Due to a lapse in federal funding, this website is not being actively updated or monitored. See OPM status.
Results:
Category: Technology & Innovation

Jan. 22, 2019

A Cyber Force for Persistent Operations

Persistent engagement and forward defense are two key concepts in this article by General Paul Nakasone, Commander of USCYBERCOM. This means remaining in constant contact with adversaries while operating as close to them as possible. The idea is to support the National Security Strategy and protect the DOD Information Network while denying advantage to adversaries so the Joint Force can conduct secure operations. Although cyberspace represents a new strategic environment, Nakasone says USCYBERCOM is maturing as a combatant command, transitioning from force generation to sustained readiness for persistent engagement with cyber adversaries.

July 3, 2018

Intelligence in a Data-Driven Age

In this article, the authors explore alternative methods to create long-term competitive advantage by increasing collaboration between the intelligence community and machines, with an emphasis on artificial intelligence and machine learning. The intelligence community is battle-trained if overworked as a result of continuous operations since 2001, and its technological advantage may be at risk because intelligence systems are collecting data in too many disconnected and diverse formats, and relying on systems that are disconnected, non-standard or inaccessible. Nonetheless, artificial intelligence and machine learning will be instrumental to increase the effectiveness of future intelligence analysts and to sustain our competitive advantage.

April 19, 2018

Paradigm Change: Operational Art and the Information Joint Function

The need for this addition to the joint functions has become increasingly obvious to military leaders over time. It reveals itself in the difficulty of addressing gray zone challenges. During a recent effort by the Joint Staff to update Joint Publication (JP) 3-13, Information Operations, leaders recognized that the joint force was already attempting to use information as a function and that the time to institutionalize information as a function was therefore overdue.

April 12, 2018

Moore’s Law and the Challenge of Counter-sUAS Doctrine

In 1965, Gordon Moore, co-founder of the Intel Corporation, made his now famous prediction that the “number of transistors incorporated in a chip will approximately double every 24 months.” More than 50 years later, his prediction has not only held true, but also the implications of what is now called Moore’s Law define the combat environment for the joint force. The continual miniaturization, mass production, proliferation, and improvement of integrated circuits and microprocessors have introduced powerful computing technology into every aspect of modern life.

April 11, 2018

The Practical Implications of Information as a Joint Function

The integration of the Information as a Joint Function (IJF) with the other six joint functions offers new opportunities for developing and conducting operational art and design. IJF will result in the development of executable plans to deal with future conflicts that are TMM in nature. The ultimate result will be that joint force commanders are able to dominate the informational aspect of their operating environment (the IE) the same way they dominate land, sea, air space, and cyberspace.

April 11, 2018

Introducing Information as a Joint Function

In July 2017, the Chairman of the Joint Chiefs of Staff issued a change to Joint Publication (JP) 1, Doctrine for the Armed Forces of the United States, introducing information as a new and seventh joint function. This issuance portends significant changes in how the joint force will plan and execute transregional, multidomain, and multifunctional operations. As such, it represents an opportunity to reimagine what “combined arms” means in 21st-century warfare.

March 1, 2018

Technology and National Security: The United States at a Critical Crossroads

Globalization of science and technology, emerging and unpredictable threats (both manmade and natural), conventional and emerging weapons of mass destruction, and an inversion of technology flow from the private to public sectors all present challenges to our national security.

Aug. 14, 2017

The Pentagon’s Pivot: How Lead Users Are Transforming Defense Product Development

Historically, the Department of Defense (DOD) has relied on strategic forecasting to determine specifications for new military products. These specifications are codified in formal product requirements that drive new product development (NPD).

June 21, 2017

Autonomous Weapons Systems Safety

Available technology and unforeseen world events will make it increasingly difficult to apply the law of armed conflict and international law relating to the use of force via autonomous weapons systems in a consistent manner that adheres to U.S. policy. Many nations, including the United States, will place limits on the use of lethal autonomous weapons systems (LAWS) to avoid the risk of collateral damage and to comply with international humanitarian law. However, potential adversaries might not be bound by these constraints.

May 22, 2017

Like, Comment, Retweet: The State of the Military's Nonpartisan Ethic in the World of Social Media

Through a survey of more than 500 military elites attending the United States Military Academy and National Defense University, this project seeks to establish the nature and extent of political expression by members of the military throughout social media and whether or not such expression is in keeping with the norm of nonpartisanship.

