Publications By Category

Publications By Type
Articles

Books

In-House Bulletins

Monographs

Policy Papers


Publications Related to Defense Technology Program

back to publications page


Defense Technology Monitor - No. 2
Bulletins - March 3, 2016
 

U.S. space dominance a double edged sword;
The Air Force's new cyber shield;
All eyes on electronic warfare;
China pushing new boundaries with its drones

 

 
Defense Technology Monitor - No. 1
Bulletins - February 19, 2016
 

Legal questions about laser weapons;
Russia's A2AD strategy;
New drone capabilities needed;
Hardening future fighters;
Hackers turned out the lights in Ukraine

 
Understanding Cybersecurity - Part 5 | Military Cyber Operations
Policy Papers - November 10, 2015
 

 What is the role of cybersecurity in the conduct of war and ongoing security operations? Policymakers, academics, and journalists often think of cybersecurity as a single domain problem. That is to say, they view cyber operations as taking place solely within its own domain—one that is separate from land, sea, air or space. This perspective, however, overlooks the fact that computer systems and networks pervade society and the physical environment, and are present to some degree in all physical environs and across the three levels of war (strategic, operational, and tactical). Modern militaries employ forces in a “joint” manner, combining the specific platforms and technologies of different services to achieve a more effective force. National security policymakers should similarly see both kinetic and cyber capabilities as part of a broad set of tools available to achieve their objectives. Thinking of cybersecurity as a limited or separate space, wholly distinct from the other domains of conflict, limits the potential for understanding its strategic utility...

 
Understanding Cybersecurity - Part 4 | Internet Security Governance
Policy Papers - October 2, 2015
 

Internet Security Governance covers the policy challenges that arise from building and governing security in the Internet’s architecture and key protocols. It is not a description of security for computers and networks (Information Assurance),  how to manage the negotiated structure and key functions of the Internet (Internet Governance), or the pursuit of criminal groups and other threat actors (Cyber Crime). Internet Security Governance is the discussion of defensively oriented technical and legal topics that cross national boundaries and/or involve security of the underlying protocols and hardware which make up the Internet...

 
Strategic Primer - Missile Defense
Policy Papers - October 1, 2015
 

The goal of the new Strategic Primer initiative is to provide a concise, comprehensive overview of specific defense technology issues presented in a clear, direct, and graphical manner that serves as an accessible reference to policymakers. Volume 1 of the series focuses on Missile Defense.

 
Time To Refocus On The EMP Threat
Articles - August 19, 2015
 

In late July, the US Senate Committee on Homeland Security and Governmental Affairs assembled a number of top experts to discuss a critical threat to the homeland: electromagnetic pulse (EMP).

 
The War Against ISIS Through Social Media
Policy Papers - July 7, 2015
 

On July 7, the American Foreign Policy Council (AFPC) held the fourth installment of its Defense Technology Program’s Understanding Cybersecurity lunch briefing series for Congressional Staffers. This event, entitled, “How the Caliphate is Communicating:” Understanding and Countering the Islamic State’s Messaging outlined how and why the Islamic State has been winning the “war of ideas” through the use of social media, and how the group is using social media to further its operations...

 
 
Understanding Cybersecurity - Part 3 | Cyber Crime
Policy Papers - June 30, 2015
 

Cyber crime covers a wide range of activities that includes theft, fraud and harassment; stealing valuable intellectual property as part of industrial espionage; committing financial fraud and credit card theft; and disrupting internet services for ideological goals (“hacktivism”). The crimes target both firms and consumers, and while they rarely result in physical harm or property damage, there can still be severe consequences...

 
Understanding Cybersecurity - Part 2 | Information Assurance
Policy Papers - April 15, 2015
 

Information Assurance is the art and science of securing computer systems and networks against efforts by third parties to disable, intrude, or otherwise impede operations. It is the focus of most “cybersecurity” professionals in the technical community. The principal goals are to maintain an information system’s Confidentiality (the secrecy of information as it is used and stored), Integrity, reliability of data and equipment, and Availability, that a computer system is ready and able to function as needed. Information Assurance includes writing secure software, deploying it safely, and managing it to minimize the risk of compromise.

 
Understanding Cybersecurity - Part 1 | Redefining Cybersecurity
Policy Papers - January 22, 2015
 

Cybersecurity is an often abused and much misused term that was once intended to describe and now serves better to confuse. While originally intended to cover security related issues associated with “cyberspace,” a phrase coined by author William Gibson in the short story “Burning Chrome,” it has become the byword for a staggeringly diverse array of topics. While this is frustrating, the term is popular as shorthand, so we offer this paper to identify and explain four clusters of related topics under the larger umbrella of “cybersecurity.”  Each is a distinct issue area with unique technical and policy challenges, while retaining some association to the others...