Similar Articles |
|
National Defense June 2009 Stew Magnuson |
U.S. Plans to Destroy Enemy Computer Networks in Cyber-Attacks Questioned But secrecy may have impeded widespread debate about the nature and implications of cyber-attack. |
InternetNews April 15, 2010 |
Cyber Command Plans to Focus on Coordination Nominee for the new Department of Defense position says the agency is going to lead other agencies in cyber attacks instead of waging its own. |
National Defense December 2013 Yasmin Tadjdeh |
Industry, Military Emphasize Need for 'Cyberwarrior' Training as Attacks Increase Government and military leaders have for years warned of increasingly pervasive and nefarious cyber-attacks. The network intrusions, perpetrated by nation states, hacktivists and thieves, are growing rapidly, experts have said. |
National Defense August 2011 Stew Magnuson |
Do Cyberwarriors Belong at Special Operations Command? Josh Hartman, a former congressional staffer and Defense Department executive, knows a good place for the military to house its cadre of cyberwarriors: In Tampa, Fla., at MacDill Air Force Base, home of Special Operations Command. |
Military & Aerospace Electronics October 2007 John Keller |
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future? |
National Defense February 2006 Stew Magnuson |
Network Vulnerabilities Worry Pentagon Pentagon officials call the Defense Department's global communications network its weakest link. The question is how to manage the risk, and create a balance between security and the necessity of working with international partners and the private sector. |
National Defense August 2009 Sandra I. Erwin |
Future War: How The Game is Changing "It's hard to concentrate on a grand strategy when your house is on fire," said Marine Corps Gen. James Mattis, head of U.S. Joint Forces Command. Even as they cope with the frantic demands of two major wars, military leaders say they have a clearer sense of the future than they did in the 1990s. |
Parameters Winter 2005/2006 Mitchell J. Thompson |
Breaking the Proconsulate: A New Design for National Power There have been few truly transformational changes to the institutions of national security, only slight modifications to the existing ones. |
National Defense July 2010 Stew Magnuson |
Competition Keen for Next Generation of Cyberwarriors The Air Force last year established its first command devoted solely to protecting and attacking networks. But in a time when cybersecurity experts are in high demand, the question has arisen: Where is the talent coming from? |
Military & Aerospace Electronics October 2009 J.R. Wilson |
Military Information Security Command Opens for Business at Lackland AFB The U.S. Air Force ended two years of confusion and controversy by designating Lackland Air Force Base as its official operational cyber security center, consolidating all U.S. military cyberspace operations and computer security. |
National Defense August 2007 Grace Jean |
Defense Technologies for an Uncertain Future The United States is at a crossroads when it comes to developing defense technologies for a future that seems obscure at best. |
National Defense August 2011 Beidel & Magnuson |
Government, Military Face Severe Shortage Of Cybersecurity Experts There is an acute shortage of Internet security experts in the government, and no large pool of insourced or outsourced applicants waiting in the wings to join the fight. |
Parameters Autumn 2007 Gregory L. Cantwell |
Nation-Building: A Joint Enterprise When America's Army is at war, is the nation also at war? |
National Defense December 2006 Stew Magnuson |
Strategic Command's Expanded Portfolio Prompts Skepticism Stratcom is wrapping up a four-year process where it has reinvented itself, and taken eight missions into its fold. Now comes the hard part: proving to the rest of the U.S. defense community that it can effectively deliver its services. |
National Defense May 2015 Sandra I. Erwin |
Procurement Issues That Congress Won't Fix The new foreign policy mantra in Washington is that the world is on fire. The nation's weapons procurement machine, meanwhile, keeps partying like it's 1999. |
National Defense March 2008 Stew Magnuson |
Goal of a `Network-Centric' Military Seems Distant Unblocking communications and data sharing barriers is necessary if the military will achieve its longtime goal of becoming a network-centric force. |
National Defense January 2016 Stew Magnuson |
Marines Prepare to Fight at Sea, on the Ground, From the Air After more than a decade of slogging counterinsurgency warfare, the Marine Corps is preparing for the conflicts of the future. |
