For more than half the history of our country, one of the surest ways to be elected president was to gain public fame as a general in the U.S. Army. Since the tumultuous 19th century, we have fallen out of the habit of electing generals. But the one exception to the rule turned out to be Dwight D. Eisenhower, former five-star general, former commander of Allied forces in Europe in World War II, first supreme commander of NATO and a two-term president who defined an era.
Multiple transnational organizations are moving to ensure security in an increasingly dynamic environment in Europe.
The private and financial sectors are pressing for better governmental answers to the costly cybersecurity challenges still plaguing the nation.
Cyber is becoming more critical in battle every day, and the U.S. Army is adjusting its Network Integration Evaluation to reflect that reality.
With the information world marching en masse to the cloud, one global firm is offering direct peer-to-peer encryption to reduce the threat of an intervening cyber intercept. This approach is applicable to dedicated hardware as well as to commercial off-the-shelf consumer communications equipment, and its operation is relatively transparent to the user.
U.S. Navy officials have, for the first time, proved that the unmanned X-47B aircraft and an F/A-18 Hornet can operate at the same time within the same aircraft carrier-controlled landing pattern. Manned and unmanned aircraft flying from the same flight deck may change the way warfighters operate in the decades to come.
A developmental U.S. Navy project aims to provide a creative solution to the challenge of how to move unmanned underwater vehicles to their proper point for submersion. The project is creating a bio-inspired seacraft that will use flight to reach its destinations.
Adm. Michael Rogers, USN, who leads both the National Security Agency and U.S. Cyber Command, predicts a damaging attack to critical infrastructure networks within the coming years. If an attack happens, the agency and Cyber Command will coordinate a response along with other government agencies and potentially the private sector organizations that own many of the networks.
Article updated December 3, 2014.
The U.S. Defense Information Systems Agency is being tasked with an operational role in the cyber domain, namely network defense. The new role creates a formal relationship between the agency, U.S. Cyber Command and the military services; integrates network operations and defense; and should ultimately improve security.