by Jennifer Sevier
Maj Nick Brunetti-Lihach is a communications officeholder currently assigned as a Faculty Advisor to the U.S. Marine Corps Expeditionary Warfare School inwards Quantico, Virginia. He has deployed to Republic of Iraq as well as Afghanistan. In ix AD, 3 Roman legions were ambushed as well as destroyed past times Germanic tribes inwards the Teutoburg Forest. The Germanic tribes exploited the dispersed Roman business of march as well as baggage back upwardly trains, neutralizing the Romans’ superior weaponry, training, as well as discipline. In 1415, Henry V defeated numerically-superior French forces at Agincourt inwards component due to effective utilisation of the English linguistic communication longbow against well-armored knights trudging through mud inwards the open. The English linguistic communication combined a ameliorate standoff weapon alongside tactical superiority to defeat the French.
During the Vietnam War, the Viet Cong as well as North Vietnamese Army exploited unsecure American radio communications using commercial Sony transistor radios compatible alongside U.S. armed services radios. By taking payoff of vulnerabilities inwards U.S. communications, spoofing vocalisation communications through imitation transmissions, as well as eavesdropping inwards advance of operations, the enemy misled American forces, disrupted operations, as well as avoided greater casualties. Commercial equipment as well as innovative tactics were used to degrade or compromise American command as well as control.
Adaptation as well as project design take hold long been a hallmark of warfare. History is replete alongside examples of novel tactics combined alongside engineering to counter an adversary.1From Alexander’s improvement of the Greek phalanx to the Higgins boats of World War II, adapting through project design has been a harbinger of victory on the battlefield. Today’s adversaries are no unlike inwards their wishing to harness whatsoever way to gain advantage. For terrorists as well as non-state actors, inwards particular, the powerfulness to employ widely-available commercial engineering as well as modern IT (information technology) has degraded traditional western technological advantage. Modern engineering inwards the hands of the enemy has enabled effective command as well as control, information sharing, strategic messaging, as well as kinetic attacks. It has also degraded traditional U.S. overmatch inwards combined arms, ISR (intelligence, surveillance, as well as reconnaissance), as well as air superiority. As the 9/11 hijackers exploited gratis as well as ubiquitous air move alongside box cutters, terrorists as well as others are using smartphones, software, commercial encryption, as well as drones to mitigate the powerfulness of U.S. weapons as well as intelligence systems.
Thus ISIS as well as al-Qaeda choose advanced computing powerfulness to plan, coordinate, elude, or behaviour attacks, piece Russia, China, as well as Islamic Republic of Iran taste the fruits of the U.S. IT revolution. In recent Congressional testimony, John E. McLaughlin of SAIS (School of Advanced International Studies), Johns Hopkins, noted a trend:
… a engineering revolution that exceeds inwards speed as well as orbit anything we’ve seen inwards modern history. The in conclusion century was driven past times physics as well as engineering—which led to air power, improved mobility, as well as nuclear liberate energy ... This finds aspect inwards phenomena such as the so-called Internet of Things, a world of unprecedented connectivity—one that holds advantages but also vulnerabilities for the United States. Here's the telephone commutation point: this engineering revolution has brought a really revolutionary as well as unprecedented devolution of asymmetric powerfulness to individuals as well as pocket-sized groups through things similar social media as well as piece of cake access to knowledge. This is powerfulness they tin exert for goodness ends or ill.2
Thus states, terrorists as well as non-state actors blend weapons alongside widely available technology, to include sophisticated sensors, as well as surveillance systems.3Meanwhile, most U.S. armed services personnel rely on low-bandwidth business of sight VHF/UHF vocalisation communications at the tactical level. While U.S. armed services communications assets are to a greater extent than secure than commercial engineering (for now), American forces are largely unable to securely send as well as have networked high Definition video as well as information on the battlefield today (with the exception of a pocket-sized subset of elite troops). Military radios inwards the plain were designed over 10 years ago. These radios are larger as well as heavier than a cellular telephone circa 1990. While armed services radios offering strong encryption, reliability, as well as battery life, they were designed for secure vocalisation as well as depression information charge per unit of measurement (8-16k) communications. Today’s conflicts require a broad array of existent fourth dimension persistent information, to include picture, video, chat, email, as well as other sensor data. The inability of these radios to effectively send as well as have information fails to run across many mission requirements as well as pales inwards comparing to bandwidth provided past times commercial 4G LTE networks for a decade. To brand matters worse, troops send additional specialized equipment such as pocket Light Amplification by Stimulated Emission of Radiation make finders, ISR receivers, handheld GPS, as well as seat location beacons. Compounding the bulk, all of these devices require their ain powerfulness source as well as cables.
