The U.S. is preparing to draw down in Africa in order to concentrate on broader geopolitical threats. ‘As the department implements the [National Defense Strategy] to maintain our global military advantage, we are moving to a more resource-sustainable approach with our counter violent extremist organization campaign,’ Pentagon spokeswoman Navy Cmdr.
“The U.S. Department of Defense ‘failed’ its first-ever audit, expected to be released Thursday, according to its No. 2 official. But Deputy Secretary of Defense Patrick Shanahan isn’t surprised at the result, saying it was widely expected the audit would find issues. A 1990 law passed by Congress required audits
“The Islamic State’s 2014 invasion of Iraq, military futurist Peter Singer writes, ‘was launched with a hashtag.’ #AllEyesOnISIS became a viral propaganda machine that inspired followers, generated bots and is credited in part with driving enough fear to lead thousands of U.S.-trained and equipped Iraqi forces to abandon their posts.
New DoD/Rand report populates searchable, predictive database on sexual assault in the U.S. military
The U.S. Department of Defense recently released a study on sexual assault in the U.S. military. The data it generated from over 170,000 survey responses has formed the basis for all kinds of statistics broken down by gender, location, and service branch, allowing analysts to project the likelihood that any
The Department of Defense has released its first new cyber strategy document since 2015. The document affirms that the U.S. “cannot afford inaction,” and that U.S. cyber operations must more “amplify military lethality and effectiveness” more offensively. Defense officials conducted a review of the department’s cyber capabilities and strategy that
A group of Australian researchers published a paper on how swipes, taps, key strokes, and handwriting on touch screen devices can be used to identify individuals. “While regular tracking tracks virtual identities such as online profiles, touch-based tracking has the potential to track and identify the actual (physical) person operating
Although it has not included a deadline, Congress has proposed high-level exercise led by the DoD in cooperation with the DHS and FBI to prepare civilian agencies to respond to attacks on critical infrastructure. Responding to lawmakers’ claims that the DoD has not adequately prepared, DOD’s CYBERCOM has emphasized that
The Chairman of the Joint Chiefs of Staff has offered to assist in the securing of the U.S.’s election systems for the upcoming midterm elections in November, according to a tweet from a U.S. senator on the Armed Services Committee. A Pentagon spokesperson has also announced that the DoD continues
The appearance of sensitive documents detailing UAV plans and a variety of army manuals have highlighted ongoing cyber-related difficulties within the U.S. military. The plans were accessed through a router vulnerability that had been disclosed two years previously, through the computer of a Air Force captain would have completed a
While Cyber has been a recognized warfare domain for almost ten years, the U.S. is still working to improve information sharing relationships between traditional intelligence entities and cyber operations groups. The problem has been named an “item of special interest” for the DoD and efforts are currently under way to