U.S. Africa Command commander Marine Corps Gen. Michael Langley and Algeria’s minister delegate to the minister of national defense and chief of staff to the National People’s Army, Gen. Saïd Chanegriha sign an MOU on Jan. 22, 2025. (Source: U.S. Africa Command)
Secretary of Defense Lloyd J. Austin and South Korean Defense Minister Kim Yong-hyun conduct a joint press briefing at the Pentagon, Washington, D.C., Oct. 30, 2024. (DoD photo by U.S. Air Force Senior Airman Madelyn Keech)
Leaders assemble for a meeting of the heads of state of the North Atlantic Council, Indo-Pacifc Partners and the European Union, during the 2024 NATO Summit on July 11, 2024 in Washington, DC. (Photo by Kevin Dietsch/Getty Images)
This photograph taken in Kyiv on February 26, 2024 shows a laptop screen with a webpage of the IT Army of Ukraine group of volunteer hackers. The IT Army of Ukraine first set up in the wake of Russia’s devastating attack, and has since hugely grown in importance. It is one of a flurry of hacker groups that have flourished in wartime, countering Russia from behind their screens and operating in a legal grey area. (Photo by GENYA SAVILOV/AFP via Getty Images)
As the Russia-Ukraine conflict has evolved, the U.S. should be careful of taking cyber lessons from the early days of the war, Gen. Timothy Haugh said.
Staff Sgt. Gregory Fretz, cyber operations specialist with 178th Cyber Protection, Mississippi Army National Guard, monitors cyber attacks during Exercise Southern Strike at Camp Shelby, Mississippi, April 21, 2023. (U.S. Army National Guard photo by Staff Sgt. Renee Seruntine)
In addition to conducting information operations, the military must begin preparing for how service members and commanders will themselves be targeted, according to Gen. Timothy Haugh.
Swedish-made Archer Howitzer operated by Ukrainian members of the 45th Artillery Brigade fires toward Russian positions, in the Donetsk region, on January 20, 2024, amid the Russian invasion of Ukraine. (Photo by Roman PILIPEY / AFP) (Photo by ROMAN PILIPEY/AFP via Getty Images)
WASHINGTON, D.C. (Dec. 04, 2012)- Naval Criminal Investigative Service (NCIS) personnel use specialized computer programs to conduct a forensic analysis of a hard drive. (U.S. Navy photo by Ed Buice/Released)
The annual defense policy bill is directing an independent study on the lessons learned from information operations conducted by the U.S., Ukraine, Russia and NATO nations in…
While DOD officials still believe cyber will have a role in conflict, it just might not be the function they previously expected after having observed the Russia-Ukraine…
Air Force Gen. Jacqueline D. Van Ovost salutes during the presentation of colors at the U.S. Transportation Command change of command, Scott Air Force Base, Ill., Oct. 15, 2021. In a ceremony presided over by Secretary of Defense Lloyd J. Austin III, Van Ovost took command of the joint worldwide organization. (DoD photo by Lisa Ferdinando)
Joan Heald and Dave Hamilton explore the intricate web of hacking, ransomware attacks, money laundering and illicit cryptocurrency mining that intertwines North Korea and Russia.