Point(s) of Contact
Pamela Hamilton / FSO
843.327.3273
pamela@appliedsecurityknowledge.com
Richard Carmichael / ITPSO
678.221.7834
rcarmichael@laochservices.com
DoD Hotline
dodig.mil/hotline / 800.424.9098
SOURCE: U.S. Department of Justice Press Release – July 10, 2025
A civilian employee of the U.S. Air Force assigned to the U.S. Strategic Command (USSTRATCOM) at Offutt Air Force Base pleaded guilty today to conspiring to transmit classified information relating to the national defense (National Defense Information) on a foreign online dating platform beginning in or around February 2022 until in or around April 2022.
"The defendant, an employee of the United States Air Force with access to some of our Nation's most closely held secrets, shared classified information with someone claiming to be a foreigner on an online dating platform," said Assistant Attorney General for National Security John A. Eisenberg. "The Department of Justice stands ready to hold accountable those who violate their obligation to protect sensitive national security information entrusted to them."
"Access to classified information comes with great responsibility. David Slater failed in his duty to protect this information by willingly sharing National Defense Information with an unknown online personality despite having years of military experience that should have caused him to be suspicious of that person's motives," said U.S. Attorney Lesley A. Woods for the District of Nebraska.
SOURCE: Forbes by Heather Wishart-Smith – July 30, 2025
For companies in the defense industrial base, Cybersecurity Maturity Model Certification will soon be a prerequisite for doing business. And as CMMC compliance rollout deadlines loom, the Department of Defense isn't mincing words.
"CMMC started under Trump 1," said Katie Arrington, performing the duties of the DoD Chief Information Officer and a key architect of the program. "It will finish and be implemented under Trump 2." She made these comments in a keynote at the AFCEA International TechNet Cyber convention in May.
With CMMC requirements already appearing in contract language and full enforcement expected by 2028, the urgency is real. Contractors who aren't ready may lose their ability to compete for new work, replaced by competitors who moved faster and budgeted smarter.
SOURCE: National DEFENSE Magazine by J.R. Cottingham – August 8, 2025
From ancient omens to advanced satellite forecasting, commanders have long recognized that weather can profoundly influence the outcome of battle, just like any other human decision. Weather affects every dimension of military operations, including fire and maneuver, logistics, training, mobility, communication and safety.
History offers dramatic proof. Napoleon's advance at Waterloo was halted by a night of rain that bogged down his artillery. The success of the D-Day invasion hinged on correctly predicting a brief break in severe weather. In Iraq in 2003, a sandstorm stalled the U.S.-led advance on Baghdad for days.
These real-world moments remind us that weather is not a background variable; it is a force to be reckoned with.
Today, satellites, Doppler radar, sensors and AI-enhanced models offer forecast accuracy that previous generations could only have dreamed of. Despite these technological leaps, a critical gap remains: real-time, macro-aware yet sometimes hyperlocal and context-rich weather intelligence for the tactical edge.
SOURCE: Infosecurity Magazine by James Coker – August 14, 2025
Cybercriminals are selling access to active law enforcement and government email accounts for as little as $40 on the dark web, according to an investigation by Abnormal AI.
These compromised accounts belong to officials from the US, UK, India, Brazil and Germany, with agencies such as the FBI among those affected.
The ability to impersonate law enforcement and government employees through their own emails offers attackers' opportunities to conduct sophisticated fraud and data theft schemes. Such schemes include sending fake subpoenas and accessing sensitive information through emergency data requests.
Emails sent from domains such as .gov and .police are more likely to evade technical defenses and less likely to raise suspicion among recipients. The result is a higher ratio of malicious attachments and links are clicked on.
The Abnormal AI researchers noted that while law enforcement accounts have been quietly sold on the dark web for years, there has recently been a marked shift in strategy.
"Cybercriminals are no longer just reselling access; they're actively marketing specific use cases, such as submitting fraudulent subpoenas or bypassing verification procedures for social platforms and cloud providers. This commoditization of institutional trust has broadened the appeal of these accounts and lowered the barrier to entry for impersonation-based attacks," they wrote.
