China

September 15, 2021
By Kimberly Underwood
Gen. Paul Nakasone, USA (c), commander, U.S. Cyber Command, speaks on a panel at the Intelligence and National Security Summit. Photo by Herman Farrer

The cyber activities of Russia to try and impact the U.S. presidential elections of 2016 and 2020 are well known, spoken about by U.S. military cyber and other leaders. Going forward toward the mid-term election of 2022, the roster of countries attempting to harm U.S. processes is growing, reports Gen. Paul Nakasone, USA, commander, U.S. Cyber Command. And the command is already preparing to protect the 2022 elections.

August 1, 2021
By Shaun Waterman
Airman 1st Class William King, USAF, technician, 352nd Special Operations Support Squadron, troubleshoots a modem connected to a parabolic dish in August, at RAF Mildenhall, England. JADC2 relies on globe-spanning high bandwidth links like these. U.S. Air Force photo by Airman 1st Class Joseph Barron

Earlier this year, Defense Secretary Lloyd Austin signed off on the U.S. Defense Department’s first-ever strategy for Joint All-Domain Command and Control, or JADC2, giving his imprimatur to an ambitious vision of a fully networked U.S. military.

JADC2 aims to provide rear-echelon commanders with continuous connectivity to front-line sensors, providing real-time data and offering an unassailable decision advantage to U.S. forces.

On the digitally managed battlefield envisaged by JADC2, autonomous vehicles and networked weapons would be remotely controlled via cloud-based AI-enabled software, so that a coordinated attack by land, sea, air and cyber forces can be launched with the swipe of a finger.

August 1, 2021
By Cmdr. Erika De La Parra Gehlen, USN
National security objectives can only be achieved when the government and private sector work together. NSA

As China continues to threaten U.S. national security through a whole-of-society warfare strategy, a government-private sector partnership must be a fundamental component of the U.S. government’s approach to information advantage and countering China’s attacks.

July 29, 2021
By George I. Seffers
A new threat-based strategy and a reorganization at the Defense Intelligence Agency will help the agency more effectively share intelligence on competing countries such as China and Russia. Credit: helloRuby/Shutterstock

The Defense Intelligence Agency (DIA) will release a new threat-based strategy very soon and is undergoing a reorganization to create a Directorate for Global Integration, says Lt. Gen. Scott Berrier, USA, the agency’s director.

“We have some changes at DIA that are cooking right now. The first is a new strategy. That is a strategic approach that includes intelligence advantage, a culture of innovation, allies and partnerships, and an adaptive workforce,” he says.

July 13, 2021
By Kimberly Underwood
A view of Taipei, Taiwan’s capital city, extends over the horizon. Military action by China against Taiwan may “only be a matter of time, and not a matter of ‘if,’” warns Rear Adm. Michael Studeman, USN, the intelligence leader, or J-2, of the U.S. Indo-Pacific Command. Credit: Shutterstock/SkyImages

For 25 years, Rear Adm. Michael Studeman, USN, director, J-2, U.S. Indo-Pacific Command, has been sounding the warning bell about the government of China and the threat it brings to the world and the United States. The threat is real, and China’s intent is clear, the leader has warned. The United States must now examine the time elements associated with China’s dangerous moves, the intelligence leader says. 

June 16, 2021
By Robert K. Ackerman
Credit: Devis M/Shutterstock

NATO is increasing the amount of joint work on command and control (C2) systems as a result of increases in common funding, according to the alliance’s secretary general. Jens Stoltenberg told a media roundtable that “We are on the right track” as the allies are stepping up to meet changing challenges. These efforts include developing an offensive cyber capability and establishing a unified approach to China.

April 15, 2021
By Robert K. Ackerman
Credit: William Potter/Shutterstock

From the virtual realm to zero gravity, China is posing a serious threat to U.S. national security that goes far beyond the Earth. With a strategic thrust designed to buttress and expand the reach of the Chinese Communist Party, the country is engaged in a long march for control that currently includes operations inside the United States as well as in orbit and beyond.

April 13, 2021
By Robert K. Ackerman
Sittipong Phokawattana/Shutterstock

Global changes increasing at an accelerated pace will drive new threats to international security, and some of these are already manifest in the worldscape, according to a pair of just-released U.S. intelligence community forecasts. Yet the diversity of these changes and their possible outcomes offer different potential scenarios ranging from “a renaissance of democracies” to “tragedy and mobilization.”

