Trump officials mistakenly shared attack plans with a reporter on an unsecured app, breaching rules. Pentagon and military leaders emphasize operational security training to protect troops. OPSEC is ...
Messages shared on the Signal app did not include the most extensive type of plans the military produces, but included a detailed timeline and operational information about a Yemen bombing. Military ...
Bombing terrorist organizations is a tactic not a strategy, and SOCAFRICA’s 2015–2017 Gray Zone approach used a long-term, ...
A MINDBOGGLING MISSTEP: As blunders go, this one is a doozy. But let’s be clear at the outset, the mistake by national security adviser Mike Waltz was not accidentally adding a journalist to a ...
A new report finds that the Department of Defense needs to find more productive ways to address and mitigate risks associated with publicly available digital data of military personnel that could ...
Army Staff Sgt. Casey Trosclair, left, and Sgt. Alex Romero mount a long-range surveillance system to its tripod near Santa Teresa, N.M., July 3, 2025. (Photo: Army Capt. Bailey Buhler via DOD) Along ...
U.S. Soldiers provided Tunisian Armed Forces and Brigade des Forces Spéciales with training in civil affairs operations at Camp ...
The United States continues to face one of the largest cybersecurity workforce gaps ever recorded, with more than 500,000 open cyber positions nationwide. Federal agencies, from CISA to the Department ...
The Army’s role is not to duplicate the Space Force; it is to fulfill its foundational functions as prescribed by federal law. Title 10, U.S. Code, legally mandates each service to “organize, train, ...
This commentary was originally created for publication with the Air War College. Surprising a military opponent—whether through deception, misdirection, or unexpected maneuvers—has often yielded ...