If the space-based global positioning system (GPS) were to go down, the Joint Aerial Layer Network might be able to fill in to provide timing and navigation in theater during military operations.
TechNet Asia-Pacific 2011
Airpower dominated the 20th century, but cyberpower will dominate the 21st century. Change is outstripping conventional patterns as technologies race capabilities.
Network situational awareness, largely the purview of military systems, may be the best line of defense against cybermarauders threaten the nation's critical infrastructure.
The nation's critical infrastructure, long a potential target of cybermarauders, now faces even greater threats--ironically because of the very information technologies on which it depends for better efficiency of operation.
The U.S. Coast Guard is looking at a variety of options for adding maritime versions of unmanned air vehicles (UAVs) to its sea assets. These vehicles would be used to maintain persistent presence in remote ocean areas.
The Defense Department wants innovative solutions to build the third generation of the Global Information Grid (GIG 3.0), but it wants only current technologies to underpin those innovations.
Accountability, in the form of identity and access management, will be the key elements in the Defense Department's third-generation Global Information Grid, or GIG 3.0.
The problems that the military is facing as personnel make greater use of social media are the same that it has confronted with earlier communications technologies. And, the solution may be the same: greater education on, and adherence to, security guidelines.
Modern cybercriminals have become too sophisticated for traditional security measures. So, the old way of ensuring network security must give way to a new approach that encompasses the whole of user operations in the network.
The spread of mobile networking systems along with the use of social media have opened new backdoors for hackers with potentially serious consequences, according to a leading security expert speaking at TechNet Asia-Pacific 2011. Tom Reilly, vice president and general manager, HP Enterprise Security, told the Wednesday breakfast audience that this major information technology transformation is leading to an escalation of attacks, especially against applications, and cyberspace will be a more dangerous place as a result.
Everything over Internet Protocol (EoIP) is not the cure-all for military communications and networking, a panel of experts warned. Legacy systems must be integrated with EoIP to form a hybrid network that is more flexible and less vulnerable than EoIP would be alone.
Industry must change the way it provides key information technologies and systems to the military, especially with a major budget storm looming on the horizon.
U.S. forces will need to be more dispersed and have greater capabilities if they are to meet challenges in the Asia-Pacific region in the coming century.
The Asia-Pacific region will be the focal point of this century as nations try to maintain booming economic growth amid longtime regional tensions. Many nations in the area want the United States to remain an active partner in security measures.
The United States must partner closely with Asia-Pacific nations to ensure that regional security and stability persist in that region. Sacrificing presence in favor of budget cuts would be the wrong move right now.
It's time for the United States to review its national policy and develop procedures for going after cyberspace intruders. This may be the only way to have an effect on persistent cyber attacks.
Unintended consequences may dampen early success in Libya. The lessons learned by rogue nations such as North Korea and Iran is not to give up nuclear weapons.
An attack on India by terrorists based in Pakistan could lead to the unthinkable, as retaliation by India probably would escalate into a nuclear response by Pakistan.