Publications By Category

Publications By Type


In-House Bulletins


Policy Papers

Publications Related to Information and Cyberwarfare

back to publications page

Internet Security Governance - Building Security Without Piling On
Policy Papers - October 2, 2015

Internet Security Governance covers the policy challenges that arise from building and governing security in the Internet’s architecture and key protocols. It is not a description of security for computers and networks (Information Assurance),  how to man- age the negotiated structure and key functions of the Internet (Internet Governance), or the pursuit of crim- inal groups and other threat actors (Cyber Crime).2 Internet Security Governance is the discussion of de- fensively oriented technical and legal topics that cross national boundaries and/or involve security of the un- derlying protocols and hardware which make up the Internet...

The War Against ISIS Through Social Media
Policy Papers - July 7, 2015

On July 7, the American Foreign Policy Council (AFPC) held the fourth installment of its Defense Technology Program’s Understanding Cybersecurity lunch briefing series for Congressional Staffers. This event, entitled, “How the Caliphate is Communicating:” Understanding and Countering the Islamic State’s Messaging outlined how and why the Islamic State has been winning the “war of ideas” through the use of social media, and how the group is using social media to further its operations...

Cyber Crime: Security Under Scarce Resources
Policy Papers - June 30, 2015

Cyber crime covers a wide range of activities that includes theft, fraud and harassment; stealing valuable intellectual property as part of industrial espionage; committing financial fraud and credit card theft; and disrupting internet services for ideological goals (“hacktivism”). The crimes target both firms and consumers, and while they rarely result in physical harm or property damage, there can still be severe consequences...

Missile Defense Briefing Report - No. 337
Bulletins - June 23, 2015


Missile defense for the Gulf;
Ukraine seeks BMD as a hedge against Russia;
In the Army, a focus on integration;
Beijing, Moscow make missile moves



Understanding Cybersecurity - Part 2 - Information Assurance
Policy Papers - April 15, 2015

Information Assurance is the art and science of securing computer systems and networks against efforts by third parties to disable, intrude, or otherwise impede operations. It is the focus of most “cybersecurity” professionals in the technical community. The principal goals are to maintain an information system’s Confidentiality (the secrecy of information as it is used and stored), Integrity, reliability of data and equipment, and Availability, that a computer system is ready and able to function as needed. Information Assurance includes writing secure software, deploying it safely, and managing it to minimize the risk of compromise.

Redefining Cybersecurity
Policy Papers - January 22, 2015

Cybersecurity is an often abused and much misused term that was once intended to describe and now serves better to confuse. While originally intended to cover security related issues associated with “cyberspace,” a phrase coined by author William Gibson in the short story “Burning Chrome,” it has become the byword for a staggeringly diverse array of topics. While this is frustrating, the term is popular as shorthand, so we offer this paper to identify and explain four clusters of related topics under the larger umbrella of “cybersecurity.”  Each is a distinct issue area with unique technical and policy challenges, while retaining some association to the others...

Protecting the Warfighter in an Austere Budget Environment
Policy Papers - September 24, 2014

Winston Churchill is often quoted as saying, “Gentlemen, we have run out of money. Now we have to think.” A similar statement is attributed to Ernest Rutherford, a New Zealand physicist often cited as the “father” of nuclear physics. Regardless of who uttered this quote, many believe it appropriately summarizes the state of America’s defense establishment today. “Fiscal austerity” is the environment in which national security decisions are made...

Cybersecurity: New Threats and Challenges
Policy Papers - September 27, 2013

In recent years the vast expansion of cyberspace, not only in terms of user but content and applications, has brought about a set of new threats and challenges never anticipated by the net’s designers. At the outset of this technological revolution access to the net was only through a few connected mainframe computers; there was literally nothing to steal or attack; and no infrastructure was connected to the net. Cybersecurity was simply not an issue...

A more sober approach to the Russian ‘reset’
Articles - August 27, 2013

Today, the U.S. and Moscow share few common interests

The fate of controversial National Security Agency whistleblower Edward Snowden, who was recently granted asylum by the Kremlin, is of little importance. His case, however, shines a revealing spotlight on the true state of U.S.-Russian relations, and on the sorry state of American policy toward Vladimir Putin’s Russia.

Getting On The Same Wavelength
Articles - July 8, 2013

Largely unnoticed among the acrimonious back-and-forth over Syria at the recent Group of Eight summit in Fermenagh, Ireland, the United States and Russia took a small but meaningful step forward in cyberspace. On the sidelines of the summit, the two nations signed a pact filled with “confidence-building measures” designed to prevent miscalculations and unwarranted escalations in the event of a cyberconflict.