Publications By Category

Publications By Type
Articles

Books

In-House Bulletins

Monographs

Policy Papers


Publications Related to Information and Cyberwarfare

back to publications page


China Reform Monitor - No. 1294
Bulletins - August 9, 2017
 

Beijing cracks down on VPNs;
China secures lease for Hambantota port

 
Defense Technology Monitor - No. 17
Bulletins - June 22, 2017
 

Military lasers and the law;
Making a better special operator:
Hiding tankers in plain sight;
ABL 2.0?;
The future of drone warfare: Autonomous engagement

 
Defense Technology Monitor - No. 16
Bulletins - May 29, 2017
 

Bracing for fully automated cyberwarfare;
Manufacturing battlefield weapons;
Miniaturized weapons pose new threats;
China takes strikes toward microwave weapons;
Upgrading the human mind to combat AI

 
Russia Reform Monitor - No. 2127
Bulletins - April 18, 2017
 

Political repression on the rise in Crimea;
A new way to expand Russia's citizenry

 
Defense Technology Monitor - No. 15
Bulletins - March 29, 2017
 

Washington, Tokyo plot future of missile defense;
DARPA's new drone catcher;
IBM's Watson works to bolster cybersecurity;
Atmospheric laser shield in the works;
Drone operators to get AI "wingmen";
ISIS drone innovations complicate battle in Iraq

 
Defense Technology Monitor - No. 14
Bulletins - March 14, 2017
 

The Pentagon's new project: Longer-lasting drones;
3D printing with super materials;
The evolution of drone warfare;
The ethics of future war;
From parlor games to cyberspace

 
Defense Technology Monitor - No. 13
Bulletins - February 17, 2017
 

DOD outlines electronic warfare strategy;
British government eyes gamers for drone missions;
Defenseless against hypersonic missiles;
The limits of drone warfare;
DPRK finds new delivery system for dirty bombs 

 
Defense Technology Monitor - No. 12
Bulletins - January 17, 2017
 

Army considers tech upgrades for combat vehicles;
A new way to defeat drones;
New EMP defense discovered;
Chinese phones spy on U.S. consumers;
Non-nuclear EMP versus North Korean drones

 
Global Islamism Monitor - No. 34
Bulletins - December 26, 2016
 

Boko Haram's economic impact;
ISIS in Afghanistan: Down, but not out;
How the Taliban moves money;
Targeting the cyber caliphate;
ISIS seeks softer targets in Europe;
A helping hand from Riyadh

 
Defense Technology Monitor - No. 11
Bulletins - December 19, 2016
 

Trending toward terminators;
Army adopts 3D printing;
Combating suicide drones;
The future of UAV fueling;
How drones are reshaping American strategy

 
Defense Technology Monitor - No. 9
Bulletins - October 24, 2016
 

Japan contemplates how to counter China at sea:
Hypersonics: A widening capabilities gap;
DARPA targets anti-drone tech;
China's cruise control;
Meeting the challenge of artificial intelligence

 
Russia Reform Monitor - No. 2097
Bulletins - October 17, 2016
 

Now Russian hacking hits Germany;
Full speed ahead for "Yarovaya" monitoring

 
Defense Technology Monitor - No. 8
Bulletins - October 11, 2016
 

Drones, coming soon to a lab near you;
Russia's robotic revolution;
A new military mission: Countering robotic sensor systems;
Mind control and drone fleets
How Russia plans to take the high ground

 
Assessing US-India Defense Relations: The Technological Handshake
Articles - October 6, 2016
 

In the words of U.S. Defense Secretary Ashton Carter, two “handshakes” now define the increasingly intimate Indo-U.S. defense partnership. The “strategic handshake” was examined in detail in my last article for The Diplomat. We will now turn our attention to the “technological handshake,” shorthand for the growth in arms sales, technical cooperation, and defense co-production and co-development.

 
Cyber Insecurity: Navigating the Perils of the Next Information Age
Books - October 2016
 
 
A Better Plan for Internet Governance
Articles - September 29, 2016
 

The problem with high technology is that it can be difficult to understand, leading to what are often confused policy prescriptions. A perfect example is the proposed upcoming transition of the internet-naming function from U.S. to private control - an event that's scheduled to take place just a few days from now, on Sept. 30. While the transition itself isn't necessarily a bad idea, the Obama administration's current plan has definite flaws. 

