Electronic warfare (EW) is one of the most complex, least understood and difficult operating environments we face. U.S. forces in Southwest Asia did not encounter a consistently serious EW challenge, and in some ways, EW has become a forgotten capability. Since the end of the Cold War, when we concentrated on defending and waging EW against the Soviets, attention has turned elsewhere. Now the Soviet heirs in Russia, as well as other adversaries, have refined and sharpened their EW skills. If we engage in a higher level of conflict than we have faced in the recent past, then we will likely confront a foe wielding a vastly improved EW capability that could threaten the success of our operations.
The Indo-Asia-Pacific area is diverse, expansive and challenging for the United States and our international partners. The 36 countries within the U.S. Pacific Command’s area of responsibility encompass about half the Earth’s surface and contain half the world’s population. The region lacks a common culture, religion or language. In fact, about 3,000 languages are spoken there. It hosts the three largest global economies—the United States, China and Japan—and the world’s largest Muslim nation, Indonesia. Furthermore, it is now home to five nuclear powers: Pakistan, India, China, Japan and North Korea. The region has seven of the world’s 10 largest armies, accentuating centuries of deeply held animosities.
The challenges facing the intelligence community (IC) have never been greater in both degree and diversity. New threats are emerging constantly, old threats are becoming more serious, and capabilities menacing national security are increasingly innovative. The greatest impediment to addressing these dynamic challenges may be internal rather than external: insufficient resources.
Possessing the ultimate weapon, the infantryman, the U.S. Army now is marching foursquare into cyberspace and electronic warfare operations. It is doing so not as a latecomer to the digital fight, but as one of the thought-leading pioneers in a rapidly expanding, cohesive domain.
The ground service, along with the other services, is integrating cyber, electronic warfare (EW) and other elements of information warfare into combat operations to more effectively assimilate information age technology. The effects of cyber and EW can move at the speed of light. They can enable or inhibit each other depending on how they are used, so it is only natural that these aspects of warfighting are tightly bound.
Robots, drones, automated devices—they are but a few of the names given to unmanned systems proliferating across the military and the commercial sector. The sky’s the limit for unmanned aerial vehicles, and no ocean is too deep for their underwater counterparts. Yet the potential for these devices, which seems unlimited, is being hindered by the human element they support. Planners must abandon convention and explore disruptive approaches that will allow unmanned systems to reach their full promise.
The challenges of cyberspace permeate just about everything we do—whether in defense, critical infrastructure such as banking systems or utilities and any other major commercial enterprise or individual pursuit. The ability to shape, change and manipulate data in an unauthorized and undetected manner can severely undermine confidence in the systems that depend on that information. Consequently, the ability to secure cyberspace is critical.
The need to secure data never has been greater, and that need is growing. Encrypting data is one of the main methods of securing information at the source, in storage and in transit. With data breaches becoming more common and more serious, organizations and individuals increasingly are encrypting information. This trend ultimately could lead to significant changes in the data security realm.
Fraud, theft and information corruption have become a way of life in cyberspace. Vital information such as health care data has joined financial and personal data as a prime target of hackers.
A significant level of effort and commitment is needed to restore the U.S. military to where it can appropriately address the country’s many national and international security responsibilities. The new administration has pledged to rebuild the nation’s defense capabilities, proposing billions more in defense spending for badly needed improvements. This initial hike in funding, while a much-needed and welcome first step, will require reinforcement in the Future Years Defense Program to truly position the military to meet our global commitments.
One of the more intriguing information technology trends sweeping the globe is the Internet of Things, or IoT. Its inevitability is clear, and the military is hoping to leverage the IoT for gains in situational awareness and logistics, among other areas. Yet an increased reliance on the IoT offers potential liabilities, such as security challenges and availability, along with a heavy dependence on technology in what is sure to be a contested or denied future warfighting environment.
