Networking In Military

Explore top LinkedIn content from expert professionals.

  • View profile for Jessica L. Wagner

    Museum Director of Education and Public Engagement | Heritage and Preservation Officer (38G/6V) | Board of Directors, Sudan Heritage Preservation Council | Cultural Property Protection Researcher

    3,842 followers

    Currently thinking through social network theory and the strategic value of the U.S. Army Civil Affairs and Psychological Operations Command 38G program... Beyond individual expertise, the distinct value of U.S. Army Civil Affairs 38G Program can be best understood through social capital theory, which holds that trust-based relationships and professional networks function as real, mobilizable resources in moments of uncertainty and crisis (Bourdieu 1986; Putnam 2000). In wartime or rapid-onset emergencies, information, legitimacy, and cooperation move fastest through pre-existing, trusted networks, not formal bureaucratic channels. Embedded 38G officers convert social and professional capital into operational advantage by acting as brokers between military command structures and high-level civilian sectors across academia, industry, NGOs, and international institutions. Drawing on Mark Granovetter’s concept of the “strength of weak ties,” 38Gs enable commanders to rapidly access specialized knowledge and external capacity that would otherwise be unreachable or too slow to mobilize (Granovetter 1973). In this sense, the program enhances warfighting not merely by embedding expertise, but by embedding trust networks, expanding the Army’s reach, legitimacy, and freedom of maneuver at the speed modern conflict demands (FM 3-57; ADP 6-0). This isn’t a distraction from lethality. It is how commanders reduce strategic risk and win when firepower alone is not decisive. Image Credit: New York, N.Y. – Cultural Property Protection training at the Metropolitan Art Museum, June 3, 2023. (U.S. Army photo By Sgt 1st Class Gregory Williams/Released)

  • View profile for Kevin Sampels

    SVP of Operations, Systecon North America; Host, The Logistics Lens Podcast; Founder, Trusted Source Consulting; Chair, NDIA Logistics Division; Board Member, Institute for Defense and Business (IDB)

    16,775 followers

    I was on a one-day layover in San Francisco this past Saturday...on my way to a much-anticipated holiday...when a massive power outage in the city provided a real-world reminder about tech dependency—an effect that can hit home hard in our world of #logistics. While I was out sight-seeing, over 130,000 homes and businesses lost power. I also saw a number of autonomous Waymo vehicles stalled in the streets because traffic signals had failed due to the power outage. Ironically, in a city famous for leading-edge tech, the outage underscored a blunt truth: even our most advanced systems rest on a solid power and infrastructure backbone. For defense logistics, this scenario isn’t just an abstract risk. Our global supply chains rely on a web of sensors, autonomous platforms, satellites, automated warehouses, and real-time data links. When the power fails, communications, tracking, autonomous transport and other critical capabilities can falter. In the world of logistics this could easily lead to missed troop movements, delayed supply deliveries, and overdue maintenance actions...all negatively affecting operatational availability. The outage clearly illuminated how electricity and resilient networks are the quiet enablers of battlefield-ready logistics—without them, even the best AI-driven optimization can stall. That said, this experience also strengthened the case for leveraging advanced tech in defense. Autonomy and AI can greatly enhance safety, efficiency, and reach in difficult environments. And real-time routing, predictive maintenance, and automated warehousing can reduce response times and increase resilience under pressure. But the crucial caveat to all of this...we must not rely on a single system. If essential infrastructure—power, cyber, or comms—gets disrupted, automated logistics can become a bottleneck. No complex military logistics network is immune to disruption, and overreliance on automation can create new vulnerabilities. Key takeaways for me then... - Diversify and harden dependencies: maintain robust human-in-the-loop controls, fallback procedures, and manual override capabilities where feasible. - Strengthen critical infrastructure: prioritize resilient power, secure communications, and cybersecurity across depots, terminals, and mobility platforms. - Ensure clear crisis protocols: rapid, actionable guidance for operators and commanders when automated systems operate in degraded modes. - Measure true resilience: go beyond uptime to assess recovery speed, degraded-operation performance, and mission continuity under adverse conditions. As we push toward more capable autonomous systems, we must pair them with sturdy infrastructure, rigorous testing, and layered redundancy. The goal should be innovation that enhances speed and accuracy without becoming brittle when the unexpected happens. In defense logistics, progress hinges on reliability as much as ingenuity—so we can keep supplies moving, even when the power go out.