 
Defense Technology Monitor - No. 7
Bulletins - July 27, 2016
 

Cyber command to enhance training Ops;
How to cripple the U.S. electrical grid;
Israel develops land battle drone;
NATO and the importance of cyber;
Is A.I. the future of aerial combat? 

 
Defense Technology Monitor - No. 6
Bulletins - July 6, 2016
 

China's answer to U.S. lasers;
European missile defense moves ahead;
Space assets and the fight against ISIS;
Another step forward for Iron Dome;
Railguns becoming a reality;
China takes aim with new missile 

 
Defense Technology Monitor - No. 5
Bulletins - June 17, 2016
 

Rise of the bio bot drones;
The Pentagon's micro UAVs
A new kind of submarine hunter;
Missile defense looks left of launch;
Blimp funding deflated

 
Russia Reform Monitor - No. 2067
Bulletins - June 6, 2016
 

Russian elites: increasingly anti-American and statist;
How Russia rigged the Sochi Games

 
Defense Technology Monitor - No. 4
Bulletins - June 3, 2016
 

Penetrating the Pentagon's network;
Protecting power grids through fingerprinting;
Part man, part machine?;
How to down drones;
The Pentagon focuses on cyber-hardening

 
Strategic Primer - Cybersecurity
Policy Papers - April 1, 2016
 

The goal of the new Strategic Primer initiative is to provide a concise, comprehensive overview of specific defense technology issues presented in a clear, direct, and graphical manner that serves as an accessible reference to policymakers. Volume 2 of the series focuses on Cybersecurity.

 
 
Cyber Threats in the Space Domain
Policy Papers - March 31, 2016
 

The ability to access and exploit space has long been woven into the fabric of American national power. It is a critical component of global political leadership, the economy, and military power. Unfortunately, those pillars are increasingly at risk. The spread of space technology to new international actors and the increasing sophistication of those capabilities have made it possible to threaten American space systems directly. The national security community is accustomed to analyzing these threats and vulnerabilities and is pursuing a reasonable mix of policies and programs to address them. (Whether those actions are sufficient is subject to debate). However, over the last decade space and cyberspace have grown increasingly integrated. This opens up new vulnerabilities in American space systems, and gives a greater number of actors the potential to exploit those vulnerabilities...

 
Defense Technology Monitor - No. 2
Bulletins - March 3, 2016
 

U.S. space dominance a double edged sword;
The Air Force's new cyber shield;
All eyes on electronic warfare;
China pushing new boundaries with its drones

 

 
Defense Technology Monitor - No. 1
Bulletins - February 19, 2016
 

Legal questions about laser weapons;
Russia's A2AD strategy;
New drone capabilities needed;
Hardening future fighters;
Hackers turned out the lights in Ukraine

 
Understanding Cybersecurity - Part 5 | Military Cyber Operations
Policy Papers - November 10, 2015
 

 What is the role of cybersecurity in the conduct of war and ongoing security operations? Policymakers, academics, and journalists often think of cybersecurity as a single domain problem. That is to say, they view cyber operations as taking place solely within its own domain—one that is separate from land, sea, air or space. This perspective, however, overlooks the fact that computer systems and networks pervade society and the physical environment, and are present to some degree in all physical environs and across the three levels of war (strategic, operational, and tactical). Modern militaries employ forces in a “joint” manner, combining the specific platforms and technologies of different services to achieve a more effective force. National security policymakers should similarly see both kinetic and cyber capabilities as part of a broad set of tools available to achieve their objectives. Thinking of cybersecurity as a limited or separate space, wholly distinct from the other domains of conflict, limits the potential for understanding its strategic utility...

 
Understanding Cybersecurity - Part 4 | Internet Security Governance
Policy Papers - October 2, 2015
 

Internet Security Governance covers the policy challenges that arise from building and governing security in the Internet’s architecture and key protocols. It is not a description of security for computers and networks (Information Assurance),  how to manage the negotiated structure and key functions of the Internet (Internet Governance), or the pursuit of criminal groups and other threat actors (Cyber Crime). Internet Security Governance is the discussion of defensively oriented technical and legal topics that cross national boundaries and/or involve security of the underlying protocols and hardware which make up the Internet...

