Similar Articles |
|
National Defense December 2015 Lloyd McCoy Jr. |
Defense Department Plays Key Role in Industrial Base Oversight The Defense Department and other federal agencies have been directed to identify and protect critical infrastructure sectors specific to their mission. |
InternetNews November 29, 2007 |
World Faces 'Cyber Cold War' Threat Cybercrime is no longer just a threat to industry and individuals but increasingly to national security. |
National Defense January 2016 Sid Ashworth |
Turning Point Coming for National Security The national security landscape has seen significant change over the past five years. The number of deployed forces declined by more than 60 percent from 2011 to the start of 2016, and the Budget Control Act of 2011 ushered in a period of uncertainty. |
National Defense May 2015 Sandra I. Erwin |
Procurement Issues That Congress Won't Fix The new foreign policy mantra in Washington is that the world is on fire. The nation's weapons procurement machine, meanwhile, keeps partying like it's 1999. |
Military & Aerospace Electronics April 2005 John Keller |
Balancing national security and freedom of commerce Should U.S. technology developers sell their products to whomever they want, or should the government step in and strengthen technology export controls in what some consider a futile effort to keep important technology away from terrorists? |
Salon.com April 26, 2001 Fiona Morgan |
Does the U.S. spy too much? In the wake of the spy plane flap with China, experts propose international rules of order that would limit excessive espionage... |
National Defense April 2007 Stew Magnuson |
Congress Ponders Action After Chinese Anti-Sat Test After the Chinese demonstrated their ability to destroy enemy spacecraft, analysts say U.S. reliance on satellites and make them a weak link in our defenses. |
National Defense October 2015 Sandra I. Erwin |
National Security Tests for the Next President Republican presidential candidates have blasted the Obama White House for its handling of foreign crises and for weakening the military. But few, if any, potential nominees have put forth any concrete policy prescriptions. |
Parameters Spring 2005 |
Review Essay Is there a Chinese Way of War?... Political Success Trumps Operational Victory... Use Force Sparingly; Repeat as Often as Needed... etc. |
BusinessWeek February 21, 2005 John Rossant |
An Arms Cornucopia For China? Europe will probably lift its embargo in spite of objections by the U.S., but companies will be careful what they sell. |
National Defense April 2008 Nate Hughes |
Promising Future For China's Aerospace Industry China's plans to create a new civil aviation company in the first quarter of 2008 could signify much more than prospective competition in the regional jetliner class. |
Popular Mechanics May 30, 2008 Glenn Reynolds |
Is China's Space Program Armed for Apollo 2.0? Live @ ISDC 2008 China's out-of-this-world interests are nothing new as they're currently on their eleventh five-year plan. What's even clearer is that the Chinese have ambitious future plans for space. |
Military & Aerospace Electronics December 2006 John Keller |
Election Aftermath: What's in it for the Military? One potential target of the new Congress is the large supplemental spending budgets that fund military operations in Iraq and Afghanistan. |
National Defense October 2007 Sandra I. Erwin |
Why Is Congress Launching Yet Another Roles-and-Missions Probe? Congress may have the power of the purse, but it has been largely powerless in just about every attempt to influence the course of the war in Iraq and to substantially reshape military spending priorities. |
Salon.com April 4, 2001 |
Spy plane showdown Can the hardline Bush administration use diplomacy to prevent a crisis with China? Experts weigh in... |
Military & Aerospace Electronics April 2007 John Keller |
U.S. Military Stretched Thin at Just the Wrong Time Pressure is mounting from all sides to reduce spending for sophisticated U.S. military equipment and weapons, and it's coming at the wrong time. |
Popular Mechanics February 9, 2009 Glenn Reynolds |
Can Obama Ban Space Weapons Successfully? Soon after President Obama took office, the White House Web site stated that the administration would seek a worldwide ban on weapons interfering with military and commercial satellites. |
Salon.com March 13, 2002 Robert Scheer |
When in doubt, nuke 'em The Pentagon's secret plan to fight terror with nuclear weapons shows just how dangerous this administration is... |
National Defense December 2010 Tom Captain |
Defense Affordability: Can We Buy Only What We Need? Military acquisition budgets globally are flattening out and declining. Large scale multi-billion dollar programs are running over budget and being delayed. |
InternetNews September 18, 2009 |
Do You Need to Fear Being Hacked From China? The U.S. government says China is capable of stealing your secrets - and may successfully do so, unless you take precautions. |
Military & Aerospace Electronics August 2007 John Keller |
Taking the Pulse of Defense Spending As the war in Iraq has become a political sore spot, we can expect the Pentagon's leaders to hunker down to the status quo on military spending at least through the presidential election in November |
Fast Company Pavithra Mohan |
Obama Administration Proposes Sanctions In Retaliation For Chinese Cyberhacks In an effort to curb cyberhacking, the White House is currently developing economic sanctions that would impede the operations of Chinese companies in the U.S., the Washington Post reports. |
National Defense July 2014 Yasmin Tadjdeh |
New Chinese Threats to U.S. Space Systems Worry Officials If China continues to make strides and develops weapons that reach farther, it could one day threaten key satellites in geosynchronous orbit. |
National Defense November 2012 Erwin et al. |
Top Five Threats to National Security in the Coming Decade The next wave of national security threats might be more than the technology community can handle. They are complex, multidimensional problems against which no degree of U.S. technical superiority in stealth, fifth-generation air warfare or night-vision is likely to suffice. |