All the U.S. military services have had to do more with less, but the Navy is facing a challenge that strikes at the heart of its raison d’être. Simply put, the Navy is underequipped. It does not have the number or types of ships it needs to adequately address its global role. Maintenance is backlogged, and because the supply of ready forces does not meet demand, deployments are longer. This downward curve in operating capability is reciprocal to the growth in its missions. The cost to re-establish the dominance of the Navy is significant, but it must be met—and in several areas. Further delay only adds to the expense and the risk to national security.
Our next adversary likely will use far more sophisticated technologies against our command, control, communications, intelligence, surveillance and reconnaissance capabilities than the Taliban, al-Qaida and the Islamic State of Iraq and the Levant have employed. U.S. armed forces will face significant radio jamming, cyber attacks, misinformation, elaborate deception operations and denial of access to radio frequency spectrum. My concern is that some of the military’s best technical capabilities could be unavailable or degraded. To counter this, a renewed effort to double down on mission-oriented training is needed.
Athletes and coaches alike constantly study game film of opposing teams and players, identifying patterns and collecting intelligence that can provide insights into the opposition’s tendencies and overall game plan. This allows a team to formulate a strategy to exploit an opponent’s weaknesses.
Sports present an apt analogy for predictive intelligence. Achieved largely through the tools of big data analytics and augmented by other types of intelligence, a predictive capability takes on many forms. At its core, it assists in promoting timely and actionable information to identify trends or behaviors that enable the prediction of events. As a result, officials can act in a prompt and decisive manner.
New communications and information system technologies being designed and deployed for tactical use are doing more than simply changing the way warfighters communicate. They are helping to shape the very nature of operations with game-changing capabilities. This trend is likely to continue and even accelerate as new innovations in information technology move into the battlespace more quickly.
AFCEA International marks its 70th anniversary this year. While much has changed as the association evolved over the decades, the founders’ guiding principles still hold true and are even more relevant now.
Established after the end of the most destructive war in human history, AFCEA today serves the Free World as it deals with burgeoning threats amid an uncertain future. The challenges that faced the postwar world then have their counterparts in this millennium, and AFCEA is uniquely positioned to help respond to them.
The United States and the entire world owe a great deal to technology and the pace of technological change. The standards of living that define advanced societies, along with the advanced national security elements that guarantee their freedom, are the result of a constant march of technological innovation that characterizes the last century and continues at breakneck speed. The United States must continue to promote and enable technology development to meet new challenges and ensure continued freedom, prosperity and security. This tenet applies to all facets of national security.
Innovative uses for geospatial systems are exploding across the government and commercial landscape. What once was largely the purview of military planners and operators now is creating adherents in fields where geospatial systems can help understand the past, comprehend the present and predict the future.
The United States always has been a maritime nation, but now more so than ever. The globalization of the world’s economy and communications has increased the importance of maritime operations. The multitrillion-dollar international economic engine that has brought prosperity to billions of people moves most of its international commerce by sea.
What a difference a year makes.
AFCEA International enters 2016 on an upward trend across the board. The association definitely is moving in the right direction, as membership, revenue and events are up. Association committees are solidly on their feet, providing key thought leadership to AFCEA and other organizations, including the Obama administration.
Why should people be concerned about the Asia-Pacific region? Just because it comprises more than half the Earth’s population, has 36 nations that speak 3,000 languages, spans the globe from the Arctic to the Antarctic, is transited by a third of the world’s maritime trade and includes six nuclear powers should not necessarily be cause for alarm.
A large portion of this issue of SIGNAL Magazine is devoted to its new quarterly special section—The Cyber Edge. The goal of The Cyber Edge is to do a better job of educating people across a broad spectrum in terms of the cyber threat, its implications, its technology issues and the policies that must be undertaken to solve the challenge.
Currently, from a cyber perspective, there is a dearth of information on what really is going on. Tales and stories abound, but no one goes into enough detail on what is behind those stories. Very few professional publications have properly framed the issues that must be dealt with from a cyber perspective.