 
The War Against ISIS Through Social Media
Policy Papers - July 7, 2015
 

On July 7, the American Foreign Policy Council (AFPC) held the fourth installment of its Defense Technology Program’s Understanding Cybersecurity lunch briefing series for Congressional Staffers. This event, entitled, “How the Caliphate is Communicating:” Understanding and Countering the Islamic State’s Messaging outlined how and why the Islamic State has been winning the “war of ideas” through the use of social media, and how the group is using social media to further its operations...

 
 
Understanding Cybersecurity - Part 3 | Cyber Crime
Policy Papers - June 30, 2015
 

Cyber crime covers a wide range of activities that includes theft, fraud and harassment; stealing valuable intellectual property as part of industrial espionage; committing financial fraud and credit card theft; and disrupting internet services for ideological goals (“hacktivism”). The crimes target both firms and consumers, and while they rarely result in physical harm or property damage, there can still be severe consequences...

 
Missile Defense Briefing Report - No. 337
Bulletins - June 23, 2015
 

Missile defense for the Gulf;
Ukraine seeks BMD as a hedge against Russia;
In the Army, a focus on integration;
Beijing, Moscow make missile moves

 
Understanding Cybersecurity - Part 2 | Information Assurance
Policy Papers - April 15, 2015
 

Information Assurance is the art and science of securing computer systems and networks against efforts by third parties to disable, intrude, or otherwise impede operations. It is the focus of most “cybersecurity” professionals in the technical community. The principal goals are to maintain an information system’s Confidentiality (the secrecy of information as it is used and stored), Integrity, reliability of data and equipment, and Availability, that a computer system is ready and able to function as needed. Information Assurance includes writing secure software, deploying it safely, and managing it to minimize the risk of compromise.

 
Understanding Cybersecurity - Part 1 | Redefining Cybersecurity
Policy Papers - January 22, 2015
 

Cybersecurity is an often abused and much misused term that was once intended to describe and now serves better to confuse. While originally intended to cover security related issues associated with “cyberspace,” a phrase coined by author William Gibson in the short story “Burning Chrome,” it has become the byword for a staggeringly diverse array of topics. While this is frustrating, the term is popular as shorthand, so we offer this paper to identify and explain four clusters of related topics under the larger umbrella of “cybersecurity.”  Each is a distinct issue area with unique technical and policy challenges, while retaining some association to the others...

 
Protecting the Warfighter in an Austere Budget Environment
Policy Papers - September 24, 2014
 

Winston Churchill is often quoted as saying, “Gentlemen, we have run out of money. Now we have to think.” A similar statement is attributed to Ernest Rutherford, a New Zealand physicist often cited as the “father” of nuclear physics. Regardless of who uttered this quote, many believe it appropriately summarizes the state of America’s defense establishment today. “Fiscal austerity” is the environment in which national security decisions are made...

 
Cybersecurity: New Threats and Challenges
Policy Papers - September 27, 2013
 

In recent years the vast expansion of cyberspace, not only in terms of user but content and applications, has brought about a set of new threats and challenges never anticipated by the net’s designers. At the outset of this technological revolution access to the net was only through a few connected mainframe computers; there was literally nothing to steal or attack; and no infrastructure was connected to the net. Cybersecurity was simply not an issue...

 
A more sober approach to the Russian ‘reset’
Articles - August 27, 2013
 

Today, the U.S. and Moscow share few common interests

The fate of controversial National Security Agency whistleblower Edward Snowden, who was recently granted asylum by the Kremlin, is of little importance. His case, however, shines a revealing spotlight on the true state of U.S.-Russian relations, and on the sorry state of American policy toward Vladimir Putin’s Russia.

 
Getting On The Same Wavelength
Articles - July 8, 2013
 

Largely unnoticed among the acrimonious back-and-forth over Syria at the recent Group of Eight summit in Fermenagh, Ireland, the United States and Russia took a small but meaningful step forward in cyberspace. On the sidelines of the summit, the two nations signed a pact filled with “confidence-building measures” designed to prevent miscalculations and unwarranted escalations in the event of a cyberconflict.

