Military leaders are adept at winning wars with tanks, troops and aircraft. Now the U.S. Army is putting the final touches on a campaign plan that sets the direction for the newest battlefield weapons: bits, bytes and the systems that deliver them. Earlier this year, the service's single authority for information management unveiled a detailed picture of short- and long-term operational capabilities implementation. The plan aims at supporting the force, helping fight the war on terrorism and sustaining transformation. It is on target to be finalized by the end of this month.
The U.S. Army's Land Warrior program is making new strides-or more specifically, making new treads-in equipping soldiers for 21st century warfare. Army troops are testing Land Warrior Stryker Vehicle Integration Kits to study the effects of the human factor on the capability and to assess its worth in combat situations. The technology will connect warfighters on the ground directly with each other and with vehicle crews without needing to exchange the information only at the leadership level. At the same time, the ability to use a weapon will not be inhibited.
Dismounted infantry may one day rely on four-legged robots to carry equipment and ammunition into battle. The U.S. Defense Department envisions the machines following troops into rugged terrain or through densely packed urban areas too confined for conventional vehicles. These automated quadrupeds are part of a larger government initiative to study how animals move and to apply those characteristics to robotic systems.
The battlefield is not the only place where coalition cooperation happens today. The U.S. Army has found that sometimes the answers to United States' technical questions reside overseas, and one of its organizations is taking advantage of expertise available across the Atlantic to address relentless issues such as maximizing data throughput and minimizing information overload.
The Sender Policy Framework is an emerging Internet standard that could cause a large part of the U.S. Army's legitimate e-mail to be categorized as spam and dropped. Large e-mail providers in the commercial world are in the initial phases of implementing the framework, and while deleterious effects on Army e-mail have been rare so far, they are almost guaranteed to grow as more providers and intermediaries adopt the standard. However, several courses of action can address the issue, and Army Knowledge Online already has taken steps to implement the framework while simultaneously protecting the future viability of the service's e-mail system.
The rush of innovative information technologies is both mandating a greater need for advanced security and spawning a new generation of potential solutions. The explosion in networking and wireless communications brings with it greater security requirements, and computing advances offer the potential for a range of new information assurance approaches.
While information technology experts have been hard at work securing the national infostructure, other key sectors in the United States' vital infrastructure may be vulnerable to attack through their own information systems. Critical elements such as ports, railroads, the electrical grid, fuel pipelines and hazardous materials facilities may be equipped with information systems that are virtual open doors to malicious marauders ranging from rookie hackers to al-Qaida terrorists.
The U.S. Defense Department has launched a new policy initiative designed to provide increased security and interoperability for wireless devices and systems. The undertaking provides rules for the use of commercial wireless equipment on government networks and emphasizes the adoption of open standards for wireless technologies.
Conversations with computers are usually pretty one-sided: Users may yell obscenities; cursors continue to blink innocuously. But a collaborative effort between the military and industry may one day replace this one-way, futile discourse with systems that understand the user's cognitive state and then respond accordingly. The implications of this capability reach beyond ensuring that warfighters are primed to receive critical information. It could prove to be instrumental to inventing ways of designing new systems and improving military training.
Coordinating evolving operational and technical requirements between government agencies and allied nations was the focus of AFCEA's Transformation TechNet 2006 conference and exposition. Held in Hampton, Virginia, in May, the two-day event's theme was "TEAM Transformation … A Must for International Security." Conference topics addressed the various joint and cooperative efforts underway among government, military, industry and international organizations.