Publications By Category

Publications By Type
Articles

Books

In-House Bulletins

Monographs

Policy Papers


Publications Related to Information and Cyberwarfare

back to publications page


Resource Security Watch - No. 11
Bulletins - February 16, 2018
 

The hidden cost of cryptocurrency;
Tehran's toxic air;
Reclassifying climate change;
China moves to manage carbon emissions;
Indonesia's sinking city

 
Russia Is Poised To Surprise The US In Battlefield Robotics
Articles - January 25, 2018
 

No one would call Russia's government and budgetary bureaucracy particularly nimble, nor its defense industry particularly advanced. Certainly, it trails Western economies in such key areas as communication equipment, microelectronics, high-tech control systems, and other key technologies. But in certain aspects of the field of unmanned military systems, Russia may be inching ahead of its competition in designing and testing a wide variety of systems and conceptualizing their future use.

 
Russia Reform Monitor - No. 2183
Bulletins - January 18, 2018
 

The Russian threat to NATO connectivity;
In post-conflict Syria, the advantage goes to Russia

 
China Reform Monitor - No. 1311
Bulletins - January 9, 2018
 

New anti-terror restrictions foreshadow squeeze on foreigners;
The PLA deploys in Doklam

 
Emerging Technology and Security - Tables
Articles - December 20, 2017
 

Please use this link to reference the Tables in the November 2017 Defense Dossier Future of War issue article Emerging Technology and Security - Looking to the Future.

 
Defense Technology Monitor - No. 24
Bulletins - December 18, 2017
 

Hypersonic weapons enable global strike capability;
Dreaming of invisibility;
The brewing debate over BCI;
Naval iron dome reaches IOC;
Russia's push for an independent internet directory

 
Russia Reform Monitor - No. 2174
Bulletins - December 14, 2017
 

A nuclear accident after all, perhaps;
The Kremlin gears up for war with Google

 
Red Robots Rising: Behind The Rapid Development Of Russian Unmanned Military Systems
Articles - December 12, 2017
 

Over the last five years, the Russian Federation has made great strides in designing, testing, evaluating, and fielding a variety of unmanned military systems, including land, air, and sea-based models. Russian media is full of announcements and analyses of the use and specification of what I call red robots, while Russia's foray into Eastern Ukraine and Syria afforded Moscow a rare opportunity to field and operate such machines in combat

 
Defense Technology Monitor - No. 23
Bulletins - December 7, 2017
 

China's cyberforce set to surge;
The Marines embrace additive manufacturing;
How coal may fuel a defense tech boom;
A facelift for the U.S. EW technology;
Those other directed energy weapons

 
Beyond Super Soldiers and Battle Suits
Articles - December 5, 2017
 

Science fiction is always fascinating to follow, because at least some of the ideas presented in the genre do become reality over time. The concept of "super soldiers" is a case in point. Although the protagonists in Marvel's iconic Avengers comic books (and now movies) are still a long way from being realistic, we are unquestionably trending in that direction. Thus, the character of Captain America is a soldier enhanced by the government using a special serum to make him stronger, faster and more resilient, while Iron Man is an operator encased in full body armor that affords him super human strength, advanced weapons, and extrasensory systems. Even though such enhancements are still a stretch, performance drugs, exoskeletons, and other new technologies are increasingly augmenting - and expanding - the capabilities of today's warfighters.

 
Defense Technology Monitor - No. 22
Bulletins - December 1, 2017
 

Wirelessly charging drone subs;
The Pentagon's new EW strategy;
Reconsidering "Rods from Gods";
The hazards of hacked robots;
New military applications for AI

 
Future Thinking: the Role Of Artificial Intelligence
Articles - November 18, 2017
 

The past several years have seen a remarkable transition of Artificial Intelligence (AI) from academia to practical use. This shift is beginning to transform every industry, is fundamentally changing many consumer services, and will have a profound impact on national security.

