Publications By Category

Publications By Type
Articles

Books

In-House Bulletins

Monographs

Policy Papers


Publications Related to Information and Cyberwarfare

back to publications page


Cyber Crime: Security Under Scarce Resources
Policy Papers - June 30, 2015
 

Cyber crime covers a wide range of activities that includes theft, fraud and harassment; stealing

valuable intellectual property as part of industrial espionage; committing financial fraud and credit card theft; and disrupting internet services for ideological goals (“hacktivism”). The crimes target both firms and consumers, and while they rarely result in physical harm or property damage, there can still be severe consequences...
 
Missile Defense Briefing Report - No. 337
Bulletins - June 23, 2015
 

 

Missile defense for the Gulf;
Ukraine seeks BMD as a hedge against Russia;
In the Army, a focus on integration;
Beijing, Moscow make missile moves

 

 

 
Understanding Cybersecurity - Part 2 - Information Assurance
Policy Papers - April 15, 2015
 

Information Assurance is the art and science of securing computer systems and networks against efforts by third parties to disable, intrude, or otherwise impede operations. It is the focus of most “cybersecurity” professionals in the technical community. The principal goals are to maintain an information system’s Confidentiality (the secrecy of information as it is used and stored), Integrity, reliability of data and equipment, and Availability, that a computer system is ready and able to function as needed. Information Assurance includes writing secure software, deploying it safely, and managing it to minimize the risk of compromise.

 
Redefining Cybersecurity
Policy Papers - January 22, 2015
 

Cybersecurity is an often abused and much misused term that was once intended to describe and now serves better to confuse. While originally intended to cover security related issues associated with “cyberspace,” a phrase coined by author William Gibson in the short story “Burning Chrome,” it has become the byword for a staggeringly diverse array of topics. While this is frustrating, the term is popular as shorthand, so we offer this paper to identify and explain four clusters of related topics under the larger umbrella of “cybersecurity.”  Each is a distinct issue area with unique technical and policy challenges, while retaining some association to the others...

 
Protecting the Warfighter in an Austere Budget Environment
Policy Papers - September 24, 2014
 

Winston Churchill is often quoted as saying, “Gentlemen, we have run out of money. Now we have to think.” A similar statement is attributed to Ernest Rutherford, a New Zealand physicist often cited as the “father” of nuclear physics. Regardless of who uttered this quote, many believe it appropriately summarizes the state of America’s defense establishment today. “Fiscal austerity” is the environment in which national security decisions are made...

 
Cybersecurity: New Threats and Challenges
Policy Papers - September 27, 2013
 

In recent years the vast expansion of cyberspace, not only in terms of user but content and applications, has brought about a set of new threats and challenges never anticipated by the net’s designers. At the outset of this technological revolution access to the net was only through a few connected mainframe computers; there was literally nothing to steal or attack; and no infrastructure was connected to the net. Cybersecurity was simply not an issue...

 
A more sober approach to the Russian ‘reset’
Articles - August 27, 2013
 

Today, the U.S. and Moscow share few common interests

The fate of controversial National Security Agency whistleblower Edward Snowden, who was recently granted asylum by the Kremlin, is of little importance. His case, however, shines a revealing spotlight on the true state of U.S.-Russian relations, and on the sorry state of American policy toward Vladimir Putin’s Russia.

 
Getting On The Same Wavelength
Articles - July 8, 2013
 

Largely unnoticed among the acrimonious back-and-forth over Syria at the recent Group of Eight summit in Fermenagh, Ireland, the United States and Russia took a small but meaningful step forward in cyberspace. On the sidelines of the summit, the two nations signed a pact filled with “confidence-building measures” designed to prevent miscalculations and unwarranted escalations in the event of a cyberconflict.

 
Trouble on the Chinese Seas
Articles - June 19, 2013
 

Media coverage of the June 7-8 "shirt sleeves" summit between President Obama and new Chinese president Xi Jinping in Rancho Mirage, California has largely focused on the two issues that dominated the official agenda. The first was China's extensive intellectual property theft and hacking activities in cyberspace. The second was the threat posed by the regime of reckless "young leader" Kim Jong Un in North Korea.

 
Rules of Engagement, the Cybercrime Edition
Articles - April 2, 2013
 

Late last month, computers in Seoul became the latest victims of the growing number of cyber-intrusions now taking place worldwide. Approximately 32,000 computers belonging to South Korean banks and broadcasting stations were shut down by an unknown perpetrator, strongly suspected to be the notoriously unpredictable Stalinist regime in North Korea.