Historical trends during military drawdowns indicate that current Defense Department budget cuts could last for more than a decade. This situation could endanger major acquisition programs and negatively impact the ability of the United States both to pivot forces to the Asia-Pacific region and to maintain a presence in the Middle East, experts say. But the department may have a short window of opportunity to reconcile strategy with lower budgets.
The network-centric U.S. Navy could find itself without its core information assets during a conflict in the vast Asia-Pacific region. So, the U.S. Pacific Fleet is embarking on an effort to learn how to function without some of its most important technology capabilities.
Admiral Harry B. Harris Jr., USN, commander of the U.S. Pacific Fleet, outlined that scenario on the final day of TechNet Asia-Pacific 2013 in Honolulu, Hawaii. Adm. Harris said the fleet is planning for operation in a disconnected, intermittent, low-bandwidth environment, or DIL.
The U.S. Pacific Fleet is feeling the pain of budget cuts, and its commander is looking toward industry to provide it with necessary capabilities under tight budgetary conditions. Adm. Harry B. Harris Jr., USN, commander of the U.S. Pacific Fleet, described the approaches he wants industry to take along with the fleet’s requirements on the final day of TechNet Asia-Pacific 2013 in Honolulu, Hawaii.
“We’re looking to our partners in industry to develop the new technologies and capabilities we need,” Adm. Harris declared. “And, we have do it in a fiscally constrained environment.”
Defense spending must shift its outlook away from what it needs and toward where it can afford not to spend money, according to a Navy information technology executive. Terry Halvorsen, Department of the Navy chief information officer, told the breakfast audience at the final day of TechNet Asia-Pacific 2013 in Honolulu, Hawaii, that the department must become more outcome focused and determine the risk of not doing something.
“The number one question in the Pentagon today is, ‘What am I not going to spend money on?’” Halvorsen stated.
The U.S. Defense Department’s Joint Information Enterprise (JIE) promises to be the core of force networking, and it will be at the heart of coalition interoperability. An approach to networking allies and nontraditional partners in the JIE may loom in social media.
Establishing communities of interest within the JIE was broached by Randy Cieslak, chief information officer, U.S. Pacific Command (PACOM). Cieslak cited the concept during a panel discussion he was moderating on the final day of TechNet Asia-Pacific 2013 in Honolulu, Hawaii.
TechNet Asia-Pacific 2013 Online Show Daily: Day 2
Quote of the Day:
“You may have to make the job fun. What motivated me to get where I am today is not necessarily what will motivate the leaders of tomorrow.”—Cindy Moran, director, network services, Defense Information Systems Agency
Effective cybersecurity ultimately will depend on the ability of nations with shared interests to form coalitions that influence the development of international rules and regulations, according to Internet security experts. A lively Wednesday panel on cyberspace at TechNet Asia-Pacific 2013 in Honolulu, Hawaii, explored the broad ramifications of cyberspace security on a global scale.
Scott Dewar, the Australian consulate general in Honolulu, warned of letting others define the Internet. Australia believes the openness of the Internet is “a libertarian force for good,” he said, adding “we need to be building like-minded coalitions” to obtain results that work in cybersecurity.
The biggest impediment to effective cybersecurity may be the national laws that underpin freedom in the most technologically advanced democracies. These laws not only provide cybermarauders with hiding places, they also prevent global law enforcement from pursuing them as they prey on unknowing victims around the world.
International experts seeking to cooperate in cybersecurity measures often do not even realize how cultural issues are hampering their efforts, according to a top cybersecurity expert. Even when negotiating with friends, they often do not understand the thought processes brought to the table by their foreign partners.
South Korea has developed a national policy and program that brings government and the private sector together in a coordinated effort. This thrust, which emerged from two serious cyber attacks earlier this year, aims to have several key measures in place by 2017.
Walter Paik, Republic of Korea consul general in Honolulu, told a panel audience at TechNet Asia-Pacific 2013 in Honolulu, Hawaii, that major cyber attacks in March and June had significant effects in the television sector and in commercial and government sites. Millions of citizens had data stolen, so the Korean government set out on a new approach.
The recent humanitarian assistance/disaster response (HA/DR) effort in the wake of the Philippine typhoon demonstrated new capabilities and vulnerabilities for the broad networking necessary for successful operations. Information was shared to a degree greater than at previous emergencies, but this opened the door to potential information assurance problems.
The revolutionary nature of cyberspace pales in comparison to the dynamic differences that characterize its work force. Not only do younger workers have different professional goals than their progenitors, but also same-generation technology-savvy workers may have varying outlooks on how to innovate and exploit new capabilities.