March 2, 2021
By Robert K. Ackerman
Credit: FOTOGRIN/Shutterstock

China’s quest for global dominance is definitive and open, said the director for intelligence (J-2) in the U.S. Indo-Pacific Command (INDOPACOM). Rear Adm. Michael Studeman, USN, held little back as he described China’s maneuvering and aggressive tactics as it pursues a long-term strategy of world domination.

April 9, 2021
By Robert K. Ackerman
A communications tower for military 5G rises above a forest. Several challenges loom as the U.S. Defense Department strives to implement 5G into the force. Credit: M.Moira/Shutterstock

The revolutionary advantages offered by defense use of 5G technology could be undone if the United States doesn’t begin now to meet and overcome a set of challenges, said an expert from the National Security Agency (NSA). These challenges range from developing effective security measures to ensuring the supply chain is not contaminated by parts made by foreign adversaries.

April 1, 2021
By Shaun Waterman
NASA astronauts Shannon Walker (l), Victor Glover (second from l), Japan Aerospace Exploration Agency (JAXA) astronaut Soichi Noguchi (second from r), and NASA astronaut Mike Hopkins (r), walk toward their SpaceX Crew Dragon spacecraft at NASA’s Kennedy Space Center in Florida. The November launch was the first time NASA personnel had traveled into orbit aboard a commercial space vehicle.  NASA/Joel Kowsky via Flickr

Ever since the Sputnik scare of 1957, space has been front and center on the U.S. national security agenda. Successive administrations have highlighted the essential role of space-based capabilities such as GPS, satellite imagery and real-time global communications in undergirding U.S. military power.

March 17, 2021
By Kimberly Underwood
The United States already is losing positional advantage to China in the Western Hemisphere, in our own “neighborhood,” warns Adm. Craig S. Faller, USN, commander, U.S. Southern Command, testifying before Congress on March 16.

China is using the COVID-19 pandemic to progress its goal of global dominance. The adversary is using its vaccination program and assistance to poorer countries in the democratic Western Hemisphere to cement the use of China’s 5G communications and information technology, especially in the Caribbean and Central and South America, leaders say. The problem is that what starts as a veiled commercial interest ends with a significant military application and connection—given that the commercial companies, like Huawei, are all state owned, explained Adm. Craig S. Faller, USN, commander, U.S. Southern Command.

March 4, 2021
By George I. Seffers
China is often first in the information operations competition, keeping the United States and its allies and partners in the Asia Pacific on defense. Credit: andriano.cz/Shutterstock

With its rapid-fire information operations campaign, China effectively outguns the United States and its partners and allies in the Indo-Pacific region, according to three military officers from the United States and Australia.

March 3, 2021
By Kimberly Underwood
The newly commissioned National Security Cutter Midgett conducts sea trials on February 25. The U.S. Coast Guard needs to be more nimble in the Pacific region. Credit: U.S. Coast Guard Headquarters photo courtesy of Huntington Ingalls Industries

The seas of the Indo-Pacific region are an increasingly complex maritime environment. To combat an increase in nefarious activity, protect U.S. economic security and thwart brazen adversaries, the U.S. Coast Guard is adding resources to its operations there, says Vice Adm. Linda Fagan, USCG, commander, U.S. Coast Guard Defense Force West and commander, Pacific Area, presented a keynote address Thursday at AFCEA’s TechNet Indo-Pacific conference.

March 1, 2021
By Robert K. Ackerman
The USS Wilbur (l) conducts replenishment at sea with Japanese and French ships. The U.S. Indo-Pacific Command is expanding its exercise and training activities with allies and partners to boost its deterrent capabilities across the vast region.  U.S. Navy courtesy of Japan Maritime Self-Defense Force

“The erosion of conventional deterrence vis-à-vis China” is the greatest danger the United States faces in the Indo-Pacific region, says the head of the vast area’s command. Adm. Philip Davidson, USN, commander of the U.S. Indo-Pacific Command (INDOPACOM), added that “without a valid and convincing conventional deterrent, China will be emboldened to take action to supplant the established rules-based international order.”