Meanwhile, adversary smartphones take hold go all-in-one command as well as command nodes, alongside apps to nada a rifle, make a mortar, as well as render GPS, navigation, fifty-fifty infrared or thermal imagery. Non-state actors utilisation VPN (Virtual Private Network) software as well as encrypted messaging for security. For ISR, a commercial quadcopter alongside a 4K video photographic tv camera as well as make of 2,000 meters tin live on purchased for less than $1,000. This is striking compared to the (much older) AeroVironment Raven, widely fielded to the Army as well as Marine Corps at a terms of $30,000 per aircraft.4
The U.S. armed services has enjoyed technological superiority for decades as well as counts on technological authorization on the battlefield. Yet that authorization is inwards endangerment today as U.S. forces take hold non realized many advances inwards modern technology. Worse, armed services networks, especially at the tactical level, are over-reliant on satellite communications for basic connectivity, largely due to the low-performance of existing line-of-sight radios as well as waveforms. Meanwhile, over one-half the people on world ain a smartphone capable of streaming high-speed video as well as data. According to an Ericsson report5, lxx per centum of the people on the planet volition take hold smartphones past times 2020, as well as ninety per centum volition live on covered past times mobile broadband networks. Significantly, lxxx per centum of novel smartphone subscriptions past times 2020 volition come upwardly from Africa, the Middle East, as well as Asia Pacific, all areas of U.S. national interest.
In the 20th century, most adversaries could non approach western armed services powerfulness inwards whatsoever existent feel without a Russian or Chinese proxy sponsor. Now good into the 21st century, commercially available hardware as well as software has go an equalizer inwards some areas. Software is king, fueling only novel sectors of entertainment, social media, as well as mobile communications, as well as software is predicted to Pb the adjacent tech revolution.6 The modern smartphone today is orders of magnitude to a greater extent than powerful than the reckoner which took human being to the satelite inwards 1969, as well as it is far cheaper, smaller, as well as liberate energy efficient. Cyberspace has also provided adversaries alongside an only novel domain to probe or assail commercial, authorities as well as armed services networks.
Yet American troops are “choking on onetime technology” given the deadening footstep of development, lack of mobile armed services networks, as well as inability to resolve concerns nearly operational security.7 In the cyber realm, Americans are farther constrained past times authorities to engage adversaries. Current trends are non promising. Influenza A virus subtype H5N1 recent Heritage Foundation study pointed out the footstep at which commercial project design has begun to outstrip traditional defence technology, as well as how “the fruits of this commercial project design are available as to U.S. competitors as well as adversaries without meaning investment on their part.”8 Even to a greater extent than worrisome, the study notes “advanced microelectronics, IT breakthroughs, mobile devices, as well as commoditized connectivity are the foundations on which America’s adversaries are edifice their engineering advantage.”
Lagging development, powerfulness to leverage commercial technology, as well as bureaucracy are bad enough. Worse, perhaps, are the tendency lines inwards education, especially STEM (Science, Technology, Engineering as well as Math). Many observers take hold suggested the U.S. is losing its project design border to China.9 The chairman of the congressional U.S.-China Economic Security Review Commission late reported 350,000 Chinese students inwards the U.S. are “systematically stealing U.S. technology.”10 By most metrics, Americans are losing footing inwards STEM education, other countries are gaining footing inwards both education, as well as powerfulness to innovate.
