Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Viewpoint

Cybersecurity Demands Physical Security

February 2006
By Robert Fonow

In the United States, both corporate and Defense Department telecommunications have developed along a path of increasing complexity to support global geopolitical or commercial requirements. The paradox is that while this complexity improves the ability to support worldwide operations, the underlying network is becoming more vulnerable.

Imagery's National Status Faces Questionable Future

May 1999
By Dr. Mark M. Lowenthal

The role of imagery as a national intelligence asset could be on the cusp of a promising alternative future, or it could be about to dwindle significantly. Much depends on the choices that the imagery community makes over the next several years.

Technology Did Not Create and Cannot Resolve Privacy Dilemma

January 2000
By Col. Alan D. Campen, USAF (Ret.)

The exploding use of encryption in cyberspace has spawned a dilemma for policy makers. They must strive to balance citizens' rights to security and privacy with the needs of law enforcement and intelligence to police what a senior defense official terms a "lawless frontier," and others call the "World Wild Web."

Intelligence Is the Long Pole in The Information Operations Tent

March 2000
By Col. Alan D. Campen, USAF (Ret.)

Alarmed that its borders can easily be breached through technology in the hands of criminals, terrorists, nontraditional foes and even the merely inquisitive, the federal government has broadened the definition of national security. In doing so, it has established a timetable for erecting defenses, enlisted a host of recalcitrant bedfellows into its national security apparatus, and charged the intelligence and law enforcement communities to collaborate and perform what some believe without resources to be a near-Sisyphean task.

Information Technology—Servant, Not Master, of Operational Art

June 2000
By Col. Alan D. Campen, USAF (Ret.)

The military's increasing reliance on commercial off-the-shelf information systems is leading to an environment in which the technologies could be driving the doctrine. The opportunities-and the challenges-presented by these new technologies cover the gamut of communications, computing, sensors, networks, interoperability and security. The defense community's response to this development may define military superiority for years to come.

Outsourcing Trend Demands Closer Examination

November 2000
By James H. Ward

Nowhere does the battle for or against outsourcing rage more fiercely than in the halls of the Pentagon, seat of the most powerful military in the world. The U.S. Defense Department is finding itself in the throes of a debate that might, over time, cause it to cede its hegemony to commercial forces and lose the tools it will need to fight on distant battlefields.

Surveillance Slips Into Cyberspace

February 2005
By David E. Peterson

Allied intelligence agencies engaged in computer-to-computer signals intelligence exploration are closely examining Internet protocol network intercepts and forensics analysis as a new weapon in the war against terrorism. Traditional signals intelligence professionals, who have shied away from this type of intelligence gathering for more than a decade, are realizing that the computer-to-computer intelligence gap can be filled. The fact that computer-to-computer signals intelligence is a weakness in current allied intelligence-gathering efforts is no secret. But after decades of denial, the intelligence community and emerging technologies are changing the old ways of looking at network surveillance.

Apathy and Incompetence Trump Terrorism In Cyberspace

January 2005
By Col. Alan D. Campen, USAF (Ret.)

Today's threats to U.S. national security range from the bloody reality of terrorist suicide bombers who kill and maim individuals to weapons of mass destruction that potentially hold many thousands at risk. The U.S. information infrastructure is a vital element of U.S. national security, but the design and management of software render its terminals, nodes and networks demonstrably vulnerable to malicious manipulation.

COTS Is Only as Good as the Shelf

January 2001
By Col. Alan D. Campen, USAF (Ret.)

Commercial off-the-shelf procurement is now a fact of life for the U.S. Defense Department. This thrust is driven as much by economics as it is by technology advances. However, the headlong rush to commercialize the defense technology base is producing unwanted complications that threaten to undermine the original goals of commercial acquisition.

Balancing Capability Protection and Mission Readiness

April 2001
By Capt. Philip Ray, USN

In Case of Emergency, Break Glass. That phrase calls to mind the image of a firefighter's axe in a glass box on a wall. It also is an appropriate analogy for the U.S. Defense Department's approach to information operations, wherein powerful capabilities often are locked away from the hands of the warfighter. But unlike the firefighter, who is trained in the use of the axe, warfighters have virtually no opportunity to train with U.S. information operations capabilities or to factor them into their plans. Tight security controls that are designed to ensure the protection of many capabilities are, as an unintended consequence, locking the armed forces out of opportunities to learn to use them effectively. This, in a nutshell, is the problem of overprotection.

Pages

Subscribe to RSS - Viewpoint