The 2025 Annual Threat Assessment (ATA), published March 2025 by the Office of the Director of National Intelligence, provides an overview of the primary threats to U.S. national security, with a ...
In late 2022, the People’s Republic of China issued the world’s first deep fake regulation. The communist country sought to limit artificial intelligence creations, or deep synthesis, that went ...
The U.S. Air Force Reserve announced a new direct commissioning effort designed to bring in cyber professionals from industry and enlisted ranks. The Cyber Direct Commission Program will add personnel ...
See which topics SIGNAL readers were most interested in this past year, from generative AI to cyber defense.
The global security landscape has fundamentally transformed. The United States no longer enjoys unchallenged military and economic overmatch, while peer competitors—particularly China and ...
The Department of the Air Force (DAF) is on the hook for meeting the challenge of air- and space-related joint all-domain command and control. Having spent the last couple of years validating the ...
Drug traffickers expand the use of submersible vessels to transport illicit substances as states struggle to detect them. This whack-a-mole game sees cartels improve the seaworthiness and technologies ...
The rise of the drug cartel movement since the 1970s has ignited fear among many. From complex and undetected tunnel systems to leveraging ubiquitous technical surveillance (UTS), many of the recently ...
Never before has there been a holistic view of the nation’s cyber attack surface, by county. Thanks to researchers at the University of Maryland, counties can assess how vulnerable their IP addresses, ...
The revamping of the military’s Risk Management Framework, or RMF, is a welcome move. The initial vision of the Cyber Security Risk Management Construct (CSRMC) is a good one and much needed, say ...
The explosion of publicly available and commercially available information that is geotagged, time-boxed and capable of being rapidly aggregated has brought attributes to open-source intelligence ...
As artificial intelligence (AI)-based systems become more prevalent and sophisticated than ever before, defense officials are exploring new ways to ensure that these models are protected against ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results