Hence competitors as well as adversaries are closing the technological gap piece U.S. servicemembers hold back for DoD computer program managers to deliver mobile networking to the battlefield decades later the outset Android telephone hitting the market. In a recent probing article, Michael Horowitz asked if the U.S. armed services is prepare for war:
The ongoing full general proliferation of precision strike capabilities, cross-domain threats from cyber, space, as well as beyond, ascent operational competence inwards potential adversaries, as well as the anticipation of rapidly diffusing novel commercial engineering alongside armed services relevance is placing American conventional overmatch at risk.
We are approaching a menstruum where commercial markets volition have haemorrhage border technologies to spread faster than the telephone commutation technologies of the past times generation, such as stealth or precision guidance. Here, I am talking nearly technologies that are component of the third offset strategy—artificial intelligence, robotics, 3D printing, cyber, directed energy, as well as others.11
From a technological perspective, adversaries are approaching or take hold attained parity on a issue of fronts. TheU.S. budget as well as calendar-driven computer program objective memorandum bicycle is non conducive to innovation, or keeping footstep alongside industries which pride themselves on novel gadgets annually, as well as novel apps weekly. Even alongside funds available inwards a budget to buy novel technology, the RMF (Risk Management Framework) physical care for to employ novel engineering is typically a years-long process, except for the intervention of a full general officer. The outcome is reliance on rigid, tightly controlled hardware as well as software to minimize risk, as the armed services calculus for approbation commercial-grade hardware as well as software places a premium on caution as well as safety over capability. Yet cutting-edge innovative companies prize speed, modeled on planning frameworks such as Agile, which sets timelines inwards weeks as well as months, non years. As the Heritage study noted, “commercial software uses agile methodologies as well as lean start-up principles, piece the Defense Department ofttimes attempts to instruct software using outdated waterfall methods.”12 Hence it is non uncommon for fifty-fifty established technologies to require upwardly to xv years of evolution fourth dimension inside DoD.13
Acting Secretary of the Army Robert M. Speer summed upwardly the flaws inside authorities procurement of information engineering observing that “by the fourth dimension the decision’s finally made, allow lone implemented, the Army is ofttimes locked into a proprietary solution that’s already obsolete.”14 To reinforce the point, a recent article inwards the U.S. Naval Institute magazine, Proceedings, characterized the defence acquisition physical care for itself as the enemy:
It is routine for a [D]efense procurement, including acquisition of information technology, to accept 5 or to a greater extent than years from the establishment of requirements to down-select of the provider as well as contract start. During those years, the underlying engineering volition evolve significantly. Sensor engineering volition take hold evolved at to the lowest degree i cycle. The information engineering that undergirds nearly every arrangement nosotros construct volition evolve at the speed of Moore’s Law, i generation every xviii months. Worse, it is mutual for the affected armed services service or agency to suspend safety as well as engineering updates on existing systems during the procurement cycle, believing it is ameliorate to hold back until the novel contract is available.
Suspension of normal upgrades to systems during the acquisition bicycle results inwards a ‘trough of stagnation,’ during which the affected systems go to a greater extent than vulnerable to failure or attack. This degradation of readiness probable makes the delta betwixt ‘current state’ as well as ‘needed state’ to a greater extent than substantial than specified inwards the initial requirements. As a result, when the systems are delivered, because the starting betoken degraded piece engineering evolved over the class of the acquisition cycle, disappointment is certain. Either terms to unopen the gap causes the allocated budget to live on missed, or since our enemies are non constrained past times the same byzantine processes, insufficient capability is delivered to protect the warfighter.