March 1, 2021
By Maryann Lawlor
China’s consolidated control its political mechanisms enables a unity of effort difficult to achieve in democracies. Credit: Shutterstock/Poring Studio

The rise of the People’s Republic China as a peer competitor vying for superpower status has emerged as an important challenge for the United States. To confront this competition, policy and decision makers must preserve and extend U.S. global interests to deter China if necessary and work in the international system in which the United States plays a vital role.

March 1, 2021
By Robert K. Ackerman
Credit: DHS

The entire nation must engage in an informed debate about cybersecurity and how to stop the damage being inflicted by adversaries through cyberspace, says the director of intelligence for the U.S. Cyber Command. Brig. Gen. Matteo Martemucci, USAF, J-2 for the U.S. Cyber Command, says this debate must explore whether the roles played in cyber defense stay the way they are or change.

February 8, 2021
By Robert K. Ackerman
Gen. John Raymond, USSF, chief of space operations, is seeing increased cooperation among the new U.S. Space Force and international partners.

The formation of the U.S. Space Force has led to more advanced cooperation in the space domain with existing and new partners, according to the force’s chief of space operations. Gen. John Raymond, USSF, noted that some nations even followed the U.S. example in giving space an increased priority as a warfighting domain.

Speaking at a Defense Writers Group media roundtable, Gen. Raymond stated that the United States is stronger as a nation with a stable and secure space domain. “The United States is a spacefaring nation, and we’ve long known that access to space and freedom to maneuver in space underpin all the instruments of our national power,” he declared.

February 2, 2021
By Robert K. Ackerman
China owes much of its economic growth to technologies purloined from the United States via cyber espionage. Credit: Sangoiri/Shutterstock

The greatest threat the United States faces is through cyber attacks on economic targets, and the worst adversary in this realm is China, according to the director of intelligence for the U.S. Cyber Command. Brig. Gen. Matteo Martemucci, USAF, J-2 for the Cyber Command, declared that China’s pilferage of intellectual property represents a major strike against the United States as part of the Middle Kingdom’s plan for global domination.

December 2, 2020
By George I. Seffers
The vast troves of personal data on U.S. citizens are now being weaponized by foreign adversaries, panelists warn.at TechNet Cyber. Credit: Meranna/Shutterstock

Massive amounts of sensitive information on U.S. citizens are being collected, created, shared, bought and sold, and in some cases used as a weapon by the country’s adversaries, according to a panel of experts speaking at the AFCEA TechNet Cyber conference, a virtual event held December 1-3.

The information is gathered and sold by companies such as Facebook and Google and the producers of a wide range of applications, programs and technologies. 

November 4, 2020
By Kimberly Underwood
Cybersecurity officials reporter few cyber attack interruptions on Election Day. Credit: Shutterstock/vesperstock

Despite attempts from adversaries such as China, Iran and Russia to compromise voting on America’s Election Day, the election system worked well, even with the record levels of voting, reported senior officials with the U.S. Department of Homeland Security’s (DHS’) Cybersecurity and Infrastructure Security Agency (CISA). The cybersecurity concerns now move to protecting the final vote counting, canvasing, auditing, certification and inauguration phases.

September 22, 2020
By Robert K. Ackerman
Ships of the U.S. Navy, the Indian Navy, the Japanese Maritime Self-Defense Force and the Republic of Philippine Navy transit through international waters in the South China Sea. Nations increasingly are working together in the face of Chinese aggression in the region. Credit: Japanese Maritime Self-Defense Force

In its quest for global supremacy, China has overtaken the United States in some areas but remains uncertain of its own position in head-to-head competition. The United States can take advantage of this status, but must be careful of overconfidence.

These were two key points expressed by Rear Adm. Michael Studeman, USN, director of intelligence/J-2, U.S. Indo-Pacific Command (INDO-PACOM). Speaking at a virtual AFCEA Hawaii Chapter luncheon, Adm. Studeman cited these elements as he focused on seven myths about China.

September 18, 2020
By Robert K. Ackerman
Credit: Shutterstock/stefano carniccio

The United States and its great power rivals are taking different paths in their pursuit of artificial intelligence (AI), but all three are devoting significant resources to what they believe will be a game changer. Their uses of AI also are likely to be different, as their approach to ethics varies according to each nation’s principles.

