Listing 1 - 4 of 4 |
Sort by
|
Choose an application
The defense industrial base (DIB) is under attack. Foreign actors are stealing large amounts of sensitive data, trade secrets, and intellectual property every day from DIB firms — contributing to the erosion of the DIB and potentially harming U.S. military capabilities and future U.S. military operations. The U.S. Department of Defense (DoD) has taken steps to better secure systems against cyber threats, but most protections in place focus on classified networks, while unclassified networks have become an attractive entrance for adversaries seeking access to cutting-edge technologies and research and development efforts. To address this problem, DoD has increased regulations and introduced new security controls, but the current approach may be insufficient. This report offers DoD a way ahead to better secure unclassified networks housing defense information — through the establishment and implementation of a cybersecurity program designed to strengthen the protections of these networks. The program offers a means for DoD to better monitor the real-time health of the DIB and ensure that protections are in place to prevent the disclosure of sensitive corporate information from DIB firms or sensitive supply chain information across the DIB. The program also includes a means to offer qualified small DIB firms access to cybersecurity tools for use on unclassified networks, for free or at a discounted rate, to ensure that affordable protections are accessible to all DIB firms. Advanced persistent threats and sophisticated cyber attacks will not stop, but this program can help build stronger defenses, develop more-coordinated responses, and help maintain the technological superiority of U.S. military forces.
Choose an application
The U.S. Department of Defense (DoD) seeks to advance the ability of its software acquisition workforce to rapidly and reliably deliver complex software-dependent capabilities through an enhanced understanding of technical competencies, improvements to education and training, and guidance for workforce management and assessment. Focusing on three primary acquisition career fields—information technology, engineering, and program management—the authors review existing competency models used by DoD and commercial industry, along with industry trends and modern software practices, and gather feedback from stakeholders and subject-matter experts to develop a model consisting of 48 competencies organized by topic: problem identification, solution identification, development planning, transition and sustainment planning, system architecture design, software construction management, software program management, mission assurance, and professional competencies. They also review existing courses offered by the Defense Acquisition University, other DoD institutions, and private and public universities to determine whether and to what extent the courses offer software training and education that corresponds with these competencies, and to identify ways to address potential gaps. Although there is no currently accepted government job title or occupational series for software professionals, and although the competency model thus affords limited utility for assessing current workforce capability, the authors present options for tracking and managing the software acquisition workforce, as well as further steps toward validating the competency model.
Choose an application
Hurricanes Irma and Maria in Puerto Rico and the U.S. Virgin Islands (USVI) in September 2017 sparked a whole-of-government response involving local, state, federal, civilian, and military responders. From late September through mid-November 2017, U.S. Army North (USARNORTH) was the joint force land component commander for Department of Defense (DoD) support to civilian disaster-response operations in the wake of the two hurricanes. USARNORTH directed RAND Arroyo Center to answer a series of questions about that support, ranging from how well the DoD response fit with the National Response Framework (NRF), doctrine, authorities, and templates to relationships among responding organizations to possible improvements in such things as speed of response and situational awareness (SA). While it is reasonably unlikely that both local and state response capabilities would simultaneously be incapacitated in future such incidents, Puerto Rico and USVI would still be relatively isolated, and a complex catastrophe could again present many of the same challenges. A strategic concept for defense support of civil authorities (DSCA) needs to center on policy decisions on the number, types, and sizes of overlapping incidents that will serve as pacing functions for determining future response capabilities and who will provide them.
Choose an application
China's leaders' quest to achieve an artificial intelligence (AI) capability to perform a variety of civilian and military functions starts with mastering big data analytics — the use of computers to make sense of large data sets. The research conducted by the authors of this report indicates that China is aggressively working toward becoming a global leader in big data analytics as part of its plan to achieve great power status; indeed, President Xi Jinping has articulated that China should become the global center for AI by 2030. Beijing's efforts are guided by a national big data strategy, an effort that encompasses economic, military, police, and intelligence functions. The authors find that Beijing is already using big data analytics to survey the country's domestic population and enhance its military capabilities. Improvements in big data analytics have supported Beijing's monitoring and control of its citizens — including ethnic minorities.
Big data --- Government policy --- China.
Listing 1 - 4 of 4 |
Sort by
|