  • View profile for Luca Leone

    CEO, Co-Founder & NED

    35,719 followers

    Westminster scrutiny of the MoD’s three-year direct award to Palantir Technologies signals a broader shift: politics has woken up to the reality that access to, and control of, defence data will be decisive in future conflict. In the Lords, peers questioned the December 2025 single-source award, raising concerns over value for money, sovereign capability and long-term reliance on a US supplier for AI-enabled defence data systems. Ministers defended the move, citing a transparency notice and the operational case for continuity, stressing that UK defence data “resides in the United Kingdom” under MoD control. The enterprise agreement reportedly includes a £1.5 billion commitment to grow British business through SME support and skills investment, but the central issue in debate was not funding — it was who controls the architecture through which data is structured, accessed and exploited. As AI-driven targeting, logistics optimisation and operational planning become standard, the platform layer that organises defence data becomes as strategically significant as the weapons it supports. The political focus is shifting accordingly: data sovereignty, proprietary control and system dependency are no longer technical procurement details — they are core elements of national power in the 2030s battlespace. #defence #AI #datagovernance #procurement #nationalsecurity

  • View profile for Luca Callegari

    Managing Director Google Cloud DACH

    8,591 followers

    NATO's move to Google Cloud isn't just another tech deal – it's a strategic shift in how military alliances approach digital sovereignty 🔐 Google just secured a multimillion-dollar contract to build completely air-gapped, sovereign cloud systems for NATO's Joint Analysis, Training, and Education Centre. This means fully disconnected environments with absolute data residency and operational control. 🔸 Zero compromise on data sovereignty – complete autonomy regardless of scale 🔸 Air-gapped infrastructure for maximum security in training and operations 🔸 Part of NATO's broader multi-cloud strategy (AWS and Microsoft are also in the mix) This reflects a larger trend: 61% of European CIOs want to increase local cloud usage amid geopolitical uncertainty. When military alliances prioritize sovereign cloud capabilities, it signals where the future of critical infrastructure is heading. The question isn't whether organizations will adopt sovereign cloud solutions – it's how quickly they can implement them without compromising operational efficiency. More on The Register: https://ow.ly/3hNT50XzWpI

  • View profile for Christian Erras

    Quality System engineer at Harman Automotive Werk Straubing

    3,039 followers

    Basics: Quantum Technologies for Cyber Defence Quantum computing challenges long-standing assumptions about secure communications and critical infrastructure, as current encryption methods may become vulnerable once quantum computers reach advanced capabilities Realizing this potential requires deeper exploration and collaboration  across military, academic, and industrial domains This book invites readers to explore the emerging opportunities and strategic significance of quantum technologies in the context of cybersecurity It brings together the latest trends and insights into the evolution of quantum computing  and quantum communication, offering valuable guidance While the path forward remains uncertain, this moment is pivotal By expanding our understanding of quantum technologies,  we can position ourselves to lead with foresight rather than react in this transformative era of digital defense 🔵 Military Cybersecurity Threats 🔷 Decryption of Sensitive Data:  Quantum algorithms could break current asymmetric encryption protocols, exposing classified intelligence, communications, and logistical data 🔷 "Store Now, Decrypt Later" Attacks:  Adversaries are likely harvesting encrypted data today, waiting for mature quantum computers to unlock it 🔷 Critical Infrastructure Risk:  Quantum-enabled attacks could disrupt military communication networks, navigation systems (GPS), and weapon control systems ⚪ Future Outlook and Key Areas of Impact ◻️ Cryptographic Threats and Security:  Quantum computers will eventually break current public key cryptography.  This drives an urgent shift toward "post-quantum" encryption to protect secure communications and sensitive data ◻️ Next-Generation Sensing:  Quantum sensors will enable navigation in GPS-denied environments and detect hidden threats, including submarine detection through quantum gravitational sensors ◻️ Logistics and Optimization:  Quantum systems will optimize complex military supply chains, personnel deployment, and logistical support, enhancing overall operational efficiency ◻️ Artificial Intelligence and Information Warfare:  Quantum-enhanced AI will analyze vast data sets to identify adversarial disinformation and influence operations,  helping to secure the cognitive domain of warfare ◻️ Battlefield Imaging and Detection:  Quantum imaging and radar will allow detection of objects through camouflage or atmospheric obscurants e.g "Fighting in the Light" As quantum sensors detect stealth aircraft and submarines, militaries will need to adapt to being visible in previously secure areas ◻️ Investment Surge:  The quantum warfare market is projected to grow significantly by 2035, with major efforts focused on quantum processors and secure networks ◻️ National Security Focus:  Top powers (US, China, UK) are investing heavily to avoid a "quantum divide," aiming for superiority in AI-driven target identification and autonomous weapon systems ...

