James Kitfield

James Kitfield James Kitfield a senior fellow at the Center for the Study of the Presidency & Congress and a Defense One contributor. He is a former senior correspondent for National Journal and has written on defense, national security and foreign policy issues from Washington, D.C. for more than two decades.
Results 141-150 of 176

Agencies to spend billions on security upgrades

August 20, 1998 Buildings reduced to crumbled concrete; debris and carnage scattered over city blocks. These scenes from last week's terrorist attacks in Nairobi and Dar es Salaam were a terrifying replay of bombings in cities as disparate as New York, Dhahran, Oklahoma City and Buenos Aires. In all of those cities, the...

The End of Merger Mania

August 15, 1998 hroughout the post-Cold War era, the operative metaphor for a rapidly shrinking defense industrial base has been an event since dubbed "the Last Supper." At that infamous 1993 dinner, Pentagon officials informed the assembled leaders of America's premier defense and aerospace companies that fewer than half would survive the...

The Simulated Revolution

August 15, 1998 dvanced simulation systems are best known in the military for helping kick off the "revolution in military affairs," ushering in a new era where warriors hone their skills on virtual battlefields before confronting the real thing. Perhaps the greatest untapped potential for advanced simulations and modeling, however, lies in...

Millenium Nightmare Looms

August 15, 1998 he rumble of underground nuclear tests and a rapidly escalating arms race between India and Pakistan have once again raised the specter of nuclear war in a world that had worked most of the past decade to exorcise that 20th century demon. The emergence of two newly declared nuclear...

Millenium Nightmare Looms

August 15, 1998 ike virtually every American company or government organization, the Defense Department faces a twofold challenge in preparing its vast communications systems for the year 2000. Not only must its own systems function as the clock strikes midnight at the close of Dec. 31, 1999, but the computer systems of...

High Stakes for High Technology

August 15, 1998 n this information age, the United States has become more determined than ever that its armed forces have no technological peer. During the Cold War, technological superiority was considered necessary to offset the much larger forces of the former Soviet Union. More recently, advanced technology enabled the Defense Department...

Flying Through the Budget Flak

August 15, 1998 s it flies through increasingly heavy flak over Washington, the Air Force's F-22 Raptor provides an apt metaphor for military aircraft in general. Due to numerous direct budget hits and subsequent delays, the program has been restructured three times. The planned buy of aircraft has been continually reduced, from...

The Pentagon's Nightmare Scenario

June 22, 1998 Among the many nightmare scenarios predicted for the year 2000, the most chilling involve the Defense Department. And with good reason: The Pentagon's operations are vast and enormously complex, its reliance on computers and high-tech systems is profound, and its stock-in-trade routinely involves doomsday weapons. Moreover, DoD efforts to address...

Off Base

June 1, 1998 t quitting time, end-of-the-day conversations are swallowed in the vast expanse of the giant aircraft hangar at the Sacramento Air Logistics Center at McClellan Air Force Base, Calif. Suddenly it's as quiet as a morgue. Even in mid-shift, this mammoth maintenance and repair facility for Air Force planes operates...


May 1, 1998 Sitting beside a pond atop a high mesa in the desert near Los Alamos, N.M., a small monument pays tribute to the super-secret Manhattan Project of the 1940s. At this spot, J. Robert Oppenheimer rapidly constructed the largest laboratory in the world, and in the desperation of war unleashed the...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.