The U.S. Navy’s Program Executive Office (PEO) for Unmanned Aviation and Strike Weapons is striving for better integration of sensors and weapon systems across the entire domain.
Quantum encryption technology created in a national laboratory will be available this summer to government and commercial clients. The system provides faster and more cost-effective cryptographic services with long-term system security.
The failure of other communications networks from damage caused by catastrophic disasters has compelled local and state governments to work with their federal counterparts on establishing satellite connectivity under the worst of conditions.
Just as soldiers on a battlefield use technology to pinpoint locations of friend and foe, emergency service agencies are equipping departments with the Blue Force Tracking capability as state and local governments seek to improve situational awareness.
Terrorists, their supporters and other adversarial groups and individuals are finding new and creative ways to use the law against their enemies. The tactics create hesitation on the battlefield, cast doubt on the legality of military operations and ultimately can change the way nations fight.
A deadly combination of turbulence, waves and wind is causing aircraft crossing the equator to crash with increasing frequency because of higher ocean temperatures.
Defense Department information technology systems are economically unsustainable, but the department only now is catching the revolutionary spirit of the cloud, and adoption is slow and not in line with advances in the commercial sector.
The U.S. Transportation Command, in charge of providing land, sea and air mobility to U.S. forces worldwide, now finds itself tasked with its own form of conflict in the cyber domain.
The cyber attacks that threaten the United States are just as intense and worrisome for NATO, which comes under persistent strikes by nation-states, terrorist groups and criminal organizations all assailing with denial-of-service malware, organized criminal incursions, cyber espionage and website defacements.