Military brass urges overseas info tech spending increase

A larger investment in communications and information technology is crucial to the military's ability to combat terrorism overseas, according to regional combat commanders who testified before the Senate Armed Services Committee on Tuesday.

"We need increased [communications and computer systems] funding to maintain the operational edge over our adversaries," said Adm. Dennis Blair, commander in chief of the U.S. Pacific Fleet and leader of the military's effort to help the Philippine army combat terrorism more effectively.

Blair said in written testimony that the military's information infrastructure--commonly known as command, control, communications and computer systems, or C4--is the "unsung workhorse of any military operation," and he stressed the need for interoperability among systems.

"As evidenced by the world's recent response to recent terrorist events, the need for information sharing between service, joint and coalition partners, as well as local, state and federal organizations, has increased exponentially," Blair said. "This requirement places a strain on an already antiquated and stressed communications network."

Blair said that in regions such as the Philippines, for example, U.S. military systems are not interoperable with the mobile radio systems used by local police and fire officials. "These incompatibilities prevent key personnel from sharing critical information in a timely fashion and could easily lead to catastrophic results," he said.

But he cautioned that a failure to protect highly sensitive information from unauthorized users could yield equally catastrophic results.

"How we protect our sensitive information from potential adversaries while ... sharing it with our coalition partners is probably the toughest challenge we face in today's C4 environment," Blair said, noting that Pacific Command networks are threatened by viruses and hacker attacks on a daily basis. "Although we have made significant strides to improve [information assurance] in [the Pacific Command], we are far from 100 percent protected. Cyber warfare never rests."

Blair said the Pacific Command needs a "heavy investment" to modernize its antiquated cryptography. "Replacement parts for this aging equipment are difficult to obtain--a limiting factor as technology increases the speed, connectivity and capacity of our networks," he said.

Many of the Pacific Command's other basic infrastructure elements also are antiquated, such as wires and cables installed as far back as the 1960s. "These cables are no longer dependable," Blair said, adding that the ever-increasing need for more real-time information requires the Pacific Command to quickly upgrade its systems to support increasing bandwidth and speed requirements of intelligence gatherers, combat planners and war-fighters.

Military troops helping to keep the peace in Korea are facing similar challenges, according to Gen. Thomas Schwartz, who serves as commander in chief of that region.

"In the past, unfunded [C4] requirements have had a significant impact on our ability to maintain an adequate infrastructure needed to support the increased bandwidth, network redundancy and the modern decision and collaboration tools required by my unit commanders," Schwartz said, adding that local military units have had to divert money from other operations' accounts to maintain adequate technological capabilities.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    View
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    View
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    View
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    View
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    View
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    View
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    View

When you download a report, your information may be shared with the underwriters of that document.