 
Gaming To Victory: Synthetic Training For Future Combat
Articles - November 15, 2017
 

It looked like a video game. From the comfort of a living room couch, with TV dinners in hand, families watched as precision-guided munitions rained down with seemingly perfect accuracy on Iraqi military and civilian targets. It was Jan. 17, 1991 - the start of Operation Desert Storm - and the combination of camera equipped high-tech weaponry and night vision equipment provided viewers an action-packed front-row view into the coalition's air war. What had seemed like science fiction was now a reality.

 
Directed Energy Weapons And Modern Warfare
Articles - November 14, 2017
 

In a 2009 article entitled "Technology and Warfare," Professor Alex Roland of Duke University wrote that "...technology, more than any other outside force, shapes warfare.”[1] In his article, Roland went on to explain how military technologies, while not being deterministic, open doors and provide opportunities - often referred to as 'opportunity space' in current military parlance - for the nations employing them.

 
Russia Reform Monitor - No. 2161
Bulletins - October 16, 2017
 

The Kremlin doubles down on the Donbas;
A looming showdown in Syria

 
Russia Reform Monitor - No. 2160
Bulletins - October 11, 2017
 

A news day for the Donbas?;
Ukraine under cyber-assault

 
Russia Reform Monitor - No. 2159
Bulletins - October 10, 2017
 

How Russia exploits the North Korean crisis;
A helping hand for Hamas

 
Russia Reform Monitor - No. 2158
Bulletins - October 9, 2017
 

Russia, Europe edge closer to political divorce;
Facebook wises up to Russian propaganda... finally

 
Defense Technology Monitor - No. 21
Bulletins - September 26, 2017
 

U.S. Navy 3D prints submersible;
Has China developed "hack proof" communications?;
A new way to hack computers;
Self-healing robots on horizon;
Tech leaders fight for UN ban on killer robots

 
Defense Technology Monitor - No. 19
Bulletins - August 31, 2017
 

Artificial intelligence: The NGA's new top analyst;
Hacking the human brain;
ABL reborn...on a drone;
How Russia can hack the U.S. electric grid

 
China Reform Monitor - No. 1295
Bulletins - August 10, 2017
 

Beijing cracks down on VPNs;
China secures lease for Hambantota port

 
Defense Technology Monitor - No. 18
Bulletins - July 25, 2017
 

Bionic spy dragonfly;
With an eye on Russia, U.S. focuses on electronic warfare;
A military focus on electromagnetic weapons;
Navy rail gun almost ready to launch;
Prepping for space warfare

 
Defense Technology Monitor - No. 17
Bulletins - June 22, 2017
 

Military lasers and the law;
Making a better special operator:
Hiding tankers in plain sight;
ABL 2.0?;
The future of drone warfare: Autonomous engagement

 
Defense Technology Monitor - No. 16
Bulletins - May 29, 2017
 

Bracing for fully automated cyberwarfare;
Manufacturing battlefield weapons;
Miniaturized weapons pose new threats;
China takes strikes toward microwave weapons;
Upgrading the human mind to combat AI

 
Russia Reform Monitor - No. 2127
Bulletins - April 18, 2017
 

Political repression on the rise in Crimea;
A new way to expand Russia's citizenry

 
Defense Technology Monitor - No. 15
Bulletins - March 29, 2017
 

Washington, Tokyo plot future of missile defense;
DARPA's new drone catcher;
IBM's Watson works to bolster cybersecurity;
Atmospheric laser shield in the works;
Drone operators to get AI "wingmen";
ISIS drone innovations complicate battle in Iraq

 
Defense Technology Monitor - No. 14
Bulletins - March 14, 2017
 

The Pentagon's new project: Longer-lasting drones;
3D printing with super materials;
The evolution of drone warfare;
The ethics of future war;
From parlor games to cyberspace