A breakout session panel provided a global view on the race for AI during the third and final day of the AFCEA/INSA Intelligence and National Security Summit being held online September 16-18. Panelists assessed the differences in AI research and applications among Russia, China and the United States.

September 17, 2020
By Robert K. Ackerman
Credit: Shutterstock/Photomarine

China is steadily pursuing its global goals based on a series of core issues that are not likely to be affected by international actions, said a panel of experts. The United States must take bipartisan actions to boost its own standing relative to China, even if the upcoming election results in a change of parties in the White House come January 2021.

These were among many points introduced by experts in a breakout session during the second day of the AFCEA/INSA Intelligence and National Security Summit being held online September 16-18. They assessed China’s activities in and against the United States and recommended some actions to be taken by U.S. leaders.

September 16, 2020
By Robert K. Ackerman
Credit: Shutterstock/Gorodenkoff

Just as with terrorism, disinformation can be home-grown and as damaging to a democracy as its foreign counterpart. It will take a partnered effort among all people and elements of a democracy to combat disinformation and restore truth to its mantle of supremacy before the institutions that underpin freedom crumble under the weight of lies and other propaganda. The threat is growing and is widespread, as purveyors of falsehoods adjust their tactics to increase effectiveness.

September 1, 2020
By Robert K. Ackerman
Credit: Shutterstock/FOTOGRIN

China’s global moves to gain technological hegemony over 5G and reshape the Internet to suit its own needs offer the potential to give the Middle Kingdom control over the telecommunications market and information itself. At the very least, it would achieve market dominance. But at most, it would control both the nature of the Internet and the information that flows through it, say Internet experts.

August 28, 2020
By Robert K. Ackerman
Credit: Shutterstock/Herr Loeffler

U.S. trade secrets are being stolen by Chinese espionage at an alarming rate, and a Justice Department initiative is focusing on stopping the stealing. While cyber espionage is well known and hugely effective, the insider threat has shown to be equally damaging as the Middle Kingdom fuels its economic and military sectors with state-of-the-art U.S. technology.

July 22, 2020
By Robert K. Ackerman
U.S., Australian and Japanese forces participate in a trilateral exercise dedicated to a free and open Pacific. These and other nations are worried about China's aggression in the wake of the Middle Kingdom reneging on its 50-year promise of economic and political autonomy to Hong Kong. Credit: U.S. Navy photo

The COVID-19 pandemic has had a sweeping effect across the Indo-Pacific region, but ultimately the most disruptive security threat to that vast area may turn out to be China’s strongarm moves against Hong Kong, says the head of the U.S. command for that region. Adm. Phil Davidson, USN, commander of the U.S. Indo-Pacific Command, specifically cited the Hong Kong crackdown as having a greater effect on security over that hemisphere of the globe.

July 8, 2020
By Robert K. Ackerman
Credit: Shutterstock/metamorworks

Last of a multipart series.

The success of China’s foray into Internet control ultimately may be determined by the growth of the Internet itself, according to an Internet expert. While China seeks economic benefit from having its prime technology companies become the providers of choice for Internet customers, it also looks forward to being able to control Internet use outside of its borders. The ongoing evolution of the Internet, particularly its spread into a growing number of devices, may be China’s best asset for realizing its aims.

July 10, 2020
By Robert K. Ackerman
Credit: Shutterstock/Wth

Threats to global security now include the ongoing pandemic, its exploitation by international malefactors and climate change, according to an ad-hoc group of international defense and national security experts. These experts spent two days brainstorming the future online, and their findings were analyzed by the world’s most well-known artificial intelligence (AI) computer.

Titled “Securing the Post-COVID Future,” the event exchanged ideas among active duty military and civilian expertise with several international organizations. Findings during the 50-hour nonstop event were evaluated by tools from Watson, IBM’s question-answering computer that bested Jeopardy!’s top two champions in a competition a few years ago.

