Cyber News

  • U.S., Ukraine Aim to Implement Strategic Defense Framework

    Secretary of Defense Lloyd J. Austin III met with Ukrainian leaders in the capital city of Kyiv to reinforce ties between the nations and look for ways to implement the Strategic Defense Framework — a roadmap for both countries to follow to strengthen security and defense cooperation.

  • Leaders discuss ballistic missile defense at Vista Intercept 22

    Ballistic missile defense is a critical mission for defending North America. Vista Intercept 22 provided a forum for participants to evaluate NORAD’s threat warning and assessment capabilities and U.S. Northern Command’s ballistic missile defense, integrated deterrence and additional capabilities

  • 168th Cyber Operations Squadron assists and trains Army Guard cyber team

    Since being activated in 2017, the 168th Cyberspace Operations Squadron (COS), operating out of the 132d Wing, Iowa Air National Guard, has executed its mission of providing cyber protections teams to identify, pursue and mitigate cyberspace threats impacting Department of Defense information

  • NATO Ally Contributions to the Space Domain

    This paper discusses U.S. North Atlantic Treaty Organization (NATO) ally space capabilities. In November 2019, NATO recognized space as an operational domain, declaring it on par with the air, land, sea, and cyber domains. NATO’s designation of outer space as an operational domain is a recognition

  • Virtual or not, Air Force Marathon still a big draw

    WRIGHT-PATTERSON AIR FORCE BASE, Ohio -- According to popular running websites, only 1% of the U.S. population has ever completed a 26.2-mile marathon, and those who do finish the race with an average time of 4 hours and 45 minutes.Bill Neitzke, the 88th Air Base Wing’s safety director, is among

  • Wartime Innovation and Learning

    The following case study details how one leader effectively integrated new operational concepts with a novel technological device to generate a capability in a combat theater. A collection of adaptations produced a new military innovation that was developed and tested incrementally and then applied

  • Understanding the Vulnerabilities in China’s New Joint Force

    This article analyzes PLA reforms and identifies vulnerabilities in China’s new joint force. The first section analyzes the changes to the Central Military Commission (CMC), the highest level of the PLA, set in the context of China’s model of national decisionmaking and civil-military relations. The

  • Realizing Energy Independence on U.S. Military Bases

    Near-peer competitors such as Russia and China are working to exploit our aging infrastructure to gain advantage in possible future conflict and destabilize day-to-day operations. This article focuses on domestic military bases and the energy vulnerabilities associated with local grids. As energy

  • Reading the Tea Leaves: Understanding Chinese Deterrence Signaling

    This essay seeks to illuminate Beijing’s deterrence signaling by reviewing key concepts in Western deterrence theory to provide a foundation for discussion. With this foundation laid, the essay then contrasts these concepts with historical PRC deterrence practice to identify nuances and trends.

  • Project Convergence: Achieving Overmatch by Solving Joint Problems

    As the United States confronts Great Power competition (GPC), incremental improvements to individual Service capabilities will not produce a military able to decisively win on the battlefield. The enhanced range, precision, and survivability of our weapons systems are just one part of achieving

  • The Tactical Defense Becomes Dominant Again

    It has become widely accepted that the convergence of technological advances is leading to a revolution in military affairs or perhaps even a military revolution. One of the unanswered questions concerning this shift is whether it will lead to continued dominance by the offense or a period of

  • The Great ShakeOut: what you can do to prepare for an earthquake

    Emergencies can occur in the blink of an eye, with the impact ranging from temporary disruption of activities to a loss of an installation’s ability to perform its assigned missions. Employees receive warnings of approaching weather emergencies, such as blizzards, tornados, floods, etc., in time for

  • Stop the Snowball: Protect Yourself from Phishing Scams

    Technology is the commonality between everything in our daily lives. Whether you’re checking email at home or in the office, or scrolling through social media, you’re connected. That access and freedom is a staple in our country’s advancements and successes, but we can’t forget about those trying to