“When reached by cell phone the Taliban claimed credit,” said Google Chairman Eric Schmidt referring to Malala Yousufzai, the young woman shot and critically-injured for protesting against the Taliban. “We know their phone number? Hmm. Why don’t we know where they are?”
By Colin ClarkBesides coming up with techniques and technologies to get rid of bombs, the Joint Improvised Explosive Device Defeat Organization also shares that information with U.S. and allied warfighters through an online training portal.
By Colin ClarkFor several days, Bank of America’s systems had problems. The problems – primarily denial of service disruptions – hit their web site and reportedly their mobile banking services. For BofA, the nation’s largest bank based on assets, this was not the first issue or attack they experienced in the past year. Nor in fact, was…
By Sydney J. Freedberg Jr.Borrowing insights gleaned from the FBI and the National Science Foundation, six U.S. lawmakers introduced legislation today to revamp NASA’s leadership structure, using the FBI and the National Science Foundation as models.
By Colin ClarkSharing information with allied nations is also a major consideration for the Pentagon. The Joint Information Environment (JIE) is an important mechanism for supporting coalition operations, explained Army Major General Mark Bowman, Joint Staff director for C4 and CIO.
By Henry KenyonThe US Military services want to derive 3 gigawatts of electric capacity from renewables by 2025, but they don’t have hte budget to pay to build it.
By Jori BellThe Defense Department’s release of a new mobile device strategy late last week provides a revealing snapshot of how much work lies ahead for Defense officials in rationalizing the rapid adoption of smartphones, tablets, and mobile devices across the Department. It also highlights the urgent challenge to secure the use of those devices on Defense…
By Wyatt KashLegislation intended to deter members of Congress from profiting from stock trades based on inside information is inadvertently forcing 28,000 federal employees to expose their personal financial information on the Internet.
By Jori BellThe commitment of the US military to renewable energy is serious, long-term and about guaranteeing energy security for missions, and it is not a short-term environmental program, the US Army’s energy and installations chief stressed today.
By Jori BellA terrific example of modern tactical mobility would be the “Jolted Tactics” initiative (Joint Operational Long Term Evolution Deployable). In essence, Jolted Tactics is all about providing tools and technologies to warfighters in a secure manner – no matter where they are.
By Colin ClarkA number of countries have been hit by Flame, which has been called the most sophisticated pieceof malware seen to date.
By Colin ClarkWASHINGTON — The House passed a defense budget Friday that exceeds the deal cut by Congress and President Barack Obama last summer, and that would have to be paid for with cash taken from poverty programs, health care and the federal workforce.
By Sydney J. Freedberg Jr.WASHINGTON: The White House moved quickly Thursday to name Michael Daniel as President Obama’s cybersecurity adviser to replace retiring Howard Schmidt. Daniel assumed the key position immediately as Congress and the White House continue to spar over how best to protect critical U.S. industries from crippling cyberattacks.
By Colin ClarkThink of this, defense insiders. Walmart boasts twice the revenue of the top five defense companies combined, according to comments made at the Army War College. An interesting nugget at Second Line of Defense, run by Robbin Laird, member of AOL Board of Contributors.
By Colin Clark