SOURCE: Federal News Network by Anastasia Obis – August 13, 2025
Both the House and the Senate want to overhaul how the Defense Department evaluates contractors by getting rid of subjective performance ratings in the Contractor Performance Assessment Reporting System with a "negative-only" reporting system.
The House Armed Services Committee's version of the 2026 defense policy bill includes a provision titled "Reforming of Contractor Performance Information Requirements," which would require DoD to revise the Defense Federal Acquisition Regulation Supplement to create an "objective, fact-based, and simplified system for reporting contractor performance."
The amendment, introduced by Rep. Elise Stefanik (R-N.Y.), would establish a system focused solely on "negative performance events that are measurable to reduce subjectivity and inconsistency in evaluations."
By limiting contractor performance reports to major failures or poor performance, the amendment's sponsor says the system would ease the workload for contracting officers, create standardized templates for documenting negative events and calculating composite scores, and give companies without extensive past performance records a better chance to compete for Defense Department contracts.
SOURCE: StartUs Insights by David R. Prasser – August 5, 2024
The global military landscape is changing due to trends like artificial intelligence, robotics, and the Internet of Things. Hybrid warfare combines conventional and cyber strategies to reshape battlefields in terms of connectivity, lethality, autonomy, and sustainability.
Connectivity improves detection, communication, and coordination, while advanced weapon technologies increase lethality. Robotics and AI allow autonomous decision-making with minimal human involvement. Sustainability advances through additive manufacturing and electrification innovations.
For this in-depth research on the Top Military Tech Trends & Startups, we analyzed a sample of 1036 global startups & scaleups. This data-driven research provides innovation intelligence that helps you improve strategic decision-making by giving you an overview of emerging technologies in the military industry. In the Military Technology Innovation Map, you get a comprehensive overview of the innovation trends & startups that impact your company.
SOURCE: Homeland Security Today by Anna Corsaro – August 11, 2025
"When an ideology loses its center, it does not vanish—it multiplies into operational fractals, adapting where geography withdraws and control disintegrates."
After months of asymmetric escalation between Israel, Iran, and the United States, the Middle Eastern theater is taking shape as a new architecture of controlled chaos. The global spotlight remains fixed on drones, ICBMs, cyberattacks, and proxy conflicts—but behind the clash of powers, a quiet actor is repositioning decentralized jihadism.
From Afghanistan to Somalia, the Sahel to cyberspace, networks affiliated with ISIS and Al-Qa'ida are restructuring, recruiting, and exploiting geopolitical instability to launch a new operational phase—less visible, more dangerous.
Even in institutional collapses like Sudan or Haiti—where jihadist presence is not yet dominant—there exist chaotic, ungoverned spaces increasingly conducive to extremist infiltration. These may soon provide ideological shelter, recruiting grounds, or logistical corridors for the next evolution of global jihad.
SOURCE: Fox News by Louis Casiano – August 8, 2025
AG Bondi announces $50M bounty for arrest of Venezuelan President Nicolas Maduro
Attorney General Pam Bondi announces the Trump administration is offering a $50M bounty for information leading to the arrest of Venezuelan President Nicolas Maduro for various serious crimes
(Attorney General Pamela Bondi)
President Donald Trump has secretly authorized military force against Latin American drug cartels designated by the United States as foreign terrorist organizations, according to reports.
The move, reported by the New York Times, would give U.S. forces permission to engage the cartels, which traffic drugs like fentanyl across the US-Mexico border.
"The president is determined to not just dismantle – but completely destroy – [Venezuelan dictator Nicolas] Maduro's Cartel de Los Soles and obliterate their operations in the Western Hemisphere," a source close to the White House said, the New York Post reported.
The anti-cartel effort is being coordinated among several departments, including the Department of Defense, Justice Department, Department of Homeland Security, Office of the Director of National Intelligence and the Treasury, the source added.
"President Trump's top priority is protecting the homeland, which is why he took the bold step to designate several cartels and gangs as foreign terrorist organizations," deputy White House press secretary Anna Kelly said in a statement to Fox News Digital.