June 2013

June 1, 2013
By Kent R. Schneider

U.S. Director of National Intelligence Lt. Gen. James R. Clapper, USAF (Ret.), recently testified in Congress that cyber attacks have become the greatest single threat facing the United States. He went on to say the threat is particularly acute for the nation’s critical infrastructure and reminded Congress that the majority of critical infrastructure in the United States is privately owned.

The European Union Internal Security Plan, written in 2011 and updated annually, makes the same assertion: cyber security has become the greatest vulnerability for the European Union and its member nations.

June 1, 2013
By George I. Seffers
The Internet is much like the early days of the airline industry and will need to be regulated to keep networks safe, says Roger Krone, president of the Network and Space Systems business unit within the Boeing Company, Chicago.

Large companies take varying actions to deal with emerging markets, threats, trends and the future of cyber.

With attacks on critical data increasing in numbers, intensity and sophistication, securing networks is becoming a global effort while fostering greater information sharing among agencies, governments and the public and private sectors. The future of cybersecurity offers greater opportunities for industry and greater cooperation on national security and critical infrastructure protection, say executives at some of the largest U.S. defense companies.

June 1, 2013
By Lt. Ben Kohlmann, USN

The advent of social networks is transforming the way the military does business. Net-centric warfare once was in vogue, seeking to capture electrons and raw fiber to transform the way combat was fought. Yet an even more powerful and unanticipated net is making waves in remarkable ways. It is the power of relational networks, fostered by loose ties and catalyzed by the proliferation of quickly evolving online platforms.

June 1, 2013
By George I. Seffers
A U.S. Marine Corps F-35 aircraft is escorted by two Marine F/A-18 Hornets as it flies toward Eglin Air Force Base, Florida. Later this year, the Defense Department will establish a program of record to ensure communications between different generations of fighter aircraft, and that program will feed into the Joint Aerial Layer Network vision.

The concept connects disparate networks to provide greater information to warfighters.

U.S. military officials envision one day being able to network together virtually all airborne assets, providing data to warfighters in the air, on the ground and at sea, even under the most harsh conditions. Major milestones in the coming months and years will bring that concept closer to a fielded capability.

June 1, 2013
By Rita Boland

Transporting billions of dollars' worth of Defense Department cargo requires an outside-the-box approach to information assurance. 

The U.S. Transportation Command has taken a novel approach to its Joint Cyber Center, reflecting the unusual needs of this organization that plays a role across U.S. military operations. Officials have found their decisions, such as uniting disparate experts in a single physical location, help save resources while increasing cooperation with the many industry partners that have integral roles in the efforts to keep supplies and people moving.

June 1, 2013
By Max Cacas

As the U.S. Army wraps up fighting land wars in Iraq and Afghanistan, the service is adapting cybersecurity training to the changing landscape.

The U.S. Army is making its facility at West Point the focus of a joint program with the other services, industry and academia, devoted to sharing advanced cybertraining and research. Training in the new cyber realm includes not only basic best practices concerning passwords and mobile device security but also advanced training in the latest network management protocols and technology for members of the Army’s Signal Corps.

June 1, 2013
By Rita Boland

Integrating air land, and sea forces on a monthly basis saves money and creates continuity of operations.

Technology experts at the U.S. Air Force’s 4th Fighter Wing based at Seymour Johnson Air Force Base, North Carolina, are networking joint units up and down the East Coast to provide unique training opportunities for the modern military. Through their efforts, advancements are being made to further the Air-Sea Battle Concept, simultaneously improving coalition interoperability. The events allow for interservice and international training without strain on organizations’ budgets.

June 1, 2013
By Robert K. Ackerman
Fig. 1 [circuit-traces-640.jpg]: Cyberspace is the new invasion route for marauders to attack the nation’s critical infrastructure, and that potential threat now is increasing to the point of likelihood.

Cyberspace offers a wealth of options for evildoers seeking to bring down a nation.

Digital marauders have set their sights on the critical infrastructure and are likely to strike soon with major effect. Several different elements of the infrastructure are vulnerable to attack by all manner of cyberspace players ranging from malevolent individuals to hostile nation-states.

June 1, 2013
By Robert K. Ackerman
U.S. Air Force officers monitor moving target indicators during a training exercise for the Joint Surveillance and Target Attack Radar System (JSTARS).

Costs, security and operations requirements share top billing on priority list.

The U.S. Air Force is looking to overhaul its networking capabilities to meet new taskings in the post-Southwest-Asia era. Limited resources are changing the way the Air Force moves information throughout the battlespace, so the service must confront its challenges through innovative approaches and cooperative efforts.

June 1, 2013
By Robert K. Ackerman
A U.S. Air Force network administrator employs a laptop at Kandahar Airfield, Afghanistan.

Dealing with virtual challenges may require a meeting of different disciplines.

June 1, 2013
By Robert K. Ackerman
U.S. Air Force personnel conduct cyber operations in an exercise at Joint Base San Antonio-Lackland. The Air Force is looking to restructure both its cyber organization and its cyber operations to account for changes in the virtual domain.

Roles are changing as the service reshapes its digital future.

The U.S. Air Force is subjecting itself to a cyber reality check with an eye toward restructuring the discipline both operationally and organizationally. A working group is parsing the service’s activities in this domain, and this effort involves interaction with the other services as well as the commercial sector.