A Wednesday panel at TechNet Asia-Pacific 2013 in Honolulu, Hawaii, wrestled with the challenges facing leaders in cyber fields. Senior Master Sgt. Torry Hickson, USAF, Defense Information Systems Agency (DISA) Pacific, stated that an organization dealing with cyber needs a mix of young and old people. This will combine leadership built of wisdom with an innovative spirit with technology knowledge.
An evolving mission network connecting U.S. and Australian forces is being expanded to include other trusted allies with an eye toward adding coalition partner nations. The network is built around a risk-managed approach for sensitive information sharing.
Known as Pegasus, the network expands on the two nations’ Improved Connectivity Initiative (ICI). Maj. Gen. Mike J. Milford, Australia Military, chief technology officer, Chief Information Officer Group of the Australian Department of Defence, outlined details of the network to the Wednesday breakfast audience at TechNet Asia-Pacific 2013 in Honolulu, Hawaii.
Now that allied forces have accepted coalitions as a requisite for future military operations, they must undergo a cultural sea change for cybersecurity. Accepting nontraditional partners demands a new way of viewing cybersecurity that entails greater flexibility at its most philosophical level.
“We have realized the value of fighting on a single network instead of multiple networks,” said Maj. Gen. Mike J. Milford, Australia Military, chief technology officer, Chief Information Officer Group of the Australian Department of Defence, at TechNet Asia-Pacific 2013 in Honolulu, Hawaii. “Now, we are moving from a risk averse approach to a risk management approach.”
Australia has implemented a cybersecurity policy that brings together government and industry to secure the domain nationally. The country recently elevated cybersecurity as a major priority for national security, and in 2009, it established a Cyber Security Operations Center (CSOC).
TechNet Asia-Pacific 2013 Online Show Daily, Day 1
Quote of the Day:
"If you allow the United States to operate out of sanctuary, we will beat the crap out of you." - Lt. Gen. Stanley T. Kresge, USAF, vice commander, U.S. Pacific Air Forces, addressing potential adversaries.
The recent U.S. strategic pivot toward the Pacific has placed that region at the forefront of change in the military. Where in the recent past activities in the area of responsibility (AOR) for the U.S. Central Command (CENTCOM) defined military needs, now the requirements for the U.S. Pacific Command (PACOM) are emerging as the leading edge of the defense technology sword.
U.S. Pacific Command military leaders agree that any future operation will be conducted amid a coalition, and partner countries must be networked. However, that networking opens the possibility for greatly increased network vulnerabilities as less-secure nations provide weak links for network security.
This vital issue was discussed by a panel featuring the U.S. Pacific Command’s -6s at TechNet Asia-Pacific 2013 in Honolulu, Hawaii. Col. Michael Finn II, USAF, director of communications and chief information officer, headquarters, U.S. Pacific Air Forces, noted, “all of our partners are hungry for this [cyber] domain.” Japan and South Korea in particular are primary information sharing partners.
The United States must examine new means of deterrence that address the multitude of ways an adversary would seek a military advantage, said the vice commander of the U.S. Pacific Air Forces. Lt. Gen. Stanley T. Kresge, USAF, told the opening luncheon audience in TechNet Asia-Pacific 2013 in Honolulu, Hawaii, that the old idea of deterrence—threatening an enemy with total destruction—does not apply to current challenges, especially with cyber issues.
The U.S. Pacific Air Forces will benefit greatly from combining its A-3 and A-6, said its director of communications and chief information officer. Col. Michael Finn II, USAF, told the audience at the opening panel discussion at TechNet Asia-Pacific 2013 in Honolulu, Hawaii, that the Pacific Air Forces would have “a lot of synergy combining the -3 with the -6.”
The concept of cyber readiness has a different perspective from the operations side and the cyber side. This consolidation helps provide warfighting integration across the entire network, Col. Finn said.
Years of exercises between the Philippine and U.S. militaries helped both countries work together in the massive rescue effort after the Asian nation was devastated recently by a typhoon. The U.S. effort, designated Operation Damayan, featured effective coordination amid a sterling execution by the Philippine military, according to U.S. military officers.
At TechNet Asia-Pacific 2013 in Honolulu, Hawaii, a panel featuring the U.S. Pacific Command’s -6s discussed how those rescue efforts came together. Col. James Dillon, USMC, the assistant chief of staff for G-6, Marine Forces Pacific, noted that when the disaster struck, personal relationships already existed, and both sides could leverage that.