April 1, 2017

Information Warfare in an Information Age

In the past week, how many devices have you used that were connected to the Internet or relied on an algorithm to accomplish a task? Likely, the number is upward of 10 to 15, and most of those devices are used daily, if not hourly. Examples may include a Fit-Bit, cell phone, personal computer, work computer, home monitoring system, car, Internet television, printer, scanner, maps, and, if you are really tech savvy, maybe your coffee pot or refrigerator.

April 1, 2017

Operational Graphics for Cyberspace

Symbols have been part of military tactics, operations, and strategy since armies became too large for personal observation on the battlefield. In joint military operations, it is crucial to have a set of common symbols familiar to all users. The inability of cyber warriors to easily express operational concepts inhibits the identification of cyber key terrain, development of tactics and strategies, and execution of command and control.

Dec. 12, 2016

Chapter 8 | Cyber Policy

The effective use of the informational instrument of national power in all domains, and the use of all the instruments of national power in the cyber domain, will be a serious and growing challenge for the United States. The next U.S. President must have a clear understanding of the relationship of technology, law, and policy in formulating options. Centralized but not procrustean, leadership at the highest level, providing a clear and rational delineation of authorities, will be needed to coordinate and effectively employ U.S. cyber and information capabilities. Internationally, engaging with allies and partners will be vital to our defense; engaging with adversaries will require a new understanding of deterrence and counter-espionage in cyberspace. Domestically, new approaches to public-private partnerships will be key to addressing threats, preserving civil liberties, and unleashing our potential for improved governance and expanded commerce.

Oct. 1, 2016

Predicting the Proliferation of Cyber Weapons into Small States

Recent analysis of cyber warfare has been dominated by works focused on the challenges and opportunities it presents to the conventional military dominance of the United States. This was aptly demonstrated by the 2015 assessment from the Director of National Intelligence, who named cyber threats as the number one strategic issue facing the United States.1 Conversely, questions regarding cyber weapons acquisition by small states have received little attention. While individually weak, small states are numerous. They comprise over half the membership of the United Nations and remain important to geopolitical considerations.2 Moreover, these states are facing progressively difficult security investment choices as the balance among global security, regional dominance, and national interests is constantly being assessed. An increasingly relevant factor in these choices is the escalating costs of military platforms and perceptions that cyber warfare may provide a cheap and effective offensive capability to exert strategic influence over geopolitical rivals.

July 12, 2016

Will Technological Convergence Reverse Globalization?

The Economist defines globalization as the “global integration of the movement of goods, capital and jobs,”1 and for decades, the process has been advancing. The combination of labor cost advantages, increasingly efficient freight systems, and trade agreements fueled globalization by providing regional cost advantages for manufacturing. Over the last six decades, it transformed agricultural societies into industrial powerhouses.

July 1, 2016

Twenty-First Century Information Warfare and the Third Offset Strategy

It is well established that both state and nonstate adversaries are gaining parity with current U.S. military-technological capabilities, and as a result adversaries are eroding the tremendous asymmetrical conventional warfare advantages once exclusively enjoyed by U.S. forces. This leveling of the playing field has been enabled through decreased costs of modern information technology and low barriers of entry to attaining precision weapons; stealth capabilities; sophisticated commercial and military command and control (C2) capabilities; advanced intelligence, surveillance, and reconnaissance (ISR); and relatively cheap access to commercial and government-sponsored space and cyber capabilities. As a result, in November 2014, then–Secretary of Defense Chuck Hagel announced the Defense Innovation Initiative to counter adversary technical and tactical progress that, if left unchecked, will ultimately hinder U.S. ability to project power across the globe and permanently challenge its aims of retaining its coveted status as a global hegemon. While there are many aspects to this initiative, the Third Offset Strategy, as outlined in policy, does not adequately address the need for advanced information operations (IO), particularly IO wargaming, modeling and simulation (M&S), and training systems. The purpose of this article is to make the case that increasing the investment in joint live, virtual, and constructive (LVC) IO wargaming and simulations will generate lasting asymmetrical advantages for joint force commanders and will significantly contribute to the achievement of the Third Offset Strategy.

July 1, 2016

#SocialMediaMatters: Lessons Learned from Exercise Trident Juncture

Headquarters from the brigade to combatant command levels must understand how to establish credibility and gain popularity through social media if they are to effectively shape the information environment during modern military operations.

