national security

June 28, 2019
By Kimberly Underwood
Gen. David Goldfein, USAF, chief of staff of the Air Force, speaking at the Mitchell Institute Strategic Deterrence Breakfast event on June 26, warns of increasing posturing of Russia and China in the Arctic region.

With Russia and China pursuing “rapid and comprehensive” nuclear weapon modernization efforts, instead of denuclearization, the United States must remain vigilant in its commitment to update its defensive tools to protect the nation, said Gen. David Goldfein, USAF, chief of staff of the Air Force.

The chief of staff spoke at the Mitchell Institute’s Strategic Deterrence Breakfast Series on June 26. He confirmed the necessity of the United States’ nuclear deterrence triad, the combination of intercontinental ballistic missiles (ICBMs), ballistic missile submarines and the aircraft bomber fleet, which serve as the backbone of our national security.

May 16, 2019
Posted by Kimberly Underwood
President Trump takes action to block risky technology coming into the United States through the IT supply chain. Credit: Shutterstock/Travel mania

In an effort to secure the digital supply chain for the United States, President Trump issued a policy on May 15 prohibiting the trade of information and communications technology or services designed, developed, manufactured or supplied by adversaries. 

The Executive Order on Securing the Information and Communications Technology and Services Supply Chain states that the risk of using such technology and services constitutes a national emergency.

May 15, 2019
By George I. Seffers
From l-r, Mathew Gaston, director of the Emerging Technology Center at the Carnegie Mellon University Software Engineering Institute, Stephen Wallace, DISA’s systems innovation scientist with the Emerging Technology Directorate, and and Fletcher Previn, chief information officer at IBM Corp., discuss artificial intelligence during a session of TechNet Cyber. Photo by Michael Carpenter

Asked which technology will be most critical to artificial intelligence in the coming years, experts agree: artificial intelligence, hands down.

Two experts from academia and industry—Mathew Gaston, director of the Emerging Technology Center at the Carnegie Mellon University Software Engineering Institute, and Fletcher Previn, chief information officer at IBM Corporation—participated in a fireside chat at the AFCEA TechNet Cyber 2019 conference and predicted artificial intelligence will be the number one technology most critical to national security in the next several years.

April 18, 2019
By Kimberly Underwood
Gen. Timothy Ray, USAF, commander of the Air Force Global Strike Command and commander of the Air Forces Strategic Command, explains the service’s development of the Ground-Based Strategic Deterrent weapon system. Credit: The George Washington University Project for Media and National Security

The Air Force is in the process of developing a successor to the LGM-30G Minuteman III intercontinental ballistic missile (ICBM) known as the Ground-Based Strategic Deterrent (GBSD). The GBSD is the land-based component of the United States’ nuclear deterrence triad, which, along with ballistic missile submarines and the aircraft bomber fleet, serves as the backbone of our national security, according to the Defense Department.

The service also is working on a next-generation airborne missile control system that can launch both Minuteman III as well as GBSD missiles when the latter is ready for deployment in the late 2020s as expected.  

June 11, 2018
 

Six3 Advanced Systems Inc., Dulles, Virginia, was awarded a $48,634,304 indefinite-delivery/indefinite-quantity contract that provides integration, installation, sustainment, and engineering services to the AIRWorks Rapid Development Capabilities Integrated Product Team in support of the deployment of new and existing counter unmanned aerial systems capabilities and hardware to high priority and sensitive government sites that protect assets vital to national security. This contract provides technical, engineering and project management support services to include modeling and simulation, hardware integration, software integration, and command and control integration. Materials and equipment to be integrated may be procured under this co

February 20, 2018
By Maryann Lawlor
The volume and variety of information that adversaries are surreptitiously collecting and analyzing from U.S. information systems requires new ways to detect enemies. Credit: Shutterstock

The billions of bits and bytes that make government services, information sharing and even shopping easier also open the doors for adversaries to gather intelligence that aids their nefarious pursuits. AFCEA International’s Cyber Committee has published a white paper that describes several ways big data analytics can help cybersecurity analysts close those doors or at least shrink the gap and reduce vulnerabilities.

February 1, 2018
By Kimberly Underwood
As part of the U.S. National Defense Strategy, Secretary of Defense Jim Mattis is calling for investments in C4ISR to field capabilities that will “gain and exploit information, deny competitors those same advantages and enable us to provide attribution while defending against and holding accountable state or non-state actors during cyber attacks.”

No longer can the U.S. military bank on ensured victories. The battlefield is more lethal and disruptive, is conducted at breakneck speeds and reaches further around the globe. And although fighting terrorism has gripped the military’s focus for the last 16 years, it is the rise of so-called inter-state strategic competition against nations such as China and Russia that will now be the primary concern for U.S. national security.