Adversaries are exploiting the inherent vulnerabilities of U.S. military supply chains that involve tens of thousands of private sector providers from all over the globe. Attack operations include stealing valuable technical data; striking critical infrastructure, manufacturing and weapon systems control systems; corrupting the quality and assurance across a broad range of product types and categories; and manipulating software to access connected systems and to degrade systems operation integrity.
The FBI has a full plate: fighting public corruption, organized and white-collar crime and domestic and foreign terrorism; solving violent crimes; protecting civil rights; neutralizing national security threats, espionage and counterintelligence; and mitigating threats of weapons of mass destruction, among other responsibilities. And one part of the bureau is growing to protect the nation against cyber threats.
China is investing heavily in the Indo-Pacific, a critical region of the world for strategic purposes, and luring poorer countries away from the United States, said Thomas Modly, undersecretary of the Navy.
Modly made the comments during an afternoon luncheon address on the first day of the West 2019 Conference in San Diego.
The response to the Chief of Naval Operations (CNO) Adm. John Richardson’s repeated request to “pick up the pace” of developing and implementing breakthrough technologies for our warfighters has gone, in my opinion, largely unheeded.
This is not the result of a lack of innovative solutions. A myriad of research and development programs exists to support the development of new technologies or to adapt existing commercial technologies to defense applications. Rather, it’s the result of an arcane acquisition process that is burdensome, expensive and lacking vision. Acquisition reform is where we need to pick up the pace!
The Warfighter Information Network–Tactical program delivered a digital transformation, enabling maneuver elements to move faster and provide commanders with vital battlefield information in near real-time. Its flexibility facilitated communications in Iraq’s urban environments and Afghanistan’s mountainous terrain. Although a powerful improvement over Mobile Subscriber Equipment, the technologies are not powerful enough to combat adversaries wielding cyber capabilities.
China is at the heart of many key geopolitical issues confronting the Indo-Pacific region. It has seen dramatic and unprecedented economic growth in the last three decades and is embarked on a path supporting that growth with a major expansion in military capabilities. China is a nation on the move, and its strategic behavior underscores a long-term goal of seeking hegemony over the vast Indo-Asia region where it resides and likely exerting extraordinary influence over global affairs.
China’s growth continues apace. Having surpassed Japan in gross domestic product, China is poised to overtake the U.S. economy as the world’s largest in the next decade. By some widely accepted standards, it has already done so.
With the United States engaged in a “long-term strategic competition” with China and Russia, which are mounting persistent cyber attack campaigns that pose long-term risks to America, the U.S. military will act to deter aggression, cyber or otherwise, according to a new policy, known as the Department of Defense Cyber Strategy, from the U.S. Department of Defense.
For the last decade, “informatization” of its national civilian and military infrastructure has been a top priority for the People’s Republic of China. The country’s efforts to become a global power in information and communications technology include a focus on signals intelligence. Out of its $150 billion total defense budget, the country is spending an estimated $15 billion on signals intelligence, said David Stupples, professor of electronic and radio systems, City, University of London, at an August 9 Association of Old Crows (AOC) online event.
The days of the United States’ stature as a force without equal appear to be over. The threat of near-peer competition with increasingly sophisticated adversaries is growing. As Secretary of Defense James Mattis says in the National Defense Strategy, "America has no preordained right to victory on the battlefield."
The generation that remembers “duck and cover” also recalls headlines that included the words Soviet Union and impending dangers. Today, a combination of global instability, rising authoritarianism and democracies in retreat may lead to similar yet more dangerous situations, and this time, the headlines also are likely to include the words “People's Republic of China.”
To succeed in the battlespace of the future and to ensure combat superiority over peer adversaries, the U.S. military must be equipped with capabilities to defend information networks in cyberspace and to secure unimpeded access to the electromagnetic spectrum. Adversaries are developing cyber and electronic warfare capabilities to conduct information operations against U.S. systems that will likely threaten the speed and accuracy of military communications, intelligence and data sharing channels, while maliciously altering or stealing the information itself. These capabilities often have complementary effects, which means integrating cyber and electronic warfare could provide a stronger protection and attack capacity for U.S.
Cloud computing, big data and cyber are among the capabilities that pose a major threat to U.S. forces, said Lt. Gen. Scott Berrier, Army deputy chief of staff, G-2.
“If you’re a threat actor out there, probably a little bit of investment in these areas is going to go a long way to make life very difficult for your adversaries,” Gen. Berrier told the audience at the AFCEA Army Signal Conference in Springfield, Virginia.
Russia, Iran and North Korea are testing more aggressive cyber attacks against the United States and partner nations, according to the annual Worldwide Threat Assessment of the U.S. Intelligence Community delivered to Congress today by Dan Coats, director of national intelligence.
“The use of cyber attacks as a foreign policy tool outside of military conflict has been mostly limited to sporadic lower-level attacks. Russia, Iran and North Korea, however, are testing more aggressive cyber attacks that pose growing threats to the United States and U.S. partners,” the report states.
Not only will the race for AI go to the swiftest, military superiority may follow suit, according to a panel at West 2018 in San Diego on February 8. Hyperwar, or combat waged under the influence of AI, already is beginning to intrude on military operations. And other nations are devoting huge resources to military AI, which may tilt the balance of conflict in favor of them in little more than a decade.
No longer can the U.S. military bank on ensured victories. The battlefield is more lethal and disruptive, is conducted at breakneck speeds and reaches further around the globe. And although fighting terrorism has gripped the military’s focus for the last 16 years, it is the rise of so-called inter-state strategic competition against nations such as China and Russia that will now be the primary concern for U.S. national security.
No longer the wave of the future, quantum communications are here today. China recently launched Micius, the world’s first-ever quantum communications satellite capable of securing transmitted data within a high-dimensional quantum encryption.
This development is a “Wow!” There is no known capability to decrypt quantum encryption. This means no one can hack it until quantum technology reaches a point where technology gurus can think of it as another element within the Internet of Things (IoT).
It is imperative that the United States—government and private companies alike—begin using its inherent innovative spirit to think exponentially and develop technologies that will save time, dollars and lives while defeating the nation's adversaries, said Adm. Harry Harris, USN, commander of U.S. Pacific Command.
Chinese naval forces returned a U.S. Navy underwater, unmanned research vessel on Tuesday, near the location where it was unlawfully seized late last week, according to a U.S. Defense Department statement.
A Chinese military ship seized a U.S. underwater, unmanned research vessel, prompting the U.S. Defense Department to launch “appropriate government-to-government channels” with the Chinese government to immediately return the vessel. On Thursday, China unlawfully seized the unclassified ocean glider while sailing in the South China Sea, according to a Defense Department news release.
The USNS Bowditch and the unmanned underwater vessel (UUV) are used to gather military oceanographic data such as salinity, water temperature and sound speed, the release states.
The vaunted technology edge enjoyed by Western nations risks fading into history because of espionage by nation-states. National competitors and potential adversaries are saving years of research and development and billions of dollars in related expenses by extricating secrets through cyberspace. Both military and commercial organizations are suffering what could amount to devastating losses from opportunistic enemies, and communications and information technologies top the list of desirable targets.