware of how much of their personal data can be shared or sold.
The decision to assume the helm of AFCEA International was one I made very easily. This is a prestigious organization with an honorable mission and an exciting future, both of which would present anyone with a strong sense of opportunity.
The war on terrorism and heightened homeland security are prompting the U.S. military to re-evaluate its priorities and accelerate the use of strategic concepts that only months ago were in the experimental stage. Although some of the tactical approaches are not in the polished form they would have been in several years from now, certain aspects can and are making their way into today's efforts.
Defensive information warfare posturing traditionally has taken the form of security-passwords, firewalls and locked doors. But with less than 100 percent confidence that intruders can be kept out of information systems, a U.S. Air Force and industry team is developing a fundamentally different defensive approach. They are creating a prototype that provides advanced warning of attacks on U.S. Defense Department systems so they are prepared when security is breached.
The United States has been using simulations for decades to explore the capabilities of its military forces and train soldiers to perform their missions better. In the war against terrorism, however, this technology can come out of the training centers and into the operations centers to support the country and its allies in fighting this new type of war and enhance homeland security.
Despite a delayed launch, the first year of the maiden voyage of a different approach to military acquisition of information technology products and services has been mostly smooth sailing. The Navy/Marine Corps Intranet is well underway, and key leaders from both industry and the U.S. Defense Department say they are pleased with the progress that has been made so far.
The U.S. Navy is shoring up its information systems capabilities with the creation of a new restricted line designation for its officers. The information professional community will concentrate on space systems, information technology, network operations and protection, and enhanced fighting techniques. This new group joins the ranks of two long-established specialties in intelligence and cryptography.
The next generation of U.S. Navy aircraft carriers will feature evolutionary rather than revolutionary advances in technologies and capabilities. The new vessels are being designed with an open architecture to permit growth in virtually every key component and system, and special allowances are being made for adding complex electronics systems as the Navy focuses on network-centric warfare.
Regulatory and spectrum issues may delay widespread release of third generation wireless technologies in the United States and Europe. The root of the difficulty is the lack of available bands for new applications in North America and questions surrounding rule-making authority in the European Union.