Skip to content

Happening Now

Live coverage from CPAC 2015

Inside the Ring

Related Articles

China conducts JL-2 sub missile test

China carried out a flight test of its new JL-2 submarine-launched ballistic missile last month, highlighting Beijing's nuclear buildup of missile submarines. The JL-2 flight test took place Jan. 23, according to defense officials familiar with details of the test.

Lisa Monaco, assistant to the president for homeland security and counterterrorism, this week announced the creation of the Cyber Threat Intelligence Integration Center, a "czar" bureaucracy. (Associated Press)

Cyberthreat center coming

The White House national security adviser for counterterrorism announced this week that the Obama administration is setting up a cyberintelligence center aimed at providing better information and coordinated responses after cyberattacks that she said are growing more diverse and dangerous.

Ashton Carter outlines acts of cyber war

- The Washington Times

Defense Secretary nominee Ashton Carter told the Senate Committee on Armed Services that an act of cyberwarfare is defined as a cyberattack on critical infrastructure, the economy or U.S. military operations.

Russia is increasing military operations in eastern Ukraine, but the U.S. and NATO have not supplied urgently needed lethal weaponry to the Ukrainian army. Moscow has proposed restoring an agreed line of division to end an escalation of fighting. (Associated Press)

Russians advance on Ukraine

Russian military forces are crossing into eastern Ukraine in larger numbers, according to Phillip A. Karber, a Georgetown University professor currently on a fact-finding tour of the region.

Army Sgt. Bowe Bergdahl was released in May after nearly five years as a hostage, and perhaps after a failed ransom payment to an Afghan national. (Associated Press)

Pentagon IG to query five in Bergdahl ransom probe

Despite an official denial from Defense Secretary Chuck Hagel that a ransom was paid, the Pentagon's inspector general last week moved a step closer to launching a formal investigation into charges that the military's Joint Special Operations Command paid a large sum in a failed bid to win the release of Army Sgt. Bowe Bergdahl in Afghanistan last year.

Among the top threats to U.S. national security is a potential "massive cyber-attack" launched by China, which has been "actively and aggressively refining its cyber warfare capabilities," says Bill Cowan. (Associated Press)

China: A cyberwarring state

China's strategy of large-scale cyberattacks is motivated mainly by the goal of keeping the Chinese Communist Party (CCP) in power, in addition to gaining economic secrets and planning cyberattacks in a conflict, according to a new report by the Center for a New American Security.

 William A. Reinsch, National Foreign Trade Council President. CSPAN

Confessions of a panda hugger

William A. Reinsch, former undersecretary of commerce for export administration under President Bill Clinton, offered a surprising mea culpa in the latest annual report by the U.S.- China Economic and Security Review Commission made public earlier this month.

National Security Agency director Mike Rogers said the exercise "Cyber Flag" was "force-on-force" training, "fusing attack and defense across the full spectrum of military operations in a closed network environment." (AP Photo/Marcio Jose Sanchez) ** FILE **

Cyber war games held

- The Washington Times

U.S. Cyber Command recently conducted large-scale digital war games that involved cyberattacks and defense against foreign strikes on critical infrastructure.