Sen. Ayotte Pledges Hold On Amb. Rice Nomination For State
Posted on
[After meeting this morning with Amb. Susan Rice, Senator Kelly Ayotte, R-NH, spoke to reporters today at a 12noon roundtable at the Foreign Policy Institute’s annual conference, where she promised there “absolutely” would be a hold if Amb. Rice is nominated for Secretary of State — and potentially, a hold on any administration nominee for… Keep reading →
Witty Video Pokes Fun At Petraeus, Allen Muddle
Posted on
Our clever Chinese friends at Next Media Animation have done it again with a video offering their unique perspective on the scandal that has enveloped two of our top military leaders — and several women. We haven’t pursued these stories with much gusto, keeping our focus on strategy, policy and politics and leaving the prurient… Keep reading →
Spy Sat Costs Are ‘Unsustainable,’ Warns Space Commander; BTW, Don’t Cut Space, Cyber
Posted on
WASHINGTON: The head of Air Force Space Command worries that tightening defense budgets and looming force structure cuts could reduce his critical space and cyber capabilities. “Because these capabilities are so vital, and the need to maintain local and global capabilities, space and cyber capability doesn’t really scale well with force structure reductions,” Air Force… Keep reading →
DoD, Intel Officials Bullish On Open Source Software; Government-wide Software Foundation In The Mix
Posted on
Defense Department and intelligence community officials have been talking about open source software as the next great thing for government technology programs for years. Why all the love? Speaking at a recent industry gathering, government officials described what they like about the software: it’s affordable, flexible, and can be quickly modified by developers because they… Keep reading →
DNI Clapper Defends Intel Handling of Benghazi Attacks; Ducks Commercial Imagery Question
Posted on
ORLANDO: The terrorists who attacked the Benghazi consulate, killing US Ambassador to Libya Chris Stevens and four others, apparently maintained web, cell and radio silence before they acted, giving the US no hint an attack was imminent. “If people do not emit or discuss their behavior, it’s hard to find out what they are going… Keep reading →
Air Force Seeks Out NASCAR For Video Data Mining Lessons
Posted on
PENTAGON CITY: Hungry for answers on how to make more effective use of the tens of thousands of hours of video gathered by Predators, Global Hawks and other military eyes in the sky, Air Force officials recently visited NASCAR, the car racing people, to learn better and faster ways of mining video data. “We have… Keep reading →
Chinese Spaceplane: Chimera Or Object Lesson In Threat Analysis?
Posted on
China unveils a new “stealth” jet, but we don’t know how stealthy it is or when it might fly actual missions. China unveils a new aircraft carrier. Its leaders boast about extending China’s reach, but the carrier doesn’t have any planes and we aren’t sure when they might build them. Monitoring a rapidly developing China,… Keep reading →
Defense, Deterrence Can Work In Cyberspace, But Don’t Forget Offense
Posted on
CAPITOL HILL: Maybe cyberspace isn’t as fragile as it’s made out to be. “Relax, Chicken Little, the sky isn’t falling,” said Columbia professor Abraham Wagner. “Protection ultimately is easier than penetration.” Wagner’s argument reverses the conventional wisdom that the attacker always has the advantage online. A forthcoming study by the Cyber Conflict Studies Association, for… Keep reading →
HPSCI Chair Rogers Casts Doubts On US Origin Of Stuxnet, Flamer
Posted on
WASHINGTON: Rep. Mike Rogers, chairman of the House intelligence committee, cast doubt today on reports that the Stuxnet and Flamer viruses were the work of the US and Israel. In fact, he argued, it’s against America’s interest to be staging any cyber attacks because the US is so vulnerable to retaliation. “Don’t believe everything you… Keep reading →
Military Debates Who Should Pull The Trigger For A Cyber Attack
Posted on
VIRGINIA BEACH, VA: The American military is intrigued by the offensive uses for cyber-warfare, but it is struggling to figure out how to do it. What impact can cyber weapons have on the battlefield? What organizations should take the lead? And who makes the decision to pull the trigger? “We’ve been thinking 90% defense, 10%… Keep reading →