While much attending is paid to preventing ‘contractual risk’ past times adhering to a strict laid of guidelines intended to ensure fairness inwards the acquisition process, in that location is no countervailing attending paid to the opportunity imposed on soldiers, sailors, airmen, Marines, as well as national security, past times the years of delays as well as billions of dollars spent unnecessarily.15
In the absence of available technology, as well as inwards low-cal of the evolution bicycle for novel technology, operational necessity places front-line troops inwards a dilemma to weigh operational safety alongside operational necessity. Influenza A virus subtype H5N1 risk-averse approach to engineering way beingness perennially stuck inwards the past. Government as well as armed services C4ISR (command, control, communications, computers, intelligence, surveillance, as well as reconnaissance) systems are typically several generations behind available technology, as well as worse - lack interoperability alongside armed services communications networks.
As armed services technological evolution lags, the same is truthful for mutual feel grooming as well as instruction inwards the utilisation of IT on unsecure commercial networks. Influenza A virus subtype H5N1 determined advanced persistent threat tin hack most Americans today given the ubiquitous utilisation of chat, email, text, as well as social media profiles. Even a secured mobile network opens upwardly novel vulnerabilities, described inwards a recent newspaper for the Center for a New American Security: Wi-Fi enabled devices on troops volition render novel threat vectors for enemies to target. Troops fooled past times imitation or spoofed signals polluting their sensors may target friendlies, live on exposed to attack, or compromise their location as well as other data.16
The threat from unsecure mobile devices is myriad: devices tin live on jammed; geo-located; are susceptible to spoofing, radiate liberate energy as well as RF signals; as well as possess vulnerabilities inherent to its operating arrangement or software. Pictures taken past times a mobile device are geo-tagged, providing a valuable breadcrumb trail. Today’s global economic scheme is built upon the opened upwardly as well as gratis commutation of commerce as well as ideas. The Internet of things has far exceeded its master copy intended purpose. This is evident inwards the lack of built-in safety requirements for most protocols as well as applications. For goodness reason, cyber safety experts volition tell you lot the most secure reckoner is disconnected from the Internet, locked inwards a steel box inwards a basement, as well as guarded 24/7. In today’s Internet, the only truthful safety is disconnection.
Global connectivity has expanded soft targets exponentially. The commercially driven networking of households (e.g., Alexa) has spread threat vectors to every laundry room as well as garage. Couple the impairment done to authorities as well as quasi-government entities inwards recent years (the Democratic National Committee, Office of Personnel Management, etc.) alongside growing interconnectivity of mobile devices as well as dwelling appliances, as well as the implications are daunting.
Congress as well as recall tanks fret over a dearth of naval vessels as well as stealth aircraft. These weapons may testify indispensable inwards non bad powerfulness war, but if enemies consider America’s critical vulnerability, an unsecure reckoner inwards every pocket is hard to overlook. Our adversaries may create upwardly one's heed it is to a greater extent than advantageous to strike electronically from a distance.
The utilisation of unsecure devices introduces opportunity inwards basic principles of operational security, information security, as well as communications security. Yet, in that location is also opportunity inwards denying forces a capability due to potential vulnerabilities. Perhaps as debilitating, the inability to communicate alongside coalition as well as partner forces utilizing mobile engineering on the battlefield places U.S. forces at a disadvantage to coordinate as well as exercise command as well as control.
Personal devices take hold go an enormous threat to individuals, their family, as well as friends. Yet nosotros are to a greater extent than worried today nearly physical threats than the virtual surround which has questioned concepts of physical borders as well as evolved into capabilities alongside real-world effects (Estonia, Georgia, Stuxnet, etc.). The modern American economic scheme is a noesis economic scheme as well as this regulation applies to overseas operations. Information is currency, as well as in that location must live on an powerfulness to access, leverage, send, receive, as well as persuasion the make of digital voice, video, as well as data. To brand that a reality, practical, useful, as well as effective guidance on the utilisation of modern engineering is essential.
