Lessons from recent combat experiences in Kosovo, Afghanistan and Iraq have shown that UAVs can provide vastly improved acquisition and more rapid dissemination of Intelligence, Surveillance and Reconnaissance (ISR) data. They are one of the principal contributors to successful outcomes for the United States, in these campaigns. The benefits and promise offered by UAVs in surveillance, targeting and attack have captured the attention of senior military and civilian officials in the Defense Department (DoD), members of Congress, and the public alike. Indeed, these recent combat operations...
Lessons from recent combat experiences in Kosovo, Afghanistan and Iraq have shown that UAVs can provide vastly improved acquisition and more rapid dis...
Since renouncing the development, production, stockpiling, and use of biological weapons in 1969, the Department of Defense (DoD) has invested in militarily relevant biological defense. Also in 1969, the U.S. Army Medical Research Institute of Infectious Diseases (USAMRIID) was created to develop medical defensive countermeasures. Medical biological defensive research has focused mainly on the development of vaccines, drugs, and diagnostics as defensive countermeasures. DoD maintains a network of laboratories and centers dedicated to developing defensive capabilities to protect against...
Since renouncing the development, production, stockpiling, and use of biological weapons in 1969, the Department of Defense (DoD) has invested in mili...
Office of the Under Secretary of Defense Technology and Logistics Department of Defense
After conducting an 18-month study, this Task Force concluded that the cyber threat is serious and that the United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent utilizing cyber capabilities in combination with all of their military and intelligence capabilities (a "full spectrum" adversary). While this is also true for others (e.g. Allies, rivals, and public/private networks), this Task Force strongly believes the DoD needs to take the lead and build an effective response to measurably...
After conducting an 18-month study, this Task Force concluded that the cyber threat is serious and that the United States cannot be confident that our...
Software has become the central ingredient of the information age, increasing productivity, facilitating the storage and transfer of information, and enabling functionality in almost every realm of human endeavor. However, as it improves the Department of Defense's (DoD) capability, it increases DoDs dependency. Each year the Department of Defense depends more on software for its administration and for the planning and execution of its missions. This growing dependency is a source of weakness exacerbated by the mounting size, complexity and interconnectedness of its software programs. It is...
Software has become the central ingredient of the information age, increasing productivity, facilitating the storage and transfer of information, and ...