A newly revised Army regulation prescribes the use of “red teams” that are assigned to try and penetrate the security of military communications, as if they were hackers or opposition forces.
“Red Team operations expose vulnerabilities by challenging an organization’s readiness and ability to protect information. Red Team activities focus on identifying an organization’s critical and classified information to show the operational impact of physical, information and operations security shortcomings,” the regulation explains. “To replicate a true adversary, certified Red Teams have the authority to access .mil networks from public domains through the use of remote operations.”
See “Communications Security Monitoring,” Army Regulation 380-53, December 23, 2011.
Among other changes to the previous edition of the regulation, the new revision “removes the requirement to obtain permission from the Assistant Secretary of Defense for Networks and Information Integration to conduct communications security monitoring in the National Capital Region.”
For International Year of the Woman Farmer and International Women’s Month, we spoke to five women farmers in America about planting the next generation.
It’s a busy time and you have things to do. Here are three things worth tracking in science policy as Fiscal Year 2026 (FY26) wraps and we head into FY27.
We’re asking the U.S. government to release holds on Congressionally-appropriated funding for scientific research, education, and critical activities at the earliest possible time.
It is in the interests of the United States to appropriately protect information that needs to be protected while maintaining our participation in new discoveries to maintain our competitive advantage.