While already behind inwards work of modern technology, policy as well as best practices are farther behind. There must live on a residue betwixt safety as well as flexibility to leverage available modern engineering as well as all available local telecommunication infrastructure. Ten years removed from the outset iPhone, troops from the province that led the smartphone revolution take hold limited access to real-time information during armed services operations. The few authorized mobile tablets/smartphones either can’t live on networked, are non interoperable alongside other computer program of tape systems, or are only capable of depression bandwidth business of sight communications. Take the Army’s late canceled WIN-T program, a $9.1 billion investment inwards mobile intranet for soldiers.17 The arrangement is plagued alongside meaning cyber vulnerabilities as well as inherent defects, such as pathetic battery performance. Just prior to the Army’s cancellation of WIN-T, the House of Representatives wrote a missive of the alphabet to the U.S. Army Chief of Staff concerned nearly scheduling WIN-T fielding through 2038 or beyond. Stating the obvious, the missive of the alphabet remarked, “Considering the footstep of technological development, fifty-fifty if upgrades are made over time, the arrangement would live on obsolete.”18
Multiple opened upwardly source interviews of senior uniform as well as armed services leadership take hold noted the inability to render persistent as well as reliable on-the-move communications as a leading capability gap hindering command as well as command as well as ISR. The Army Chief of Staff is on tape stating he does non believe WIN-T would take hold been survivable inwards combat.19 The most recent annual study from the Pentagon’s role of developmental testify as well as evaluation warned the arrangement was overly complex as well as presented usability problems. The “land-based line-of-sight would non run across the Army’s operational needs.”20
The representative of the Army’s WIN-T computer program illustrates how far evolution of mobile armed services networkslags behind modern technology, as well as heightens the demand to demand ameliorate from the uniform as well as civil servants running these programs. Another representative illustrates only how deadening armed services IT systems evolution tin be. When Microsoft stopped supporting Windows XP inwards 2015, as well as then many U.S. Navy as well as Army systems were as well as then far behind inwards upgrades, the Services had to pay Windows to go on patching for specific weapons systems.21
The tidings is non all bad. There has been some progress, albeit slow. DISA (Defense Information Systems Agency) is piloting what it calls a “gray network” to secure connectivity to classified networks using the world Internet or commercial prison theatre electrochemical cell towers, according to Alfred Rivera, manager of the Development as well as Business Center at DISA.22 Even to a greater extent than promising, the Air Force late reduced its certification as well as accreditation timeline downwardly from xviii months to thirty days past times using the Agile Framework methodology.23 Marines are also experimenting alongside hive UAVs.24 The Corps is arguable also leading the way alongside 3D printing.25 On the cloth side, every Marine infantry team volition also presently possess its ain quadcopter.26 Many of the recent commercial engineering acquisitions past times the Marine Corps are driven from the top, inwards a concerted exertion past times senior officers. However, the Marine Corps Strategy for Assured Command as well as Control document recognizes many existing management practices as well as processes are “outdated as well as obsolete.”27 Faster acquisition of some commercial tech is a goodness thing, but integration into existing systems as well as platforms requires a faster, to a greater extent than agile evolution bureaucracy.
Despite these efforts, at the tactical flat the Marine Corps has non yet realized the mobile information revolution of the past times ii decades, or enabled disparate footing as well as air systems to communicate. To address this, DoD needs secure solutions for mobile communication without compromising portability, survivability, as well as compatibility alongside existing systems. There should live on a “menu” of data-in-transit as well as data-at-rest solutions personnel tin download or access on hand-held devices. This may live on a VPN solution to access secure services inwards the cloud, or a listing of approved as well as vetted applications for messaging or encryption. The solution should live on predicated on the powerfulness to communicate securely roughly the world regardless of transmission medium. Vulnerability analysis, built upon the RMF, volition only maintain relevance past times vetting hardware as well as software inwards weeks as well as months, non years.