National Defense February 2008 Breanne Wagner |
Special Operators Ponder the Right Mix of Roles and Missions U.S. Special Operations Command is growing. From 48,000 personnel today, its numbers are expected to increase to 58,000 in the coming years. But how will they be used? |
Popular Mechanics September 2008 Glenn Derene |
The Coming Cyberwar: Inside the Pentagon's Plan to Fight Back In the modern American military, digital telecommunication is so integral to command and control of forces and equipment that the disruption of data can do more to disable a fighting force than a thousand bombs |
National Defense November 2011 Eric Beidel |
Coast Guard Cyberdefense Office: Small but Mighty Like the Army, Navy, Air Force and Marine Corps, the Coast Guard suffers thousands of attacks on its networks each month. |
National Defense February 2015 Meloni & McCoy Jr. |
Defense IT Investment to Focus on Big Data, Cloud As the Defense Department cuts spending on information technology, it is focusing on a "technological offset strategy" to counterbalance a shrinking fighting force. |
National Defense January 2012 Eric Beidel |
Military Academies Look to Fill Nation's Cybersecurity Gaps Like West Point, the other academies recognize the sea change and are putting increased focus on their network security curriculum, both for these specialists and for the rest of the students who pass through their doors. |
National Defense October 2005 Joe Pappalardo |
As Military Becomes More Reliant On Networks, Vulnerabilities Grow If problems are not addressed, the Pentagon could spend $200 billion during the next 10 years on a network with serious vulnerabilities, according to security experts. |
National Defense March 2006 Sandra I. Erwin |
In the Latest Pentagon Strategy, Uncertainty Rules An elaborate plan recently unveiled by the Defense Department aims to prepare the military services to cope with a wide range of threats to national security during the next 20 years. |
National Defense June 2004 Harold Kennedy |
U.S. Northern Command Actively Enlisting Partners The U.S. Northern Command--established in 2002 to prevent a repeat of 9/11--is seeking assistance from a wide range of organizations to help it protect the United States, its territories and interests, said Army Col. Stover James, the organization's director of interagency coordination. |
National Defense February 2016 Jon Harper |
Defense Department Moving Slowly on 'Internet of Things' The "Internet of Things" is a key component of the military's modernization strategy. But the Pentagon is behind the curve due to security concerns and other impediments, cyber experts said. |
National Defense November 2015 Sandra I. Erwin |
Navy Command Expands Commercial IT Acquisitions The Pentagon has set out to replace outdated military information systems with commercial products that offer far better performance at lower cost. |
Parameters Autumn 2006 Michael R. Melillo |
Outfitting a Big-War Military with Small-War Capabilities Unfortunately, it took the tragedy of 9/11 and the challenges posed by an adaptive enemy for the U.S. to realize it was not prepared to fight war on terms other than its own choosing. |
National Defense August 2014 Stew Magnuson |
Cyber Labor Shortage Not What it Seems, Experts Say Only a handful of universities offering cyber security degrees are producing graduates who have "hard skills." |
National Defense November 2012 Dan Parsons |
U.S. Pacific Shift Aims to Manage, Not Challenge China's Rise Defense Department leaders are set to manage a strategic "shift" or "pivot" that has been in works for a while, but will accelerate once U.S. troops leave Afghanistan in 2014. |
National Defense June 2006 Grace Jean |
Commandos see expanded mission portfolio To boost its unconventional warfare capabilities, Canada is revamping its special operations military organization and emphasizing counter-terrorism skills in elite unit training programs. |
National Defense March 2005 Roxana Tiron |
Pentagon Strategists Ponder Value of High-Tech Weapons The Pentagon's sweeping review of strategy and programs is expected to bolster investments in sensors, networks, information technology and precision-guided munitions. |
Parameters Winter 2003/2004 Donald Chisholm |
The Risk of Optimism in the Conduct of War The Rapid Dominance approach to warfare can be appealing to a country like the U.S. that has technological advantages, but it requires an optimistic view on one's ability to manipulate the will of adversaries. |
National Defense May 2013 Stew Magnuson |
