The U.S. Joint Chiefs of Staff has updated its maritime joint command and control guidance, reflecting changing practices across the fleet. Although the rewrite is part of regularly scheduled reviews, the timing is apt for world conditions. U.S. attention is moving east to a far more watery environment than the one the country has focused on for the last dozen or more years, and contentions among nations for waterway control continue to mount in areas such as the East China Sea.
The success of Operation Damayan, the massive Philippines typhoon relief effort by the U.S. Pacific Command, owes as much to preparation as to execution, according to a U.S. official involved in the operation. Military communications equipment designed for easy entry and quick activation provided essential networking capabilities. Longtime multinational and bilateral exercises laid the groundwork for interoperability, both technological and organizational, between U.S. and Philippine armed forces. Commercial technologies, such as local cell systems that survived the storm, proved invaluable for onsite communications. And, U.S.
A set of rapid entry communications systems formed the core of networking assets for U.S. military forces providing humanitarian assistance/disaster relief (HA/DR) operations in the Philippines in the wake of the devastating November typhoon. These systems provided scalable links that allowed U.S. forces to interoperate with the Philippine government and nongovernmental organizations (NGOs) in sharing unclassified information.
Historical trends during military drawdowns indicate that current Defense Department budget cuts could last for more than a decade. This situation could endanger major acquisition programs and negatively impact the ability of the United States both to pivot forces to the Asia-Pacific region and to maintain a presence in the Middle East, experts say. But the department may have a short window of opportunity to reconcile strategy with lower budgets.
The network-centric U.S. Navy could find itself without its core information assets during a conflict in the vast Asia-Pacific region. So, the U.S. Pacific Fleet is embarking on an effort to learn how to function without some of its most important technology capabilities.
Admiral Harry B. Harris Jr., USN, commander of the U.S. Pacific Fleet, outlined that scenario on the final day of TechNet Asia-Pacific 2013 in Honolulu, Hawaii. Adm. Harris said the fleet is planning for operation in a disconnected, intermittent, low-bandwidth environment, or DIL.
The U.S. Pacific Fleet is feeling the pain of budget cuts, and its commander is looking toward industry to provide it with necessary capabilities under tight budgetary conditions. Adm. Harry B. Harris Jr., USN, commander of the U.S. Pacific Fleet, described the approaches he wants industry to take along with the fleet’s requirements on the final day of TechNet Asia-Pacific 2013 in Honolulu, Hawaii.
“We’re looking to our partners in industry to develop the new technologies and capabilities we need,” Adm. Harris declared. “And, we have do it in a fiscally constrained environment.”
Defense spending must shift its outlook away from what it needs and toward where it can afford not to spend money, according to a Navy information technology executive. Terry Halvorsen, Department of the Navy chief information officer, told the breakfast audience at the final day of TechNet Asia-Pacific 2013 in Honolulu, Hawaii, that the department must become more outcome focused and determine the risk of not doing something.
“The number one question in the Pentagon today is, ‘What am I not going to spend money on?’” Halvorsen stated.
The U.S. Defense Department’s Joint Information Enterprise (JIE) promises to be the core of force networking, and it will be at the heart of coalition interoperability. An approach to networking allies and nontraditional partners in the JIE may loom in social media.
Establishing communities of interest within the JIE was broached by Randy Cieslak, chief information officer, U.S. Pacific Command (PACOM). Cieslak cited the concept during a panel discussion he was moderating on the final day of TechNet Asia-Pacific 2013 in Honolulu, Hawaii.
Effective cybersecurity ultimately will depend on the ability of nations with shared interests to form coalitions that influence the development of international rules and regulations, according to Internet security experts. A lively Wednesday panel on cyberspace at TechNet Asia-Pacific 2013 in Honolulu, Hawaii, explored the broad ramifications of cyberspace security on a global scale.
Scott Dewar, the Australian consulate general in Honolulu, warned of letting others define the Internet. Australia believes the openness of the Internet is “a libertarian force for good,” he said, adding “we need to be building like-minded coalitions” to obtain results that work in cybersecurity.
The biggest impediment to effective cybersecurity may be the national laws that underpin freedom in the most technologically advanced democracies. These laws not only provide cybermarauders with hiding places, they also prevent global law enforcement from pursuing them as they prey on unknowing victims around the world.
