“Understanding culture is essential in conducting irregular warfare.” That is the opening sentence in the introduction to a new U.S. Army publication on Cultural and Situational Understanding. “Irregular warfare requires a deliberate application of an understanding of culture due to the need to understand a populated operational environment, what specifically is causing instability, the nature […]
By Hans M. Kristensen Russian deployed strategic warheads counted by the New START Treaty once again slipped below the U.S. force level, according to the latest fact sheet released by the State Department. The so-called aggregate numbers show that Russia as of March 1, 2015 deployed 1,582 warheads on 515 strategic launchers. The U.S. count […]
The anticipated deployment of thousands of unmanned aerial systems (UAS) — or drones — in American skies raises unresolved privacy concerns that have barely begun to be addressed, according to a new report from the Congressional Research Service. The CRS report provides “a primer on privacy issues related to various UAS operations, both public and […]
In a significant retrenchment of the national security bureaucracy, the Department of Defense has reduced the number of employees and contractors who hold security clearances in the past two years by more than 700,000 persons, a cut of 15% in the total security-cleared population in DoD. The previously undisclosed reductions were reported in data provided […]
Physicist Kenneth W. Ford, who participated in the design of the hydrogen bomb in the early 1950s, has published a memoir of his experiences despite the objections of Energy Department reviewers who requested substantial redactions in the text. “Building the H Bomb: A Personal History” was released this month in softcopy by World Scientific Publishing Company. […]
A flood of information from the ongoing proliferation of space-based sensors and ground-based data collection devices is promoting a new era of transparency in at least one corner of the U.S. intelligence community. The “explosion” of geospatial information “makes geospatial intelligence increasingly transparent because of the huge number and diversity of commercial and open sources […]
Several pending bills would promote increased sharing of cybersecurity-related information — such as threat intelligence and system vulnerabilities — in order to combat the perceived rise in the frequency and intensity of cyber attacks against private and government entities. But such information sharing is easier said than done, according to a new report from the […]
Attorneys for former CIA officer Jeffrey Sterling, who was found guilty on nine felony counts involving unauthorized disclosure of classified information, argued yesterday that the Sterling verdict should be set aside in view of the misdemeanor plea agreement that was recently offered to former CIA director Gen. David Petraeus for mishandling classified information. Sterling’s attorneys […]
The policy implications of changing climatic conditions in the Arctic region, and specifically the record loss of ice cover, are explored in a newly updated report from the Congressional Research Service. See Changes in the Arctic, March 17, 2015. “There are only eight nations in the world whose territory above the Arctic Circle gives them […]
The U.S. Government reached the statutory debt limit today, exhausting its normal ability to borrow money. In order to meet the government’s financial obligations, the Secretary of the Treasury must now take certain extraordinary measures. A newly updated report from the Congressional Research Service provides background on federal debt policy and explains the current state […]
The Department of Justice has adopted an unacceptable double standard in its treatment of persons accused of leaking or mishandling classified information, the attorney for imprisoned leaker Stephen Kim wrote in a letter to DoJ released yesterday. “The decision to permit General [David] Petraeus to plead guilty to a misdemeanor demonstrates more clearly than ever […]
Within a remarkably short period of time– less than two decades– all of us have become immersed in a sea of electronic data collection. Our purchases, communications, Internet searches, and even our movements all generate collectible traces that can be recorded, packaged, and sold or exploited. Before we have had a chance to collectively think […]