Threats

No service can fight on its own: JADC2 demands move from self-sufficiency to interdependency

No service can fight on its own: JADC2 demands move from self-sufficiency to interdependency
No service can fight on its own: JADC2 demands move from self-sufficiency to interdependency

Making all-domain operations a warfighting capability means integrating, fusing, and disseminating a sensor picture appropriate for a particular theater segment, not all of them, says the Mitchell Institute’s David Deptula.

Bahrain’s new AH-1Z attack helos matter as much for politics as firepower

Bahrain’s new AH-1Z attack helos matter as much for politics as firepower
Bahrain’s new AH-1Z attack helos matter as much for politics as firepower

While it’s comforting to imagine that US hardware will only be directed at terrorists and Iranian threats, “Bahrain’s history of suppressing internal dissent with external weaponry suggests that these choppers may end up serving a police function during times of crisis, as well.”

The Evolution of Terror Groups Since 9/11: From Tech to Politics

The Evolution of Terror Groups Since 9/11: From Tech to Politics
The Evolution of Terror Groups Since 9/11: From Tech to Politics

Terrorist groups have evolved in the past two decades, some growing powerful enough that they are now seeking to transform into political actors.

Hasty US Pullout from Afghanistan Invokes Regional Talk of Post Pax Americana

Hasty US Pullout from Afghanistan Invokes Regional Talk of Post Pax Americana
Hasty US Pullout from Afghanistan Invokes Regional Talk of Post Pax Americana

America’s allies in the Middle East are weighing options to avoid meeting the fate of the Afghani government, as regional scholars talk of the post Pax Americana era.

Are Israel And Lebanon Heading For Another War?

Are Israel And Lebanon Heading For Another War?
Are Israel And Lebanon Heading For Another War?

Hezbollah continues to develop its arsenal with a continued focus on precision guided munitions, and both Israel and Hezbollah watch for any change in the rules of engagements along the Blue Line.

New Egyptian Base Sends Messages of Support to Libya, Challenge To Turkey

New Egyptian Base Sends Messages of Support to Libya, Challenge To Turkey
New Egyptian Base Sends Messages of Support to Libya, Challenge To Turkey

The opening of the base signifies Egypt’s determination to assert itself as a regional naval power with vast capacities and challenge efforts by its competitors like Turkey to expand their area of influence and control oil and gas rich zones of the Mediterranean.

Proposed ‘Hack-Back’ Bill Tells DHS To Study Allowing Companies To Retaliate

Proposed ‘Hack-Back’ Bill Tells DHS To Study Allowing Companies To Retaliate
Proposed ‘Hack-Back’ Bill Tells DHS To Study Allowing Companies To Retaliate

“So what will happen is you’ll be destroying your grandmother’s computer in Kansas that has been taken over,” cyber policy expert Herb Lin said. “It’s not clear to me that that’s the best way.”

ACK, STITCHES And The Air Force’s Networking Hopes

ACK, STITCHES And The Air Force’s Networking Hopes
ACK, STITCHES And The Air Force’s Networking Hopes

“Believe it or not, we found that the primary barriers to being able to field the software tools are bureaucratic, said Heather Penney of the Mitchell Institute.

US, Allies, Partners Formally Attribute Exchange Hacks To China

US, Allies, Partners Formally Attribute Exchange Hacks To China
US, Allies, Partners Formally Attribute Exchange Hacks To China

“The PRC’s pattern of irresponsible behavior in cyberspace is inconsistent with its stated objective of being seen as a responsible leader in the world,” a senior administration official said on Sunday night.

As America Moves Air Defenses From Middle East, Will Local Partners Step Up?

As America Moves Air Defenses From Middle East, Will Local Partners Step Up?
As America Moves Air Defenses From Middle East, Will Local Partners Step Up?

It is more of a repositioning rather than a withdrawal and “does not reflect any political orientation similar to the one to withdraw troops from Afghanistan,” strategic expert and political researcher Abdullah Al Jenaid tells Breaking Defense.

IBCS Overcomes Electronic Attacks, Downs Cruise Missile

IBCS Overcomes Electronic Attacks, Downs Cruise Missile
IBCS Overcomes Electronic Attacks, Downs Cruise Missile

The test involved electronic attack efforts against radars while previous tests had been directed against the communications systems binding IBCS to its sensors.

‘Sense Of Crisis’ On China-Taiwan: Japan Defense White Paper

‘Sense Of Crisis’ On China-Taiwan: Japan Defense White Paper
‘Sense Of Crisis’ On China-Taiwan: Japan Defense White Paper

Chinese actions in the Pacific are posing a “grave concern” for Japan’s military, a new official paper concludes.

CISA Warns Executive Branch Agencies To Fix Critical Windows Vulnerability

CISA Warns Executive Branch Agencies To Fix Critical Windows Vulnerability
CISA Warns Executive Branch Agencies To Fix Critical Windows Vulnerability

“CISA has validated various proofs of concept and is concerned that exploitation of this vulnerability may lead to full system compromise of agency networks if left unmitigated,” the emergency directive says.

NIST Recommends Agencies Assume They Have Already Been Hacked

NIST Recommends Agencies Assume They Have Already Been Hacked
NIST Recommends Agencies Assume They Have Already Been Hacked

The Security Measures publication focuses on running software, while the Recommended Minimum Standards focuses on developing it.