Attend the Airborne ISR Caucus Breakfast

Please join the Air Force Association as they host a kick-off breakfast for the Airborne ISR Caucus on Wednesday, December 13th, in RHOB Room 2043 from 8 a.m. to 9 a.m. featuring Lt Gen Shanahan of the Office of the Undersecretary of Defense for Intelligence. 
Caucus Co-Chairs John Garamendi and Don Bacon invite you to attend and join us in a discussion on the present and future of our nation’s ISR enterprise.
This discussion will be a great opportunity to hear from one of our nation’s most senior ISR military leaders on the state of the force and to ask questions about the future of airborne ISR in both contested and non-contested airspace.

Read More

Protect our Elections From Hackers – Cosponsor the Safeguarding Election Infrastructure Act of 2017

After the 2000 Presidential Election, Congress passed the Help America Vote Act (HAVA) to update our ageing and confusing voting systems with easy-to-use touch screen voting machines.  While the intention was good, many of those voting machines haven’t been
updated since, and are vulnerable to attack.  We all know now that foreign adversaries pay very close attention to our elections.  At the most recent DEFCON,

hackers and security researchers were able to compromise dozens of voting machines with relative ease – and during an election, these same vulnerabilities would allow an actor to change vote tallies or manipulate voter registration databases, often with
little to no trace. 

Read More

Protect our Elections From Hackers – Cosponsor the Safeguarding Election Infrastructure Act of 2017

After the 2000 Presidential Election, Congress passed the Help America Vote Act (HAVA) to update our ageing and confusing voting systems with easy-to-use touch screen voting machines.  While the intention was good, many of those voting machines haven’t been
updated since, and are vulnerable to attack.  We all know now that foreign adversaries pay very close attention to our elections.  At the most recent DEFCON,

hackers and security researchers were able to compromise dozens of voting machines with relative ease – and during an election, these same vulnerabilities would allow an actor to change vote tallies or manipulate voter registration databases, often with
little to no trace. 

Read More