March 29, 2016

Cheap Technology Will Challenge U.S. Tactical Dominance

The convergence of dramatic improvements in the fields of robotics, artificial intelligence, materials, additive manufacturing, and nanoenergetics is dramatically changing the character of conflict in all domains. This convergence is creating a massive increase in capabilities available to increasingly smaller political entities—extending even to the individual. This new diffusion of power has major implications for the conduct of warfare, not the least of which are the major hazards or opportunities that it presents to medium and even small powers. The outcome will depend on the paths they choose.

Oct. 1, 2015

Strategic Development of Special Warfare in Cyberspace

How does the United States develop a strategic cyber-enabled special warfare capability? Why are regional powers such as Iran and Russia better prepared for cyber-enabled special warfare operations than the United States?

April 1, 2015

The Defense Innovation Initiative: The Importance of Capability Prototyping

The recently unveiled Defense Innovation Initiative aims to “pursue innovative ways to sustain and advance our military superiority for the 21st Century” by finding “new and creative ways to sustain, and in some areas expand, our advantages even as we deal with more limited resources.”

April 1, 2015

The Quantum Leap into Computing and Communication: A Chinese Perspective

For a few decades, nations have been relying on encryption systems to protect a wide variety of computerized transmissions ranging from commerce to government to military communications. While today’s encryption systems are considered reasonably secure, the possibilities of quantum cryptography and quantum computing offer a whole new dimension and threat to computerized secrecy.

April 1, 2015

Relying on the Kindness of Machines? The Security Threat of Artificial Agents

Modern technology is a daily part of our lives. It serves critical functions in defense, responding to natural disasters, and scientific research. Without technology, some of the most common human tasks would become laborious or, in many cases, impossible. Since we have become dependent on technology and its uses, and technology is becoming ever more capable, it is necessary that we consider the possibility of goal-driven, adaptive agents becoming an adversary instead of a tool.

April 1, 2015

Will Humans Matter in the Wars of 2030?

Much of the future-looking discussion in national security circles today focuses on autonomous systems and cyber weapons. Largely missing from this discussion is a place for humans on the battlefield. Do today’s emerging and potentially disruptive technologies mean that humans will no longer be important in future warfare? A look at historical military operations and current technologies suggests the proper response is that, to paraphrase Mark Twain, reports of man’s obsolescence have been exaggerated.

Dec. 30, 2014

Debunking Technical Competency as the Sole Source of Innovation

Academic and governmental organizations have sounded the alarm that the United States is rapidly losing technical competence, and this decline places the Nation at risk. A 1983 National Science Foundation (NSF) report stated, “If an unfriendly foreign power had attempted to impose on America the mediocre educational performance that exists today, we might well view it as an act of war.” In 1999, Congress chartered the U.S. Commission on National Security/21st Century (also known as the Hart-Rudman Commission) to provide the most comprehensive Government-sponsored review of U.S. national security in 50 years. The report highlighted a lack of U.S. technical competence as a national security threat second only to the threat of weapons of mass destruction in the hands of terrorists. This article attempts to answer the question: “Does improving technical competency enhance innovation?”

April 1, 2014

The Joint Force Commander’s Guide to Cyberspace Operations

Cyberspace can be leveraged by first, finding a theory to express and teach the constantly changing vagaries of that domain, including a suitable lexicon, and second, overcoming assorted turf wars and adequately resourcing the study, manning, equipping, and training of the cyberspace force so it can integrate with other domains.

April 1, 2014

Achieving Accountability in Cyberspace: Revolution or Evolution?

Cyberspace considerations are irreversibly proliferating, and five core ideas will help commanders fight a perpetual cyberwar: education and training, a clear chain of custody, explicit processes and procedures and guidance, advanced methods of controlling access to networks and information, and a formal cyberspace mishap investigation process throughout the Defense Department.

April 1, 2014

Information-Sharing with the Private Sector

The Obama administration’s Executive Order 13636 and Presidential Policy Directive 21 are a beginning, but establishing public-private information sharing requires matching cyber security legislation to fill in the gaps found in the 2003 National Strategy to Secure Cyberspace, address a multitude of contentious issues, and achieve a unified cyberspace focus.

Jan. 1, 2014

Biometric-Enabled Intelligence in Regional Command-East

Biometric-enabled Intelligence (BEI) has established its value throughout Regional Command–East even though the full potential of biometrics-related collections and applications remains unknown. Importantly, the concept has gained traction at the general government level as well as locally, where Afghan National Security Forces and allies and adversaries are seeing the forensic footprints insurgents leave behind being exploited to erase insurgent anonymity, which has served as a traditional hiding place. Arrests and warrants are up, and BEI operations have impacted insurgents' ability to lead their movement and lower-level cells' ability to function. The pressure grows as coalition and Afghan forces employ biometrically developed watch lists and "be on the lookout" messages as part of focused hunts for offenders.

