


Former soldier charged with trying to give classified info to China
A former U.S. Army soldier has been charged with attempting to provide classified information to China's security services.

IT and Networks
A sensible approach to AI regulation
Humans will use AI as a co-pilot to make them more efficient in unwanted or criminal digital behavior, like cyberattacks or misinformation campaigns.

Hyper-enabling special ops will transform missions
New tech for language and text translation, as well as secure data transfer, gives operators an edge.
‘Stone Ghost’ secret intel network may expand to more nations: DIA
The system is used to share intelligence among “Five Eyes” partners, but DIA wants the ability to add and remove other users "on the fly."

Taylor Swift-based passwords harm cybersecurity, report says
Swift’s highly anticipated 10th album “Midnights” resulted in many passwords including “taylor,” “swiftie” and “midnights.”

Lessons from tech industry can curb digital fratricide on battlefield
There are impactful operating system techniques, like “compute orchestration,” that effectively turn a dozen cell phones into one single supercomputer.

Cyber Flag exclusive: What Cyber Command learns from the annual exercise
U.S. Cyber Command is applying lessons learned from operations and training exercises to refine the deployment of cyber teams and effects.

Cyber Command leverages acquisition model of special operations group
With the new acquisition authorities Congress granted to U.S. Cyber Command, the nascent organization is emulating the buying model of U.S. Special Operations Command.

An exclusive peek inside Cyber Command’s premiere annual exercise
C4ISRNET got an exclusive look at Cyber Flag, a military exercise focused on training and validating the Cyber Mission Force’s capabilities and readiness.
