It’s Time for a Backup to GPS

Satellite bowl in Spain, courtesy of Jose Maria Cuellar/flickr

This article was originally published by the Atlantic Council on April 16, 2014.

If you’re not a space geek, you probably didn’t notice the total failure of the Russian satellite navigation system early this month. And if you’re not an electronic warfare geek, you probably didn’t notice those Russian satellite navigation jammers driving around Crimea either. Both, though, should be a reminder of just how much industry and the armed forces depend on navigation and timing from space, and what should be done about it.

What Does “Small Footprint” Really Mean?

Silhouette of two US Soldiers in Afghanistan, courtesy of isafmedia/flickr

This article was originally published by War on the Rocks on 13 March 2014.

There will be no more large-scale American counterinsurgency operations. At least, that’s what the Obama administration’s Defense Strategic Guidance (DSG) of 2012 anticipates. While it maintains an existing emphasis on countering irregular threats and conserving hard-won skill sets, the DSG articulates a desire to do so not through large-scale counterinsurgency, but by maintaining a persistent, forward presence around the world and leveraging that presence to deter potential adversaries, respond to crises, and build the capacity of partner nations to provide for their own security. Specifically regarding the latter, the document states,

Across the globe we will seek to be the security partner of choice, pursuing new partnerships with a growing number of nations – including those in
Africa and Latin America – whose interests and viewpoints are merging into a common vision of freedom, stability, and prosperity. Whenever possible, we will develop innovative, low-cost, and small-footprint approaches to achieve our security objectives… [Emphasis in the
original]

The “small-footprint approach” is a lynchpin of the DSG, and has led to a number of initiatives within the military services, such as the Marine Corps’ establishment of several Special Purpose Marine Air Ground Task Forces (SPMAGTFs) focused on Africa or the U.S. Army’s Regionally Aligned Brigades (RABs). Yet, the discussion of the implications of the emphasis on small footprint for U.S. foreign policy, and for the U.S. military, has only just begun.

Cloaks of Invisibility: The Latest Frontier in Military Technology

Japanese and US snipers during an exercise, courtesy of Marines/flickr

Fiction and reality have meshed to incredible extents in the past decades, and it is no longer a surprise to see sci-fi-inspired inventions used in everyday life. The military field has been no exception and is now at the cusp of groundbreaking innovations that could change war-making to its core.

The next frontier in defense technology is so-called “stealth” technologies, in which the U.S. military has already invested huge funds. New research is opening up the prospect of achieving something close to invisibility on the battlefield, a breakthrough likened to Harry Potter`s famous invisibility cloak. While most stealth technologies are designated to elude enemy radars, new invisibility technologies could conceal objects in real time, not just from radar but from the naked eye.

Review – Cybersecurity and Cyberwar

National Security Agency headquarters, Fort Meade, Maryland
National Security Agency headquarters in Fort Meade, Maryland. Photo: National Security Agency/Wikimedia Commons.

Cybersecurity and Cyberwar: What Everyone Needs to Know
By: P. W. Singer and Allan Friedman
New York: Oxford University Press, 2014

The year 2013 saw a number of headline news stories featuring a variety of different actors and sectors, but all with their roots in the same place: the cyber world. Edward Snowden disclosed a series of classified NSA documents detailing the United States’ global surveillance apparatus, including Internet surveillance programs like PRISM. The US federal government launched the website healthcare.gov to facilitate enrollment in health care exchanges, and an acting assistant secretary of Homeland Security testified before congress in November that the site experienced a series of attempted hacks. Conspirators who hacked into the systems of Nasdaq, Visa, and J.C. Penney and other major companies were subsequently charged in relation to a $45 million bank heist that involved stolen account information. A group supporting Syria’s Assad regime hacked the Associated Press’ Twitter account, tweeting (falsely) that President Obama had been injured in White House explosions. And a report released by the US government reported that China’s People’s Liberation Army had carried out cyber attacks on US corporations.

From Russia without Love: Russia Resumes Weapons Sales to China

Sukhoi Su-35S
Sukhoi Su-35S. Photo: Alex Beltyukov/Wikimedia Commons.

In March 2013, Russian and Chinese media reported that Beijing was acquiring significant quantities of advanced military equipment from Russia. Among the multi-billion dollar systems to be bought by the Chinese military are six Lada-class attack submarines and 35 SU-35 fighter jets. These acquisitions are significant because they are sophisticated systems and it has been more than a decade since China purchased any significant weapon systems from Moscow.

After making substantial purchases from Russia from the mid-1990s to the early-2000s, China began to reverse engineer weapons such as the SU-27 multirole fighter, the NORINCO T-90 tank, and several components of its most advanced conventionally powered submarines. Occasionally, China legally purchased licensing rights to Russian systems. Achieving self-reliance in military technology has long been a major priority of China s defense policy.