Connecting the Dots We can’t see all of the dots. … We have an inability to see everything. … We as U.S. Cyber Command or the National Security Agency may see what is occurring outside of the United States, but...
Cyber
World: Army Aims for “All-dimension- al” Capabilities; USSF Space Systems Command Structure; Counterspace Capabilities; John T. Correll, 1939- 2021; and more ...
The top four U.S. adversaries—China, Russia, Iran and North Korea—are improving their military capabilities but relying increasingly on cyber means to challenge the U.S. and blunt its influence around the world, the intelligence community's annual threat assessment says. The report comes amid military tensions with ...
Watch Matthew Cornick, director of advanced concepts at General Atomics Aeronautical Systems, Inc.; Mark Rasnake, Multi-Domain ABMS program lead at Boeing; Richard S. Stapp, corporate vice president and chief technology officer at Northrop Grumman; and moderator and Space and Missile Systems Centers Commander Lt. Gen. ...
Gold Medal Standard We must prepare together for a long-term strategic competition with China. How the United States, Europe, and Asia work together to secure the peace and defend our shared values and advance our prosperity across the Pacific will...
Partnerships in space could build capabilities and save money for all in the coalition. At the dawn of the new space age, the United States is racing to assemble a military coalition of spacefaring nations to rival that of Operation...
A collection of quotes on air power and national security issues.
The Air Force’s intelligence and cyber operations branch will soon roll out a diversity and inclusion strategy to strengthen that workforce and the quality of their analyses. “Diversity, equity, inclusion are critical to our success going forward. It's a national security imperative; it's in the ...
The Air Force's in-house software factories have become hacking targets because they are accelerating the service's fielding of new capabilities, and must be defended as the "crown jewels" they are. The Pentagon needs to apply "Zero-Trust" technology in its data systems, not only keeping hackers ...