Gen. Mark Kelly, head of Air Combat Command (ACC), said he is confident about the capability of the Next Generation Air Dominance (NGAD) aircraft program but he is unsure whether the country has the focus to deploy NGAD in time to counter potential adversaries. Kelly described the NGAD program a “keen capability” and stressed the need of the country and joint force for leading-edge technology to ensure air superiority.
Read More »Gen. Jacqueline Van Ovost: Air Mobility Command Eyes Conditions-Based Approach for KC-46 Operational Use
Gen, Jacqueline Van Ovost, commander of Air Mobility Command (AMC), said AMC plans to adopt a conditions-based approach to increase operational use of the KC-46 Pegasus tanker manufactured by Boeing as the aircraft program reaches for full operational capability. Van Ovost said the command intends to certify mission sets on an incremental basis to increase tanker capacity to support Joint Force operational taskings.
Read More »Pentagon Lays Out Framework for Addressing Small UAS With New Strategy
The Department of Defense (DoD) has released a new strategy to establish a framework for addressing and countering small unmanned aircraft systems. The DOD Counter-sUAS Strategy calls for department stakeholders to work together to meet three strategic objectives and one of those is the need to improve the Joint Force through collaboration and innovation to protect defense personnel, facilities and assets in the U.S., host countries and contingency locations.
Read More »U.S. Navy Names RADM Kathleen Creighton Director of N2/N6F
The U.S. Navy appointed RADM Kathleen Creighton as director of information warfare integration (N2/N6F), the service branch reported on Monday. She will succeed RADM Steven Parode.
Read More »Sehlke Names Bryan Wood, Robert Speer to Board of Advisors to Guide Growth Efforts; Chad Sehlke Quoted
Sehlke Consulting has appointed Bryan Wood and Robert Speer to the company’s Board of Advisors to drive growth efforts, Sehlke announced on Monday.
Read More »Maj. Gen. Michael Fantini, Lt. Col. Jake Sotiriadis: US Military Needs to Address ‘Digital Connection Deficit’
Maj. Gen. Michael Fantini and Lt. Col. Jake Sotiriadis of the U.S. Air Force wrote in a commentary piece published Monday on Defense News that the U.S. military should address its “digital connection deficit” to achieve the decision advantage needed to win against potential adversaries.
Read More »Maj. Gen. Thomas Murphy on DoD’s Protecting Critical Technology Task Force
A task force within the Department of Defense is exploring ways to improve cybersecurity in the industrial base and protect research and development work on military technology and deny adversaries access to such technologies, Fifth Domain reported Tuesday.
Read More »Joint Chiefs Nominee Gen. Mark Milley: DoD Needs to Strengthen Information Warfare, Cyber Capabilities
Army Gen. Mark Milley, the White House’s nominee to be the next chairman of the Joint Chiefs of Staff, said the Department of Defense should improve its information warfare, cyber and electronic warfare capabilities to counter threats posed by Russia, China and other competitors, C4ISRNET reported Thursday.
Read More »New White House Directive Calling for DoD to Form Space Force
President Trump signed a new directive to establish the new U.S. Space Force as the sixth military branch within the Department of the Air Force. The fourth space policy directive published Tuesday says the secretary of the Department of Defense should submit to the Office of Management and Budget a legislative proposal creating the Space Force.
Read More »Pentagon Launches New Cyber Strategy
The Defense Department has released a new strategy that lays out its action plans to counter cybersecurity threats posed by Russia, China and other strategic competitors. A summary of DoD’s cyber strategy issued Tuesday states DoD’s cyber space goals such as the need to build up the joint force’s capability to carry out cyber operations that enhance the country’s military advantage; defend U.S. critical infrastructure from malicious threats; and secure the Pentagon’s information systems from cyber vulnerabilities.
Read More »