Publications By Category

Publications By Type


In-House Bulletins


Policy Papers

Publications Related to Information and Cyberwarfare

back to publications page

The War Against ISIS Through Social Media
Policy Papers - July 7, 2015

On July 7, the American Foreign Policy Council (AFPC) held the fourth installment of its Defense Technology Program’s Understanding Cybersecurity lunch briefing series for Congressional Staffers. This event, entitled, “How the Caliphate is Communicating:” Understanding and Countering the Islamic State’s Messaging outlined how and why the Islamic State has been winning the “war of ideas” through the use of social media, and how the group is using social media to further its operations...

Cyber Crime: Security Under Scarce Resources
Policy Papers - June 30, 2015

Cyber crime covers a wide range of activities that includes theft, fraud and harassment; stealing valuable intellectual property as part of industrial espionage; committing financial fraud and credit card theft; and disrupting internet services for ideological goals (“hacktivism”). The crimes target both firms and consumers, and while they rarely result in physical harm or property damage, there can still be severe consequences...

Missile Defense Briefing Report - No. 337
Bulletins - June 23, 2015


Missile defense for the Gulf;
Ukraine seeks BMD as a hedge against Russia;
In the Army, a focus on integration;
Beijing, Moscow make missile moves



Understanding Cybersecurity - Part 2 - Information Assurance
Policy Papers - April 15, 2015

Information Assurance is the art and science of securing computer systems and networks against efforts by third parties to disable, intrude, or otherwise impede operations. It is the focus of most “cybersecurity” professionals in the technical community. The principal goals are to maintain an information system’s Confidentiality (the secrecy of information as it is used and stored), Integrity, reliability of data and equipment, and Availability, that a computer system is ready and able to function as needed. Information Assurance includes writing secure software, deploying it safely, and managing it to minimize the risk of compromise.

Redefining Cybersecurity
Policy Papers - January 22, 2015

Cybersecurity is an often abused and much misused term that was once intended to describe and now serves better to confuse. While originally intended to cover security related issues associated with “cyberspace,” a phrase coined by author William Gibson in the short story “Burning Chrome,” it has become the byword for a staggeringly diverse array of topics. While this is frustrating, the term is popular as shorthand, so we offer this paper to identify and explain four clusters of related topics under the larger umbrella of “cybersecurity.”  Each is a distinct issue area with unique technical and policy challenges, while retaining some association to the others...

Protecting the Warfighter in an Austere Budget Environment
Policy Papers - September 24, 2014

Winston Churchill is often quoted as saying, “Gentlemen, we have run out of money. Now we have to think.” A similar statement is attributed to Ernest Rutherford, a New Zealand physicist often cited as the “father” of nuclear physics. Regardless of who uttered this quote, many believe it appropriately summarizes the state of America’s defense establishment today. “Fiscal austerity” is the environment in which national security decisions are made...

Cybersecurity: New Threats and Challenges
Policy Papers - September 27, 2013

In recent years the vast expansion of cyberspace, not only in terms of user but content and applications, has brought about a set of new threats and challenges never anticipated by the net’s designers. At the outset of this technological revolution access to the net was only through a few connected mainframe computers; there was literally nothing to steal or attack; and no infrastructure was connected to the net. Cybersecurity was simply not an issue...

A more sober approach to the Russian ‘reset’
Articles - August 27, 2013

Today, the U.S. and Moscow share few common interests

The fate of controversial National Security Agency whistleblower Edward Snowden, who was recently granted asylum by the Kremlin, is of little importance. His case, however, shines a revealing spotlight on the true state of U.S.-Russian relations, and on the sorry state of American policy toward Vladimir Putin’s Russia.

Getting On The Same Wavelength
Articles - July 8, 2013

Largely unnoticed among the acrimonious back-and-forth over Syria at the recent Group of Eight summit in Fermenagh, Ireland, the United States and Russia took a small but meaningful step forward in cyberspace. On the sidelines of the summit, the two nations signed a pact filled with “confidence-building measures” designed to prevent miscalculations and unwarranted escalations in the event of a cyberconflict.

Trouble on the Chinese Seas
Articles - June 19, 2013

Media coverage of the June 7-8 "shirt sleeves" summit between President Obama and new Chinese president Xi Jinping in Rancho Mirage, California has largely focused on the two issues that dominated the official agenda. The first was China's extensive intellectual property theft and hacking activities in cyberspace. The second was the threat posed by the regime of reckless "young leader" Kim Jong Un in North Korea.