 
Defense Technology Monitor - No. 13
Bulletins - February 17, 2017
 

DOD outlines electronic warfare strategy;
British government eyes gamers for drone missions;
Defenseless against hypersonic missiles;
The limits of drone warfare;
DPRK finds new delivery system for dirty bombs 

 
Defense Technology Monitor - No. 12
Bulletins - January 17, 2017
 

Army considers tech upgrades for combat vehicles;
A new way to defeat drones;
New EMP defense discovered;
Chinese phones spy on U.S. consumers;
Non-nuclear EMP versus North Korean drones

 
Global Islamism Monitor - No. 34
Bulletins - December 26, 2016
 

Boko Haram's economic impact;
ISIS in Afghanistan: Down, but not out;
How the Taliban moves money;
Targeting the cyber caliphate;
ISIS seeks softer targets in Europe;
A helping hand from Riyadh

 
Defense Technology Monitor - No. 11
Bulletins - December 19, 2016
 

Trending toward terminators;
Army adopts 3D printing;
Combating suicide drones;
The future of UAV fueling;
How drones are reshaping American strategy

 
Defense Technology Monitor - No. 9
Bulletins - October 24, 2016
 

Japan contemplates how to counter China at sea:
Hypersonics: A widening capabilities gap;
DARPA targets anti-drone tech;
China's cruise control;
Meeting the challenge of artificial intelligence

 
Russia Reform Monitor - No. 2097
Bulletins - October 17, 2016
 

Now Russian hacking hits Germany;
Full speed ahead for "Yarovaya" monitoring

 
Defense Technology Monitor - No. 8
Bulletins - October 11, 2016
 

Drones, coming soon to a lab near you;
Russia's robotic revolution;
A new military mission: Countering robotic sensor systems;
Mind control and drone fleets
How Russia plans to take the high ground

 
Assessing US-India Defense Relations: The Technological Handshake
Articles - October 6, 2016
 

In the words of U.S. Defense Secretary Ashton Carter, two “handshakes” now define the increasingly intimate Indo-U.S. defense partnership. The “strategic handshake” was examined in detail in my last article for The Diplomat. We will now turn our attention to the “technological handshake,” shorthand for the growth in arms sales, technical cooperation, and defense co-production and co-development.

 
Cyber Insecurity: Navigating the Perils of the Next Information Age
Books - October 2016
 
 
A Better Plan for Internet Governance
Articles - September 29, 2016
 

The problem with high technology is that it can be difficult to understand, leading to what are often confused policy prescriptions. A perfect example is the proposed upcoming transition of the internet-naming function from U.S. to private control - an event that's scheduled to take place just a few days from now, on Sept. 30. While the transition itself isn't necessarily a bad idea, the Obama administration's current plan has definite flaws. 

 
Defense Technology Monitor - No. 7
Bulletins - July 27, 2016
 

Cyber command to enhance training Ops;
How to cripple the U.S. electrical grid;
Israel develops land battle drone;
NATO and the importance of cyber;
Is A.I. the future of aerial combat? 

 
Defense Technology Monitor - No. 6
Bulletins - July 6, 2016
 

China's answer to U.S. lasers;
European missile defense moves ahead;
Space assets and the fight against ISIS;
Another step forward for Iron Dome;
Railguns becoming a reality;
China takes aim with new missile 

 
Defense Technology Monitor - No. 5
Bulletins - June 17, 2016
 

Rise of the bio bot drones;
The Pentagon's micro UAVs
A new kind of submarine hunter;
Missile defense looks left of launch;
Blimp funding deflated

 
Russia Reform Monitor - No. 2067
Bulletins - June 6, 2016
 

Russian elites: increasingly anti-American and statist;
How Russia rigged the Sochi Games

 
Defense Technology Monitor - No. 4
Bulletins - June 3, 2016
 

Penetrating the Pentagon's network;
Protecting power grids through fingerprinting;
Part man, part machine?;
How to down drones;
The Pentagon focuses on cyber-hardening

 
Strategic Primer - Cybersecurity
Policy Papers - April 1, 2016
 

The goal of the new Strategic Primer initiative is to provide a concise, comprehensive overview of specific defense technology issues presented in a clear, direct, and graphical manner that serves as an accessible reference to policymakers. Volume 2 of the series focuses on Cybersecurity.