Sept. 1, 2012

Toward the Printed World: Additive Manufacturing and Implications for National Security

Additive manufacturing (AM)—commonly referred to as “three-dimensional” or “3D” printing—is a prospective game changer with implications and opportunities that affect not just the Department of Defense (DOD) but the economy as a whole. The technology allows the “art to part” fabrication of complex objects from a computer model without part-specific tooling or human intervention.1 AM has already impacted a variety of industries and has the potential to present legal and economic issues with its strong economic and health-care benefits. Because of its remarkable ability to produce a wide variety of objects, AM also can have significant national security implications. The purpose of this paper is to provide a general introduction to these issues for nontechnical readers through a survey of the recent history and the current state of technology. Included in this paper is a brief review identifying key individuals and organizations shaping developments as well as projected trends.

Aug. 1, 2012

Preparing the Pipeline: The U.S. Cyber Workforce for the Future

In 2008, the Comprehensive National Cybersecurity Initiative listed “expanded cyber education” as one of its key recommendations. In 2009, the Partnership for Public Service produced a report stating that the current pipeline of cybersecurity workers into the government was inadequate. In the same year, Secretary of Defense Robert Gates stated that the military was “desperately short of people who have the capabilities [to operate in cyberspace].” And in 2011, the Inspector General of the Federal Bureau of Investigation reported that 35 percent of the special agents investigating national security cyber-intrusion cases lacked necessary training and technical skills. Nonetheless, the U.S. Government and private sector still seek to increase their online operations and dependency in spite of these shortcomings. An expert at the Atlantic Council of the United States sums up this problem: “cyber workforce management efforts resemble a Ferris wheel: the wheel turns on and on . . . we move, but around and around, never forward.”

Aug. 1, 2012

Trust, Engagement, and Technology Transfer: Underpinnings for U.S.-Brazil Defense Cooperation

On the eve of the January 1, 2011, inauguration of Brazilian President Dilma Rousseff, the State Department noted that the United States “is committed to deepening our relationship on a wide range of bilateral, regional and global issues with Brazil’s government and people.” President Rousseff herself declared shortly thereafter, “We will preserve and deepen the relationship with the United States.” During President Barack Obama’s March 2011 visit to Brazil, both leaders cited “the progress achieved on defense issues in 2010” and stated their commitment to “follow up on the established dialogue in this area, primarily on new opportunities for cooperation.” While these rhetorical commitments are important, will they lead to greater cooperation on defense issues and improve U.S.-Brazil ties?

Jan. 1, 2012

Sino-American Strategic Restraint in an Age of Vulnerability

For all their power, both the United States and China are increasingly vulnerable. Each faces a range of strategic dangers, from nuclear weapons to disruption of critical computer networks and space links.1 Because their relationship is at once interdependent and potentially adversarial, the United States and China are especially vulnerable to each other: interdependence exposes each to the other, while the potential for conflict impels each to improve strategic capabilities against which defenses can be futile. Strategic vulnerability cannot be eliminated, only mitigated.

Dec. 1, 2011

Deterrence and Escalation in Cross-domain Operations: Where Do Space and Cyberspace Fit?

Warfare has become even more complicated since Richard Smoke wrote this description of escalation in 1977. The National Security Space Strategy describes space as “congested, contested, and competitive,” yet satellites underpin U.S. military and economic power. Activity in cyberspace has permeated every facet of human activity, including U.S. military operations, yet the prospects for effective cyber defenses are bleak. Many other actors depend on continued access to these domains, but not nearly as much as the United States.

Feb. 1, 2011

Small Nuclear Reactors for Military Installations: Capabilities, Costs, and Technological Implications

In recent years, the U.S. Department of Defense (DOD) has become increasingly interested in the potential of small (less than 300 megawatts electric [MWe]) nuclear reactors for military use.1 DOD’s attention to small reactors stems mainly from two critical vulnerabilities it has identified in its infrastructure and operations: the dependence of U.S. military bases on the fragile civilian electrical grid, and the challenge of safely and reliably supplying energy to troops in forward operating locations. DOD has responded to these challenges with an array of initiatives on energy efficiency and renewable and alternative fuels. Unfortunately, even with massive investment and ingenuity, these initiatives will be insufficient to solve DOD’s reliance on the civilian grid or its need for convoys in forward areas. The purpose of this paper is to explore the prospects for addressing these critical vulnerabilities through small-scale nuclear plants.

