Publications By Category

Publications By Type
Articles

Books

In-House Bulletins

Monographs

Policy Papers


Publications Related to Information and Cyberwarfare

back to publications page


Beyond Super Soldiers and Battle Suits
Articles - December 5, 2017
 

Science fiction is always fascinating to follow, because at least some of the ideas presented in the genre do become reality over time. The concept of "super soldiers" is a case in point. Although the protagonists in Marvel's iconic Avengers comic books (and now movies) are still a long way from being realistic, we are unquestionably trending in that direction. Thus, the character of Captain America is a soldier enhanced by the government using a special serum to make him stronger, faster and more resilient, while Iron Man is an operator encased in full body armor that affords him super human strength, advanced weapons, and extrasensory systems. Even though such enhancements are still a stretch, performance drugs, exoskeletons, and other new technologies are increasingly augmenting - and expanding - the capabilities of today's warfighters.

 
Defense Technology Monitor - No. 22
Bulletins - December 1, 2017
 

Wirelessly charging drone subs;
The Pentagon's new EW strategy;
Reconsidering "Rods from Gods";
The hazards of hacked robots;
New military applications for AI

 
Gaming To Victory: Synthetic Training For Future Combat
Articles - November 15, 2017
 

It looked like a video game. From the comfort of a living room couch, with TV dinners in hand, families watched as precision-guided munitions rained down with seemingly perfect accuracy on Iraqi military and civilian targets. It was Jan. 17, 1991 - the start of Operation Desert Storm - and the combination of camera equipped high-tech weaponry and night vision equipment provided viewers an action-packed front-row view into the coalition's air war. What had seemed like science fiction was now a reality.

 
Russia Reform Monitor - No. 2161
Bulletins - October 16, 2017
 

The Kremlin doubles down on the Donbas;
A looming showdown in Syria

 
Russia Reform Monitor - No. 2160
Bulletins - October 11, 2017
 

A news day for the Donbas?;
Ukraine under cyber-assault

 
Russia Reform Monitor - No. 2159
Bulletins - October 10, 2017
 

How Russia exploits the North Korean crisis;
A helping hand for Hamas

 
Russia Reform Monitor - No. 2158
Bulletins - October 9, 2017
 

Russia, Europe edge closer to political divorce;
Facebook wises up to Russian propaganda... finally

 
Defense Technology Monitor - No. 21
Bulletins - September 26, 2017
 

U.S. Navy 3D prints submersible;
Has China developed "hack proof" communications?;
A new way to hack computers;
Self-healing robots on horizon;
Tech leaders fight for UN ban on killer robots

 
Defense Technology Monitor - No. 19
Bulletins - August 31, 2017
 

Artificial intelligence: The NGA's new top analyst;
Hacking the human brain;
ABL reborn...on a drone;
How Russia can hack the U.S. electric grid

 
China Reform Monitor - No. 1294
Bulletins - August 9, 2017
 

Beijing cracks down on VPNs;
China secures lease for Hambantota port

 
Defense Technology Monitor - No. 18
Bulletins - July 25, 2017
 

Bionic spy dragonfly;
With an eye on Russia, U.S. focuses on electronic warfare;
A military focus on electromagnetic weapons;
Navy rail gun almost ready to launch;
Prepping for space warfare

 
Defense Technology Monitor - No. 17
Bulletins - June 22, 2017
 

Military lasers and the law;
Making a better special operator:
Hiding tankers in plain sight;
ABL 2.0?;
The future of drone warfare: Autonomous engagement

 
Defense Technology Monitor - No. 16
Bulletins - May 29, 2017
 

Bracing for fully automated cyberwarfare;
Manufacturing battlefield weapons;
Miniaturized weapons pose new threats;
China takes strikes toward microwave weapons;
Upgrading the human mind to combat AI

 
Russia Reform Monitor - No. 2127
Bulletins - April 18, 2017
 

Political repression on the rise in Crimea;
A new way to expand Russia's citizenry

