Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

signalarticles

Ask the Expert: Next Steps for Intelligence After the Post-9/11 Era

June 1, 2014
By William M. Nolte

Q: What are the next steps for intelligence after the post-9/11 era?

A: The next steps should be a radical shift in how resources are allocated, not business
as usual on tighter budgets.

The “post-9/11” era is over. For years I’ve been telling students that a decade marked by the pre-eminence of terrorism as an issue, flush budgets and a volatile information environment has ended. Terrorism must now compete with cybersecurity, energy and other resource issues, regional conflicts and several other concerns in an extraordinary mix—or even a dangerous blending—of several issues. Now of course, we face a resurgent Russia, with all that implies for stability in both Europe and Asia.

As for flush budgets, those are a rapidly receding memory. This leaves, of the original characteristics of the post-9/11 era, only the volatile information environment, which shows no sign of slowing. If anything, its breadth as much as its pace continues to confound us as we deal with the full range of its implications—social, economic, political and legal. Every time I read an article suggesting that we have reached the limit to the amount of data we can put on a piece of silicon, I read another suggesting that silicon will be replaced by a virus or some other material ... or that quantum computing is finally about to arrive.

It Is Time to Stop the Daily Assaults on the Intelligence Community

June 1, 2014
By Kent R. Schneider

The world may be more dangerous today than in any period in history. Threats are widespread and diverse. It no longer is enough to watch nation-states. In this period of asymmetric warfare, with the addition of the cyberthreat, almost anyone can become a threat to national security. In this dangerous world, the value of intelligence has risen, and the tools and means of intelligence must be richer than in the past.

Enabling En Route Communications Aboard Large Transport Aircraft

May 1, 2014
By Lt. Col. Jan Norris, USA, 
and Whitney Katz

The ability to communicate en route directly with ground elements during an airborne theater insertion has taken a giant leap forward with a communications system boarding a C-17 Globemaster III. A long-distance deployment across the vast Asia-Pacific region has opened the door to en route command and control over secure or unsecure links.

Counterterrorism Partnerships Push Art of Possible

July 1, 2014
By George I. Seffers

The organization largely responsible for introducing robots on the battlefield now plans to field a miniaturized ground robot, a small unmanned aircraft, a Special Forces robotic exoskeleton and a host of other advanced technologies in an effort to combat terrorism around the world.

Intelligence Generates a Cyber Picture

June 1, 2014
By Robert K. Ackerman

The borderless world of cybersecurity now is benefitting from geospatial intelligence products. The U.S. National Geospatial-Intelligence Agency has joined the fight against cybermarauders by providing imagery to help cyberwarriors track down online adversaries. Experts defending the United States from cyber attack abroad have a new tool in their kit by being able to see the facility from which digital malefactors are plying their wares.

Military Evaluates Future Cyberforce

June 1, 2014
By Rita Boland

Cybersecurity remains a priority for the U.S. Defense Department, with officials protecting resources for it in the face of overall budget constraints. Guidance from the National Defense Authorization Act for Fiscal Year 2014 directs a mission analysis of cybercapabilities not only in the active military, but also across partners, to help forces maintain their edge in protecting the nation.

Lone Wolf Terrorists Prowl the Balkans

June 1, 2014
By George I. Seffers

In the coming months, extremists fighting in the Syrian civil war likely will begin returning to Europe, funneling through the Balkans where they can find cheap weapons, like-minded allies and temporary accomplices in the form of organized criminal groups. Conditions are ripe, according to experts, for those individuals to spread across Europe, launching terrorist attacks on major cities.

China and Russia Pose an Array of Dangers to the West

June 1, 2014
By Rita Boland

China and Russia represent two of the most robust, comprehensive concerns to worldwide stability. Almost every major geostrategic threat—cyber attack, nuclear weapons, ballistic missiles, capable military forces, political influence, economic power, sources of and high demand for energy—is resident in those two countries that often find themselves at odds with the United States and its allies.

U.S. Missile Defense Lags Emerging Threats

June 1, 2014
By Sandra Jontz

The U.S. missile defense program now trails emerging ballistic missile threats from rival nations that are outspending the United States in quests to move ahead and stay ahead, defense analysts caution. Emerging technologies such as maneuverable re-entry vehicles, a type of ballistic missile warhead capable of shifting course in flight, essentially render existing U.S. antiballistic missile defense capabilities ineffective.

Korean Cybersecurity Becomes a Joint Endeavor

June 1, 2014
By Robert K. Ackerman

A new facility for cybersecurity is allowing U.S. Forces Korea to coordinate efforts with other U.S. commands as well as Republic of Korea civilian government and military forces. The Joint Cyber Center serves as the focal point for increasing international cooperation between U.S. and Korean forces in their defensive measures against increasing cyber aggression from North Korea. It blends activities from the local J-2, J-3 and J-6 along with input from other forces worldwide.

The cyber center coordinates through its headquarters and partners with its counterparts at the U.S. Pacific Command (PACOM). Through PACOM, the center works with the U.S. Cyber Command (CYBERCOM). Any direction the center receives from CYBERCOM would come through PACOM.

Col. Karlton D. Johnson, USAF, is the U.S. Forces Korea J-6 and senior communicator for U.S. forces in Korea. He says what is unique about this cyber center is its partnership with the Republic of Korea. Col. Johnson notes that, in March and June of 2012, cyber attacks hit the Korean national infrastructure and its banking sector. U.S. forces viewed the threat across the board to ensure they were defended, and it coordinated with Korean partners through the Joint Cyber Center (JCC).

The colonel emphasizes that the two countries do not share locations at the cyber center. They “share what is shareable” through their bilateral cooperation protocols. Earlier this year, Korean and U.S. forces held the first bilateral cyber tabletop exercise, in which the U.S. Forces Korea J-6 served as the synchronizing agent with Korean government and military agencies.

Col. Johnson continues that he has “an outstanding working relationship” with the commander of the Korean cyber command as well as with the Korean Joint Chiefs of Staff J-6 and the Korean Ministry of National Defense. All are focused on broad cyberdefense because Korea has been on the front lines of cyber, he notes.

Pages

Subscribe to signalarticles