July 1, 2005

The Changing Landscape of Defense Innovation

In a rapidly evolving business environment, many successful companies have transformed themselves by reexamining their core missions and competencies and exploiting innovation in nontraditional ways. General Electric still manufactures products but now identifies itself as a services company. Wal-Mart has become the premier retailer by capitalizing on its logistics and support systems. These two giants and other companies have realized that they can become more profitable by exploiting new regions of the business landscape.

July 1, 2004

Defense Laboratories and Military Capability: Headed for a BRACdown?

For 150 years, military laboratories have made vital contributions to national defense. In recent years, they have been significantly reduced in number by several rounds of base realignment and closure (BRAC). Even so, they remain the primary source of internal technical competence within the Department of Defense (DOD). Their capability in that role will depend on how DOD answers two questions. Is there excess laboratory capacity - too many laboratories relative to forecasts of future force structure? What is their military value - their likely contribution to the future operational needs of warfighters.

July 1, 2004

NATO Technology: from Gap to Divergence?

A widening technology gap between the United States and other NATO members will challenge the ability of NATO to function as a cohesive, multinational force. Over several decades, great disparities in the funding of defense research and technology by NATO members has produced a widening technological gap that threatens to become a divergence - a condition from which the Alliance may not be able to recover. The technology gap, in turn, is creating a capabilities gap that undercuts the operational effectiveness of NATO forces, including the new NATO Response Force.

April 1, 2004

The Science and Engineering Workforce and National Security

Trends in the American science and engineering (S&E) workforce and national research and development (R&D) funding patterns and priorities have troubling implications for the economic and national security of our nation.

Sept. 1, 2003

Technology, Transformation, and New Operational Concepts

Throughout history, technology has been central to warfare, often giving qualitative advantages to numerically inferior forces. Typically, the rate of technology development has been relatively slow and the introduction of new weapons systems even slower, which has allowed evolutionary development of operational concepts. Today’s accelerated pace of technology development no longer allows sequential development of operational concepts. In addition, the current global political environment has placed demands upon the military that range from engaging in major regional conflicts to stabilization, reconstruction and peacekeeping, all creating a continuous need for flexible, adaptive systems and new concepts of operation.

May 1, 2003

The Air Force: Science, Technology, and Transformation

A unique connectivity exists in the Air Force between science, technology, and transformation. From the defining moment of powered flight in 1903 to the creation of the Air Force as a separate service in 1947 to the present, these three elements have been continuously linked and undoubtedly will remain so.

March 1, 2003

Biology and the Battlefield

The military and the life sciences have been intertwined throughout history. Biology has often been a source of offensive weapons, ranging from the hurling of plague victims over the walls of Kaffa (which probably started the 14th-century Black Death) to the anthrax attacks of fall 2001.

March 1, 2003

NATO Defense Science and Technology

The accord establishing the North Atlantic Treaty Organization (NATO) in 1949 provided the framework for the greatest international mechanism ever in defense science and technology. From its earliest days, NATO involvement in science and technology has sought to build cooperation and promote security and stability. Today, the central element of the NATO defense science and technology program is the Research and Technology Organization (RTO), which provides the best basis for collaboration among the most technologically advanced countries in the world. Through this body, alliance nations plan and execute activities that cover the full spectrum of technologies vital to current and future security.

Jan. 1, 2003

The Silence of the Labs

Something important to the Nation’s defense has vanished, yet the top Pentagon brass never noticed. Not the stuff of headlines, this loss would not arouse public concern, especially during these times of terrorist massacres, anthrax attacks, corporate scandal, and war. Nevertheless, like the miner’s canary that is first to die with the rush of an ill wind, this loss is a warning.

Oct. 1, 2002

From Petro to Agro: Seeds of a New Economy

This paper describes the increasing importance of agriculture to defense, as a part of the Nation’s industrial base, offering the most economical way to produce large quantities of biological materials. It explains why agricultural fields will assume the same significance as oil fields.

Oct. 1, 2002

High-Energy Lasers: Technical, Operational, and Policy Issues

This paper considers the unique and promising attributes of high energy laser (HEL) weapon systems and examines the technical challenges, at both the system and component level, that need to be overcome for an HEL to be competitive against alternative weapon systems. The policy and operational challenges are also highlighted.