The range of challenges in urban environments is broad. The enemy defender generally has the advantage. To take back the initiative, the Army should deploy current drone technologies to empower soldiers to address some of the fundamental challenges of urban warfare.
Change is not easy and what the Army has been undertaking with its network strategy can best be described as a paradigm shift. However, wideband technology is a game changer and we should sprint forward to put this capability in the hands of the war fighter. So how and why aren’t we closer to success?
As the fiscal 2018 NDAA winds its way through Congress, it is worth noting how differently the House and Senate are treating matters related to reducing threats from insiders.
Are existing policies and regulations impeding our military’s and intelligence community’s ability to respond and react in a near-real time manner that is a fundamental requirement today?
After more than 15 years of nearly constant deployments, the U.S. military’s balancing act between modernization and readiness is reaching a tipping point.
Multiple technologies are emerging that individually will change multiple aspects of military operations. That is one of the areas where the issue of singularity becomes much more acute.
With all the attention over cyberthreats, one would think the business of national cybersecurity would be very robust. Well, that depends who you talk to.
While many have not heard of or understand cryptocurrencies, you had better take notice — that is for sure! This is a powerful technology whose ramifications mandate that military, intelligence organizations and law enforcement must monitor and understand it.
For decades, our adversaries have been and continue to constantly seek new ways to compete with the United States on a much more level battlefield. Cyber has much, if not all, of what they have been looking for.
Many of those that I asked believe that new and unique approaches to cybersecurity is likely to be the dominant differentiation for new entrants in the cybersecurity field.