U.K. government entities at various levels are looking into bring-your-own-device policies for their purposes. And while their mandates differ, they all have one factor in common—a need for the right level of security. To help groups at the most open classification levels make the right choices, a U.K. security agency has released a series of guidance documents that outlines what decision makers should consider.
The United States is in the midst of preparing its largest intelligence hub outside of its own national borders. The center will accommodate operations with reach into several global areas, including those rife with anti-terrorism operations. Hundreds of millions of dollars are being poured into the work that includes consolidating resources from other installations.
The price of failure to provide adequate cybersecurity ultimately may be too high for any nation to tolerate. Yet, the cost of effective cybersecurity may be too much for a nation to afford. The consequences of a damaging cyberattack on a part of the critical infrastructure could be catastrophic, yet securing national capabilities from cyberattack will require more than just government or industry action. Both groups must work in concert to produce results that are greater than the sum of their parts, but no single approach to cybersecurity will work to protect the diverse government and commercial assets that are both extremely vulnerable and highly critical to a nation’s well-being.
The missile system claimed by a Ukrainian Interior Ministry adviser to be responsible for the crash of Malaysia Airlines Flight 17 over eastern Ukraine is manufactured in Ukraine and is in use by both Ukrainian and Russian military forces. If the missile system is confirmed as the cause of the crash, determining which side fired it could be difficult, especially if Russia provided the type of missile to rebel forces in eastern Ukraine.
Mining big data for salient information points presents a plethora of challenges, but in Europe a different issue with the action has emerged as a concern. Regulations prohibiting researchers and others from searching through the data in certain documents are putting countries on the continent at a competitive disadvantage in a number of fields, studies are revealing. With several economies there already in dire straits, the legal encumbrances could add to difficulties in improving financial situations.
Cyber, defense technology, coalition interoperability, NATO contracting opportunities and Ukraine were among the topics discussed at the NATO Industry Conference and TechNet International 2014, held in Bucharest, Romania. For the third time, the NATO Communications and Information Agency and AFCEA Europe organized a joint conference and exposition. The two organizations generated a program with an agenda of truly intertwined sessions relevant to all.
Companies Deep-Secure and Sweetwater s.r.l. signed a contract earlier this month that will extend cybersecurity measures in the Romanian market. The move should help address common cybercrime issues prevalent in former Eastern Bloc nations.
You don’t hear much old-school military radio traffic anymore. Except for a few front-line radio nets, most radio chatter has been replaced by the endless, silent interplay of text messages, emails and Web postings. With that shift, we have lost an entire dialect of martial radio-speak. Sure, the approved terms—roger, wilco, prepare to copy, say again—remain in the training curricula. But the unofficial lexicon has dried up. You rarely hear today’s sergeants and lieutenants asking “how do you read this station?” That certainly is a tribute to the crystal clarity offered by modern digital equipment. And you certainly never hear the old standby before rendering a report: “Be advised.” Nobody is advised of anything in today’s U.S.
This is the second article in a two-part series. For part one, click here.
China has claimed and built up numerous islands, rocks, atolls and reefs in and near the South China Sea to support territorial claims in waters far away from the Middle Kingdom. Important differences in territorial sea and exclusive economic zones between them explain why some are more important than others. Islands that can be inhabited have 12 miles of territorial sea and a 200-mile exclusive economic zone (EEZ). Atolls have territorial sea but no EEZ, and submerged reefs have neither claim rights, even if above-water structures are built on them.
Two countries that provide stability in their regions, though often on the brink of battle with rival neighbors, elected new leaders in May, influencing how geopolitics will move forward in the second decade of the 21st century. Their relationships with the West will affect military and economic decisions, and their vastly different political systems will require sensitive political handling.
Representatives from the U.S. Army and Air Force, along with 17 NATO nations and three partner nations, will participate in a joint reconnaissance trial at Orland Air Station in Norway May 19-28 to test and evaluate intelligence, surveillance and reconnaissance (ISR) concepts and technologies. The Unified Vision 2014 (UV14) trial will be NATO’s largest-ever ISR trial and will be used as a major stepping stone to provide NATO warfighters with an enhanced set of ISR capabilities.
China and Russia represent two of the most robust, comprehensive concerns to worldwide stability. Almost every major geostrategic threat—cyber attack, nuclear weapons, ballistic missiles, capable military forces, political influence, economic power, sources of and high demand for energy—is resident in those two countries that often find themselves at odds with the United States and its allies. Decisions by their leaders on how to engage with the rest of the world, and how the two sovereign states decide to relate to each other, will have major effects on geopolitics.
A new facility for cybersecurity is allowing U.S. Forces Korea to coordinate efforts with other U.S. commands as well as Republic of Korea civilian government and military forces. The Joint Cyber Center serves as the focal point for increasing international cooperation between U.S. and Korean forces in their defensive measures against increasing cyber aggression from North Korea. It blends activities from the local J-2, J-3 and J-6 along with input from other forces worldwide.
China’s encroachment in the South China Sea for more than 40 years has much more impact on freedom of navigation and international confrontations than on pursuit of resources. While it has been staking territorial rights to oil- and gas-rich island regions also claimed by multiple countries, the Middle Kingdom has been employing maritime forces ranging from fishing boats to Coast Guard and People’s Liberation Army Navy (PLAN) vessels in ways that suggest expanded control over oceangoing traffic.
Researchers working on multiple projects in Europe and the United States are using cloud computing to teach robotic systems to perform a multitude of tasks ranging from household chores to serving hospital patients and flipping pancakes. The research, which one day could be applied to robotic systems used for national defense, homeland security or medical uses, lowers costs while allowing robots to learn more quickly, share information and better cooperate with one another.
The rise of new global flashpoints along with a strategic rebalancing are presenting the U.S. Navy with a new set of challenges and obligations concurrent with significant force reductions. The sum of the budget cuts would be enough to tax the service under any circumstances, but they are being implemented against a backdrop of a broader mission set and increased activities by potential foes.
Researchers working on behalf of the U.S. intelligence agencies can use reams of open source, anonymous data to foretell social turmoil such as disease outbreaks or international political unrest. Once fully developed, the capability to predict coming events may allow U.S. officials to more effectively respond to public health threats; to improve embassy security before an imminent attack; or to more quickly and effectively respond to humanitarian crises.
West 2014 Online Show Daily, Day 3
Quote of the Day:
“We have global responsibilities. We will not be able to do less with less. We will do the same with less.”—Gen. James F. Amos, USMC, commandant of the U.S. Marine Corps
Romania has opted to extend its force modernization period rather than cut important purchases as it deals with its version of the global budget crisis. Despite suffering from the severe economic downturn that began more than five years ago, the Black Sea country continues to upgrade its military with the goal of being a significant security force in an uncertain region.
The country’s efforts are part of a long-term plan that began with its application for, and acceptance of, membership in NATO. The first part of the three-phase modernization program concluded in 2007, the year before the global economic crisis.
Even though the Cold War has ended and the monolithic threat against the West has disappeared, the relationship between Europe and the United States remains vital. Europe includes some of the United States’ strongest coalition partners and alliances; the two economies are closely tied and interdependent; and defense and security in Europe are evolving rapidly, just as in the United States. AFCEA chapters and members outside the United States number the greatest in Europe.