military

The Army, eager to get Federal Aviation Administration permission to fly unmanned aircraft in civilian airspace near its U.S. bases for training, has issued a new directive on the subject and will apply for an FAA Certificate of Authorization to operate drones near Fort Stewart, Georgia.

The United States will police the globe, respond to disasters and shape the international environment much as it has –though our sharpest focus will be on China and the western Pacific — but it will do all that with a significantly smaller land force than it currently has.

COMMENTARY:
The race to keep pace with conventional arms development recently ran head long into the race for cyber dominance–and sustained an eye-opening set-back.

These weapons programs take years to develop and typically cost billions of dollars. But the damage goes far beyond the dollars spent on the program to date. The loss of time in the conventional arms race is perhaps the biggest area of loss and the greatest concern for Defense Department strategic planners. Keep reading →

Last month, I attended the LandWarNet Conference in Tampa where the theme was “Transforming Cyber While At War.”

In preparation for that I had just written an article entitled “Using Social Media Comments To Speculate About Future Cyber Events” which looked at using data analytic tools that can help predict future events from a collection of blog postings. I wanted to demonstrate that and “Build a Traumatic Brain Injury Knowledge base in the Cloud” for the Binary Group, of which the above graphic is part, using another new state-of-the-art technologies. Keep reading →

COMMENTARY:
A new arms race began a few years back and its rapid revolutions will make the cold war era look like a minuscule research project for a white paper!

The new race is to develop offensive, defensive and intelligence collection capabilities for cyber space operations. Keep reading →

COMMENTARY:
Social media is perhaps the greatest tool for mass communication–and for attracting like-minded individuals. That is not new. Back in 2005, for instance, the Journal of International Security Affairs reported on the increased web presence of several major Islamic militias.

Threat intelligence analysis, however, indicates that information and activities within social networking sites is now viewed as one of the primary sources of cyber intelligence on extremist groups and terrorists. Keep reading →

Page 2 of 212