author archives

Results 1-10 of 152

Better Simulation Could Save the Military Millions

1:21 PM ET How much is a good video game worth? To the military, the answer is billions. Pentagon leaders responding to a new survey conducted by the Government Business Council, GBC, said that the main thing restraining simulation training was "fidelity.” Read that to mean the games just are not feeling realistic ...

What Your Facebook Posts Mean to US Special Operations Forces

January 29, 2015 It was in the 1873 book “On War,” that Prussian military scholar Carl von Clausewitz give birth to the term “fog of war,” writing that “war is the realm of uncertainty; three quarters of the factors on which action in war is based are wrapped in a fog of greater ...

Researchers Develop Program That Can Read Malware’s Mind

January 27, 2015 After a decade in development, researchers from the Oak Ridge National Laboratory, or ORNL, have unveiled a new type of malware detection program that points to the future of cybersecurity tools. It’s called Hyperion, after the Greek titan who first came to understand the movement of the sun and the ...

Did the White House Use Drone Killing Technology?

January 26, 2015 This story has been updated. At about 3 a.m. on Monday morning, a small quadcopter drone, or unmanned aerial vehicle, crashed on the White House lawn. White House officials said that the drone, by itself, was unarmed and didn’t represent a threat. Authorities quickly located the owner, a government employee, ...

The US Military Is Building Gangs of Autonomous Flying War Bots

January 23, 2015 For the Pentagon, drones are cheaper to buy and to operate than regular fighter jets. An armed MQ-9 Reaper drone runs about $14 million, compared to $180 million or more for an F-35 Joint Strike Fighter. But unlike barrel-rolling a jet, the business of actually operating a unmanned aerial vehicle, ...

Why Obama's Cybersecurity Plan May Not Make Americans Safer

January 23, 2015 On Tuesday night, President Barack Obama appeared before the American people and again acknowledged digital data theft and data destruction as one of the most important issues facing the nation: No foreign nation, no hacker, should be able to shut down our networks, steal our trade secrets, or invade the ...

Can You Have a Transparent Spy Agency?

January 22, 2015 To the average American, the term intelligence agency refers to a group of secret military types, locked in a windowless room in Virginia, furtively collecting data on bad guys, good guys, citizens, everybody. That data is delivered up the chain in manila envelops marked “Top Secret.” There’s still some truth ...

What the Cyber Language in the State of the Union Means to You

January 21, 2015 On Tuesday night, President Barack Obama appeared before the American people and again acknowledged digital data theft and data destruction as one of the most important issues facing the nation. “No foreign nation, no hacker, should be able to shut down our networks, steal our trade secrets, or invade the ...

from govexec

Around Government

January 21, 2015 What a Long, Strange Route It’s Been Patrick Donahoe strived to be the Postal Service’s bridge over troubled waters. By Eric Katz Nearly every time Patrick Donahoe makes a public appearance, he asks those who are listening to raise their hands if they still pay their bills through the mail. ...

US, UK Establish a Joint Hacker A-Team To Conduct Cyber War Games

January 16, 2015 The White House on Friday unveiled a series of steps to increase co-operation between the United States and the United Kingdom in combating cyber threats. Those steps include better threat information sharing and the creation of a new joint cyber task force. The U.S. and U.K. already collaborate with one ...