 
Trouble on the Chinese Seas
Articles - June 19, 2013
 

Media coverage of the June 7-8 "shirt sleeves" summit between President Obama and new Chinese president Xi Jinping in Rancho Mirage, California has largely focused on the two issues that dominated the official agenda. The first was China's extensive intellectual property theft and hacking activities in cyberspace. The second was the threat posed by the regime of reckless "young leader" Kim Jong Un in North Korea.

 
Rules of Engagement, the Cybercrime Edition
Articles - April 2, 2013
 

Late last month, computers in Seoul became the latest victims of the growing number of cyber-intrusions now taking place worldwide. Approximately 32,000 computers belonging to South Korean banks and broadcasting stations were shut down by an unknown perpetrator, strongly suspected to be the notoriously unpredictable Stalinist regime in North Korea.

 
SYMPOSIUM: The New Cold War?
Articles - December 28, 2012
 

In late October, speaking at the Intrepid Museum in New York, U.S. Secretary of Defense Leon Panetta delivered a stark warning. The United States, Panetta said, could soon face a mass disruption event of catastrophic proportions, a "cyber Pearl Harbor" of sorts.

 
Banking Without Borders
Articles - December 14, 2012
 

Money laundering and terrorism financing are global problems that transcend national boundaries, and launderers and terrorists are constantly adapting their techniques to exploit vulnerabilities in the financial system to disguise the movement of funds.

 
Is Iran Attacking U.S. Banks?
Articles - October 2, 2012
 

Late last month, many Americans experienced difficulties accessing their digital bank accounts and the Web sites of their financial institutions. The culprit wasn't a simple computer glitch, but a series of coordinated cyberattacks aimed at the U.S. financial sector.

 
Cyber Urgency Needed: Complacency Leaves U.S. Vulnerable
Articles - June 18, 2012
 

How real is the potential for cyberwar? The growing attention being given to cyberspace by policymakers and the media alike reflects an inescapable reality. With government agencies and private companies under frequent attack in cyberspace, and with incidents of cyber espionage increasing in both intensity and frequency, it would be fair to say that the U.S. is already engaged in battle in cyberspace.

 
Iran, the next cyberthreat
Articles - May 14, 2012
 

Since taking office in 2009, the Obama administration has made cybersecurity a major area of policy focus. The past year in particular has seen a dramatic expansion of governmental awareness of cyberspace as a new domain of conflict. In practice, however, this attention is still uneven. To date, it has focused largely on network protection and resiliency (particularly in the military arena) and on the threat potential of countries such as China and Russia. Awareness of what is perhaps the most urgent cybermenace to the U.S. homeland has lagged behind the times.

 
Eurasia Security Watch - No. 258
Bulletins - May 11, 2012
 

Syrian hackers attack Qatar and Saudi Arabia; Hamas and Islamic jihad elections; Israeli nuclear submarines to counter Iran; Tajikistan cracks down on Islamist groups

 
China Reform Monitor - No. 961
Bulletins - April 25, 2012
 

New body to audit the PLA; 

Anonymous hacker group targets Chinese government
 
China Reform Monitor - No. 959
Bulletins - April 17, 2012
 

PLA claims it's a victim of cyberattacks; 

CPC forms monastery management agency for Tibet
 
Eurasia Security Watch - No. 256
Bulletins - March 29, 2012
 

Egyptian MP proposes "Islamic" punishments; Increasing Russian weapons exports to Syria; Resumption of U.S.-Yemen Counterterrorism training causes stir; Turkey's new cyber security strategy for 2013; Independence for Eastern Libya?

 
MTN has no business aiding terror in Iran Allegations that SA cellphone company helps regime persecute opposition
Articles - March 24, 2012
 

MTN has a corporate responsibility to cease doing business with Iran and colluding with a state sponsor of terror that uses its technology to track, silence and kill its people. The South African government should take immediate action to prevent this abuse of the telecommunications industry.

 
Russia Reform Monitor - No. 1759
Bulletins - January 19, 2012
 

 Continuing protests, and the Kremlin's response;

U.S., Russia to expand cooperation in cyberspace
 
Iran Democracy Monitor - No. 114
Bulletins - January 13, 2012
 

 Wooing Afghanistan; Sanctions Drive Iranian Rial Downward; A Falling Out with Al-Jazeera; Iran's Newest Energy Partner; A New Cyber-Clampdown