Trump sends Weapons to Ukraine via the EU/NATO with a 50-day deadline. The Raytheon Missiles & Defense business unit, part of RTX, manufactures the Tomahawk missile....
Read moreTrump sends Weapons to Ukraine via the EU/NATO with a 50-day deadline. The Raytheon Missiles & Defense business unit, part of RTX, manufactures the Tomahawk missile....
Read more“The U.S. Air Force's B-2 stealth bomber is a key component of the nation's long-range strike arsenal and one of the most survivable aircraft in the world. Its unique stealth characteristics allow it to penetrate the most sophisticated enemy defenses. July 17, 2019, marked 30 years since the...
Read moreTranscript =Welcome to today's discussion, my name is Glenn. I'm joined by Alexander Mercouris and Jack Matlock the US ambassador to the Soviet Union who had a very important role in contributing to negotiating an end to the Cold War in 1989....
Read more“The BAE SYSTEMS-British Challenger 3 has been unveiled as the UK’s newest and most lethal main battle tank (MBT)?” - The Challenger 3 is produced by modernizing existing Challenger 2 MBTs with 127 planned for conversion from the UK’s existing 221 Challenger 2s; 127...
Read moreGlobal Firepower Index: The Armed Forces of the Russian Federation surpassed all countries of the world in many indicators. “The compilers of the Global Firepower Index, which is published under the auspices of the British University of St. Andrews, compared the main indicators of the Russian and US armies. Russia Federation took 1st place in the strength of the ground for...
Read more“A significant cultural shift during the early years of the global war on terror led to the development and adoption of capabilities and tactics to counter improvised explosive devices (IEDs).Today, unmanned aerial systems (UASs) pose a threat similar to that of IEDs. The Marine Corps must develop counter-UAS (C-UAS) tools to improve battlefield survivability service-wide,...
Read more“Why is the uni party risking a war we’re so ill-prepared to fight? When Richard Nixon lost the election to John F. Kennedy, Nixon told supporters, “I know Jack Kennedy. He’s a patriot.” Nixon knew that the nation would be safe in President Kennedy’s hands. Most Americans do not have the same confidence in President Biden. In April 2023, fewer than four in ten U.S. adults ...
Read more“In the case of Ukraine, the U.S., it seems, is tilting towards a more permanent (yet less intense) war into 2026.. The so-called ‘Israeli formula'. The Corporations of Europe, UK, 32 NATO slaves of the USA Wealth Oligarchs, +, Japan all funded by the US Congress BILLIONS. They all get on their knees to the rich elitist Israel's in New York. But leaving the Ukraine conseq...
Read moreAccording to documentation from the US White House, America’s Defense Contractors will provide, as Zelensky ordered, 200,000 rounds of artillery Shells /month to the US Congress and $145 billion to the Ukraine State. (i.e.-Russia MOD uses 200,000 rounds each four days). Why would the Democratic Party controlled by the White House, the US Senate, and the Secretary of Defense, Lloyd ...
Read moreAncient War Machines Since the beginning of warfare, military planners and generals dreamed of engineered machines to destroy military enemies first before they could inflict any destruction upon their own military forces...
Read more...
Read moreEvent 1 - May/June 2021 May 25-27 2021 -Intelligence Symposium 2021- to be held virtually Jun 7, 12 Military Space San Diego CA -to be h...
Read moreSmall Sat Symposium 2018 Computer History MuseumFebruary 5-8, 2018Mountain View, CA ...
Read moreReturning for its 8th year the 2015 Mobile Deployable Communications Conference will address the key topics of CIS networks and tactical com...