  • One of the most overlooked and underestimated "verticals" for #5G and future #6G is defence. It doesn't fit neatly into the usual calculations and planning of MNOs, and also doesn't really suit the usual consultants' jargon around "business case" or B2B services. Metrics such as enterprise ROI or GDP contribution don't fit either. Increasingly, this is a critical area when it comes to policy angles on wireless, especially around spectrum management. It also has a strong impact on considerations such as cybersecurity, vendor diversity, sovereign capabilities and the design and priorities for 6G. Last week's #5GTechritory in Riga had a heavy focus on the needs of armed forces - made more urgent by the proximity of the Baltic nations to Russia, which both poses a military threat and also highlights other wireless challenges in its jamming / spoofing of GPS signals. I met with Ukrainian representatives who strongly pointed to the need for spectrum flexibility because of the impact of electronic warfare. There have been other interventions at recent spectrum conferences by the US United States Department of Defense, UK UK Ministry of Defence, NATO and other organisations. I've written a couple of articles [links in comments] that cover #spectrumsharing issues and #defence (or #defense in US-speak). Both note the wider trend of more demand for future spectrum than supply, and the specific requirements of the military. As well as traditional communications and sensing (radar) there are ever more needs for wireless communications for drones, battlefield systems, training, video analytics, space systems, soldiers and support staff. For obvious reasons, the military cannot rely on public networks, even if it exploits 5G / 6G technology in its own systems. The first article is for RealClearDefense, with an emphasis on the US. It covers successful sharing in #CBRS spectrum and the current focus on options for the lower 3GHz band. The second article is a guest blog for sensing company CRFS, which looks more broadly at the need for sophisticated sharing models, and highlights the willingness of the military to share spectrum bands, as long as it retains pre-emption rights. As well as CBRS in the US, the UK is also pursuing similar models in bands such as 2.3GHz. As usual, the commercial cellular industry is asking for bands to be cleared and then auctioned for nationwide exclusive use for public 5G / 6G. Yet we know traffic demand growth is both slowing and highly localised. The MNOs' industry bodies and lobbyists keep citing aggregate national-level data, rather than illustrating existing spectrum usage, and evidence of where future demand is concentrated. In my view, spectrum sharing is increasingly essential - partly for the reasons I've often cited about enterprise #privatenetworks, but also for reasons of national and global security. MNOs should get marching - they cannot be "conscientious objectors" on this issue.

  • View profile for Gal Hana

    CEO | Defence and HLS | Communication | Medical and Emergency Response |》MA | MBA

    5,324 followers

    In today’s defense ecosystem, everyone’s talking about loitering munitions, swarm drones, and autonomous platforms. These are the visible tools of modern warfare—fast-moving, high-tech, headline-worthy. But the real enabler? Communication. While the drones fly and systems engage, tactical communications—the ability to transmit and receive secure, uninterrupted data and voice across all domains—is what keeps the mission coherent, the units coordinated, and the commanders informed. From my own experience in the field, I can tell you this: no action starts without a green light, and no green light comes without reliable comms. Let’s break down the real-world challenges: 1. GPS-Denied Environments Near-peer conflicts have made GNSS jamming and spoofing commonplace. Without robust fallback systems, even the best positioning or timing systems are blind. HF solutions—properly engineered—offer a resilient, SATCOM-independent layer that operates across thousands of kilometers, providing reliable time, position, and messaging continuity. 2. Urban and Cluttered Terrain In dense cities or mountainous regions, line-of-sight VHF or SATCOM is degraded. Here, self-healing MANET networks shine—especially those built for mobility, multi-hop, and dynamic topologies. Systems like those integrated by Wavestorm (including Creomagic’s advanced mesh nodes) adapt in real time, maintaining secure connectivity without fixed infrastructure. 3. High Throughput Demands for ISR and Video Today’s commanders demand real-time ISR feeds from unmanned platforms—often over extended distances. Traditional narrowband radios can’t keep up. High-bandwidth MANET radios, capable of pushing HD video with low latency, are becoming essential—not just nice-to-have. 4. Contested Spectrum and EW Threats Jammers and intercept tools are evolving fast. Communications gear must now incorporate frequency agility, cognitive routing, LPI/LPD modes, and encryption—not as upgrades, but as base requirements. 5. Disconnected, Disrupted, Intermittent, and Limited (D-DIL) Conditions Humanitarian missions, SOF teams, Arctic patrols—many operations begin where infrastructure ends. HF, VHF, and MANET each serve a role in these D-DIL scenarios. The trick is not picking one, but integrating all—multi-layered, interoperable comms that adjust to the environment in real time. Wavestorm Technologies specialize in these multi-domain communication layers: -HF radio systems for long-range redundancy -VHF solutions for tactical ground and vehicular mobility -Advanced MANET networks for ISR, C2, and mission-critical data flow *All platforms are MIL-STD-certified, hot-zone validated, and optimized for mission continuity under stress. This is not about radios. It’s about delivering information when it matters most. #TacticalComms #MANET #HF #VHF #MilitaryInnovation #EWResilience #DefenseTech #C2Systems #ISR #WavestormTechnologies Canadian Armed Forces | Forces armées canadiennes US Army

