Opinion

An array of perspectives and messages from thought leaders in the defense IT and C4ISRNET community.
Cyberattacks don’t win wars
One of the key lessons from the Russian invasion of Ukraine for other militaries is to not abandon land-maneuvering capabilities in favor of investing too much in technology. Both abilities are needed, but not at the expense of one or the other.
How to put the joint in JADC2
As DoD continues to advance JADC2, it must contend with how to create a truly joint approach while avoiding the pitfalls of past attempts at joint systems.
Why has Russia’s emerging tech had so little impact on its invasion of Ukraine?
There is still a possibility that the Kremlin will begin to leverage more advanced technologies in the future. Russia’s military already possess these capabilities, ranging from unmanned ground vehicles previously used in Syria to tactical and loitering UAVs which will arm Russian commanders with clearer battlefield situational awareness and hypersonic missiles.
Washington must do more to support companies facing Russian hackers
Moscow has repeatedly demonstrated that its hackers — which include military and intelligence cyber units as well as “independent” proxies — have the capability to inflict untold damages on the infrastructure and companies the global economy depends upon.
Data transport will decide the next conflict, not hypersonics
As the U.S. and allied defense community evaluate where to focus development and problem-solving resources, it’s important to ask what will deliver the strategic advantage needed in modern warfare.The battlespace has changed, and future conflicts will be fought — and won — differently in the next 30 years than they were in the past.
Cross-Domain Technologies Are the Key to JADC2
JADC2 aims to build a cross-service digital architecture that can enable rapid and precise data exchanges across domains in order to improve decision-making at the strategic, operational and tactical edges of war fighting.
Demilitarize civilian cyber defense, and you’ll gain deterrence
By constantly flexing the military’s cyber muscles to defend the homeland from inbound criminal cyber activity, the public demand for a broad federal response to illegal cyber activity is satisfied. Still, over time, the potential adversary will understand our military’s offensive cyber operations’ tactics, techniques and procedures.
Artificial intelligence brain circuit board
The role of AI in open source intelligence
Today’s AI-enabled platforms empower intelligence analysts to leverage OSINT as the foundation that can help uncover hidden threats, corroborate classified reporting, and pinpoint the targets that warrant resource-intensive, traditional intelligence gathering.
Load More