Read more“In 2018, the dynamic nature of cyberspace is a result of rapid advancements in computer and communication technologies as well as the tight coupling of the cyber domain with physical operations. Military organizations have embedded cyberspace assets—their information technology—into mission processes to increase operational efficiency, improve decision-making quality and shorten the sensor-to-shooter cycle. But this cyberspace asset-to-mission dependency can put a mission at risk when a cyber incident occurs, such as the loss or manipulation of a critical information resource. The Y2K event went out with a whimper and not a bang, but not because the issue wasn’t serious. The potential for massive data disruption was there, but government and industry rallied to address it before the January 1, 2000, deadline. The millennium bug was squashed because stakeholders with a lot to lose attacked it in a coordinated effort. That approach can serve as both a lesson and a model for the latest security challenge: the cyber bug ”
Nonmilitary organizations typically address this type of cybersecurity risk through an introspective, enterprise wide program that continuously identifies, prioritizes and documents risks. This allows for selection of an economical set of control measures—people, processes and technology—to mitigate risks to an acceptable level. The explicit valuation of information and cyber resources, in terms of their ability to support the organizational mission, enables the creation of a continuity of operations plan and an incident recovery plan. But above all, cyber response demands the same sense of urgency as Y2K. In addition, information technology/operational technology (IT/OT) risk must be aligned with real-world risk. I have not seen the same rigor about IT/OT risk since Y2K. Unfortunately, what followed Y2K was a huge decline in information technology spending and a reversal to less governance of IT/OT portfolios. This led to more risk by allowing technology to lapse naturally after a big investment, along with the regrowth of shadow information technology. According to a Market to Market report, global spending on cybersecurity will be nearly $170 billion by 2020, and that figure does not include all the other information technology spending, which is approaching $4 trillion, analysts estimate. The money is there, but why not spend it through a structured framework to address the cyber bug today?
The millennium bug was considered a once-in-a-lifetime opportunity to clean up and standardize information technology. Now we need to do it again. We did not learn our lesson after the turn of the century as we relegated information technology back to a supporting role. Operational technology continues in its own lane instead of being incorporated into the overall business and mission risk equation. But for business, government and nearly every person, technology is part of the fabric of everyday life. The Internet of Things (IoT) promises to advance that principle even further. The approach for solving the millennium bug challenge should serve as a framework for stopping the cyber bug. The need for a solution is becoming even more urgent with the explosion of IoT devices. We have succeeded with this approach before, and we can do so again. But this time, we must be sure to learn our lesson.”
Maj. Gen. Earl D. Matthews, USAF (Ret.), the former director of cyberspace operations in the Air Force’s Office of Information Dominance and Chief Information Officer, is vice president of the Enterprise Security Solutions Group for DXC Technology (formerly known as Hewlett Packard Enterprise Services), U.S. Public Sector. The views expressed here are his own. (source:Signal Magazine By Maj. Gen. Earl D. Matthews, USAF (Ret.) June 1, 2017)
GMCStream Headquarters, 650 Castro St., STE 120-32, Mountain View, CA 94041/7283 NC Hwy 42 W,STE 102-206,Raleigh, NC 27603
This email address is being protected from spambots. You need JavaScript enabled to view it. URL: https://www.GMCstream.com
END
GMCStream, a Delaware LLC -is an American Veteran Owned print and digital publication that tracks the trends, drivers, and technologies that fuel the Aerospace and Defense communication sectors. Established in 2013 as a technology driven digital on-line publishing organization - We research, analyze, and highlight MILCOM problems and solutions that may affect Global National Security.
GMCStream based in Raleigh NC High-tech Triangle with Management and Support staff in Silicon Valley California. GMCStream was founded by Richard Theodor Kusiolek, an expert in Satellite Communications, Cyber Security, Defense, and Aerospace platforms with private sector experience and expertise in international business development and strategy, particularly in America, China, Japan, Ukraine, and Russia. The company is growing organically into a specialized niche media and technology company providing real-time streaming face-to-face video interviews and coverage on a variety of topics including Government Policy, Space and Missile systems, cyber-warfare, Defense Networks. Artificial Intelligence, STEM career webinars, and Moon-Mars explorations.