July 8, 2020
By Kimberly Underwood
Air Force Lt. Gen. Ken Wilsbach performs preflight procedures in his F-22 Raptor before his final flight as commander of the Alaskan Command, Alaskan North American Aerospace Defense Region and Eleventh Air Force, at Joint Base Elmendorf-Richardson, Alaska, in August 2018. Gen. Wilsbach takes the helm as commander of the Pacific Air Forces, succeeding Gen. Charles Brown, who is moving to be the next chief of the Air Force. Credit: U.S. Air Force photo by Alejandro Peña

After two years as the commander of the Pacific Air Forces, or PACAF, Gen. Charles Brown Jr., USAF, moves on from guiding airmen and operations in the complicated region. During a time of growing near-peer competition from China, Gen. Brown leaves advice for the new commander of PACAF, Lt. Gen. Kenneth Wilsbach, USAF. Gen. Wilsbach, who also will receive his fourth star, takes the helm at PACAF today.

Previously, Gen. Wilsbach was the commander of the 7th Air Force and the deputy commander of U.S. Forces in Korea.

When asked what advice he would give to the new PACAF commander, Gen. Brown, speaking virtually to AFCEA International’s Hawaii monthly chapter meeting last week, suggested that, “relationships really matter.”

July 2, 2020
By Robert K. Ackerman
Credit: Shutterstock/AlexLMX

Third of a multipart series.

The seeds of future telecommunications are being planted in China. But the question remains, will they take root globally?

China’s cyber policy has both economic and political sides to it. On the economic side, flooding the global market with subsidized Chinese-made technologies offers the chance for major financial rewards as this equipment and its services become ubiquitous. On the political side, introducing Chinese standards to the Internet and cellular service will give the nation control over both services and data.

June 24, 2020
By Robert K. Ackerman
Credit: Shutterstock/Aleksandar Malivuk

Second of a multipart series.

China’s high-technology communications and networking industries are proposing a host of future capabilities to come if vendors cast their lot with companies such as Huawei and ZTE. But these new technologies, once ensconced, would lead their users down a path closed to others and open to Chinese government control, say Internet experts.

June 18, 2020
By Robert K. Ackerman
Credit: Shutterstock/AlexLMX

First of a multipart series.

The next-generation Internet proposed by Huawei and supported by the Chinese government would provide a platform for revolutionary capabilities while implementing repressive measures that would eliminate today’s open communication. At worst, it would place control of Internet content in the hands of a few masters. But even if it does not subsume the entire Internet, it would cripple the interoperability that has characterized the network’s value as an economic growth engine by creating separate and unequal Internets.

June 24, 2020
By Kimberly Underwood
Air Force intelligence leader warns U.S. industry of growing risk from China's goal of intellectual property theft to undercut U.S. national security. Pictured, a F-35A Lighting II waits to taxi on the runway at Hill Air Force Base, Utah on May 20. Credit: U.S. Air Force photo by R. Nial Bradshaw.

U.S. adversaries are trying to take control of cyberspace as a medium, resulting in implications to our freedom of maneuver and access in cyberspace, says Brig. Gen. Gregory Gagnon, USAF, director of Intelligence (A2), Headquarters Air Combat Command (ACC), Joint Base Langley-Eustis. Increasing cyberspace activity is coming from China, Russia, Iran and North Korea.

“We are seeing it not just in volume, but we are seeing an expansion in the ways that they use cyberspace, whether it is to steal information, whether it is to directly influence our citizens or whether it is to disrupt critical infrastructure,” Gen. Gagnon reports. The general spoke at the AFCEA Tidewater chapter’s recent monthly virtual luncheon.

April 30, 2020
By George I. Seffers
The ongoing COVID-19 pandemic has revealed weaknesses in the medical industrial base, including a dependency on China, indicates Ellen Lord, undersecretary of defense for acquisition and sustainment. Credit: Tumisu/Pixabay

The United States is overly dependent on foreign sources, especially China, for personal protective equipment such as the gear required during pandemics, including the ongoing COVID-19 outbreak, according to Ellen Lord, the undersecretary of defense for acquisition and sustainment.

Lord made the comments during an press April 30 press briefing that was streamed online.

March 3, 2020
By Robert K. Ackerman
Adm. Philip S. Davidson, USN, commander, U.S. Indo-Pacific Command, warns of Chinese aggression in his Tuesday keynote luncheon address at WEST 2020. Photo by Michael Carpenter

A broadly expanded and multifaceted training effort entailing multiple friends and allies will be necessary to forestall Chinese adventurism in the Indo-Pacific region, said the commander of U.S. forces there. Adm. Philip S. Davidson, USN, commander, U.S. Indo-Pacific Command, laid out an extensive description of the threat China poses to the global community on the final day of WEST 2020, the conference and exposition in San Diego March 2-3 co-sponsored by AFCEA International and USNI.

