MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
National Defense
June 2013
Valerie Insinna
Defense Department Infrastructure Still Vulnerable to Cyber-Attacks, Critics Say The Defense Department knows how to fight a kinetic war with bullets, bombs and boots on the ground, but it is still figuring out what a cyberwar would look like and how it would be fought. mark for My Articles similar articles
Popular Mechanics
September 2008
Glenn Derene
The Coming Cyberwar: Inside the Pentagon's Plan to Fight Back In the modern American military, digital telecommunication is so integral to command and control of forces and equipment that the disruption of data can do more to disable a fighting force than a thousand bombs mark for My Articles similar articles
Military & Aerospace Electronics
October 2007
John Keller
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future? mark for My Articles similar articles
National Defense
February 2006
Stew Magnuson
Network Vulnerabilities Worry Pentagon Pentagon officials call the Defense Department's global communications network its weakest link. The question is how to manage the risk, and create a balance between security and the necessity of working with international partners and the private sector. mark for My Articles similar articles
National Defense
February 2008
Breanne Wagner
Special Operators Ponder the Right Mix of Roles and Missions U.S. Special Operations Command is growing. From 48,000 personnel today, its numbers are expected to increase to 58,000 in the coming years. But how will they be used? mark for My Articles similar articles
InternetNews
April 15, 2010
Cyber Command Plans to Focus on Coordination Nominee for the new Department of Defense position says the agency is going to lead other agencies in cyber attacks instead of waging its own. mark for My Articles similar articles
National Defense
August 2009
Sandra I. Erwin
Future War: How The Game is Changing "It's hard to concentrate on a grand strategy when your house is on fire," said Marine Corps Gen. James Mattis, head of U.S. Joint Forces Command. Even as they cope with the frantic demands of two major wars, military leaders say they have a clearer sense of the future than they did in the 1990s. mark for My Articles similar articles
Parameters
Winter 2003/2004
Donald Chisholm
The Risk of Optimism in the Conduct of War The Rapid Dominance approach to warfare can be appealing to a country like the U.S. that has technological advantages, but it requires an optimistic view on one's ability to manipulate the will of adversaries. mark for My Articles similar articles
National Defense
January 2012
Russell Aldrich
U.S. Should Invest in Truly Unconventional Forms of Warfare Spending enormous resources to increase the already insurmountable conventional military advantage cannot compensate for a disadvantage in non-military warfare capabilities. The face of warfare is changing rapidly, and the United States must adapt. mark for My Articles similar articles
Parameters
Summer 2006
David W. Barno
Challenges in Fighting a Global Insurgency Strategy in a global counterinsurgency requires a new level of thinking. A world of irregular threats and asymmetrical warfare demands that we Americans broaden our thinking beyond the norms of traditional military action once sufficient to win our wars. mark for My Articles similar articles
IEEE Spectrum
August 2012
Willie D. Jones
Declarations of Cyberwar What the revelations about the U.S.-Israeli origin of Stuxnet mean for warfare mark for My Articles similar articles
Wired
August 23, 2007
Ralph Peters
Washington Ignores Cyberattack Threats, Putting Us All at Peril 21st-century-warfare will be to deny entire states the ability to process, protect, and communicate information. The Pentagon doesn't seem to fully grasp the dangerous potential of this new domain of warfare. mark for My Articles similar articles
National Defense
March 2012
Stew Magnuson
Can Peace Prevail in Cyberspace? The prospect of an assault on the United States through its networks has been a doomsday scenario for a number of years. mark for My Articles similar articles
Parameters
Autumn 2007
Christopher M. Schnaubelt
Whither the RMA? The present Department of Defense (DOD) focus on technological solutions to increase capabilities may be misguided by a vision of a high-tech Revolution in Military Affairs (RMA). mark for My Articles similar articles
National Defense
August 2011
Zhen Zhang
Cohesive Cybersecurity Policy Needed For Electric Grid Securing the electric grid is one of the key components of preventing terrorist attacks in the United States and increasing the country's resilience and recovery from such events. mark for My Articles similar articles
Parameters
Summer 2005
R. D. Hooker
Beyond Vom Kriege: The Character and Conduct of Modern War While the methods used to wage war are constantly evolving, the nature and character of war remain deeply and unchangeably rooted in the nature of man. mark for My Articles similar articles
PC World
August 21, 2007
Robert McMillan
Is the U.S. at Risk From Cyberwarfare? Hostile governments may be behind the next wave of Internet attacks. mark for My Articles similar articles
National Defense
December 2006
Stew Magnuson
Strategic Command's Expanded Portfolio Prompts Skepticism Stratcom is wrapping up a four-year process where it has reinvented itself, and taken eight missions into its fold. Now comes the hard part: proving to the rest of the U.S. defense community that it can effectively deliver its services. mark for My Articles similar articles
National Defense
August 2011
Stew Magnuson
Do Cyberwarriors Belong at Special Operations Command? Josh Hartman, a former congressional staffer and Defense Department executive, knows a good place for the military to house its cadre of cyberwarriors: In Tampa, Fla., at MacDill Air Force Base, home of Special Operations Command. mark for My Articles similar articles
Reason
February 2002
Chris Bray
The Media and GI Joe How the press gets the military wrong -- and why it matters... mark for My Articles similar articles
National Defense
November 2012
Erwin et al.
