Similar Articles |
|
National Defense June 2013 Valerie Insinna |
Defense Department Infrastructure Still Vulnerable to Cyber-Attacks, Critics Say The Defense Department knows how to fight a kinetic war with bullets, bombs and boots on the ground, but it is still figuring out what a cyberwar would look like and how it would be fought. |
Popular Mechanics September 2008 Glenn Derene |
The Coming Cyberwar: Inside the Pentagon's Plan to Fight Back In the modern American military, digital telecommunication is so integral to command and control of forces and equipment that the disruption of data can do more to disable a fighting force than a thousand bombs |
Military & Aerospace Electronics October 2007 John Keller |
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future? |
National Defense February 2006 Stew Magnuson |
Network Vulnerabilities Worry Pentagon Pentagon officials call the Defense Department's global communications network its weakest link. The question is how to manage the risk, and create a balance between security and the necessity of working with international partners and the private sector. |
National Defense February 2008 Breanne Wagner |
Special Operators Ponder the Right Mix of Roles and Missions U.S. Special Operations Command is growing. From 48,000 personnel today, its numbers are expected to increase to 58,000 in the coming years. But how will they be used? |
InternetNews April 15, 2010 |
Cyber Command Plans to Focus on Coordination Nominee for the new Department of Defense position says the agency is going to lead other agencies in cyber attacks instead of waging its own. |
National Defense August 2009 Sandra I. Erwin |
Future War: How The Game is Changing "It's hard to concentrate on a grand strategy when your house is on fire," said Marine Corps Gen. James Mattis, head of U.S. Joint Forces Command. Even as they cope with the frantic demands of two major wars, military leaders say they have a clearer sense of the future than they did in the 1990s. |
Parameters Winter 2003/2004 Donald Chisholm |
The Risk of Optimism in the Conduct of War The Rapid Dominance approach to warfare can be appealing to a country like the U.S. that has technological advantages, but it requires an optimistic view on one's ability to manipulate the will of adversaries. |
National Defense January 2012 Russell Aldrich |
U.S. Should Invest in Truly Unconventional Forms of Warfare Spending enormous resources to increase the already insurmountable conventional military advantage cannot compensate for a disadvantage in non-military warfare capabilities. The face of warfare is changing rapidly, and the United States must adapt. |
Parameters Summer 2006 David W. Barno |
Challenges in Fighting a Global Insurgency Strategy in a global counterinsurgency requires a new level of thinking. A world of irregular threats and asymmetrical warfare demands that we Americans broaden our thinking beyond the norms of traditional military action once sufficient to win our wars. |
IEEE Spectrum August 2012 Willie D. Jones |
Declarations of Cyberwar What the revelations about the U.S.-Israeli origin of Stuxnet mean for warfare |
Wired August 23, 2007 Ralph Peters |
Washington Ignores Cyberattack Threats, Putting Us All at Peril 21st-century-warfare will be to deny entire states the ability to process, protect, and communicate information. The Pentagon doesn't seem to fully grasp the dangerous potential of this new domain of warfare. |
National Defense March 2012 Stew Magnuson |
Can Peace Prevail in Cyberspace? The prospect of an assault on the United States through its networks has been a doomsday scenario for a number of years. |
Parameters Autumn 2007 Christopher M. Schnaubelt |
Whither the RMA? The present Department of Defense (DOD) focus on technological solutions to increase capabilities may be misguided by a vision of a high-tech Revolution in Military Affairs (RMA). |
National Defense August 2011 Zhen Zhang |
Cohesive Cybersecurity Policy Needed For Electric Grid Securing the electric grid is one of the key components of preventing terrorist attacks in the United States and increasing the country's resilience and recovery from such events. |
Parameters Summer 2005 R. D. Hooker |
Beyond Vom Kriege: The Character and Conduct of Modern War While the methods used to wage war are constantly evolving, the nature and character of war remain deeply and unchangeably rooted in the nature of man. |
