Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

March 2014

What’s In a Name? Quite a Bit.

March 1, 2014
By Lt. Gen. Daniel P. Bolger, USA (Ret.)

In the second act of William Shakespeare’s Romeo and Juliet, musing aloud, the heroine speaks that justly famous line: “What’s in a name? That which we call a rose by any other name would smell as sweet.” True enough—but The Tragedy of Fred and Juliet lacks a certain zing. Juliet’s lament aside, Shakespeare knew reality. We best remember those items rightly named.

That is as true in the military as any other line of work. And, it has more relevance today in an information age in which credibility often is suspect.

The proper term in Shakespeare’s day did not include operational code names. When the English marched to battle in France, it was known as the Agincourt expedition, or the advance of King Henry V, or the campaign of 1415, or what we did last summer. Of course, Henry’s command and control system consisted of an occasional meeting with a few dukes and a mantra of, “Do as I do.” When Henry moved, the English followed. When he stopped and held ground, his knights and archers did likewise.

But as militaries grew in size and scope—invigorated by messages first horse-borne, then telegraphed, then radioed and now tweeted—any old name for an operation would not do. With apologies to Shakespeare, by the time of the Great War of 1914-18, military plans gained code names—shorthand titles rapidly transmitted, quickly received, immediately understood by those who needed to know and at least potentially confusing to curious enemy listeners. Had it stayed there, all would have been fine.

Modern warfare, however, is not a sport of kings. Waging war today, especially for modern militaries such as the United States’, requires popular support and public funding. As Shakespeare knew well, to keep the audience interested names must do more than identify. You go with Hamlet, Lear and Romeo, not Bill, Joe and Fred. Names must resonate. They need to sell. They have to look good on T-shirts and websites.

Defense and Security In Europe Today

March 1, 2014
By Kent R. Schneider

Even though the Cold War has ended and the monolithic threat against the West has disappeared, the relationship between Europe and the United States remains vital. Europe includes some of the United States’ strongest coalition partners and alliances; the two economies are closely tied and interdependent; and defense and security in Europe are evolving rapidly, just as in the United States. AFCEA chapters and members outside the United States number the greatest in Europe.

Question: Should Industry Ignore the Joint Information Environment (JIE)?

March 1, 2014
By Al Mink

It’s impossible these days to attend a U.S. Defense Department information technology presentation without repeated mentions of the Joint Information Environment (JIE). But industry representatives often ask, “What does JIE mean to me?” I did some digging into the environment—leveraging the expertise of the AFCEA Technology Committee, discussions with several senior defense information technology leaders and insights from colleagues at my firm who participated in JIE Increment 1 in Europe.

Military leaders emphasize that the JIE is not a funded program. However, industry would be wrong to relegate the environment to the graveyard of other unfunded initiatives. The JIE affects industry in three areas: subject matter expertise (SME), directly related modernization and non-JIE modernization.

Already, the military has tapped industry for SME support. For example, both the department’s chief information officer and the Defense Information Systems Agency (DISA) have obtained industry expertise through task orders containing JIE scope. As the JIE gains momentum, government organizations increasingly will require SME related to the JIE.

Romania Stretches Out Military Modernization

March 1, 2014
By Robert K. Ackerman

Romania has opted to extend its force modernization period rather than cut important purchases as it deals with its version of the global budget crisis. Despite suffering from the severe economic downturn that began more than five years ago, the Black Sea country continues to upgrade its military with the goal of being a significant security force in an uncertain region.

Ramping Up the Cyber Criminal Hunt

March 1, 2014
By George I. Seffers

U.S. Secret Service officials are establishing two new cybercrime task forces—in Cincinnati and Denver—that will enhance the agency’s ability to detect and investigate information technology-related crimes, including credit card theft, attacks on the banking and finance infrastructure and identity fraud.

Royal Navy Rejoins Big Leagues

March 1, 2014
By Rita Boland

The U.K. Royal Navy has re-established itself as a world-class force in the area of maritime air defense through the launch of its new destroyers, the most advanced ships the British ever have sent to sea. The latest of the vessels recently returned from its maiden deployment, proving not only the capabilities of its class but also its own flexibility and adaptability.

Automated Diagnostics and Mitigation Protects Civilian Government Computer Networks

March 1, 2014
By Henry S. Kenyon

A Department of Homeland Security program is automating the cyber attack detection process to manage the bulk of intrusion detection and mitigation work in real time across the entire civilian government. This effort addresses a long-time shortcoming for detecting attacks and intrusions into government computer networks. Traditionally, this activity has been a time-consuming and manpower-intensive process that would take place days or weeks after the incident.

National Security Advances in an Increasingly Connected World

March 1, 2014
By Rita Boland

Homeland security officials are battling privacy and technology issues amid the new social media era that offers both challenges and opportunities. Just as new technologies and information sharing architectures have improved interagency data sharing, new sources of potentially valuable information have emerged to vex planners who must handle technical obstacles and personal rights.

Coast Guard Develops Indigenous Technologies for Cutters

March 1, 2014
By George I. Seffers

By the end of this fiscal year, the next-generation command and control system for much of the cutter fleet should be installed on the U.S. Coast Guard’s 270-foot cutter class, and the system is now being considered for inclusion on 225-foot and 110-foot vessels. The system, called SeaWatch, combines navigational and tactical, optical surveillance and communications into one situational awareness picture; provides commonality across the fleet; and replaces an aging system that has outlived its usefulness.

NATO Focuses on Terrorist Cyber Exploitation

March 1, 2014
By Robert K. Ackerman

NATO’s efforts to defend against terrorism now are focusing on cyberspace as a tool of terrorists instead of merely as a vulnerability for striking at alliance nations and their critical infrastructure. These efforts cover aspects of cyber exploitation that range from understanding terrorists’ behavior to how they might use social media.

Pages

Subscribe to RSS - March 2014