 
 
Cyber Threats in the Space Domain
Policy Papers - March 31, 2016
 

The ability to access and exploit space has long been woven into the fabric of American national power. It is a critical component of global political leadership, the economy, and military power. Unfortunately, those pillars are increasingly at risk. The spread of space technology to new international actors and the increasing sophistication of those capabilities have made it possible to threaten American space systems directly. The national security community is accustomed to analyzing these threats and vulnerabilities and is pursuing a reasonable mix of policies and programs to address them. (Whether those actions are sufficient is subject to debate). However, over the last decade space and cyberspace have grown increasingly integrated. This opens up new vulnerabilities in American space systems, and gives a greater number of actors the potential to exploit those vulnerabilities...

 
Defense Technology Monitor - No. 2
Bulletins - March 3, 2016
 

U.S. space dominance a double edged sword;
The Air Force's new cyber shield;
All eyes on electronic warfare;
China pushing new boundaries with its drones

 

 
Defense Technology Monitor - No. 1
Bulletins - February 19, 2016
 

Legal questions about laser weapons;
Russia's A2AD strategy;
New drone capabilities needed;
Hardening future fighters;
Hackers turned out the lights in Ukraine

 
Understanding Cybersecurity - Part 5 | Military Cyber Operations
Policy Papers - November 10, 2015
 

 What is the role of cybersecurity in the conduct of war and ongoing security operations? Policymakers, academics, and journalists often think of cybersecurity as a single domain problem. That is to say, they view cyber operations as taking place solely within its own domain—one that is separate from land, sea, air or space. This perspective, however, overlooks the fact that computer systems and networks pervade society and the physical environment, and are present to some degree in all physical environs and across the three levels of war (strategic, operational, and tactical). Modern militaries employ forces in a “joint” manner, combining the specific platforms and technologies of different services to achieve a more effective force. National security policymakers should similarly see both kinetic and cyber capabilities as part of a broad set of tools available to achieve their objectives. Thinking of cybersecurity as a limited or separate space, wholly distinct from the other domains of conflict, limits the potential for understanding its strategic utility...

 
Understanding Cybersecurity - Part 4 | Internet Security Governance
Policy Papers - October 2, 2015
 

Internet Security Governance covers the policy challenges that arise from building and governing security in the Internet’s architecture and key protocols. It is not a description of security for computers and networks (Information Assurance),  how to manage the negotiated structure and key functions of the Internet (Internet Governance), or the pursuit of criminal groups and other threat actors (Cyber Crime). Internet Security Governance is the discussion of defensively oriented technical and legal topics that cross national boundaries and/or involve security of the underlying protocols and hardware which make up the Internet...

 
The War Against ISIS Through Social Media
Policy Papers - July 7, 2015
 

On July 7, the American Foreign Policy Council (AFPC) held the fourth installment of its Defense Technology Program’s Understanding Cybersecurity lunch briefing series for Congressional Staffers. This event, entitled, “How the Caliphate is Communicating:” Understanding and Countering the Islamic State’s Messaging outlined how and why the Islamic State has been winning the “war of ideas” through the use of social media, and how the group is using social media to further its operations...

 
 
Understanding Cybersecurity - Part 3 | Cyber Crime
Policy Papers - June 30, 2015
 

Cyber crime covers a wide range of activities that includes theft, fraud and harassment; stealing valuable intellectual property as part of industrial espionage; committing financial fraud and credit card theft; and disrupting internet services for ideological goals (“hacktivism”). The crimes target both firms and consumers, and while they rarely result in physical harm or property damage, there can still be severe consequences...