PC World August 21, 2007 Robert McMillan |
Is the U.S. at Risk From Cyberwarfare? Hostile governments may be behind the next wave of Internet attacks. |
National Defense December 2006 Stew Magnuson |
Strategic Command's Expanded Portfolio Prompts Skepticism Stratcom is wrapping up a four-year process where it has reinvented itself, and taken eight missions into its fold. Now comes the hard part: proving to the rest of the U.S. defense community that it can effectively deliver its services. |
National Defense August 2011 Stew Magnuson |
Do Cyberwarriors Belong at Special Operations Command? Josh Hartman, a former congressional staffer and Defense Department executive, knows a good place for the military to house its cadre of cyberwarriors: In Tampa, Fla., at MacDill Air Force Base, home of Special Operations Command. |
Reason February 2002 Chris Bray |
The Media and GI Joe How the press gets the military wrong -- and why it matters... |
National Defense November 2012 Erwin et al. |
Top Five Threats to National Security in the Coming Decade The next wave of national security threats might be more than the technology community can handle. They are complex, multidimensional problems against which no degree of U.S. technical superiority in stealth, fifth-generation air warfare or night-vision is likely to suffice. |
InternetNews April 8, 2009 Alex Goldman |
Pentagon Claims $100M in Cybersecurity Costs The threat is real, but so is the fight for budget financing in Washington. |
National Defense August 2007 Grace Jean |
Defense Technologies for an Uncertain Future The United States is at a crossroads when it comes to developing defense technologies for a future that seems obscure at best. |
Parameters Summer 2007 Brian Reed |
A Social Network Approach to Understanding an Insurgency A network analysis of war and insurgency differs markedly from conventional approaches, a fact that might require us to rethink some of our more conventional analytical tools. |
Parameters Winter 2005/2006 Jeffrey Record |
Why the Strong Lose Why has the United States fared consistently well against such powerful enemies as Nazi Germany, Imperial Japan and the Soviet Union, but its record against lesser foes is decidedly mixed? |
Parameters Autumn 2006 Michael R. Melillo |
Outfitting a Big-War Military with Small-War Capabilities Unfortunately, it took the tragedy of 9/11 and the challenges posed by an adaptive enemy for the U.S. to realize it was not prepared to fight war on terms other than its own choosing. |
National Defense March 2014 Robert Johnston |
New Approach Needed to Counter Malicious Software For the better part of a decade, network security has been overly focused on perimeter defenses. This has triggered a change in nation-level techniques for launching cyber-attacks. |
National Defense December 2013 Yasmin Tadjdeh |
Industry, Military Emphasize Need for 'Cyberwarrior' Training as Attacks Increase Government and military leaders have for years warned of increasingly pervasive and nefarious cyber-attacks. The network intrusions, perpetrated by nation states, hacktivists and thieves, are growing rapidly, experts have said. |
InternetNews August 4, 2009 |
Cyber War Could Cause Global Collateral Damage The effects of an all-out cyber war would be impossible to control and could be felt worldwide, experts say. |
National Defense June 2009 Sandra I. Erwin |
Predicting the Outcome of War: Can Science Help? Digital simulations are staples of military war games. They can be used to recreate just about every aspect of combat. But simulating the complex scenarios of "irregular" warfare is one of the toughest challenges that the Defense Department now faces. |
Bank Technology News July 2008 Rebecca Sausner |
Could the U.S. Be the Next Estonia? Gadi Evron, former Israeli Government Internet Security Operations Manager, went to Estonia during the crippling DDOS attacks last May. Here he talks about whether the U.S. is vulnerable to such an attack, and the role banks and home computers play in protecting critical infrastructure. |
National Defense March 2009 Grace V. Jean |
Building a Cybersecurity Lab In an effort to beef up the country's defenses in cyberspace, the Comprehensive National Cybersecurity Initiative, established last year by the Bush administration, seeks to reduce network vulnerabilities, protect against intrusions and anticipate future threats. |
