Procurement officers can now browse and acquire sole-source eligible technology in one centralized place with SBIR Advisors’ creation of a Small Business Innovation Research (SBIR) Phase III catalog ...
The Terrain Commander from Textron Corporation provides the basis for the U.S. Army's unattended ground sensor (UGS) Future Combat Systems. The sensor assembly is equipped with a variety of optical, ...
The U.S. Air Force’s 67th Cyberspace Wing has been busy. The wing operationally acts as the execution arm of Air Forces Cyber, performing comprehensive cyber operations on a service and nation level.
Rear Adm. George W. Ballance, USN, has been assigned as commander, U.S. Naval Forces Southern Command/commander, Fourth Fleet, Mayport, Florida.
With the current war in Ukraine, it’s clear that Russia’s modernization program has involved electronic warfare and signals intelligence and played a huge part in Russia’s combat advances and overall ...
Artificial intelligence (AI) development is at the center of geopolitical competition as both the United States and China seek AI supremacy. The United States has traditionally been the leader in AI ...
Drug traffickers expand the use of submersible vessels to transport illicit substances as states struggle to detect them. This whack-a-mole game sees cartels improve the seaworthiness and technologies ...
Within two years, U.S. diplomats will receive unclassified/official use-only threat intelligenced through mobile devices. The move toward mobility is one piece of the State Department’s Bureau of ...
Communications using a light beam isn’t a new idea, even outside of “Star Trek,” “Star Wars” and other similar tales of fantasy. Scientist and science fiction writer Arthur Clarke forecasted ...
As artificial intelligence (AI)-based systems become more prevalent and sophisticated than ever before, defense officials are exploring new ways to ensure that these models are protected against ...
For years, the cyber domain was perceived as a virtual one. However, every cyber attack leaves a tangible footprint—a compromised server, a disrupted infrastructure or a breached supply chain. When ...
Today, with almost infinite sources and publicly available sensors, open-source intelligence (OSINT) collection has achieved high sophistication and allows, for example, the ability to follow ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results