Ancient War Machines Since the beginning of warfare, military planners and generals dreamed of engineered machines to destroy military enemies first before they could inflict any destruction upon their own military forces...
Read moreAncient War Machines Since the beginning of warfare, military planners and generals dreamed of engineered machines to destroy military enemies first before they could inflict any destruction upon their own military forces...
Read moreUkraine – A Nation of Conflicts and Corruption Comecon standing for Council for Mutual Economic Assistance, was formed under the aegis of the Soviet Union in 1949 (until 1991) to respond to the formation of the Committee of European Economic Cooperation in western Europe in 1948. Its purpose was to facilitate and coordinate the economic developmen...
Read moreFlash News GMCStream 5-1-22 NGA’s AI in Ukraine. The “National Geospatial Agency (NGA) will take over Project Maven, the Pentagon’s key artificial intelligence program designed to identify individual objects out of a massive amount of surveillance data.The NGA is commonly understood as the intelligence agency in charge of processing and analyzing satellite imagery, but it ...
Read moreGMCStream - Flash News 3/31/22 Astronauts Never Retire - When NASA astronaut Michael Lopez-Alegria returned from his fourth flight in April 2007, he dreamed that 15 years later he would be heading back into orbit, this time to oversee a group of paying travelers to the International Space Station. ...
Read moreGMCSteam Flash News 3/29/22 New DOD Budget Anti-Russia/China Pro Ukraine "President Joe Biden's $773 billion fiscal year 2023 Defense Budget Request funds the department for today's security environment and positions DOD to maintain its competitive advantage in the years ahead, Deputy Secretary of Defense Kathleen H. Hicks said today.Hicks, along with N...
Read moreMaidan -Nuland’s War Doors with Iraq, Ukraine, Russia Russian Political Version of Trident “Khazaria is a multi-ethnic and multi-confessional state created by the Turks in 650 on the territory of modern Ukraine, the Lower Volga region and the North Caucasus. According to Artamonov and many other scientists, the Slavic farmers were ab...
Read moreBio-Weapons Labs in War Historical -According to historical records, “During World War I, the German Army developed anthrax, glanders, cholera, and a wheat fungus specifically for use as biological weapons. They allegedly spread plague in St. Petersburg, Russia ...
Read moreIn 2021, US Navy will spend $22.64 billion on tech research and to modernize the RQ-4 Golden Hawk. Iran Shot Down a $176 Million U.S. Drone. Other systems improved; for example, $135.5 million targeted on anti-radar missile improvements; ...
Read more"NASA is getting ready to send astronauts to explore more of the Moon as part of the Artemis program, and the agency has selected SpaceX to continue development of the first commercial human lander that will safely carry the next two American astronauts to the lunar surface. At least one of those astronauts will make history as the first woman on the Moon. ...
Read moreThe United States is leading the way to a new era of commercial space transportation with a final rule that streamlines the licensing process for private sector launch and reentry operations. “Innovation in commercial space transportation is increasing dramatically, and policy needs to keep up. This rule will help us to prepare for future U.S. leadership in commercial space transportation...
Read more...
Read moreEvent 1 - May/June 2021 May 25-27 2021 -Intelligence Symposium 2021- to be held virtually Jun 7, 12 Military Space San Diego CA -to be h...
Read moreSmall Sat Symposium 2018 Computer History MuseumFebruary 5-8, 2018Mountain View, CA ...
Read moreReturning for its 8th year the 2015 Mobile Deployable Communications Conference will address the key topics of CIS networks and tactical com...
Read more“In 2018, the dynamic nature of cyberspace is a result of rapid advancements in computer and communication technologies as well as the tight coupling of the cyber domain with physical operations. Military organizations have embedded cyberspace assets—their information technology—into mission processes to increase operational efficiency, improve decision-making quality and shorten the sensor-to-shooter cycle. But this cyberspace asset-to-mission dependency can put a mission at risk when a cyber incident occurs, such as the loss or manipulation of a critical information resource. The Y2K event went out with a whimper and not a bang, but not because the issue wasn’t serious. The potential for massive data disruption was there, but government and industry rallied to address it before the January 1, 2000, deadline. The millennium bug was squashed because stakeholders with a lot to lose attacked it in a coordinated effort. That approach can serve as both a lesson and a model for the latest security challenge: the cyber bug ”
Nonmilitary organizations typically address this type of cybersecurity risk through an introspective, enterprise wide program that continuously identifies, prioritizes and documents risks. This allows for selection of an economical set of control measures—people, processes and technology—to mitigate risks to an acceptable level. The explicit valuation of information and cyber resources, in terms of their ability to support the organizational mission, enables the creation of a continuity of operations plan and an incident recovery plan. But above all, cyber response demands the same sense of urgency as Y2K. In addition, information technology/operational technology (IT/OT) risk must be aligned with real-world risk. I have not seen the same rigor about IT/OT risk since Y2K. Unfortunately, what followed Y2K was a huge decline in information technology spending and a reversal to less governance of IT/OT portfolios. This led to more risk by allowing technology to lapse naturally after a big investment, along with the regrowth of shadow information technology. According to a Market to Market report, global spending on cybersecurity will be nearly $170 billion by 2020, and that figure does not include all the other information technology spending, which is approaching $4 trillion, analysts estimate. The money is there, but why not spend it through a structured framework to address the cyber bug today?
The millennium bug was considered a once-in-a-lifetime opportunity to clean up and standardize information technology. Now we need to do it again. We did not learn our lesson after the turn of the century as we relegated information technology back to a supporting role. Operational technology continues in its own lane instead of being incorporated into the overall business and mission risk equation. But for business, government and nearly every person, technology is part of the fabric of everyday life. The Internet of Things (IoT) promises to advance that principle even further. The approach for solving the millennium bug challenge should serve as a framework for stopping the cyber bug. The need for a solution is becoming even more urgent with the explosion of IoT devices. We have succeeded with this approach before, and we can do so again. But this time, we must be sure to learn our lesson.”
Maj. Gen. Earl D. Matthews, USAF (Ret.), the former director of cyberspace operations in the Air Force’s Office of Information Dominance and Chief Information Officer, is vice president of the Enterprise Security Solutions Group for DXC Technology (formerly known as Hewlett Packard Enterprise Services), U.S. Public Sector. The views expressed here are his own. (source:Signal Magazine By Maj. Gen. Earl D. Matthews, USAF (Ret.) June 1, 2017)
GMCStream Headquarters, 650 Castro St., STE 120-32, Mountain View, CA 94041/7283 NC Hwy 42 W,STE 102-206,Raleigh, NC 27603
This email address is being protected from spambots. You need JavaScript enabled to view it. URL: https://www.GMCstream.com
END
GMCStream, a Delaware LLC -is an American Veteran Owned print and digital publication that tracks the trends, drivers, and technologies that fuel the Aerospace and Defense communication sectors. Established in 2013 as a technology driven digital on-line publishing organization - We research, analyze, and highlight MILCOM problems and solutions that may affect Global National Security.
GMCStream based in Raleigh NC High-tech Triangle with Management and Support staff in Silicon Valley California. GMCStream was founded by Richard Theodor Kusiolek, an expert in Satellite Communications, Cyber Security, Defense, and Aerospace platforms with private sector experience and expertise in international business development and strategy, particularly in America, China, Japan, Ukraine, and Russia. The company is growing organically into a specialized niche media and technology company providing real-time streaming face-to-face video interviews and coverage on a variety of topics including Government Policy, Space and Missile systems, cyber-warfare, Defense Networks. Artificial Intelligence, STEM career webinars, and Moon-Mars explorations.