• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2022

NEWS IN BRIEF – USA

December 3, 2016 by

02 Dec 16. While initiatives such as the “third offset strategy” — despite seemingly being couched in so-called great power competition and developing tools for overmatch and offense — are actually aimed at ensuring conventional deterrence and peace, there is recognition that these capabilities are necessary to procure and operationalize in case a conflict ensues with another near-peer competitor.
However, a fight in a highly contested environment, which differs from the permissive counterinsurgency environments in which U.S. forces have fought for 15 years, is inevitable. “This future fight — and this is where I’ll say this is my opinion — a future fight that is inevitable, non-permissive operations in high-end contested and degraded operational environment — to me this is not a matter of if but when and we’re not as well prepared for it as we would like to be, which is why the [future] budget does put a lot of emphasis on those high-end technologies,” Lt. Gen. Jack Shanahan, director for defense intelligence (warfighter support) at the Office of the Under Secretary of Defense for Intelligence, said Thursday at a breakfast hosted by the National Defense Industrial Association.
Shanahan provided a short list of priorities being pursued to get after this issue. The first is greater airborne intelligence, surveillance and reconnaissance capability, both manned and unmanned. This unmanned component, he said, is across all the services, “it’s no longer just an Air Force [thing], the Army and the Navy are getting big into the unmanned ISR.”
Shanahan also noted unmanned undersea capabilities for the Navy, which he described as a big growth area. Space capabilities is another priority area for the department, which involves persistence, resiliency and broad area coverage.
“The resiliency discussion is a very important one,” he said. Space is becoming a highly contested domain of warfare and the ability to perform uninterrupted, even when assets are targeted will be critical, he added.

Shanahan also pointed to the growth of cyber capabilities — security, offensive and defensive — and the need for a more robust cyber intelligence workforce.
“There is a serious shortfall in the number of cyber intelligence professionals out there,” he said. “The on-net operations turns out to be a little bit easier than all the other intelligence that goes into finding out how do you get on that network, what do you do on that network, what do you take off that network … so cyber intel remains an area where we have a lot of focus on.”
He pointed to Secretary of Defense Ash Carter’s desire for greater Title 10, or military, cyber capabilities in recent years, a capability that has traditionally been shielded in the shadows of intelligence or Title 50 operations. It “has just been pretty fascinating to watch this play out in counter-ISIL operations and where that line is between Title 10 military cyber operations and foreign intelligence collection. I think Secretary Carter, you’ve seen, has been very forceful in pushing for more Title 10 cyber operations,” Shanahan said, using a common acronym for the Islamic State group (also known as ISIS) and referencing the cyber operations with which Carter has tasked as part of Operation Inherent Resolve, the global anti-ISIS coalition.
The importance of cyber as a war fighting capability has been exemplified by the standing up of CYBERCOM, increasing cyber budgets and even the recently released language in the National Defense Authorization Act elevating CYBERCOM — currently a sub-unified combatant command under Strategic Command — to a unified combatant command.
While the first open “cyberwar” is being executed against non-state actors — one that many, including CYBERCOM Commander Adm. Michael Rogers, has described as “the most adaptive target I’ve ever worked in 35 years as an intelligence professional” — cyber will continue to be a growing resource for commanders, especially against nation-s

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • InVeris
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • DSEi
  • Atkins
  • IEE
  • EXFOR logo
  • KME logo
Hilux DVD2022 GlobalMilSat

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    July 1, 2022
    Read more
  • VETERANS UPDATE

    July 1, 2022
    Read more
  • MANAGEMENT ON THE MOVE

    July 1, 2022
    Read more

Copyright BATTLESPACE Publications © 2002–2022.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT