The U.S. Navy’s Next Generation Enterprise Network, or NGEN, is on schedule to complete its transition on October 1. Yet, a few loose ends remain, and the entire system may undergo significant changes as the Navy girds for a dynamic, uncertain future.
Although the U.S. Defense Department and the military industry are feeling the effects of constrained budgets, they have not yet been forced to find truly innovative solutions, Mark Bigham, chief innovation officer for Raytheon Intelligence and Information Services, told the AFCEA TechNet Augusta 2014 audience.
In his farewell address, President Dwight Eisenhower coined the phrase "military industrial complex" to describe the relationships between the military, Congress and industry. That complex no longer exists, according to Tom Davis, a former vice president for General Dynamics, speaking during an industry panel at the AFCEA TechNet Augusta 2014 conference.
The U.S. Army is building a Cyber Center of Excellence at Fort Gordon, Georgia, and it will not come cheap, warned Maj. Gen. Stephen Fogarty, USA, the center’s new commanding general.
Former National Security Agency contractor Edward Snowden single-handedly shocked the U.S. intelligence community by leaking reams of information to the news media, but the insider threat is much more widespread, said Maj. Gen. Stephen Fogarty, USA, the new commanding general, U.S. Army Cyber Center of Excellence and Fort Gordon, Georgia.
The cyber era requires partnerships and information sharing across the agencies, industries and nations, said Maj. Gen. Stephen Fogarty, USA, the new commanding general, U.S. Army Cyber Center of Excellence, Fort Gordon, during a keynote address at the AFCEA TechNet 2014 Augusta conference, Augusta, Georgia.
U.S. Army officials struggled during the AFCEA TechNet Augusta 2014 to discuss the future of cyber operations when much of that future is currently unknowable, in large part because no one knows the effects or challenges of emerging technologies.
The U.S. Army may at some point need to allow soldiers to conduct offensive cyberwarfare at the brigade combat team level, according to a panel of chief warrant officers.
The U.S. Defense Department is primed to take a first step toward the realization of JIE as it gears up information migration to the joint regional security stacks, or JRSS, a key upgrade to streamline and secure network operations.
The U.S. Army is standing up a cyber brigade and considering a cyber branch, which has some questioning the future of the services Signal Corps, but the Signal Corps will survive, Lt. Gen. Robert Ferrell, USA, the service’s chief information officer, said during a luncheon keynote speech at the AFCEA TechNet Augusta 2014 conference.
U.S. Army officials are laboring to define what the force will look like in 2025. But technologically speaking, it is hard to define anything beyond the next two or three years, according to Lt. Gen. Edward Cardon, USA, commanding general, Army Cyber Command.
Sometimes, cyber warriors will have to pick and choose what to protect, because, “It’s increasingly clear we can’t protect everything,” said Lt. Gen. Edward Cardon, USA, commanding general, U.S. Army Cyber Command, while addressing the AFCEA TechNet Augusta audience.
All too often, the topic of cyber presents a negative view of vulnerabilities and attacks, but cyber has a positive role to play in national defense, said Lt. Gen. Edward Cardon, USA, commanding general, U.S. Army Cyber Command, speaking as a keynote at AFCEA TechNet Augusta.
The late Vladimir Ilyich Ulyanov, better known by his nom de guerre, V.I. Lenin, used to be famous, or at least infamous. As the founding dictator of revolutionary Russia, Lenin built a grim, cruel and mighty police state whose oppressive successor to this day menaces all too many unhappy people in eastern Europe. The man the Communists once idolized as “our dear Ilyich” is long gone and, in decent circles, not missed very much.
A key challenge to building a new tactical technology acquisition model is that it requires carefully identifying and prioritizing requirements, as well as staying engaged with the acquisition arm of government throughout the acquisition process. Carefully defining an operational requirement—not the end technical solution—allows industry to develop and provide the most effective solution. Industry has a strong economic impetus to provide the capability that the operating forces require.
The U.S. government is adopting changes to the cloud computing certification program that will better protect against potential insider threats. The improvements include additional penetration testing, more thorough testing of mobile devices, tighter controls over systems being carried from a facility and more stringent scrutiny of systems connecting from outside the network.
The U.S. Army is extending advanced communications to disadvantaged users, fielding a series of capabilities to various groups in an effort to give soldiers at the pointy end of the spear the connectivity they need. With the rollout, forward-deployed troops should be able to access classified networks via wireless 4G long-term evolution connections. National Guard units also are acquiring the tools to aid their troops in disaster response scenarios.
U.S. Defense Department and interagency special operators are scheduled to begin receiving new tactical mesh networking equipment this month. The kit provides a mobile, ad hoc, self-healing network that offers a full range of situational awareness data, including intelligence, surveillance and reconnaissance feeds, blue force tracking and a voice over Internet protocol capability.
Despite substantial research and investments, widespread interoperability continues to elude the Defense Department, the joint force and their partners. Some of the hurdles are inherent in the current acquisition and budgeting process.
Fiscal year 2015 marks the official kickoff of a U.S. Army program to develop a foliage-penetrating radar that will simultaneously locate still objects and track moving objects from a fast-moving fixed-wing aircraft.