The United States must weigh its command and control (C2) capabilities before it embarks on a military plan instead of the other way around, according to the vice commander, U.S. Pacific Air Forces. Lt. Gen. Stanley T. Kresge, USAF, told the opening luncheon audience in TechNet Asia-Pacific 2013 in Honolulu, Hawaii, that vulnerabilities have increased the importance of C2 in planning and execution.
The U.S. Pacific Command needs effective intelligence, surveillance and reconnaissance (ISR) assets to address its increasing mission activities, according to the command’s deputy commander. Lt. Gen. Thomas L. Conant, USMC, was blunt in his assessment to the audience at the opening breakfast at TechNet Asia-Pacific 2013 in Honolulu, Hawaii.
Any future U.S. military network architecture must accommodate allies, or it will not work for the vast Asia-Pacific region. Operations from humanitarian aid to military conflict will involve partners, and their effective participation will depend on access to U.S. networks.
U.S. forces may be over relying on cyber to meet challenges in the Asia-Pacific region at a time when potential adversaries view it as a key to disrupting U.S. operations, according to the top leaders of the U.S. Pacific Command (PACOM). Lt. Gen. Thomas L. Conant, USMC, deputy commander of PACOM, offered that U.S. forces must expect to operate without at least some of their cyber assets in a time of conflict.
North Korea’s growing missile and nuclear capabilities “keep us awake at night,” according to the deputy commander of the U.S. Pacific Command. Lt. Gen. Thomas L. Conant, USMC, warned that the communist government’s recent developments pose a much greater threat to peace and security than traditionally offered.
The bottom line is that today's military structure is not set up to foster creative solutions and incorporate them into the bureaucracy, but a revolution quietly erupted in October. More than 80 innovators came together to discuss their ideas about how to solve some of the military's most vexing problems.
Current fiscal and world conditions are taking their toll on the ability of the U.S. Army’s signals community to keep soldiers equipped with the latest developments. However, leadership embraces the challenges as impetus to improve, ensuring that troops are prepared as they transition from an operational to a contingency force. Necessity is inspiring creativity to developing solutions, with the government reaching out to industry for more help. As the service branch’s chief information officer/G-6, Lt. Gen.
Cyberspace has security problems, and the U.S. government is trying to do something about it. The National Strategy for Trusted Identities in Cyberspace (NSTIC) is promoting a plan and taking actions to move citizens beyond usernames and passwords to more powerful methods of authentication. In recent years, massive data theft has occurred in the cyber realm. Even strong passwords are vulnerable to hackers.
“We are in an era where biometric data is proliferating,” Dr. Joseph Atick, chairman, Identity Council International, said today at the Biometric Consortium Conference. That expansion is taking place in the civilian world in addition to increases in the military and public safety sectors. “Biometrics in daily life has arrived,” Atick explained.
NATO is investing time, talent and treasure into advancing biometrics, Col. Bernard Wulfse, Dutch Army, commander, Joint Task Force Counter Improvised Explosive Device (C-IED), explained at the Biometric Consortium Conference. The alliance has named biometrics a critical capability shortfall to address. Key to achieving goals for biometrics is bringing all the partner nations together—not only the few currently supporting the efforts.
Biometrics has advanced significantly over the past decade, altering the lives of people across the globe, especially in developing countries. But the field faces many concerns as it looks toward the future.
The U.S. Army no longer has the luxury of propping up program failures with extra money, causing big changes in the service’s decisions. “If a program doesn’t execute, it’s not going to be a program very long,” said Maj. Gen. Harold J. Greene, USA, deputy for acquisition and systems management, headquarters, Army, during TechNet Augusta. His repeated this main message throughout his presentation, emphasizing that programs must perform and meet budgets.
The Joint Information Environment (JIE) is well on its way to becoming a pervasive reality for the U.S. Armed Services and its coalition partners. The version at U.S. European Command reached initial operational capability on July 31, and the Army now has 1.5 million users on enterprise email, a key service under the environment.
“No other field has changed so completely, so rapidly as signals has in the last 10 years,” Gen. Dennis Via, USA, commander, U.S. Army Materiel Command (AMC), said during TechNet Augusta on Wednesday. During his address, he asked the Army’s communications community to help his organization provide the capabilities soldiers will need even as sequestration makes providing them more difficult. Senior leaders should worry about the budget, leaving soldiers in the field to worry about coming home safely.
As often happens when discussions focus on military technology, talk during the first day of TechNet Augusta 2013 zeroed in on people, not capabilities. Leaders today shared their ideas on human resources and how they would make all the difference modernizing the Army network during a time of lean budgets.
As cyber becomes increasingly important to military operations, the personnel necessary to success in the field are a major focus of attention. Senior noncommissioned officers from all four branches of the U.S. military and the Army National Guard sat on a panel to today discussing this issue during TechNet Augusta.
Despite small pockets of resistance, officials across the U.S. Defense Department and military services support the convergence of multiple networks into one common, shared, global network. Lessons learned from the theater of operations indicate the need for the joint environment, which will provide enterprise services such as email, Internet access, common software applications and cloud computing.
Protecting the nation from cyber attack entails deterring or preventing marauders from carrying out their malevolent plans. But, while government and the private sector endeavor to fight the menace jointly, evildoers constantly change their approaches and learn new ways of striking at vulnerable points. So many variables have entered the equation that even the likelihood of attacks—along with their effects—is uncertain.
Supervisory control and data acquisition (SCADA) systems face numerous threats from cybermarauders coming at them from any of a number of directions. Some systems could suffer malware attacks even though they are not the intended targets, according to a leading security expert.