The U.S. Air Force’s 67th Cyberspace Wing has been busy. The wing operationally acts as the execution arm of Air Forces Cyber, performing comprehensive cyber operations on a service and nation level.
Through its annual awards program, AFCEA International recognizes the outstanding contributions of individuals in the communications, electronics, intelligence and information technology disciplines.
The Terrain Commander from Textron Corporation provides the basis for the U.S. Army's unattended ground sensor (UGS) Future Combat Systems. The sensor assembly is equipped with a variety of optical, ...
The Department of the Air Force (DAF) is on the hook for meeting the challenge of air- and space-related joint all-domain command and control. Having spent the last couple of years validating the ...
Drug traffickers expand the use of submersible vessels to transport illicit substances as states struggle to detect them. This whack-a-mole game sees cartels improve the seaworthiness and technologies ...
With the current war in Ukraine, it’s clear that Russia’s modernization program has involved electronic warfare and signals intelligence and played a huge part in Russia’s combat advances and overall ...
In 2022, amidst the ongoing Russo-Ukrainian conflict, one of the largest cyber attacks fell upon Kyivstar, the largest telecommunications provider in Ukraine, leaving millions without mobile and ...
Soldiers may soon be wearing equipment that physically strengthens and protects them, as well as potentially improves their cognitive abilities on the battlefield. Artillery soldiers carry heavy ...
In late 2022, the People’s Republic of China issued the world’s first deep fake regulation. The communist country sought to limit artificial intelligence creations, or deep synthesis, that went ...
Sandia National Laboratories, the multidisciplinary national security engineering labs in New Mexico, is relying on artificial intelligence (AI) more and more, reports Laura McGill, the new director ...
After several years of development and experimentation, U.S. Army officials are applying their initial continuous authority to operate (cATO) projects to existing software. The Department of Defense ...
For years, the cyber domain was perceived as a virtual one. However, every cyber attack leaves a tangible footprint—a compromised server, a disrupted infrastructure or a breached supply chain. When ...