NATO has initiated Dynamic Mongoose, this year's biggest antisubmarine warfare exercises in the North Sea, with a focus on detecting and defending against submarines.
The cyber attacks that threaten the United States are just as intense and worrisome for NATO, which comes under persistent strikes by nation-states, terrorist groups and criminal organizations all assailing with denial-of-service malware, organized criminal incursions, cyber espionage and website defacements.
In recent decades, air power has been NATO’s first, and sometimes only, military response to a threat. But tightened budgets and dwindling resources are placing air power in a death spiral driven by declining readiness, a shrinking force structure and an ever-smaller residual fighting capacity, say NATO’s foremost experts on air and space power.
BAE Systems Technology Solutions & Services Inc., Rockville, Maryland, is being awarded an $8,480,150 modification to a previously awarded cost-plus-fixed-fee contract (N00024-14-C-5404) to exercise option year one for major product
Multiple autonomous underwater vehicles equipped with modern sensors relevant to NATO minehunting missions are being employed at sea during the Multinational AutoNomy Experiment (MANEX ‘14), held September 22 to October 13, 2014, along the Italian coast, between Framura and Bonassola, in the Ligurian Sea.
The United States is in the midst of preparing its largest intelligence hub outside of its own national borders. The center will accommodate operations with reach into several global areas, including those rife with anti-terrorism operations.
A new mobile operations fusion kit that provides easy, rapid and on-the-go interoperability for mobile field operations and communications piqued the interest recently of the U.S. Marine Corps’ research and development community.
Cyber, defense technology, coalition interoperability, NATO contracting opportunities and Ukraine were among the topics discussed at the NATO Industry Conference and TechNet International 2014, held in Bucharest, Romania. For the third time, the NATO Communications and Information Agency and AFCEA Europe organized a joint conference and exposition. The two organizations generated a program with an agenda of truly intertwined sessions relevant to all.
Estonia has established a dedicated cyberdefense infrastructure and implemented new policies that are serving as models for other allied nations gearing up for potential cyber attacks. The Estonian measures come in the wake of the Baltic nation undergoing a severe cyber attack in 2007.
Encountering many variables as it strives to achieve effective cybersecurity, NATO is focusing on two long-standing constants to move forward: training and partnerships with industry. The Atlantic alliance is seeking industry help in pursuing solutions, and it is adopting many traditional methods and institutions to train personnel in vital cyberskills.
Defenders of cyberspace need to concentrate on the critical services provided by the critical infrastructure, not the infrastructure itself, according to a leading cyber expert. Melissa Hathaway, president of Hathaway Global Strategies and former acting senior director for cyberspace with the National Security Council, said that the future of the West is held hostage to the fact that its security and resilience are threatened.
Even with the rising tide of nation-sponsored cyber attacks, NATO does not yet have a policy—let alone a definition—of what constitutes a cyber attack that would mandate a response under Article 5 of the alliance’s Washington Treaty, according to NATO officials. Article 5 defines an attack on a NATO member as “an attack on all,” requiring a response by all members against an aggressor.
Representatives from the U.S. Army and Air Force, along with 17 NATO nations and three partner nations, will participate in a joint reconnaissance trial in Norway this month to test and evaluate intelligence, surveillance and reconnaissance concepts and technologies.
In the coming months, extremists fighting in the Syrian civil war likely will begin returning to Europe, funneling through the Balkans where they can find cheap weapons, like-minded allies and temporary accomplices in the form of organized criminal groups. Conditions are ripe, according to experts, for those individuals to spread across Europe, launching terrorist attacks on major cities.
China and Russia represent two of the most robust, comprehensive concerns to worldwide stability. Almost every major geostrategic threat—cyber attack, nuclear weapons, ballistic missiles, capable military forces, political influence, economic power, sources of and high demand for energy—is resident in those two countries that often find themselves at odds with the United States and its allies.
Ball Aerospace Technologies Incorporated, Boulder, Colorado, is being awarded a $23,933,170 firm-fixed-price contract for "Stalker" or long-range electro-optical/infrared/laser range finder (SLREOSS) production. SLREOSS is used with the NATO Seasparrow Missile System MK 57 on the MK 9 Tracker Illuminator System. The Naval Sea Systems Command, Washington D.C., is the contracting activity (N00024-14-C-5412).
Even though the Cold War has ended and the monolithic threat against the West has disappeared, the relationship between Europe and the United States remains vital. Europe includes some of the United States’ strongest coalition partners and alliances; the two economies are closely tied and interdependent; and defense and security in Europe are evolving rapidly, just as in the United States. AFCEA chapters and members outside the United States number the greatest in Europe.
Romania has opted to extend its force modernization period rather than cut important purchases as it deals with its version of the global budget crisis. Despite suffering from the severe economic downturn that began more than five years ago, the Black Sea country continues to upgrade its military with the goal of being a significant security force in an uncertain region.
NATO’s efforts to defend against terrorism now are focusing on cyberspace as a tool of terrorists instead of merely as a vulnerability for striking at alliance nations and their critical infrastructure. These efforts cover aspects of cyber exploitation that range from understanding terrorists’ behavior to how they might use social media.
The budget reductions that will be a fact of military life for the foreseeable future promise to impel dramatic changes in force structure and military operations. Ongoing needs such as high technology and overseas commitments offer the possibility of being both challenges and solutions, as planners endeavor to plan around a smaller but, hopefully, more capable force.