In a world where data is often compromised, stolen, and used against its owner, the demand for a higher level of security can mean adhering to consistent standards and tight protocols, even with the smallest of details or the stuff that we often take for granted. The Chinese theft incident of F-35 data has shown us that we need to keep cybersecurity in place so that it works right when it matters. We have to make sure to have the means to protect ourselves. Just how important is the Cybersecurity Maturity Model Certification (CMMC) Policy program and how does it protect us from being vulnerable to data theft?
Month: February 2021
In a few years, the US and its allies will have developed a solid foundation for AI readiness through the recently inaugurated Partnership for Defense, formed through the Joint Artificial Intelligence Center. The coalition aims to focus on preparing allied militaries to be “AI-ready,” with an end goal for all the allied nations to be data-ready and easily coordinated on AI-driven projects in the future.
An emerging cadre of cyber warriors for the military’s newest service, The Space Force, will have begun shifting over from the Air Force at the beginning of February. These cyber professional forces primary directive is to defend installations, such as ground terminals, space assets, including satellites, enact missions that will help to protect the critical domain from any possible threat. The cyber warriors will be organic personnel from the Air Force and transferred to the US Space Force and will serve to align with the Air Force’s cyber squadron initiative to build the Space Force’s version of mission defense teams.
The Army is developing a tool to monitor electromagnetic spectrum emissions to help prevent adversaries from geolocating teams in the field. Listening to sound advice from spectrum managers who have clamored for a program-of-record spectrum analyzer to improve situational awareness. Proposing to develop an integration with the Electronic Warfare Planning and Management Tool, a command-and-control capability that allows forces to visualize the potential effects of electronic warfare. How this integration of the two tools will provide a better operational picture of any invisible terrain in near real-time is in this report from C4ISRNET.
Last year, unmanned platforms paved the way for easy attacks on vulnerable troops and efficiently neutralized ground-based systems designed to counter such attacks. Beyond the shadow of a doubt, the balance of power between drones and air defense systems is now shaping up to play a key role in future global wars.