International experts seeking to cooperate in cybersecurity measures often do not even realize how cultural issues are hampering their efforts, according to a top cybersecurity expert. Even when negotiating with friends, they often do not understand the thought processes brought to the table by their foreign partners.
South Korea has developed a national policy and program that brings government and the private sector together in a coordinated effort. This thrust, which emerged from two serious cyber attacks earlier this year, aims to have several key measures in place by 2017.
Walter Paik, Republic of Korea consul general in Honolulu, told a panel audience at TechNet Asia-Pacific 2013 in Honolulu, Hawaii, that major cyber attacks in March and June had significant effects in the television sector and in commercial and government sites. Millions of citizens had data stolen, so the Korean government set out on a new approach.
TechNet Asia-Pacific 2013 Online Show Daily: Day 2
Quote of the Day:
“You may have to make the job fun. What motivated me to get where I am today is not necessarily what will motivate the leaders of tomorrow.”—Cindy Moran, director, network services, Defense Information Systems Agency
An evolving mission network connecting U.S. and Australian forces is being expanded to include other trusted allies with an eye toward adding coalition partner nations. The network is built around a risk-managed approach for sensitive information sharing.
Known as Pegasus, the network expands on the two nations’ Improved Connectivity Initiative (ICI). Maj. Gen. Mike J. Milford, Australia Military, chief technology officer, Chief Information Officer Group of the Australian Department of Defence, outlined details of the network to the Wednesday breakfast audience at TechNet Asia-Pacific 2013 in Honolulu, Hawaii.
Now that allied forces have accepted coalitions as a requisite for future military operations, they must undergo a cultural sea change for cybersecurity. Accepting nontraditional partners demands a new way of viewing cybersecurity that entails greater flexibility at its most philosophical level.
“We have realized the value of fighting on a single network instead of multiple networks,” said Maj. Gen. Mike J. Milford, Australia Military, chief technology officer, Chief Information Officer Group of the Australian Department of Defence, at TechNet Asia-Pacific 2013 in Honolulu, Hawaii. “Now, we are moving from a risk averse approach to a risk management approach.”
Australia has implemented a cybersecurity policy that brings together government and industry to secure the domain nationally. The country recently elevated cybersecurity as a major priority for national security, and in 2009, it established a Cyber Security Operations Center (CSOC).
The recent humanitarian assistance/disaster response (HA/DR) effort in the wake of the Philippine typhoon demonstrated new capabilities and vulnerabilities for the broad networking necessary for successful operations. Information was shared to a degree greater than at previous emergencies, but this opened the door to potential information assurance problems.
The revolutionary nature of cyberspace pales in comparison to the dynamic differences that characterize its work force. Not only do younger workers have different professional goals than their progenitors, but also same-generation technology-savvy workers may have varying outlooks on how to innovate and exploit new capabilities.
A Wednesday panel at TechNet Asia-Pacific 2013 in Honolulu, Hawaii, wrestled with the challenges facing leaders in cyber fields. Senior Master Sgt. Torry Hickson, USAF, Defense Information Systems Agency (DISA) Pacific, stated that an organization dealing with cyber needs a mix of young and old people. This will combine leadership built of wisdom with an innovative spirit with technology knowledge.
TechNet Asia-Pacific 2013 Online Show Daily, Day 1
Quote of the Day:
"If you allow the United States to operate out of sanctuary, we will beat the crap out of you." - Lt. Gen. Stanley T. Kresge, USAF, vice commander, U.S. Pacific Air Forces, addressing potential adversaries.
The recent U.S. strategic pivot toward the Pacific has placed that region at the forefront of change in the military. Where in the recent past activities in the area of responsibility (AOR) for the U.S. Central Command (CENTCOM) defined military needs, now the requirements for the U.S. Pacific Command (PACOM) are emerging as the leading edge of the defense technology sword.
The United States must examine new means of deterrence that address the multitude of ways an adversary would seek a military advantage, said the vice commander of the U.S. Pacific Air Forces. Lt. Gen. Stanley T. Kresge, USAF, told the opening luncheon audience in TechNet Asia-Pacific 2013 in Honolulu, Hawaii, that the old idea of deterrence—threatening an enemy with total destruction—does not apply to current challenges, especially with cyber issues.