February 21, 2020
By Robert K. Ackerman
Adm. James Stavridis, USN (Ret.), is an operating executive for The Carlyle Group and former supreme allied commander of NATO.

The United States is woefully underprepared to protect cyberspace against the worst-case scenarios threatening the country, says the former supreme allied commander of NATO. Adm. James Stavridis, USN (Ret.), operating executive for the Carlyle Group, warns that long-term solutions must be paired with near-term actions to prevent a host of cyber threats from crippling the United States militarily and economically.

February 1, 2020
By George I. Seffers
The National Spectrum Consortium, a Defense Department research and development organization, is central to the Pentagon’s efforts to gain dominance in the 5G arena.

The United States and China are locked in a competition to take command of fifth-generation spectrum technologies known as 5G. Because those technologies will enable autonomous vehicles, smart cities and battlefield operations, the leading nation will reap commercial, economic and military benefits. To spur U.S. innovation, the Defense Department is largely relying on the National Spectrum Consortium, a research and development organization designed to develop revolutionary spectrum-related technologies through collaboration among industry, academia and government agencies.

December 11, 2019
By George I. Seffers
The Defense Department has added to new 5G-related requests for prototype proposals to its efforts with the National Spectrum Consortium. Credit: Wit Olszewski/Shutterstock

The U.S. Defense Department has released two more draft requests for prototype proposals seeking fifth-generation (5G) wireless solutions. The newly announced projects are for smart warehousing and asset management for Naval Supply Systems Command and augmented reality and virtual reality at Joint Base Lewis-McChord in Washington.

November 19, 2019
By Robert K. Ackerman
Adm. Phil Davidson, USN, commander, U.S. Indo-Pacific Command, speaks at TechNet Indo-Pacific. Credit: Bob Goodwin Photography

China has no ambiguities about its concept of the global future. The rising superpower wants to replace the current system of international laws and guaranteed freedoms with one built around Chinese control of geography, commerce and information.

Thus defined, this challenge formed the basis of the keynote luncheon speech on the first day of TechNet Indo-Pacific, held November 19-21 in Honolulu. The speaker was Adm. Phil Davidson, USN, commander, U.S. Indo-Pacific Command (INDOPACOM), and he pulled no punches in describing how China has dropped all illusions of peaceful coexistence in its drive toward global domination.

October 23, 2019
By Robert K. Ackerman
U.S. Navy cryptologic technicians stand watch in the combat information center of the USS Milius in the East China Sea. U.S. Indo-Pacific Command (INDOPACOM) intelligence experts are addressing the long-expected emergence of China as a regional adversary with global intentions. (U.S. Navy photo by MC2 Taylor DiMartino, USN)

The U.S. Indo-Pacific Command (INDOPACOM) harbors no illusions about China’s capabilities and intentions, its officials say. Experts who long have followed the Middle Kingdom’s official publications and statements have understood the nation’s aggressive nature and threat to peace and security, according to the director of intelligence (J-2) for INDOPACOM. These issues are now front and center for INDOPACOM as China expands its military and political reach to disrupt the peace and security of the entire Indo-Pacific region.

July 1, 2019
By Chris Nissen
Bill Bickert, assistant commander for supply chain management policy and performance, Naval Supply Systems Command, visits the command’s Fleet Logistics Center–Jacksonville, Florida, headquarters. Supply chain monitoring software is useful; however, ensuring suppliers are providing clean components is crucially important as well. Photo by Carol Williams

Adversaries are exploiting the inherent vulnerabilities of U.S. military supply chains that involve tens of thousands of private sector providers from all over the globe. Attack operations include stealing valuable technical data; striking critical infrastructure, manufacturing and weapon systems control systems; corrupting the quality and assurance across a broad range of product types and categories; and manipulating software to access connected systems and to degrade systems operation integrity.

