Once viewed by many as a security liability, wireless has become a security asset for the U.S. Marine Corps Forces Pacific. In its effort to identify valuable items and devices inside its facilities at all times, the command recently implemented its first wireless system ever accredited for use in secure areas. This system soon could transition to the tactical world.
All computer systems are prone to attacks from various cyberthreats, but disruptions on few of those networks have the potential to cause calamitous damage to national infrastructures.To help prevent catastrophe, the U.S. Department of Homeland Security has an effort dedicated to countering these dangers through various partnerships and training opportunities.
The U.S.-led global cybersecurity exercise known as Cyber Storm will sport a new look and format when it takes place later this year. The changes reflect the constantly deviating nature of the threats posed daily to the world’s cyber infrastructure.
It is no secret that the Pentagon process for acquiring technology can be a long, cumbersome slog. But sometimes warfighters need something, and they need it now to save lives or gain an advantage over the enemy. In those cases--hundreds of cases--the rapid acquisition process can deliver capabilities weeks, months or even years quicker than the traditional routine.
U.S. Navy researchers have built a prototypical family of small, simple and affordable unmanned aerial vehicles that warfighters can use to deploy an array of sensors, tailor for a variety of missions, and launch by ones and twos or by the thousands. Essentially a flying circuit board, the miniature craft has completed basic research and development and is ready for further technological advances and eventual battlefield deployment.
How can the military avoid cheating itself out of good personnel who leave for greener pastures? In January's Incoming column, Capt. Joseph A. Grace Jr., USN (Ret.) poses this question as he examines the delicate line between being well rounded and being an expert, noting that the military seldom promotes the expert.
U.S. combat operations in Iraq may have come to an official end, but work in the country is far from over. U.S. troops are playing more and more supportive roles and, in some cases, acting as advisers. With the help of U.S. experts, the locals are taking over their own defense and law enforcement, putting the country on track to handle all problems internally in the near future.
Warfighters in current operations now have better intelligence, surveillance and reconnaissance equipment at their fingertips as the result of a push from the highest levels of the U.S. Defense Department for rapid fielding. The equipment is providing more air and ground surveillance, improved intelligence, and greater network and data applications across the services and the coalition. Consequently, warfighters at all levels know and understand the combat situation and are able to make sound decisions more quickly.
The complexities of communications in Afghanistan require the military to adopt new ways of doing business, such as creating the Afghan Mission Network rather than using traditional networks, and turning communicators into warfighters rather than mere supporters. The Afghan Mission Network directly addresses the military’s operational need to mix coalition forces down to the company level, which provides commanders with greater flexibility in task organization and the ability to fight more effectively as a true coalition. That seemingly simple need has sparked a chain of events that may change forever the way coalition forces communicate on the battlefield and the role that communicators play in wartime.