Contracting Adversary Aircraft, and More from CRS
The US Air Force and Navy might choose to train their fighter pilots in simulations using enemy aircraft that are flown by contractors, the Congressional Research Service said in a new brief.
“Particularly in the case of the Air Force, which has increasingly publicized a shortage of pilots, using contractors to provide adversary air may free up experienced uniformed pilots for other duties,” CRS said. Doing so would also “offer U.S. pilots the opportunity to fly against a diversity of aircraft types without the overhead and expense required to maintain a fleet of planes not otherwise in inventory.” See Contracting the Adversary, CRS Insight, November 16, 2017.
Other new or updated products of the Congressional Research Service include the following.
Zimbabwe: A Military-Compelled Transition?, CRS Insight, November 16, 2017
Private Flood Insurance and the National Flood Insurance Program (NFIP), CRS Insight, updated November 17, 2017
The Individual Mandate for Health Insurance Coverage: In Brief, updated November 16, 2017
Tax Incentives for Charitable Giving in the Tax Cuts and Jobs Act (H.R. 1), CRS Insight, November 17, 2017
Monuments and Memorials Authorized and Completed Under the Commemorative Works Act in the District of Columbia, updated November 17, 2017
Monuments and Memorials Authorized Under the Commemorative Works Act in the District of Columbia: Current Development of In-Progress and Lapsed Works, updated November 17, 2017
OPEC and Non-OPEC Crude Oil Production Agreement: Compliance Status, CRS Insight, November 16, 2017
This DOE Office has been achieving DOGE’s stated mission of billion dollar savings for decades. Now government leaders may close its doors.
Direct File redefined what IRS service could look like, with real-time help and data-driven improvements. Let’s apply that bar elsewhere.
At this inflection point, the choice is not between speed and safety but between ungoverned acceleration and a calculated momentum that allows our strategic AI advantage to be both sustained and secured.
Improved detection could strengthen deterrence, but only if accompanying hazards—automation bias, model hallucinations, exploitable software vulnerabilities, and the risk of eroding assured second‑strike capability—are well managed.