Rear Adm. Robert Day Jr., USCG, assistant U.S. Coast Guard commandant for command, control, communications and information technology, sees the Joint Information Environment as an opportunity to resolve some of the most pressing information technology problems in the years to come as he faces a future with more challenges and fewer resources. He says a military-wide common operating environment will establish “enterprisewide mandates that programs cannot ignore.”
The U.S. Navy uses a popular online collaboration tool to change course around last-minute travel restrictions.
The U.S. Naval Safety and Environmental Training Center, charged with conducting safety and environmental training worldwide, successfully is circumventing hurriedly imposed government travel restrictions by using an online application to conduct safety and environmental training. The tool recently enabled the center to conduct an annual conference with more than 1,000 attendees.
The planners of the Defense Department Joint Information Environment, or JIE, must specify the requirements that can cope with the surges in asymmetric cyberwarfare—now. Asymmetric warfare describes conflicts in which the resources of the two belligerents differ in terms of their weapons and organization. The opponents will attempt to exploit each other’s weaknesses.
Today’s financial skimping will lead to military forces and equipment that are short on readiness for future conflicts. Cutbacks in training and travel to conferences where service members network, learn about the latest in technologies and benefit from educational courses is one way to meet mandated budget cuts; but in the long term, they will result in service members who are ill-prepared to meet the challenges of what some believe will be a volatile future. Simultaneously, reductions in maintenance of vehicles, networks and ships will result in higher repair bills much like a car that is not routinely taken to the shop ends up costing the owner more to fix in the long run.
The Army adjusts its training and career path for cyber domain troops and leaders.
The U.S. Army is taking a successful model developed to train chief warrant officers in the realm of information assurance and is adapting it for qualified enlisted personnel and officers. Instead of reinventing the wheel, the program blends already-successful cybersecurity training designed for the private sector with training tailored for the Army’s mission-specific networks. The goal is to create a career path for what is expected to be a cadre of cyberspecialists whose primary goal is to protect and defend the service’s digital infrastructure.
On-the-move communications go digital for troops in regular or disadvantaged locations.
Project Fishbowl spurs industry to meet military and intelligence community needs.
U.S. intelligence and defense officials are wrapping up a mobile device pilot program known as the Fishbowl project and are planning over the next year to expand on the capabilities it provides. Doing so is part of a larger strategy to wean the agency and the Defense Department off of government-designed mobile device technology, which will save time and money while providing secure, cutting-edge electronics for high-level government officials and to individual soldiers.
Amidst dire threat warnings, cyber warriors grow increasingly adept.
While many cybersecurity experts preach the gloom and doom of more advanced adversaries attacking U.S. networks, one government official contends that U.S. network defenders can meet the challenge. Training, education and technological improvements are showing dividends in a better-prepared cyber workforce.
From handheld to the cloud, new technologies are driving new approaches to data assurance.
The increasing use of readily available and inexpensive commercial technologies by the military is changing the way the Defense Information Systems Agency provides information assurance. As these technologies are integrated into the Defense Department information infrastructure, the agency is adjusting its approaches to providing security for its networks and the data that reside on them.
Protection is as much about who you know as what you know.
The tasks critical to success in the realm of information assurance have become so robust that a breadth of expertise is now necessary to stop cybercriminals. To that end, Sandia National Laboratories, Albuquerque, New Mexico, opened a new research facility called the Cyber Engineering Research Laboratory to promote the collaboration required to safeguard networks. An accessible external location, coupled with a synergistic internal mindset, enables advancements and maturity of concepts essential to success in the cyber realm.
Recent developments in advanced materials bring the Army closer to next-generation displays for a new breed of warfighter mobile devices.
A coalition of military, academic and industry scientists is approximately one year away from the first working prototypes of mobile devices using newly developed flexible display technologies. The goal is to demonstrate that manufacturing the displays can be done economically, and in quantity, so that they can be widely adopted by mobile device makers, benefitting both the military and consumers. Project managers ultimately hope to introduce mobile devices that are lighter, more reliable and less expensive.
Industry officials foresee changes in network security.
Cyber industry experts predict a number of coming developments in the cyber realm, driven in part by government strategy and funding uncertainties. The future may include a greater reliance on law enforcement to solve state-sponsored hacks, increased automation and more outsourcing.
This time it is the Internal Revenue Service (IRS) that has demonstrated bad judgment and lack of a full understanding of the rules governing large meetings. The revelation of extravagant IRS spending on meetings follows similar issues with the General Services Administration and the U.S. Department of Veterans Affairs. This waste shines a light on bad judgment for sure—but it also reveals a larger problem. For the most part, government personnel who are planning and coordinating government-run events do not do this as their primary function. They do not run events often enough to fully understand the travel and conference policies or the ethics and gift regulations.
As the Global War on Terrorism winds down in the minds of American military strategists, the rush to put this chapter of our history behind us without further reflection is palpable. Yet, by turning our focus to more easily understood conflicts, we risk missing the very real lessons of the past 10 years that likely will remain relevant in the coming decades.;