The U.S. Marine Corps is ramping up to conduct operations in cyberspace as part of its everyday capabilities. Marine Air Ground Task Forces (MAGTFs) will operate in cyberspace as they do on land, sea and air.
The information technology arena is experiencing large tectonic shifts that are directly affecting requirements for cybersecurity. Transitions-from physical to virtual; from the premise to the cloud; from more formal networks to social networks-will have their counterparts in new security requirements and approaches.
China and the United States are constantly redefining their relationship in a dynamic that could lead to conflict if both sides are not careful, according to a leading U.S. Asia-Pacific expert.
The U.S. military by and large is taking the wrong approach to cyberwarfare by treating it as a separate entity without the innovation that should bring. The country needs to incorporate it with other military activities and turn loose creative leadership for U.S. cyberwar activities to prevail.
U.S. counterterrorism experts in the Pacific region have turned to media outreach to combat terrorists and their allies who exploit mass media, including the Internet, to further their goals.
The U.S. Coast Guard's Deepwater program has a new name and already is generating results for Coast Guard personnel. Now known as the Coast Guard Acquisition Program, the troubled effort is generating positive results, according to Rear Adm. Manson Brown, USCG, commander,14th Coast Guard District.
National security threats are drawing the U.S. Coast Guard deeper into the Asia-Pacific region as it carries out its conventional missions in unconventional areas. Piracy, drug smuggling and even overfishing are becoming more prevalent in U.S. and neighboring waters, and the Coast Guard is finding itself forming alliances with foreign counterparts.
While the push forward for better collaboration and information-sharing capabilities will require technical advances, the experts at today's NATO workshop in Brussels, Belgium, are struggling with an even bigger challenge than connecting the bits and bytes.