The perfect cannot go the enemy of the good. Several steps tin live on taken inwards the close term to enable U.S. forces to leverage mobile networks at the frontward tactical edge. First, to mitigate safety risks, break approved/sanitized apps as well as tactics, techniques, as well as procedures for unclassified smartphone utilisation past times the expanse of responsibleness if necessary. Conversely, in that location should live on a listing of prohibited apps. Re-assess the cultural demand to “secure everything as if they were diamonds” to the Type-1 MIL SPEC standard, at to the lowest degree for threshold requirements.28 Additionally, delegate to a greater extent than IT purchasing powerfulness as well as flexibility to commanders, mitigate onerous RMF as well as accreditation requirements, promote interoperability, as well as require whatsoever arrangement similar a shot inwards evolution live on interoperable alongside whatsoever device or software available inwards the General Service Administration catalog, a practise broadly known as reciprocity. This volition optimize the powerfulness for commands as well as commanders to flexibility employ diverse technologies.
Marines at the tactical flat are even out alongside goodness ideas. There is to a greater extent than demand to foster project design at the footing level, as well as ensure in that location is a machinery to rapidly disseminate gaps or shortfalls inwards capabilities into novel technologies or techniques upwardly the chain of command, than in that location is a demand for a Rapid Capabilities Office to experiment. This is easier said than done as well as peradventure no to a greater extent than hard inwards an establishment such as the Marine Corps which values as well as prides itself on the chain of command. Yet anyone who has spent fourth dimension at the tactical flat has an appreciation for the existent or perceived disconnect betwixt the rank as well as file as well as higher headquarters. In the realm of innovation, the lack of capability is to a greater extent than acutely felt past times front-line troops alongside a greater feel of urgency for solutions. The Innovation Challenge is a non bad measurement inwards the correct direction, but is non a in conclusion solution. Higher upwardly the chain of command, priorities do non ever align, as well as ofttimes come upwardly into conflict alongside resources, especially fourth dimension as well as money. This makes it all the to a greater extent than of import to non only challenge existing culture, but to avoid the persistent wishing amid computer program managers to consolidate as well as protect programs.29
Long term, all systems must live on interoperable, survivable against electronic attack, as well as capable of taking payoff of a broad make of the electromagnetic spectrum. There is also a demand to develop apps as well as network architecture alongside built-in safety that is operating arrangement agnostic. The Marine Corps has already stated its wishing to reckon articulation standards for applications as well as then “they don’t demand to reverse-engineer apps used past times other service branches when they behaviour articulation operations.”30 The Marine Corps should reform or cancel whatsoever existing computer program that is non or cannot live on networked to existing or emerging information systems. Systems are inwards evolution today inside DoD that either cannot live on networked alongside existing systems. This defies the purpose behind distributed forces sharing information inwards real-time, but is emblematic of thestovepipe physical care for past times which computer program managers neglect to appreciate operational requirements or do non coordinate alongside their intelligence, air, as well as fires counterparts to ensure interoperability.
The Marine Corps should accept payoff of software as a strength multiplier. Devices no longer take hold to communicate through identical frequencies as well as waveforms. Software such as TRAX (Tactical Radio Application Extenstion) or JECL (Joint Effects Coordination Link) tin interpret disparate frequencies as well as waveforms inwards real-time. Every sensor on the battlefield does non require the same frequency or protocol alongside the correct network architecture.
The DoD cybersecurity workforce must live on reformed as well as incentivized to re-examine the RMF process, as well as require faster turn-around of accreditation as well as certification. This may require to a greater extent than cultural alter amid the so-called “blue as well as gray beards” of the bureaucracy, as the mobile innovations Pb for the Army late noted.31 Similarly, the Division Chief at the Army’s LandWarNet Division, Michael McCarathy late stated, “too often, network as well as IT modernization programs are hampered past times requirements that serve commanders or acquisition officials rather than goal users.” In other words, the C4 evolution bureaucracy should focus to a greater extent than on operational requirements, non higher headquarters’ staff requirements.