Special Operations Missions to Require New Doctrine Whether it is called "soft power," or the latest buzzword, "the seventh warfighting function," special operations forces are entering a new chapter in their storied history, senior SOF leaders said. |
National Defense August 2015 Jon Harper |
Market for Ground Robots Poised for a Turnaround The market for ground robots is set to expand as technology advancements give the machines greater utility on the battlefield and elsewhere, according to defense officials and industry experts. |
Parameters Summer 2004 Brownlee & Schoomaker |
Serving a Nation at War: A Campaign Quality Army with Joint and Expeditionary Capabilities The United States is driving a rapid evolution in the methods and techniques of war. |
CIO April 15, 2002 Stephanie Overby |
Leadership Lessons from the Modern Military Military methods hold unexpected how-tos for corporate CIOs... |
National Defense April 2005 Roxana Tiron |
Irregular Warfare Counter-insurgency in Iraq provides a template for fighting terrorism. |
National Defense February 2010 Grace V. Jean |
Army's Anthropology Teams Under Fire, But in Demand The military's lack of knowledge of the Iraqi population and its socio-cultural dynamics was one of the key failings of U.S. policy that led to the rise of insurgency there. |
National Defense November 2012 Erwin et al. |
Top Five Threats to National Security in the Coming Decade The next wave of national security threats might be more than the technology community can handle. They are complex, multidimensional problems against which no degree of U.S. technical superiority in stealth, fifth-generation air warfare or night-vision is likely to suffice. |
Parameters Autumn 2007 Christopher M. Schnaubelt |
Whither the RMA? The present Department of Defense (DOD) focus on technological solutions to increase capabilities may be misguided by a vision of a high-tech Revolution in Military Affairs (RMA). |
National Defense December 2005 Grace Jean |
Navy Faces Expanded Mission Portfolio, Declining Resources In preparation for future shifts in military priorities and resources, Navy officials have gone to great lengths to spell out their vision for the service's roles in protecting U.S. interests and bolstering global security. |
National Defense April 2009 Grace V. Jean |
U.S. Special Operations Command Seeks Culturally Attuned Warriors Candidates who hope to join the Army's Special Forces, whether recruited from the services or other programs, will face higher standards in training. |
National Defense December 2003 Lawrence P. Farrell Jr. |
'Access' Challenges in Expeditionary Operations The fact that friendly nations are becoming sensitive about hosting U.S. forces should be a wake-up call. Eventually, the services will need to develop a joint vision and concept of operations for how to tackle these challenges. |
Military & Aerospace Electronics August 2004 Ben Ames |
Military Warns Contractors About Pitfalls of Joint Weapons Design Pentagon planners are pushing the different service branches to share equipment and split the cost of customized-weapons development. This joint operation will help transform the American military into a lighter, faster force, they say. |
National Defense November 2004 Roxana Tiron |
Pentagon Seeks Joint Doctrine, Training for Personnel Recovery Despite accounting for each and every missing soldier in the Iraq war the combat search and rescue community is stretched thin and grappling with gaps ranging from policy to training. |
Parameters Winter 2005/2006 Christopher M. Schnaubelt |
After the Fight: Interagency Operations The situation in Iraq may not be nearly as dire as some pundits and much of the media would have the American public believe, but there is certainly a long way to go. |
National Defense August 2005 Lawrence P. Farrell Jr. |
Strategy and Budget Driven by Global War on Terror The final report is not scheduled to be completed and sent to Congress until February, but looking at what is happening in the world today, there are clear indicators of where the Pentagon's Quadrennial Defense Review is headed -- to a change to the current military posture. |
National Defense December 2005 Lawrence P. Farrell Jr. |
Military Not the Only Solution To Gaps in Disaster Response At a time of tightening budgets and competing priorities for defense and homeland security funds, one of the most contentious issues being debated at the Pentagon and on Capitol Hill is whether the Defense Department should take primary responsibility in disaster response and relief operations. |
Reason November 2005 Matt Welch |
Rummy's Posse The main thrust of an 1878 law -- keeping the four fighting branches of the military away from American citizens -- has stood firm. Until now. |