Publications By Category

Publications By Type
Articles

Books

In-House Bulletins

Monographs

Policy Papers


Publications Related to Information and Cyberwarfare

back to publications page


Russia Reform Monitor - No. 2127
Bulletins - April 18, 2017
 

Political repression on the rise in Crimea;
A new way to expand Russia's citizenry

 
Defense Technology Monitor - No. 15
Bulletins - March 29, 2017
 

Washington, Tokyo plot future of missile defense;
DARPA's new drone catcher;
IBM's Watson works to bolster cybersecurity;
Atmospheric laser shield in the works;
Drone operators to get AI "wingmen";
ISIS drone innovations complicate battle in Iraq

 
Defense Technology Monitor - No. 14
Bulletins - March 14, 2017
 

The Pentagon's new project: Longer-lasting drones;
3D printing with super materials;
The evolution of drone warfare;
The ethics of future war;
From parlor games to cyberspace

 
Defense Technology Monitor - No. 13
Bulletins - February 17, 2017
 

DOD outlines electronic warfare strategy;
British government eyes gamers for drone missions;
Defenseless against hypersonic missiles;
The limits of drone warfare;
DPRK finds new delivery system for dirty bombs 

 
Defense Technology Monitor - No. 12
Bulletins - January 17, 2017
 

Army considers tech upgrades for combat vehicles;
A new way to defeat drones;
New EMP defense discovered;
Chinese phones spy on U.S. consumers;
Non-nuclear EMP versus North Korean drones

 
Global Islamism Monitor - No. 34
Bulletins - December 26, 2016
 

Boko Haram's economic impact;
ISIS in Afghanistan: Down, but not out;
How the Taliban moves money;
Targeting the cyber caliphate;
ISIS seeks softer targets in Europe;
A helping hand from Riyadh

 
Defense Technology Monitor - No. 11
Bulletins - December 19, 2016
 

Trending toward terminators;
Army adopts 3D printing;
Combating suicide drones;
The future of UAV fueling;
How drones are reshaping American strategy

 
Defense Technology Monitor - No. 9
Bulletins - October 24, 2016
 

Japan contemplates how to counter China at sea:
Hypersonics: A widening capabilities gap;
DARPA targets anti-drone tech;
China's cruise control;
Meeting the challenge of artificial intelligence

 
Russia Reform Monitor - No. 2097
Bulletins - October 17, 2016
 

Now Russian hacking hits Germany;
Full speed ahead for "Yarovaya" monitoring

 
Defense Technology Monitor - No. 8
Bulletins - October 11, 2016
 

Drones, coming soon to a lab near you;
Russia's robotic revolution;
A new military mission: Countering robotic sensor systems;
Mind control and drone fleets
How Russia plans to take the high ground

 
Assessing US-India Defense Relations: The Technological Handshake
Articles - October 6, 2016
 

In the words of U.S. Defense Secretary Ashton Carter, two “handshakes” now define the increasingly intimate Indo-U.S. defense partnership. The “strategic handshake” was examined in detail in my last article for The Diplomat. We will now turn our attention to the “technological handshake,” shorthand for the growth in arms sales, technical cooperation, and defense co-production and co-development.

 
Cyber Insecurity: Navigating the Perils of the Next Information Age
Books - October 2016
 
 
A Better Plan for Internet Governance
Articles - September 29, 2016
 

The problem with high technology is that it can be difficult to understand, leading to what are often confused policy prescriptions. A perfect example is the proposed upcoming transition of the internet-naming function from U.S. to private control - an event that's scheduled to take place just a few days from now, on Sept. 30. While the transition itself isn't necessarily a bad idea, the Obama administration's current plan has definite flaws. 

 
Defense Technology Monitor - No. 7
Bulletins - July 27, 2016
 

Cyber command to enhance training Ops;
How to cripple the U.S. electrical grid;
Israel develops land battle drone;
NATO and the importance of cyber;
Is A.I. the future of aerial combat? 

 
Defense Technology Monitor - No. 6
Bulletins - July 6, 2016
 

China's answer to U.S. lasers;
European missile defense moves ahead;
Space assets and the fight against ISIS;
Another step forward for Iron Dome;
Railguns becoming a reality;
China takes aim with new missile 

 
Defense Technology Monitor - No. 5
Bulletins - June 17, 2016
 

Rise of the bio bot drones;
The Pentagon's micro UAVs
A new kind of submarine hunter;
Missile defense looks left of launch;
Blimp funding deflated

 
Russia Reform Monitor - No. 2067
Bulletins - June 6, 2016
 

Russian elites: increasingly anti-American and statist;
How Russia rigged the Sochi Games

 
Defense Technology Monitor - No. 4
Bulletins - June 3, 2016
 

Penetrating the Pentagon's network;
Protecting power grids through fingerprinting;
Part man, part machine?;
How to down drones;
The Pentagon focuses on cyber-hardening

 
Strategic Primer - Cybersecurity
Policy Papers - April 1, 2016
 

The goal of the new Strategic Primer initiative is to provide a concise, comprehensive overview of specific defense technology issues presented in a clear, direct, and graphical manner that serves as an accessible reference to policymakers. Volume 2 of the series focuses on Cybersecurity.

 
 
Cyber Threats in the Space Domain
Policy Papers - March 31, 2016
 

The ability to access and exploit space has long been woven into the fabric of American national power. It is a critical component of global political leadership, the economy, and military power. Unfortunately, those pillars are increasingly at risk. The spread of space technology to new international actors and the increasing sophistication of those capabilities have made it possible to threaten American space systems directly. The national security community is accustomed to analyzing these threats and vulnerabilities and is pursuing a reasonable mix of policies and programs to address them. (Whether those actions are sufficient is subject to debate). However, over the last decade space and cyberspace have grown increasingly integrated. This opens up new vulnerabilities in American space systems, and gives a greater number of actors the potential to exploit those vulnerabilities...