Holistic alter is needed inwards the acquisition physical care for to maintain footstep alongside technological innovation.32 One house to start is the recent recommendations past times the Defense Business Board, a Federal advisory panel of corporate executives.33From a “culture” perspective, the armed services should consider the powerfulness of commanders to sympathise how engineering tin contribute inwards a multi-domain environment. For junior service members, this way crafting a civilization Air Force Col Jason M. Brown calls an “innovation ecosystem” to unleash project design potential. It volition require talent management to enable service members to innovate without having to navigate the bureaucracy labyrinth, spending years inwards the process.34 It volition also require attracting as well as retaining uniform as well as civilian talent capable of keeping footstep alongside the tempo of changing C4 systems. The Marine Corps must ensure it focuses on the correct people inwards improver to the correct engineering as well as processes. The Defense Innovation Board is currently looking at solutions to this complex job correct now.35
The 3rd offset strategy was predicated on the powerfulness of the U.S. to leverage industry, especially Silicon Valley, inwards social club to innovate to a greater extent than quickly. Unfortunately, as a recent analysis pointed out, “it’s non at all clear that the bet volition ground inwards favor of the U.S. as well as its allies.”36
There must live on a alter inwards the development, acquisition as well as fielding of modern engineering on the battlefield. Otherwise, mobile networks volition enable adversaries to run across U.S. as well as allied technical advantages, as well as surpass them; inwards which instance the engineering that makes our armed services as well as then non bad today volition go far terrible for our forces on the frontlines. Access to modern engineering volition non unmarried handedly win a conflict. However, faster evolution volition outcome inwards meaning improvements to physical care for information at the tactical level, if protected against near-peer threats. Otherwise, “the inability of U.S. defence project design agencies to absorb as well as exploit this freely available commercial engineering is leading the the States downwardly the path of project design isolationism.”37
This article appeared originally at the Marine Corps Gazette.
Notes
Peter Paret, ed., Makers of Modern Strategy: From Machiavelli to the Nuclear Age,(Princeton: Princeton, 1986).
John E. McLaughlin, The State of the World: National Security Threats as well as Challenges, (Statement Before House Armed Services Committee, Washington, DC: Feb 2017).
Staff, “Army to Unveil New Combat ‘Operations’ Doctrine,” Scout, (Online: Oct 2017), available at https://scout.com.
Jonathan Gillis, “In Over Their Heads: U.S. Ground Forces are Dangerously Unprepared for Enemy Drones,” War on the Rocks, (Online: May 2017), available at https://warontherocks.com.
Information available at https://www.ericsson.com.
Devin Guan, “Despite Our Gadget Obsession its Software Not Hardware that volition Lead the Next Tech Revolution,” Venture Beat, (Online: June 2017), available at https://venturebeat.com
Leon Blanken, Jason Lepore, Stephen Rodriguez, “America’s Military is Choking on Old Technology,” Foreign Policy, (Online: Jan 2018), available at http: foreignpolicy.com
Gareth Evans, “Is the US armed services machine losing its project design border to China?,” Army Technology, (Online: March 2018), available at https://www.army-technology.com
Brian Wang, “The US used to advance as well as then fast that countries could only re-create what the US did twenty years before,” Next Big Future, (Online: April, 2018), available at https://www.nextbigfuture.com
Victoria Coleman as well as Thomas Spoehr, “Reclaiming US Defense Leadership on Innovation,” Real Clear Defense, (Online: May 2017), available at www.realcleardefense.com.
Michael Horowitz, “The Future of War is Fast Approaching inwards the Pacific are the US Military Services Ready?,” (Online: June 2017), available at https://warontherocks.com.
“Reclaiming US Defense Leadership on Innovation.”
Ibid.
Sydney J. Freedberg, Jr., “Army Reviews ALL Networks—Way Beyond WIN-T: Milley & Speer,” Breaking Defense, (Online: June 2017), available at http://breakingdefense.com.