May 7, 2019
By Kimberly Underwood
The FBI’s Cyber Division is strengthening its investigative capabilities to battle more and more digital-based crimes from global adversaries, says Amy Hess, executive assistant director of the FBI’s Criminal, Cyber, Response, and Services Branch. Credit: Atlantic Council/Image Link

The FBI has a full plate: fighting public corruption, organized and white-collar crime and domestic and foreign terrorism; solving violent crimes; protecting civil rights; neutralizing national security threats, espionage and counterintelligence; and mitigating threats of weapons of mass destruction, among other responsibilities. And one part of the bureau is growing to protect the nation against cyber threats.

February 13, 2019
By George I. Seffers
Thomas Modly, undersecretary of the Navy, discusses Chinese mercantalism while speaking at West 2019. Photo by Michael Carpenter

China is investing heavily in the Indo-Pacific, a critical region of the world for strategic purposes, and luring poorer countries away from the United States, said Thomas Modly, undersecretary of the Navy.

Modly made the comments during an afternoon luncheon address on the first day of the West 2019 Conference in San Diego.  

January 23, 2019
By Joe Marino
Delivering innovative technologies into the hands of warfighters requires streamlined acquisition processes. Photo by Marine Corps Lance Cpl. Drake Nickel

The response to the Chief of Naval Operations (CNO) Adm. John Richardson’s repeated request to “pick up the pace” of developing and implementing breakthrough technologies for our warfighters has gone, in my opinion, largely unheeded.

This is not the result of a lack of innovative solutions. A myriad of research and development programs exists to support the development of new technologies or to adapt existing commercial technologies to defense applications. Rather, it’s the result of an arcane acquisition process that is burdensome, expensive and lacking vision. Acquisition reform is where we need to pick up the pace!

November 1, 2018
By Lt. Col. Jon Erickson, USAR
Soldiers demonstrate the Command Post Computing Environment prototype at Aberdeen Proving Ground. With a new single tactical server infrastructure plus a common software baseline, it will provide soldiers an underlying core command post system. U.S. Army photo by Dan Lafontaine, PEO C3T

The Warfighter Information Network–Tactical program delivered a digital transformation, enabling maneuver elements to move faster and provide commanders with vital battlefield information in near real-time. Its flexibility facilitated communications in Iraq’s urban environments and Afghanistan’s mountainous terrain. Although a powerful improvement over Mobile Subscriber Equipment, the technologies are not powerful enough to combat adversaries wielding cyber capabilities.

October 1, 2018
By Lt. Gen. Robert M. Shea, USMC (Ret.)

China is at the heart of many key geopolitical issues confronting the Indo-Pacific region. It has seen dramatic and unprecedented economic growth in the last three decades and is embarked on a path supporting that growth with a major expansion in military capabilities. China is a nation on the move, and its strategic behavior underscores a long-term goal of seeking hegemony over the vast Indo-Asia region where it resides and likely exerting extraordinary influence over global affairs.

China’s growth continues apace. Having surpassed Japan in gross domestic product, China is poised to overtake the U.S. economy as the world’s largest in the next decade. By some widely accepted standards, it has already done so.

September 27, 2018
Posted by Kimberly Underwood
President Donald Trump departs from the South Lawn of the White House on September 6.  With the issuance of the new National Cyber Strategy, the president promises his administration "will act to further enable the Department of Homeland Security (DHS) to secure federal department and agency networks.” Credit: Shealah Craighead

With the United States engaged in a “long-term strategic competition” with China and Russia, which are mounting persistent cyber attack campaigns that pose long-term risks to America, the U.S. military will act to deter aggression, cyber or otherwise, according to a new policy, known as the Department of Defense Cyber Strategy, from the U.S. Department of Defense.

August 13, 2018
Posted by Kimberly Underwood
China has a significant military presence in the South China Sea that is supported by “unprecedented" levels of signals intelligence activity, says David Stupples, professor of electronic and radio systems, City, University of London. Graphic Credit: David Rosenberg, Middlebury College (www.southchinasea.org).

For the last decade, “informatization” of its national civilian and military infrastructure has been a top priority for the People’s Republic of China. The country’s efforts to become a global power in information and communications technology include a focus on signals intelligence. Out of its $150 billion total defense budget, the country is spending an estimated $15 billion on signals intelligence, said David Stupples, professor of electronic and radio systems, City, University of London, at an August 9 Association of Old Crows (AOC) online event.