Top Five Threats to National Security in the Coming Decade The next wave of national security threats might be more than the technology community can handle. They are complex, multidimensional problems against which no degree of U.S. technical superiority in stealth, fifth-generation air warfare or night-vision is likely to suffice. mark for My Articles similar articles
InternetNews
April 8, 2009
Alex Goldman
Pentagon Claims $100M in Cybersecurity Costs The threat is real, but so is the fight for budget financing in Washington. mark for My Articles similar articles
National Defense
August 2007
Grace Jean
Defense Technologies for an Uncertain Future The United States is at a crossroads when it comes to developing defense technologies for a future that seems obscure at best. mark for My Articles similar articles
Parameters
Summer 2007
Brian Reed
A Social Network Approach to Understanding an Insurgency A network analysis of war and insurgency differs markedly from conventional approaches, a fact that might require us to rethink some of our more conventional analytical tools. mark for My Articles similar articles
Parameters
Winter 2005/2006
Jeffrey Record
Why the Strong Lose Why has the United States fared consistently well against such powerful enemies as Nazi Germany, Imperial Japan and the Soviet Union, but its record against lesser foes is decidedly mixed? mark for My Articles similar articles
Parameters
Autumn 2006
Michael R. Melillo
Outfitting a Big-War Military with Small-War Capabilities Unfortunately, it took the tragedy of 9/11 and the challenges posed by an adaptive enemy for the U.S. to realize it was not prepared to fight war on terms other than its own choosing. mark for My Articles similar articles
National Defense
March 2014
Robert Johnston
New Approach Needed to Counter Malicious Software For the better part of a decade, network security has been overly focused on perimeter defenses. This has triggered a change in nation-level techniques for launching cyber-attacks. mark for My Articles similar articles
National Defense
December 2013
Yasmin Tadjdeh
Industry, Military Emphasize Need for 'Cyberwarrior' Training as Attacks Increase Government and military leaders have for years warned of increasingly pervasive and nefarious cyber-attacks. The network intrusions, perpetrated by nation states, hacktivists and thieves, are growing rapidly, experts have said. mark for My Articles similar articles
InternetNews
August 4, 2009
Cyber War Could Cause Global Collateral Damage The effects of an all-out cyber war would be impossible to control and could be felt worldwide, experts say. mark for My Articles similar articles
National Defense
June 2009
Sandra I. Erwin
Predicting the Outcome of War: Can Science Help? Digital simulations are staples of military war games. They can be used to recreate just about every aspect of combat. But simulating the complex scenarios of "irregular" warfare is one of the toughest challenges that the Defense Department now faces. mark for My Articles similar articles
Bank Technology News
July 2008
Rebecca Sausner
Could the U.S. Be the Next Estonia? Gadi Evron, former Israeli Government Internet Security Operations Manager, went to Estonia during the crippling DDOS attacks last May. Here he talks about whether the U.S. is vulnerable to such an attack, and the role banks and home computers play in protecting critical infrastructure. mark for My Articles similar articles
National Defense
March 2009
Grace V. Jean
Building a Cybersecurity Lab In an effort to beef up the country's defenses in cyberspace, the Comprehensive National Cybersecurity Initiative, established last year by the Bush administration, seeks to reduce network vulnerabilities, protect against intrusions and anticipate future threats. mark for My Articles similar articles
National Defense
March 2006
James A. Gavrilis
Army Must Address Irregular Warfare Needs The Army's largest-ever modernization program, the Future Combat Systems (FCS), is expected to deliver a kit bag of new capabilities for the tactical force. It's easy to see how FCS technologies will provide a clear advantage in the conventional fight, but it is less clear how this program will improve capabilities in unconventional warfare. mark for My Articles similar articles
National Defense
December 2006