Capt William J. Toti, USN (Ret), “Defense Acquisition Processes are the Enemy,” Proceedings, (Online: June 2017), available at https://www.usni.org.
Aliya Sternstein, “A More Connected Military Means New Battlefield Glitches Too,” The Christian Science Monitor, (Online: March 2017), available at http://www.csmonitor.com.
Marty Skovlund, Jr., “The Military’s 5 Biggest Procurement Fails Since 9/11,” Task as well as Purpose, (Online: March 2017), available at http://taskandpurpose.com.
Jen Judson, “Congress Proposes Faster Fielding of Army’s Tactical Comms,” C4ISR Net, (Online: May 2017), available at http://www.c4isrnet.com.
Matthew Cox, “Army Chief: Battlefield Network May Not Survive Combat,” DoD Buzz, (Online: May 2017), available at https://www.dodbuzz.com.
Jared Serbu, “Senate, Army Chief Cast New Doubt on Future of Army’s $6 Billion Tactical IT Network,” Federal News Radio, (Online: May 2017), available at https://federalnewsradio.com.
Robert Hackett, “Why the U.S. Navy is even as well as then paying Microsoft millions for Windows XP,” Fortune, (Online: June 2015), available at http://fortune.com.
Mark Pomerleau, “DISA Working on Gray Network Pilot alongside Combatant Commands,” C4ISR Net, (Online: May 2017), available at http://www.c4isrnet.com.
M. Wes Haga, “How the Air Force Made Its ISR Network Cheaper to Run as well as Easier to Upgrade,” Defense One, (Online: Oct 2017), available at http://www.defenseone.com.
Sydney J. Freedberg Jr., “Drone Delivery, Direct to the Grunt: Marines Experiment With Hive UAVs,” Breaking Defense, (Online: March, 2018), available at https://breakingdefense.com
Sydney J. Freedberg Jr., “Marines’ Love Affair With 3D Printing: Small Is Cheap, & Beautiful,” Breaking Defense, (Online: March, 2018), available at https://breakingdefense.com
Gidget Fuentes, “First Marine Battalion Gets ‘Eyes inwards the Sky’ Mini-drones,” USNI News, (Online: March, 2018), available at https://news.usni.org
Adam Stone, “The Next Step Toward Digital Command as well as Control,” C4ISRNet, (Online: April, 2018), available at https://www.c4isrnet.com
Phil Goldstein, “Army as well as Marines Tackle Mobility Challenges,” FedTech, (Online: Apr 2017), available at http://www.fedtechmagazine.com
Tim Jones, “The Perils of Centralizing Defense Innovation as well as How to Overcome Them,” Grounded Curiosity, (Online: May 2017), available at http://groundedcuriosity.com
“Army as well as Marines Tackle Mobility Challenges.”
Sean D. Carberry, “Army Mobility Slowed past times Culture,” FCW, (Online: March 2017), available at https://fcw.com.
Sean D. Carberry, “Army Official: Soldier Needs Should Drive Tech Acquisition,” FCW, (Online: May 2017), available at www.fcw.com
Steve Forbes, “How Trump Can Attack the Blood Soaked Money-Wasting Scandal of How the Pentagon Develops Weapons,” (Online: May 2017), available at forbes.com.
Jason M. Brown, “Why the Military Needs a Technology Revolution,” The Nationalist Interest, (Online: May 2017), available at nationalinterest.org
Matthew Cox, “Defense Innovation Board Tackles DoD’s Talent Management Woes,” DoD Buzz, (Online: Oct 2017), available at https://www.dodbuzz.com.atrick Kennedy, “Supercomputers as well as the Third Offset,” Real Clear Defense, (Online: June 2017), available at https://www.realcleardefense.com
Patrick Kennedy, “Supercomputers as well as the Third Offset,” Real Clear Defense,(Online: June 2017), available at https://www.realcleardefense.com
"Reclaiming U.S. Defense Leadership on Innovation.”
Buat lebih berguna, kongsi: