Threat Data Biggest Worry For F-35A’s IOC; But It ‘Will Be On Time’
Posted on
PENTAGON: The F-35‘s highly sensitive sensors suffer a basic problem right now: They often aren’t sure what they are detecting. That results in a high rate of false alarms. The key to fixing this lies in building highly complex data files — what we can colloquially call the threat library — and integrating them with the Joint Strike… Keep reading →
Cyber Subs: A Decisive Edge For High-Tech War?
Posted on
THE FUTURE: Imagine you’re a Chinese high commander, taking stock at the outbreak of the next great war. All your aides and computer displays tell you the same thing: For hundreds of miles out into the Western Pacific, the sea and sky are yours. They are covered by the overlapping threat zones of your long-range land-based missiles, your… Keep reading →
Build A ‘Department Of Cyber:’ Former DNI McConnell
Posted on
PENTAGON CITY: Sen. Susan Collins has a bill about how to improve cyber sharing that should go to markup next week and she spoke about the challenges cyber poses to the government this morning at the Intelligence and National Security Alliance annual conference here. Three former directors of National Intelligence — John Negroponte, Mike McConnell and… Keep reading →
Army Explores New Missile Defense Options
Posted on
ARLINGTON: Hitting a bullet with a bullet is an astounding feat. But now that US missile defenses can do it routinely, we’re realizing it’s not enough. As technology spreads around the world, more countries are getting larger numbers of more capable missiles. A cash-strapped America can’t afford to shoot down each incoming threat with a… Keep reading →
Chinese Stole Anthem Data For HUMINT; Should Raise US ‘Hackles’
Posted on
The Chinese just walked out of Anthem’s enormous data warehouse (though without encrypting their data it might as well have been a troop of Girl Scouts) with personal data on a quarter of America’s population. Assuming that the pro forma outrage and denial is a confirmation of culpability, the People’s Liberation Army and its various subsidiaries will… Keep reading →
RAND Spots China’s ‘Potentially Serious’ Weak Spots
Posted on
WASHINGTON: “We have found that the PLA suffers from potentially serious weaknesses.” That is the simple and powerful declaration of a new study of China’s military by the RAND Corp., done at the behest of the congressionally-mandated U.S.-China Economic and Security Review Commission. What are those Chinese weaknesses? The report, again, is admirably clear. “The first is… Keep reading →
Navy Submariner Takes Pentagon Cyber Post
Posted on
WASHINGTON: The Pentagon named a Navy cryptologist to a top cyber policy position today. Rear Adm. Sean Filipowski, who’ll get his second star with the new job, is a protégé of former NSA director Gen. Keith Alexander. Filipowski even served as Alexander’s intelligence chief at US Cyber Command — a position that requires keeping on… Keep reading →
Second Course Of Last Supper? Harris To Buy Exelis
Posted on
UPDATED: Insights From Steve Grundman, Former DUSD Industrial Affairs WASHINGTON: For several years, senior Pentagon officials have said they don’t expect or encourage mergers of the giant defense companies, but mergers and acquisitions of smaller entities might well make sense. The first example we saw was the merger of ATK and Orbital Sciences. Today, Harris… Keep reading →
The Phantom 2016 Budget: What Will Congress Grant?
Posted on
UPDATED: Adds HASC Chair And Ranking Reactions; Quotes Deputy Secretary Bob Work On Congress, Budget, Strategy PENTAGON: The Obama administration wants to increase the money spent on weapons in 2016 by $14.1 billion over what Congress approved in December. It’s a rare move by an administration to increase procurement so vigorously. In fact, the two largest… Keep reading →
Cybersecurity Now Key Requirement For All Weapons: DoD Cyber Chief
Posted on
WASHINGTON: Cybersecurity — it’s not just for networks anymore. The trend towards what’s called “the Internet of Things” means targets can be anywhere. “If there is a computer in something, it can be cyber-attacked, and we need to be able to harden it and defend it,” the Pentagon’s Deputy Chief Information Officer for Cybersecurity, Richard Hale,… Keep reading →