Defensive information warfare posturing traditionally has taken the form of security-passwords, firewalls and locked doors. But with less than 100 percent confidence that intruders can be kept out of information systems, a U.S. Air Force and industry team is developing a fundamentally different defensive approach. They are creating a prototype that provides advanced warning of attacks on U.S. Defense Department systems so they are prepared when security is breached.
The United States has been using simulations for decades to explore the capabilities of its military forces and train soldiers to perform their missions better. In the war against terrorism, however, this technology can come out of the training centers and into the operations centers to support the country and its allies in fighting this new type of war and enhance homeland security.
While analysts now are keeping a sharper eye on possible weapons proliferation, some of the technologies they employ may play an increasingly important role in maintaining homeland security. In the wake of the September 11 attacks on the United States, experts charged with detecting overseas programs to develop weapons of mass destruction are refocusing their efforts on a new list of nations that pose more immediate threats.
Technology is liberating the U.S. Defense Department from the chains of a single location by enabling it to become a network-centric department. The initiative to create a virtual Pentagon calls for taking advantage of advances in networking, Internet protocol, videoconferencing, mass storage and data transmitting technologies. These capabilities would allow military personnel to continue to collaborate and communicate in emergency situations even if systems within the Pentagon are damaged.
A cross-service network that shares sensitive but unclassified information among U.S. Defense Department installations is moving nationwide. The Web-portal technology allows users to document and immediately disseminate information regarding potential threats to personnel, facilities and resources to meet antiterrorism and force protection needs.
The two-year-old U.S. combatant command tasked with both homeland security and homeland defense is juggling conflicting requirements as it strives to establish a vital infostructure. The U.S. Northern Command, or NORTHCOM, must balance the need to deter, prevent and defeat threats to the United States with legal limitations on domestic information sharing. This poses both technological and organizational challenges to intelligence dissemination and communications.
As successful as operation Enduring Freedom has been on the battlefields of Afghanistan, the lack of organizational reform in domestic U.S. agencies threatens the battle on the war's other front-the United States. Despite increased security measures and the heightened state of alert on the part of the public, the country is still highly vulnerable to further attacks by terrorists.
Networked terror groups, domestic radicals, renegade states and terror for profit all threaten Western democracies to an unprecedented degree. Prospective targets might be high-profile infrastructure assets with the potential for high casualty totals, or they might simply take the form of attacks on public institutions to rapidly erode confidence in governments.
A recently developed technology will allow military and local community first responders to take advantage of all available communications assets. The gateway-bridging equipment provides interoperability between commercial and military networks. Specialized military network cards support the connectivity to tactical equipment, allowing commercial traffic to travel over those assets.
Before September 11, only a few brave organizations were dedicated to authorizing and funding programs to test advanced technologies for state and federal disaster first responders and train key personnel in their use. For scenarios involving weapons of mass destruction, even fewer offered unclassified-level training in the skills and technology needed by law enforcement and health care personnel. Among those few are the U.S. Air Force Research Laboratory's Homeland Defense Technology Center in Albuquerque, New Mexico; the U.S. Department of Justice's Office of Justice Programs, Washington, D.C.; and the New Mexico Institute of Mining and Technology, Socorro. In times of crisis, it has been their experts who arrived on the scene toting a combination of "Men in Black" suitcase technology and advanced supercomputing capabilities to assist the nation's first responders.
Civilian disaster response personnel soon will employ secure electronic messaging to communicate with U.S. government agencies and military services. The mobile system enables emergency management personnel to contact and coordinate operations quickly with other federal entities in the event of an emergency or terrorist attack.
Emergency responders to civilian crises soon may have the same command, control and communications capabilities that the armed forces use on the battlefield. Long-tested military communications technologies are being combined with state-of-the-art civilian systems to provide emergency communications when accidents, natural disasters or terrorist attacks damage or overwhelm an existing communications infrastructure.
While information technology is furnishing combatant commanders with situational awareness in current operations, cutting-edge capabilities now provide overall situational awareness to the commander in chief. In recent years, and particularly since September 11, 2001, enhancements made to the White House communications systems ensure that the president can stay connected to his troops-all the time and from any location. Like the transformation that is taking place throughout the military services, the technologies that support the president have evolved into a system of systems at breakneck speed.
Businesses and the U.S. military have between them a multitude of information assurance programs to protect against cyberattacks; however, a recent research project reveals significant gaps in national policies, procedures and relationships that must be addressed to ensure success. As the United States becomes more dependent on technology and near-real-time data, information operations are evolving into a critical national security matter that requires a joint approach.
U.S. civilian emergency management and law enforcement agencies are becoming increasingly capable of interoperating with the U.S. Defense Department. By enhancing communications and computer networking systems, organizations are readying themselves for flexible multiagency and multiservice joint operations in the event of a natural or man-made disaster.
The U.S. National Imagery and Mapping Agency is purchasing commercial remote sensing imagery, some under exclusive use agreements, to support operation Enduring Freedom in Afghanistan. Applications can range from mission planning and rehearsal to battle damage assessment and humanitarian airdrops.
Corporate America is helping assemble the homeland defense jigsaw puzzle that includes thousands of pieces being put together by hundreds of people looking at a multitude of different pictures. Industry leaders agree that the biggest challenge is the complexity of the problem and the plethora of solutions being proposed by companies with a range of specialties taking widely varying approaches.
More than 16 months after the September 11, 2001, terrorist attacks, U.S. government spending on homeland security has yet to settle into a predictable routine. Tens of billions of dollars have been allocated to domestic and foreign operations aimed at deterring, preventing or recovering from terrorist activities. Some of these appropriations have funded startup programs that promise long-term benefits, while others support long-extant efforts that are the only options available for immediate action in the war on terrorism.
The major consolidation of federal agencies that is creating the new Department of Homeland Security also is impelling private industry to adapt to the changing landscape. The resulting environment places more responsibility on businesses to protect vital infrastructure, but it also clears the way to a closer and more productive relationship between the commercial and public sectors.
Rapidly deployable, reliable and secure communications are helping sort through the inherent communications chaos surrounding emergency situations. The technology was instrumental in providing communications capabilities after the terrorist attacks and also was useful in debris recovery operations after the space shuttle Columbia disaster.