Cyber sharing
Building partner capacity in cyberspace will make them, and us, less vulnerable
By Lt. Col. Jason B. Nicholson and Lt. Col. David A. Pokrifchak
It’s time for the U.S. military to add …
Read more ›It’s time for the U.S. military to add …
Read more ›When a joint force goes to war at sea, sound command and control requires that the force’s commander clearly state the support relationship between the …
Read more ›From the archive: December 16, 1944
Here’s a letter to the editor from an unnamed lieutenant colonel.
An article in the August 5[, 1944,] issue of the Journal …
Read more ›The Truman National Security Project recently released the fifth edition of the Truman Security Briefing Book, a primer on “the most significant national security and …
Read more ›From the archive: December 14, 1962
Editor’s note: This ambitious order followed the 1956 Project Horizon study led by Wernher von Braun at the Army Ballistic Missile Agency.
Our generation has returned from the battlefields of …
Read more ›Charles E. Berger says it’s time to rewrite the AUMF. (National Interest)
The White House rejects the arguments for un-dual-hatting NSA and CYBERCOM, at least for now. (Washington Post)
Sea change at …
Read more ›Four experts told a House hearing on China’s growing seapower yesterday that no real strategy exists to deal with Beijing’s increasing assertiveness in the western Pacific, Chris Cavas reports. (Defense News)
Meanwhile, …
Read more ›Gordon Adams on the Murray-Ryan budget deal: “But let’s get real: $498 billion is a pretty good deal in a world where threats to the United States are low, terror attacks are …
Read more ›It’s A2/AD Day, apparently:
Starting by declaring that wars of choice are gravely risky and therefore the U.S. military should be optimized for wars of necessity, Sam Tangredi argues that counter-A2/AD operations …
Read more ›
Recent Comments