Sandra I. Erwin
Latest Pentagon `Roadmap' Reveals Serious Frustration Roadmaps -- which involve lengthy studies and exhaustive reports -- can be quite useful in highly technical areas that require in-depth research. The latest Pentagon roadmap, however, seeks to address the decidedly non-technical issue of "irregular warfare." mark for My Articles similar articles
InternetNews
January 27, 2010
Is the U.S. Headed for a Cyber War? With cyber threats from abroad coming fast and furious, how serious is the United States about going on the offensive? mark for My Articles similar articles
National Defense
September 2009
Gregory S. Martin
Achieving Balance Over Time Defense Secretary Robert Gates has been articulate and decisive in moving the Defense Department, military services and agencies toward a more "balanced" force. But will this balance be applicable in years to come? mark for My Articles similar articles
Salon.com
April 4, 2001
Caroline Benner
The phantom cyber-threat We should stop worrying about computer terrorism and learn who our real enemies are... mark for My Articles similar articles
National Defense
March 2011
Stew Magnuson
Governments Should Push Vendors to Eliminate Software Security Flaws, Researchers Say Security incidents in cyberspace can be prevented if governments push the creators of operating systems to test their software more thoroughly before releasing their products. mark for My Articles similar articles
National Defense
January 2013
Rich Sorelle
How to Equip the U.S. Military For Future Electronic Warfare The Navy and Air Force have adopted "air-sea battle." The concept entails highly coordinated, cross-domain operations designed to "disrupt the adversary's intelligence collection and command and control used to employ A2/AD weapons systems. mark for My Articles similar articles
National Defense
September 2012
Stew Magnuson
Feds Fear Coordinated Physical, Cyber-Attacks on Electrical Grids Electrical grids in the United States are vulnerable to both cyber-attacks and space weather, federal officials have said. mark for My Articles similar articles
Parameters
Spring 2005
Colin S. Gray
How Has War Changed Since the End of the Cold War? For the West, and for the most part, 12 of the past 15 years can fairly be described as an interwar period. That brief no-name era, usually referred to neutrally as the post-Cold War period, came to an explosive end on 11 September 2001. mark for My Articles similar articles
Military & Aerospace Electronics
October 2004
John Keller
Military transformation: beyond the buzzwords Military transformation is drowning in hyperbole that would have us believe that this new approach represents a reinvention of warfare itself. It doesn't. Warfare is essentially the same today as it was more than 3,000 years ago -- find and defeat the enemy, or be destroyed yourself. mark for My Articles similar articles
InternetNews
November 29, 2007
World Faces 'Cyber Cold War' Threat Cybercrime is no longer just a threat to industry and individuals but increasingly to national security. mark for My Articles similar articles
National Defense
October 2013
Yasmin Tadjdeh
Fears of Devastating Cyber-Attacks on Electric Grid, Critical Infrastructure Grow Department of Homeland Security Secretary Janet Napolitano warned that the United States faces "a major cyber-event that will have a serious effect on our lives, our economy and the everyday functioning of our society." mark for My Articles similar articles
National Defense
December 2007
Stew Magnuson
Strategic Command Selling Itself to Field Commanders The officers at U.S. Strategic Command are trying to sell their ability to support commanding officers. mark for My Articles similar articles
National Defense
May 2012
Teri Takai
Creating a More Agile Defense Department Info-Tech Enterprise Secretary of Defense Leon Panetta in January released guidance that outlines a plan for shaping U.S. defense strategy. mark for My Articles similar articles
National Defense
August 2006
Erwin & Magnuson
Hackers Victimize Transportation Command U.S. Transportation Command prompted to tighten its security after cyber-attacks... National Guard complain about insufficient equipment... Air Force thinks of ways to cut back on fuel costs... Worldwide military spending soars... mark for My Articles similar articles