  • Modern conflict increasingly turns not on attrition or manoeuvre alone, but on the disruption or denial of decision-making processes. In this context, the UK’s Digital Targeting Web (DTW) will become the UK's strategic centre of gravity. If an adversary can distort the data it ingests, interfere with its logic, or break the trust in its outputs, the systemic impact is severe: paralysis of effects delivery, hesitation in command, and erosion of political will. In this context, the UK’s technological advantage will only translate into operational advantage if it dominates the algorithmic and CEMA deception battlespace. In this fight, trust must be engineered, deception must be deliberate, and resilience must be automated. Success will belong to the side that can protect its own decision cycles while disrupting those of the adversary.

  • View profile for Tony Grayson

    Vice Admiral James Bond Stockdale Award for Inspirational Leadership | Infrastructure Executive | AI, Cloud, Data Centers & Power | Retired Nuclear Submarine Commander | ex-Oracle SVP, AWS, Meta

    56,443 followers

    NATO recently sounded the alarm over Russia's potential to disrupt Western infrastructure, particularly undersea internet cables and GPS systems. The article highlights that over 95% of international communications rely on these cables, meaning any disruption could have catastrophic consequences for military and civilian operations. To counter these threats, disaggregated operations provide a tactical solution that ensures resilience and operational continuity. This approach decentralizes critical military functions, enabling units to operate independently while maintaining horizontal communication with other units. Some specifics: We distribute C2 functions across mobile platforms, such as vehicles or portable containers, to avoid disruptions. These mobile units are designed for quick deployment, adaptability, and autonomous operation. We rely on SD-WAN (Software-Defined Wide Area Networking) to maintain communication between these mobile C2 units. By leveraging SD-WAN, we use multiple communication paths and dynamically route data to ensure secure and resilient connectivity, even when traditional networks fail. We deploy microservices across multiple nodes instead of relying on centralized servers. This decentralized approach enhances system resilience, ensuring critical services stay operational even under attack. We position compute nodes closer to the front lines to enhance resilience and reduce latency. These edge nodes process data locally, enabling faster decision-making and action. Coupled with SD-WAN, we ensure efficient data processing and communication, even in disconnected environments. We implement mesh networks, supported by SD-WAN, to provide a flexible and robust alternative when traditional hierarchical communication fails. This allows units to communicate directly with each other, maintaining operational coherence even when cut off from higher headquarters. As operations grow more complex, we ensure seamless communication between different units and allied forces. SD-WAN manages diverse communication channels, keeping these networks interoperable and effective across various platforms and nationalities. Inspired by HIMARS's "shoot and scoot" tactics, we design mobile C2, compute, and network nodes for high mobility and quick redeployment. This mobility allows us to avoid detection and targeting by adversaries while continually adapting to the battlefield's dynamic nature. We combine the mobility of these units with SD-WAN’s ability to maintain communication, enabling dynamic operations. This allows us to relocate quickly and re-establish connections to stay ahead of the enemy. We implement radium-based internal timing systems in environments where GPS is jammed or unreliable. These systems provide precise timing independent of external GPS signals, ensuring that operations can continue seamlessly despite attempts to disrupt navigation and synchronization. What do you think? #SDWAN #threat

Explore categories