The U.S. military will need several years to reset and rebuild its military following the wars in Iraq and Afghanistan, said the deputy secretary of defense.
Needing a new long-range anti-ship missile, the U.S. Navy has configured a Tomahawk cruise missile to perform that role. The service saved a large amount of scarce funding in adapting an existing system instead of developing a new one, stated a high-ranking defense official.
The United States is losing the defense technology advantage it has held since World War II, and that development could have ramifications far beyond the battlespace.
Returning the defense budget to sequestration levels “would be a disaster,” according to a senior defense official.
The U.S. lead in military technology is too great, not enough or disappearing, depending on which expert is speaking. And, all three statements might be accurate in their own ways.
The traditional paths to innovation may not be enough to maintain U.S. leadership in that endeavor. So, innovative ideas may be necessary for pursuing innovation.
For years, the United States maintained economic and military superiority through technological innovation. Now, that lead is diminishing, and the country must find the resources to respond.
The technology gap caused by the growing sophistication of U.S. defense communications and networking systems threatens to leave less advanced nations unable to participate effectively in coalitions. One approach to mitigate the gap is to have allies work with the United States on establishing standards for new systems and capabilities.
If cyberspace is a warfighting domain, then warfighters should expect that it will not perform as desired. The same maneuver warfare skills common on the battlespace need to be applied to cyberspace.
"Call of Duty" may be a sleeper introductory tool for future military personnel, according to a Marine Corps general.
As the U.S Marine Corps returns to its roots as a rapidly deployable amphibious force, it needs better communications and networking gear that is small and lightweight for the amphibious mission.
Being longtime allies does not give U.S. forces carte blanche in Australia. The Southern Hemisphere ally is hosting a U.S. Marine Corps detachment, but U.S. forces are treading carefully so as not to upset relations as a new relationship is built.
The U.S. Pacific Command (PACOM) increasingly is turning to technology to solve problems ranging from new threats to the tyranny of distance over the vast Asia-Pacific region. Cyberspace is both a source of challenges and a potential venue for addressing many of the challenges PACOM is facing as the pace of change picks up in the globe’s largest, most populous area of operations.
Some interoperability issues are cultural, not technical. Now, a new approach uses advanced virtual technology to help overcome cultural issues before a coalition is formed.
Many nations are loath to share data in a coalition operation, because they fear the wrong partner will access sensitive information. Now, a new system under development will allow countries to tag data for only the countries that they want to view it.
The U.S. Army Pacific has a plan—coordinated with an overall Army modernization effort—to incorporate commercial innovation into its force to overcome many of the challenges it faces in the vast Asia-Pacific region.
Truly effective leaders eschew digital media such as email and social media when they communicate with their workers. The best form of leadership communication is face to face, according to a panel of government, military and business leaders.
The deck is stacked in favor of cyber attackers against defenders. And, that trend is likely to worsen as the march of technology enables new capabilities that empower more cybermarauders.
While terrorists can inflict individual points of damage to the U.S. homeland, cyberspace attacks hold the greatest potential for inflicting devastating damage that could change the nature of the nation.
Security experts must have full network awareness in real time if they are to thwart the growing cyberspace threat. Programs such as the joint regional security stacks (JRSS) may hold the key to securing networks against dominance by cybermarauders.