signalarticles

Col. Greg Julian, USA, public affairs officer for the U.S. Forces Afghanistan, leads an investigation team to meet with villagers in Tagab, Afghanistan. The team worked with the Afghan ministries of Defense and Information to explore allegations of possible civilian casualties after a mission to capture Taliban leaders.
An MQ-1 Predator takes off from Creech Air Force Base, Nevada, during the first operational test of the latest upgrade to the Predator. Nations that use drones tout their pinpoint accuracy as one way to limit civilian casualties, while terrorist and insurgent groups targeted by the unmanned systems highlight those civilian casualties to question the use of drone strikes.

When the Law Becomes a Weapon of War

May 1, 2015
By George I. Seffers
E-mail About the Author


Terrorists, their supporters and other adversarial groups and individuals are finding new and creative ways to use the law against their enemies. The tactics create hesitation on the battlefield, cast doubt on the legality of military operations and ultimately can change the way nations fight.

This chart plots the location of Southeast Asia airline crashes. Note the proximity to the equator. Because the AF447 flight was lost in the equatorial Atlantic Ocean, its location is shown as an insert in the upper right hand portion of the chart. The equator is correctly located for all events.

Pilots Face Brick Wall-Like Icing Along Equator

May 1, 2015
By Dr. R. Norris Keeler



A deadly combination of turbulence, waves and wind is causing aircraft crossing the equator to crash with increasing frequency because of higher ocean temperatures.

Boldness Is Needed for the Military Cloud Revolution

May 1, 2015
By Lt. Col. Enrique A. Oti, USAF



Defense Department information technology systems are economically unsustainable, but the department only now is catching the revolutionary spirit of the cloud, and adoption is slow and not in line with advances in the commercial sector.

NATO Shapes its Enterprise For Conflicts of Tomorrow

May 1, 2015
By Sandra Jontz
E-mail About the Author


The cyber attacks that threaten the United States are just as intense and worrisome for NATO, which comes under persistent strikes by nation-states, terrorist groups and criminal organizations all assailing with denial-of-service malware, organized criminal incursions, cyber espionage and website defacements.

Pages