Several nations are studying the potential military benefits of Internet of Things technologies, including a variety of inexpensive commercial sensors and smart city capabilities. Their investigation likely will include three proof-of-concept demonstrations, the first of which is planned for May in Finland.
By hacking a system from within, security experts can identify vulnerabilities and try to stay one step ahead of increasingly sophisticated cyber criminals.
The arrival of a new president representing a different political party presents a host of opportunities for reforming the defense acquisition process, particularly as it relates to cyber.
Commanders and staff always are seeking the “next best” solution to attain supremacy over adversaries in the pivotal domains of command, control, communications, computers, combat systems, intelligence, surveillance and reconnaissance, or C5ISR.
The Defense Department could assert that the nation held the defining edge in nocturnal warfighting capability, thanks to massive acquisition efforts in night vision optics and weapons platforms for troops.
I feel a sense of disappointment as I think about how much the cyberspace landscape has changed over the last 40-plus years and how little our nation’s privacy laws have done to keep up with this digital transformation.