The networking assembled for the emergency Philippine typhoon response broke new ground in connectivity among governments and relief organizations. However, it also opened the door to sabotage by cybermarauders.
Australia has implemented a cybersecurity policy that brings together government and industry to secure the domain nationally. The country recently elevated cybersecurity as a major priority for national security, and in 2009, it established a Cyber Security Operations Center (CSOC).
Now that allied forces have accepted coalitions as a requisite for future military operations, they must undergo a cultural sea change for cybersecurity. Accepting nontraditional partners demands a new way of viewing cybersecurity that entails greater flexibility at its most philosophical level.
An evolving mission network connecting U.S. and Australian forces is being expanded to include other trusted allies with an eye toward adding coalition partner nations. The network is built around a risk-managed approach for sensitive information sharing.
"If you allow the United States to operate out of sanctuary, we will beat the crap out of you." - Lt. Gen. Stanley T. Kresge, USAF, vice commander, U.S. Pacific Air Forces, addressing potential adversaries
U.S. Pacific Command military leaders agree that any future operation will be conducted amid a coalition, and partner countries must be networked. However, that networking opens the possibility for greatly increased network vulnerabilities as less-secure nations provide weak links for network security.
Years of exercises between the Philippine and U.S. militaries helped both countries work together in the massive rescue effort after the Asian nation was devastated recently by a typhoon. The U.S. effort, designated Operation Damayan, featured effective coordination amid a sterling execution by the Philippine military, according to U.S. military officers.
The U.S. Pacific Command needs effective intelligence, surveillance and reconnaissance (ISR) assets to address its increasing mission activities, according to the command’s deputy commander. Lt. Gen. Thomas L. Conant, USMC, was blunt in his assessment to the audience at the opening breakfast at TechNet Asia-Pacific 2013 in Honolulu, Hawaii.
Any future U.S. military network architecture must accommodate allies, or it will not work for the vast Asia-Pacific region. Operations from humanitarian aid to military conflict will involve partners, and their effective participation will depend on access to U.S. networks.