Biometric identification moved past fingerprints long ago, and the range of modalities is helping the keepers of law and order make a big difference in several ways. Last year, authorities apprehended a former European finance minister who had stolen thousands of Euros by using voice recognition software to identify the perpetrator through a phone message. Another tool combines facial recognition with a breathalyzer so that in addition to capturing blood alcohol content, the device can send a photo of the person to a repository website.
The Defense Information System Agency (DISA) had been identified as the Defense Department’s cloud broker, but that was rescinded just last week, reported Lt. Gen. Mark Bowman, USA, director, command, control, communications and computers/cyber and chief information officer, Joint Chiefs of Staff.
"People can do a business case analysis and decide where they want to go to get their cloud support, if someone can figure out the secret sauce on how to get it cheaper. It has to be provided to the right security standards, and it will have to be checked,” Gen. Bowman stated, while speaking at AFCEA TechNet Augusta 2014.
The Online Show Daily: Day 3
The final day of AFCEA TechNet Augusta 2014 kicked off with a solemn remembrance of the September 11, 2001 terrorist attacks that rocked the nation. The conference then, necessarily, moved on to the future.
Although the U.S. Defense Department and the military industry are feeling the effects of constrained budgets, they have not yet been forced to find truly innovative solutions, Mark Bigham, chief innovation officer for Raytheon Intelligence and Information Services, told the AFCEA TechNet Augusta 2014 audience.
Bigham quoted Winston Churchill as saying that Americans will always do the right thing after they’ve exhausted all other alternatives. He also cited another Churchill quote: "Gentlemen, we have run out of money, now we have to think."
Mission success in the cyber arena, especially in a constrained budget environment, requires both cooperation and innovation, but military and industry officials speaking at AFCEA TechNet Augusta 2014 say they are not yet seeing enough of either.
Maj. Gen. Stephen Fogarty, USA, the new commanding general, U.S. Army Cyber Center of Excellence, Fort Gordon, initiated the discussion, saying that cyber is “inherently joint,” and warning against stovepiped systems and information for different mission areas, such as cyber, signal and intelligence, surveillance and reconnaissance. The Army, he said, has to cooperate with the other services, the Department of Defense, the National Security Agency, industry and multinational partners.
Many Army soldiers are receiving new vehicles and new tactical communications systems, but often those systems are so complex soldiers have difficulties setting up and taking down their tactical networks. The issue limits mobility on the battlefield because units hesitate to move knowing it can take hours to re-establish network communications, said Lt. Gen. Patrick Donahue, USA, the new deputy commanding general, U.S. Army Forces Command.
Senior military leaders will try next week to hash out differences on the command and control (C2) of the Joint Information Enterprise, or JIE, said Lt. Gen. Mark Bowman, USA, director, command, control, communications and computers/cyber and chief information officer, Joint Chiefs of Staff. Gen. Bowman made the remarks while addressing the audience at the AFCEA TechNet Augusta 2014 conference, Augusta, Georgia.
In his farewell address, President Dwight Eisenhower coined the phrase "military industrial complex" to describe the relationships between the military, Congress and industry. That complex no longer exists, according to Tom Davis, a former vice president for General Dynamics. Davis made the comments during an industry panel at the AFCEA TechNet Augusta 2014 conference in Augusta, Georgia.
U.S. Army officials struggled during AFCEA TechNet Augusta 2014 in Augusta, Georgia, to discuss the future of cyber operations when much of that future is currently unknowable, in large part because no one knows the full effects or challenges of emerging technologies.
The cyber era requires partnerships and information sharing across the agencies, industries and nations, said Maj. Gen. Stephen Fogarty, USA, the new commanding general, U.S. Army Cyber Center of Excellence, Fort Gordon, during a keynote address at the AFCEA TechNet 2014 Augusta conference, Augusta, Georgia.
Former National Security Agency contractor Edward Snowden single-handedly shocked the U.S. intelligence community by leaking reams of information to the news media, but the insider threat is much more widespread, said Maj. Gen. Stephen Fogarty, USA, the new commanding general, U.S. Army Cyber Center of Excellence and Fort Gordon, Georgia.
“Who would imagine one person could have as much impact on this nation as he did,” Gen. Fogarty said, referring to Snowden. “And we were not prepared for that. We were not looking for that. That’s an asymmetric attack that occurred, and it’s happening every single day.”
The U.S. Army is building a Cyber Center of Excellence at Fort Gordon, Georgia, and it will not come cheap, warned Maj. Gen. Stephen Fogarty, USA, the center’s new commanding general.
The U.S. Army is standing up a cyber brigade and considering a cyber branch, which has some questioning the future of the service's Signal Corps, but the Signal Corps will survive, Lt. Gen. Robert Ferrell, USA, the service’s chief information officer, said during a luncheon keynote speech at the AFCEA TechNet Augusta 2014 conference, Augusta, Georgia. “The Signal Corps will be enduring. It will not be going away,” Gen. Ferrell said. “You’re still going to be required to build, operate and defend the network.
The U.S. Army may at some point need to allow soldiers to conduct offensive cyberwarfare at the brigade combat team level, according to a panel of chief warrant officers speaking at AFCEA TechNet Augusta 2014, Augusta, Georgia.
All too often, the topic of cyber presents a negative view of vulnerabilities and attacks, but cyber has a positive role to play in national defense, said Lt. Gen. Edward Cardon, USA, commanding general, U.S. Army Cyber Command.
U.S. Army officials are laboring to define what the force will look like in 2025. But technologically speaking, it is hard to define anything beyond the next two or three years, said Lt. Gen. Edward Cardon, USA, commanding general, U.S. Army Cyber Command, during AFCEA TechNet Augusta held Sept. 9-11, Augusta, Georgia.
Major changes in defense acquisition no longer are desirable—they are essential if the United States is to maintain an effective military in a time of increasing threats and decreasing resources. Already the United States is trailing several allies technologically, and potential adversaries are hard at work developing technologies that threaten U.S. force superiority. Patterns of technology development have changed, but sclerotic acquisition practices work counter to efforts to reap the benefits of innovation.
More specific requirements and better incentives could produce better products at reduced costs, said a leading U.S. Defense Department official. Frank Kendall III, undersecretary of defense for acquisition, technology and logistics, told the keynote audience at AFCEA’s Defense Acquisition Modernization Symposium 2014 that adjusting the contracting process could produce at least some desired results in acquisition.
The AFCEA Defense Acquisition Modernization Symposium held August 5-6 in Washington, D.C., covers "Better Buying Power: Do We Have It Right?"