National Defense March 2006 James A. Gavrilis |
Army Must Address Irregular Warfare Needs The Army's largest-ever modernization program, the Future Combat Systems (FCS), is expected to deliver a kit bag of new capabilities for the tactical force. It's easy to see how FCS technologies will provide a clear advantage in the conventional fight, but it is less clear how this program will improve capabilities in unconventional warfare. |
National Defense December 2006 Sandra I. Erwin |
Latest Pentagon `Roadmap' Reveals Serious Frustration Roadmaps -- which involve lengthy studies and exhaustive reports -- can be quite useful in highly technical areas that require in-depth research. The latest Pentagon roadmap, however, seeks to address the decidedly non-technical issue of "irregular warfare." |
InternetNews January 27, 2010 |
Is the U.S. Headed for a Cyber War? With cyber threats from abroad coming fast and furious, how serious is the United States about going on the offensive? |
National Defense September 2009 Gregory S. Martin |
Achieving Balance Over Time Defense Secretary Robert Gates has been articulate and decisive in moving the Defense Department, military services and agencies toward a more "balanced" force. But will this balance be applicable in years to come? |
Salon.com April 4, 2001 Caroline Benner |
The phantom cyber-threat We should stop worrying about computer terrorism and learn who our real enemies are... |
National Defense March 2011 Stew Magnuson |
Governments Should Push Vendors to Eliminate Software Security Flaws, Researchers Say Security incidents in cyberspace can be prevented if governments push the creators of operating systems to test their software more thoroughly before releasing their products. |
National Defense January 2013 Rich Sorelle |
How to Equip the U.S. Military For Future Electronic Warfare The Navy and Air Force have adopted "air-sea battle." The concept entails highly coordinated, cross-domain operations designed to "disrupt the adversary's intelligence collection and command and control used to employ A2/AD weapons systems. |
National Defense September 2012 Stew Magnuson |
Feds Fear Coordinated Physical, Cyber-Attacks on Electrical Grids Electrical grids in the United States are vulnerable to both cyber-attacks and space weather, federal officials have said. |
Parameters Spring 2005 Colin S. Gray |
How Has War Changed Since the End of the Cold War? For the West, and for the most part, 12 of the past 15 years can fairly be described as an interwar period. That brief no-name era, usually referred to neutrally as the post-Cold War period, came to an explosive end on 11 September 2001. |
Military & Aerospace Electronics October 2004 John Keller |
Military transformation: beyond the buzzwords Military transformation is drowning in hyperbole that would have us believe that this new approach represents a reinvention of warfare itself. It doesn't. Warfare is essentially the same today as it was more than 3,000 years ago -- find and defeat the enemy, or be destroyed yourself. |
InternetNews November 29, 2007 |
World Faces 'Cyber Cold War' Threat Cybercrime is no longer just a threat to industry and individuals but increasingly to national security. |
National Defense October 2013 Yasmin Tadjdeh |
Fears of Devastating Cyber-Attacks on Electric Grid, Critical Infrastructure Grow Department of Homeland Security Secretary Janet Napolitano warned that the United States faces "a major cyber-event that will have a serious effect on our lives, our economy and the everyday functioning of our society." |
National Defense December 2007 Stew Magnuson |
Strategic Command Selling Itself to Field Commanders The officers at U.S. Strategic Command are trying to sell their ability to support commanding officers. |
National Defense May 2012 Teri Takai |
Creating a More Agile Defense Department Info-Tech Enterprise Secretary of Defense Leon Panetta in January released guidance that outlines a plan for shaping U.S. defense strategy. |
National Defense August 2006 Erwin & Magnuson |
Hackers Victimize Transportation Command U.S. Transportation Command prompted to tighten its security after cyber-attacks... National Guard complain about insufficient equipment... Air Force thinks of ways to cut back on fuel costs... Worldwide military spending soars... |