Future defense information technology is likely to focus on a set of services instead of specific elements. Accordingly, bidders likely will consist of industry teams bringing diverse expertise to the acquisition table.
Instead of deciding where to spend its money, the Pentagon now must decide where not to spend its increasingly scarce cash resources. This entails risk assessment that focuses on how not to hurt the warfighter.
Cyber has provided the means for rapidly assembling and operating military coalitions in the post-Cold-War era. Now, the very nature of the domain may require coalitions to save it from a growing menu of threats. These threats can range from annoying hackers to organized crime to malicious nation-states and even geopolitical movements to restrict the flow of ideas. While the panoply of perils is diverse, the actions to defend against them may have to spring from the well of government and organizational cooperation.
More than just generational differences characterize today's cyber work force. People of all ages have different ways of thinking and different goals for their profession. The variation is almost as great as the technology changes they are incorporating.
The networking assembled for the emergency Philippine typhoon response broke new ground in connectivity among governments and relief organizations. However, it also opened the door to sabotage by cybermarauders.
Now that allied forces have accepted coalitions as a requisite for future military operations, they must undergo a cultural sea change for cybersecurity. Accepting nontraditional partners demands a new way of viewing cybersecurity that entails greater flexibility at its most philosophical level.
An evolving mission network connecting U.S. and Australian forces is being expanded to include other trusted allies with an eye toward adding coalition partner nations. The network is built around a risk-managed approach for sensitive information sharing.
Quote of the Day:
"If you allow the United States to operate out of sanctuary, we will beat the crap out of you." - Lt. Gen. Stanley T. Kresge, USAF, vice commander, U.S. Pacific Air Forces, addressing potential adversaries
U.S. Pacific Command military leaders agree that any future operation will be conducted amid a coalition, and partner countries must be networked. However, that networking opens the possibility for greatly increased network vulnerabilities as less-secure nations provide weak links for network security.
An increasing number of missions combined with more diverse settings offer a major challenge to establishing needed communications throughout the Asia-Pacific region. U.S. forces cannot count on having necessary communications links in place with they respond to a new mission, noted a panel of military officers.
Years of exercises between the Philippine and U.S. militaries helped both countries work together in the massive rescue effort after the Asian nation was devastated recently by a typhoon. The U.S. effort, designated Operation Damayan, featured effective coordination amid a sterling execution by the Philippine military, according to U.S. military officers.
The U.S. Pacific Air Forces will benefit greatly from combining its A-3 and A-6, said its director of communications and chief information officer. The concept of cyber readiness has a different perspective from the operations side and the cyber side. This consolidation helps provide warfighting integration across the entire network.
The United States must examine new means of deterrence that address the multitude of ways an adversary would seek a military advantage. The old idea of deterrence--threatening an enemy with total destruction--does not apply to current challenges, especially with cyber issues, says the vice commander of the U.S. Pacific Air Forces.
The United States must weigh its command and control (C2) capabilities before it embarks on a military plan instead of the other way around, according to the vice commander, U.S. Pacific Air Forces. Lt. Gen. Stanley T. Kresge, USAF, told the opening luncheon audience in TechNet Asia-Pacific 2013 in Honolulu, Hawaii, that vulnerabilities have increased the importance of C2 in planning and execution.
The U.S. Pacific Command needs effective intelligence, surveillance and reconnaissance (ISR) assets to address its increasing mission activities, according to the command’s deputy commander. Lt. Gen. Thomas L. Conant, USMC, was blunt in his assessment to the audience at the opening breakfast at TechNet Asia-Pacific 2013 in Honolulu, Hawaii.
Any future U.S. military network architecture must accommodate allies, or it will not work for the vast Asia-Pacific region. Operations from humanitarian aid to military conflict will involve partners, and their effective participation will depend on access to U.S. networks.
U.S. forces may be over relying on cyber to meet challenges in the Asia-Pacific region at a time when potential adversaries view it as a key to disrupting U.S. operations, according to the top leaders of the U.S. Pacific Command (PACOM). Lt. Gen. Thomas L. Conant, USMC, deputy commander of PACOM, offered that U.S. forces must expect to operate without at least some of their cyber assets in a time of conflict.
North Korea’s growing missile and nuclear capabilities “keep us awake at night,” according to the deputy commander of the U.S. Pacific Command. Lt. Gen. Thomas L. Conant, USMC, warned that the communist government’s recent developments pose a much greater threat to peace and security than traditionally offered.
Naval forces represent the ultimate projection capability for the United States. This important capability creates some unique requirements and constraints in intelligence, surveillance and reconnaissance (ISR) support to the Navy and Marine Corps. The expeditionary nature of these forces drives two distinctive aspects of naval ISR.
Two pictures have taken up residence in my mind over the past few weeks. They highlight the growing disconnect between the U.S. Defense Department and the broader strategic environment—not just in terms of geopolitics but also in the way the rest of the world lives, works and interacts.