An established superpower is dealing with multiple threats to its interests around the world. An emerging global economic and military/naval power is making its presence felt throughout the world, particularly in Asia. The intelligence community is confronted with a complex environment punctuated by socio-economic power shifts and revolutions in communications, commerce and transportation. World intelligence organizations face internal and external terrorist and anarchist threats as well as exploding population growth and resource competition in strategically critical regions. Compounding these challenges are intelligence budgets that range from uncertain to non-existent.
Although these observations seem ripped from today’s headlines, the time in question is not 2013 but 100 years earlier—1913. The major players are different, but the challenges—and potential solutions—bear more than a passing similarity.
As the current U.S. intelligence community deals with its complex national security environment, intelligence organizations from a century ago provide excellent examples of prioritization, integration and efficiencies. A thoughtful application of 1913’s intelligence lessons effectively can guide today’s intelligence community leaders to victory.
GPS vulnerabilities could be addressed with upgraded long-range navigation.
In an instant, one million people in Tel Aviv are vaporized. Hamas, the terrorist extremist group backed by Iran, has detonated a dirty bomb—a conventional explosive with radioactive material—and is attacking Israel with long-range rockets. Concurrently, the U.S. Air Force loses all communication with its Navigation System Timing and Ranging Global Positioning System satellites. Intelligence reports indicate that Iran has launched multiple antisatellite missiles that have destroyed several navigation satellites, effectively disabling the Global Positioning System.
This is a fictional scenario, but it may not be that far-fetched. The U.S. military must take into account the vulnerabilities of its Navigation System Timing and Ranging (NAVSTAR) Global Positioning System (GPS) and invest in a land-based system that provides the same capabilities.
The United States and its allies have at their disposal an existing defense capability that can be employed as an effective weapon at the highest levels of conflict. The West's installed base of expertise in communications electronics can be harnessed as a strategic offensive weapon to constrain nation-states that seek to bypass the overwhelming superiority that the United States and its allies possess in conventional warfare.
By Col. Alan D. Campen, USAF (Ret.), SIGNAL Magazine
Today’s approach to the issue of cybersecurity is totally wrong. For years, experts have been propounding similar solutions to the problem of securing the virtual realm. Yet, that realm is less safe today than it was when the first calls for improved security achieved urgent status. The changes that define cyberspace—and what cyberspace in turn has wrought on society—cry out for a new approach rather than add-on measures to the same strategies that continue to prove unsuccessful over the long term.
The next time U.S. forces fight in the littorals—whether it be in the Persian Gulf, Africa, Asia or elsewhere—adversaries, if they are smart, will adopt the land tactics that have made insurgents effective in Iraq and Afghanistan. And, if the U.S. military is smart, it will bring to the asymmetric maritime fight the same force-multiplying intelligence, surveillance and reconnaissance tools that have kept casualty rates surprisingly low in the ground fight in Iraq and Afghanistan.
The path to achieving the vital goal of coalition interoperability may require abandoning longtime networking tenets in favor of a data-centric or knowledge management approach.
It is undeniable that defense acquisition reform has ushered in a new reality for prime contractors. Firm-fixed-price contract awards, shorter time lines, open-system architectures, the demand for greater value—these are just a few of the game-changing challenges now facing primes.
The tight coupling that currently binds Defense Department architecture—the infrastructure, communications, databases, applications, security and desktops into more than 2,200 unique silos—must be separated. Right now, each silo is the consequence of contracts in which all software is assembled into a one-of-a-kind collection of codes. The resulting software is costly to maintain; applications are not interoperable; and lack of compatibility complicates the exchange of data.
One mandate of the Clinger-Cohen Act of 1996 was creation of the Information Technology Architecture. In subsequent 1999 guidance, the Federal Chief Information Officers Council defined the Federal Enterprise Architecture as the process for developing, maintaining and facilitating the implementation of integrated systems.
The majority of the 2.5 million military, civilian or reserve personnel in the U.S. Defense Department do not care much about the technical details of computing. Users only wish to receive answers reliably and quickly. Requested information needs to be available regardless of the computing device they use. Responses must be secure. No restrictions should hamper access by certified users communicating from remote locations. Information has to be available for people authorized to make use of what they receive.