On the second day of TechNet Cyber, held in Baltimore, keynote speaker Katie Arrington, who is performing the duties of chief information officer (PTDO CIO), cited the importance of non-kinetic ...
Ensuring our nation has a capable, qualified and ready-to-deploy cyber workforce is a national security imperative. We can’t ignore shortfalls and hope for the best. We can’t rely on computer networks ...
WR Systems LTD., Fairfax, Virginia, is being awarded $13,400,925 for a non-commercial, cost-plus-fixed-fee, indefinite-delivery/indefinite-quantity contract for ...
The Department of the Air Force (DAF) is on the hook for meeting the challenge of air- and space-related joint all-domain command and control. Having spent the last couple of years validating the ...
In an era dominated by technological advancement, space technology has become a key element in communication, navigation, national defense and global surveillance, reshaping the landscape of national ...
After several years of development and experimentation, U.S. Army officials are applying their initial continuous authority to operate (cATO) projects to existing software. The Department of Defense ...
Drug traffickers expand the use of submersible vessels to transport illicit substances as states struggle to detect them. This whack-a-mole game sees cartels improve the seaworthiness and technologies ...
The 3-year-old Cybersecurity Directorate (CSD) at the 70-year-old National Security Agency/Central Security Service (NSA) is growing, especially in Texas. While the agency’s headquarters is at Ft.
The People’s Republic of China (PRC) continues to control its citizens living abroad through a sophisticated low- and high-tech system of technology surveillance and social pressure. This includes ...
In late 2022, the People’s Republic of China issued the world’s first deep fake regulation. The communist country sought to limit artificial intelligence creations, or deep synthesis, that went ...
As artificial intelligence (AI)-based systems become more prevalent and sophisticated than ever before, defense officials are exploring new ways to ensure that these models are protected against ...
Today, with almost infinite sources and publicly available sensors, open-source intelligence (OSINT) collection has achieved high sophistication and allows, for example, the ability to follow ...