Modern Warfare - Killer Robots: Beyond Artificial Intelligence

Pentagon - 9/30/2022
Modern Warfare- Killer Robots: Beyond Artificial Intelligence

How AI impacts security, military affairs

For too long, the conversation on AI and militaries has been narrowly focused on autonomous weapons and the ethical issues that come with them. The time is ripe to take stock of the myriad of other ways that AI will impact security and military affairs. Just as AI is dramatically changing a range of sectors in the civilian world, improving efficiency, reducing costs, and automating processes, there is no reason to believe that militaries, too, will not be joining the AI revolution.
Israel is a world leader in developing autonomous military capabilities, from Iron Dome interceptors to unmanned aerial vehicles to ground-based platforms – though all currently rely on human approval before kinetic firepower can be activated, in line with the values of the Israeli defense establishment.

Read More

Pathway to a Career—Leadership in the Military

High-level military leader selections impact thousands of individuals and processes that make up our military, which means the leaders need to be effective and resilient and rise above leadership military challenges.

How do military leaders learn the lessons of leadership? Traditionally classroom leader development and battlefield experience are perhaps the key places where officers learn about leadership, but is there a broader set of experiences that have an important developmental impact?

What lessons do military leaders actually learn that they come to see as most valuable? And how can we draw upon their experiences to avoid future mistakes and build on past successes?

Going directly to senior military officers and asking these questions about leadership military challenges and experiences are difficult and rarely answered.


Read More

DoD CSSP: A Unique Component of Defense–in–Depth Strategy

An effective cybersecurity posture is achieved when there is confidence that information and information systems are protected against attacks. This is done through the application of security services in such areas as availability, integrity, authentication, confidentiality, and non-repudiation. Since technical mitigation has no value without trained people to use them and operational procedures to guide their application, it is paramount that in implementing an effective and enduring cybersecurity framework, organizations achieve a synergistic balance from all three facets of a Defense in Depth strategy: people, operations, and technology. Within the Department of Defense (DOD), Cybersecurity Service Providers (CSSPs) play a unique component of the Department of Defense’s defense in-depth strategy.

Read More

Fiction to Fact - Next Generation Air Dominance (NGAD)

Anybody that has seen TOP Gun Maverick knows the beginning scene has “Maverick” testing the Next Generation Air Dominance aircraft. Throughout the movie the constant was next gen aircraft. The entire movie was about air superiority vs older technology with the differentiator being the human aspect “The Pilot”. The Air Force's Next Generation Air Dominance (NGAD) program — which includes a new manned fighter-like platform, associated collaborative drones, weapons, sensors, and communications architecture — has started its engineering, manufacturing, and development (EMD) program, Air Force Secretary announced Wednesday. The goal is to turn NGAD into a real capability before 2030. We have now started on the EMD program to do the development aircraft that we will take into production.

Read More

Pentagon Issues Memo on Continuous Authorization to Operate; Continuous Vetting of All Troops; Continuous Diagnostic and Mitigation Adoption


February 2022

SUBJECT: Continuous Authorization To Operate (cATO)

The Risk Management Framework (RMF) establishes the continuous management of system cybersecurity risk. Current RMF implementation focuses on obtaining system authorizations (ATOs) but falls short in implementing continuous monitoring of risk once authorization has been reached. Efforts in the Department are attempting to emphasize the continuous monitoring step of RMF to allow for continuous authorization (cATO). Real-time or near real-time data analytics for reporting security events is essential to achieve the level of cybersecurity required to combat today’s cyber threats and operate in contested spaces. The purpose of this memo is to provide specific guidance on the necessary steps to allow systems to operate under a cATO state.

Read More

Subscribe Here!