Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Defense

DOD declassified media library will be available online within 5 years

GCN – John Breeden II: “The Department of Defense manages a huge library of photographs and other media that has been declassified. But accessing that information, some of which dates back to World War II, isn’t easy to do. That will change within the next five years as T3Media uses its enterprise-scale video management platform to bring… Continue Reading

Using Force on Land to Suppress Piracy at Sea: The Legal Landscape of a Largely Untapped Strategy

Using Force on Land to Suppress Piracy at Sea: The Legal Landscape of a Largely Untapped Strategy, Steven R. Obert, Government of the United States of America – U.S. Navy Judge Advocate General’s Corps. December 31, 2013 “On May 14, 2012, a combat helicopter operated by European Union Naval Forces (EUNAVFOR) struck a pirate base ashore in Somalia,… Continue Reading

DOD Unmanned Systems Integrated Roadmap FY2013-2038

“The purpose of this Roadmap is to articulate a vision and strategy for the continued  development, production, test, training, operation, and sustainment of unmanned systems  technology across DoD. This Unmanned Systems Integrated Roadmap establishes a technological vision for the next 25 years and outlines actions and technologies for DoD and  industry to pursue to intelligently… Continue Reading

National Plan to Achieve Maritime Domain Awareness

“Today the White House released the National Maritime Domain Awareness Plan.  This plan promotes global maritime security and prosperity through improved governance to support the effective understanding of the maritime domain.  Notably, 90 percent of the world’s commerce moves by sea, making maritime security essential to the global supply chain and international trade Consistent with Presidential Policy Directive… Continue Reading

Spiegel – Inside TAO: Documents Reveal Top NSA Hacking Unit

“The NSA’s TAO hacking unit is considered to be the intelligence agency’s top secret weapon. It maintains its own covert network, infiltrates computers around the world and even intercepts shipping deliveries to plant back doors in electronics ordered by those it is targeting.” [TAO – Tailored Access Operations] “TAO specialists have directly accessed the protected networks… Continue Reading

The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress

CRS – The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress. November 8, 2013 “Cyberthreats to U.S. infrastructure and other assets are a growing concern to policymakers. Information and communications technology (ICT) is ubiquitous and relied upon for government services, corporate business processes, and individual professional and personal pursuits—almost every facet of modern life. Many ICT devices and other… Continue Reading

WaPo – Afghanistan gains will be lost quickly after drawdown

Report predicts Taliban’s influence will grow, even if small troop presence remains and aid continues – By Ernesto Londoño, Karen DeYoung and Greg Miller “A new American intelligence assessment on the Afghan war predicts that the gains the United States and its allies have made during the past three years are likely to have been significantly eroded by 2017, even if… Continue Reading

Investigative Report – A Deadly Mix in Benghazi

A Deadly Mix in Benghazi By DAVID D. KIRKPATRICK December 28, 2013, New York Times [snipped] “”A fuller accounting of the attacks suggests lessons for the United States that go well beyond Libya. It shows the risks of expecting American aid in a time of desperation to buy durable loyalty, and the difficulty of discerning friends from allies… Continue Reading

Judge Grants Motion to Dismiss in NSA Surveillance Case

ACLU: “A federal court issued an opinion and order in ACLU v. Clapper [American Civil Liberties Union v. Clapper, 13-cv-03994, U.S. District Court, Southern District of New York (Manhattan)], the ACLU’s challenge to the constitutionality of the NSA’s mass call-tracking program, ruling that the government’s bulk collection of phone records is lawful under Section 215 of the Patriot Act and under… Continue Reading

New Report: Police Intelligence Gathering Lacks Standards, Threatens National Security and Civil Liberties

“Gaps in local-federal intelligence sharing systems jeopardize national security investigations and threaten Americans’ civil liberties, according to a new Brennan Center report. National Security and Local Police, the most comprehensive survey of counterterrorism policing since 9/11, finds that police are operating without adequate standards and oversight mechanisms, routinely amassing mountains of data – including personal information… Continue Reading

CRS – Iraq: Politics, Governance, and Human Rights

Iraq: Politics, Governance, and Human Rights, Kenneth Katzman, Specialist in Middle Eastern Affairs. December 17, 2013 “Two years after the 2011 U.S. withdrawal from Iraq, sectarian divisions and the Sunni-led uprising in neighboring Syria have fueled a revival of radical Islamist Sunni Muslim insurgent groups that are attempting to undermine Iraq’s stability. Iraq’s Sunni Arab… Continue Reading