The best intentions among international cyber experts may be foiled simply because they don't understand each other's cultural differences. Priorities and even the way of thinking can inhibit progress without cyber experts even realizing it.
The national laws that ensure freedom in modern democracies are preventing effective international cybersecurity measures. Hackers hide behind borders as they ply their malice around the world, and authorities are hard-pressed to reach them.
Maintaining Internet security--and ensuring its continued freedom--likely will depend on like-minded nations forming coalitions that help formulate international regulations and rules of governance.
The networking assembled for the emergency Philippine typhoon response broke new ground in connectivity among governments and relief organizations. However, it also opened the door to sabotage by cybermarauders.
Australia has implemented a cybersecurity policy that brings together government and industry to secure the domain nationally. The country recently elevated cybersecurity as a major priority for national security, and in 2009, it established a Cyber Security Operations Center (CSOC).
Now that allied forces have accepted coalitions as a requisite for future military operations, they must undergo a cultural sea change for cybersecurity. Accepting nontraditional partners demands a new way of viewing cybersecurity that entails greater flexibility at its most philosophical level.
An evolving mission network connecting U.S. and Australian forces is being expanded to include other trusted allies with an eye toward adding coalition partner nations. The network is built around a risk-managed approach for sensitive information sharing.
Quote of the Day:
"If you allow the United States to operate out of sanctuary, we will beat the crap out of you." - Lt. Gen. Stanley T. Kresge, USAF, vice commander, U.S. Pacific Air Forces, addressing potential adversaries
U.S. Pacific Command military leaders agree that any future operation will be conducted amid a coalition, and partner countries must be networked. However, that networking opens the possibility for greatly increased network vulnerabilities as less-secure nations provide weak links for network security.
Years of exercises between the Philippine and U.S. militaries helped both countries work together in the massive rescue effort after the Asian nation was devastated recently by a typhoon. The U.S. effort, designated Operation Damayan, featured effective coordination amid a sterling execution by the Philippine military, according to U.S. military officers.
The U.S. Pacific Command needs effective intelligence, surveillance and reconnaissance (ISR) assets to address its increasing mission activities, according to the command’s deputy commander. Lt. Gen. Thomas L. Conant, USMC, was blunt in his assessment to the audience at the opening breakfast at TechNet Asia-Pacific 2013 in Honolulu, Hawaii.
Any future U.S. military network architecture must accommodate allies, or it will not work for the vast Asia-Pacific region. Operations from humanitarian aid to military conflict will involve partners, and their effective participation will depend on access to U.S. networks.
U.S. forces may be over relying on cyber to meet challenges in the Asia-Pacific region at a time when potential adversaries view it as a key to disrupting U.S. operations, according to the top leaders of the U.S. Pacific Command (PACOM). Lt. Gen. Thomas L. Conant, USMC, deputy commander of PACOM, offered that U.S. forces must expect to operate without at least some of their cyber assets in a time of conflict.
North Korea’s growing missile and nuclear capabilities “keep us awake at night,” according to the deputy commander of the U.S. Pacific Command. Lt. Gen. Thomas L. Conant, USMC, warned that the communist government’s recent developments pose a much greater threat to peace and security than traditionally offered.
Two pictures have taken up residence in my mind over the past few weeks. They highlight the growing disconnect between the U.S. Defense Department and the broader strategic environment—not just in terms of geopolitics but also in the way the rest of the world lives, works and interacts.
A new destroyer being deployed by China offers improvements in technology that rival those of the newest destroyers being built for the U.S. Navy. Its advances include phased array radars and improved missiles and launch systems. With room to grow, this ship seems destined to play a significant role in naval operations.
Exelis Inc., Fort Wayne, Ind., is being awarded a $7,028,919 indefinite-delivery/indefinite-quantity contract for the procurement of up to 62 radar signal simulators in support of the MH-60R and S70-B aircraft for the U.S Navy (33), the government of Australia (27), and the government of Brazil (2) under the foreign military sales program. The Naval Air Warfare Center Aircraft Division, Lakehurst, N.J., is the contracting activity (N68335-14-D-0005).
Pacific Architects and Engineers Applied Technologies, Fort Worth, Texas, is being awarded a $44,577,164 indefinite-delivery/indefinite-quantity contract for the development, testing, and installation of the SureTrak Surveillance System for the U.S. Navy, U.S.
In coordination with Joint Task Force 505, the George Washington Strike Group is assisting the Philippine government in ongoing efforts in response to super Typhoon Haiyan/Yolanda in the Republic of the Philippines.
Cubic Defense Applications Inc., San Diego, Calif., has been awarded a $24,999,949 firm-fixed-price contract for foreign military sales P5Combat Training System (P5CTS), combined hardware buy. Contractor will provide P5CTS hardware to provide an instrumented training capability that increases, maintains, and assesses combat proficiency in the following mission areas: counter air, close air support, strategic attack, air interdiction, and electronic combat.