National Defense May 2005 Roxana Tiron |
Vying for Defense Dollars China not only is producing a wide array of weapons systems for its own forces, but also is exporting versions of its military hardware to other nations under the wary eye of the United States. |
BusinessWeek August 9, 2004 Stan Crock |
Taiwan: Uncle Sam Wants You To Buy Arms The complex diplomatic dance involving Washington, Taipei, and Beijing gets trickier by the day. The tension will rise this fall when Taiwan's legislature votes on arms-purchase legislation. |
Wired August 23, 2007 Ralph Peters |
Washington Ignores Cyberattack Threats, Putting Us All at Peril 21st-century-warfare will be to deny entire states the ability to process, protect, and communicate information. The Pentagon doesn't seem to fully grasp the dangerous potential of this new domain of warfare. |
Bank Technology News April 2007 Rebecca Sausner |
The Taiwan Scenario The issue of China's cyber-warfare capabilities is intricately linked to the political status of Taiwan. |
Reason November 2005 Matt Welch |
Rummy's Posse The main thrust of an 1878 law -- keeping the four fighting branches of the military away from American citizens -- has stood firm. Until now. |
The Motley Fool December 7, 2011 Jordan DiPietro |
Stay Away From These 3 Solar Companies Regulation makes the future too uncertain for these three Chinese companies: Yingli Green Energy... Suntech Power... Trina Solar... |
National Defense November 2007 Sandra I. Erwin |
Defense Department Should Refocus Technology Spending, Experts Warn Investments in technology tend to miss the mark and do little to enhance the United States' competitive standing as a high-tech powerhouse, said Pentagon advisors and outside analysts. |
Military & Aerospace Electronics February 2009 John Keller |
It is Time to Take Anti-Tamper Technology Seriously U.S. defense electronics suppliers must get serious about building hardware security into their components and subsystems to provide anti-tamper protection. |
InternetNews November 29, 2007 Andy Patrizio |
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. |
The Motley Fool March 9, 2005 Stephen D. Simpson |
The Future of the China Syndrome What will China's saber-rattling do to Taiwanese companies? While every investor must of course do his or her own due diligence, anyone who'd been waiting for an opportunity to get into Taiwan may have just been given an opening. |
National Defense June 2011 Stew Magnuson |
When it Comes to Cybersecurity, the 'Who is Responsible for What?' Debate Continues Most experts seem to agree that the U.S. government's collective efforts to secure the Internet from large-scale attacks and other nefarious activities are lacking. |
Parameters Spring 2005 Saxby Chambliss |
We Have Not Correctly Framed the Debate on Intelligence Reform Over the last decade, our intelligence community has failed us. It wasn't able to penetrate the al Qaeda terrorist organization, and we paid a high price for that failure. |
InternetNews January 21, 2010 |
Google Delivers Strong Sales, Profits in Q4 Google did it again, as total sales rose 17 percent to $6.67 billion. |
National Defense July 2008 Sandra I. Erwin |
Export Controls: a Contentious Issue Reaching a `Boiling Point' Stringent U.S. controls on exports of military technology may help keep advanced weapons out of enemy hands, but they also are making it tougher for the United States to get the best available weapons for its armed forces |
InternetNews June 2, 2011 |
Google Blames China for Gmail Hack According to Google, their security systems discovered a phishing campaign that had targeted Gmail in an effort to obtain user passwords. |
Military & Aerospace Electronics October 2007 John Keller |
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future? |
The Motley Fool December 5, 2010 Dean Takahashi. |
WikiLeaks Reveals How Google Was Targeted in China Documents lay bare vast hacking attempts by Chinese leaders. |
InternetNews November 30, 2010 |
WikiLeaks Cables Tie China to Google Attacks Whistleblower website begins publishing leaked diplomatic cables describing longstanding program of computer espionage and hacking orchestrated by the Chinese government. |
National Defense December 2009 Alex A. Beehler |
Defense Energy Goals Require Collaboration With Sister Agencies The Defense Department is facing mounting pressure to elevate global climate change as a top national security priority. |
The Motley Fool November 18, 2011 Dan Radovsky |
Congress to Investigate Chinese Telecom Vendors A congressional committee has formally announced it will begin investigations into potential security threats posed by Chinese telecom equipment vendors Huawei and ZTE. |
IndustryWeek September 1, 2003 David Drickhamer |
Department Of Defense Goes Global Congressional debate over defense-spending requirements mirrors U.S. consumers' growing ambivalence over where products are made. |
InternetNews April 8, 2010 |
Massive Cyber Spy Ring Seen Operating in China New report details the activities of the "Shadow network," a sophisticated group of cyber criminals traced back to China, prompting denial from a state official. |
Bank Technology News April 2007 Rebecca Sausner |
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. |
TIME Asia January 24, 2011 Hannah Beech |
China: Two Faces, Fierce and Friendly When it comes to Chinese diplomacy, there always seems to be two sides to the story. |
Food Processing September 2008 Rice & Waller |
Playing Chicken with Trade New legislation would make it impossible for China to even discuss exporting fully cooked poultry into the U.S. If Congress stalls progress on this issue by using the appropriations bill to quash discussions, an agricultural trade war could be on the menu. |
National Defense May 2010 Harvey M. Sapolsky |
The False Promises of Acquisition Reform Despite meetings, laws, and hearings on acquisition reform, cost overruns, schedule slippages, and performance lapses still plague nearly all weapon system acquisitions. |