 
Defense Technology Monitor - No. 15
Bulletins - March 29, 2017
 

Washington, Tokyo plot future of missile defense;
DARPA's new drone catcher;
IBM's Watson works to bolster cybersecurity;
Atmospheric laser shield in the works;
Drone operators to get AI "wingmen";
ISIS drone innovations complicate battle in Iraq

 
Defense Technology Monitor - No. 14
Bulletins - March 14, 2017
 

The Pentagon's new project: Longer-lasting drones;
3D printing with super materials;
The evolution of drone warfare;
The ethics of future war;
From parlor games to cyberspace

 
Defense Technology Monitor - No. 13
Bulletins - February 17, 2017
 

DOD outlines electronic warfare strategy;
British government eyes gamers for drone missions;
Defenseless against hypersonic missiles;
The limits of drone warfare;
DPRK finds new delivery system for dirty bombs 

 
Defense Technology Monitor - No. 12
Bulletins - January 17, 2017
 

Army considers tech upgrades for combat vehicles;
A new way to defeat drones;
New EMP defense discovered;
Chinese phones spy on U.S. consumers;
Non-nuclear EMP versus North Korean drones

 
Global Islamism Monitor - No. 34
Bulletins - December 26, 2016
 

Boko Haram's economic impact;
ISIS in Afghanistan: Down, but not out;
How the Taliban moves money;
Targeting the cyber caliphate;
ISIS seeks softer targets in Europe;
A helping hand from Riyadh

 
Defense Technology Monitor - No. 11
Bulletins - December 19, 2016
 

Trending toward terminators;
Army adopts 3D printing;
Combating suicide drones;
The future of UAV fueling;
How drones are reshaping American strategy

 
Defense Technology Monitor - No. 9
Bulletins - October 24, 2016
 

Japan contemplates how to counter China at sea:
Hypersonics: A widening capabilities gap;
DARPA targets anti-drone tech;
China's cruise control;
Meeting the challenge of artificial intelligence

 
Russia Reform Monitor - No. 2097
Bulletins - October 17, 2016
 

Now Russian hacking hits Germany;
Full speed ahead for "Yarovaya" monitoring

 
Defense Technology Monitor - No. 8
Bulletins - October 11, 2016
 

Drones, coming soon to a lab near you;
Russia's robotic revolution;
A new military mission: Countering robotic sensor systems;
Mind control and drone fleets
How Russia plans to take the high ground

 
Assessing US-India Defense Relations: The Technological Handshake
Articles - October 6, 2016
 

In the words of U.S. Defense Secretary Ashton Carter, two “handshakes” now define the increasingly intimate Indo-U.S. defense partnership. The “strategic handshake” was examined in detail in my last article for The Diplomat. We will now turn our attention to the “technological handshake,” shorthand for the growth in arms sales, technical cooperation, and defense co-production and co-development.

 
Cyber Insecurity: Navigating the Perils of the Next Information Age
Books - October 2016
 
 
A Better Plan for Internet Governance
Articles - September 29, 2016
 

The problem with high technology is that it can be difficult to understand, leading to what are often confused policy prescriptions. A perfect example is the proposed upcoming transition of the internet-naming function from U.S. to private control - an event that's scheduled to take place just a few days from now, on Sept. 30. While the transition itself isn't necessarily a bad idea, the Obama administration's current plan has definite flaws. 

 
Defense Technology Monitor - No. 7
Bulletins - July 27, 2016
 

Cyber command to enhance training Ops;
How to cripple the U.S. electrical grid;
Israel develops land battle drone;
NATO and the importance of cyber;
Is A.I. the future of aerial combat? 

 
Defense Technology Monitor - No. 6
Bulletins - July 6, 2016
 

China's answer to U.S. lasers;
European missile defense moves ahead;
Space assets and the fight against ISIS;
Another step forward for Iron Dome;
Railguns becoming a reality;
China takes aim with new missile 

 
Defense Technology Monitor - No. 5
Bulletins - June 17, 2016
 

Rise of the bio bot drones;
The Pentagon's micro UAVs
A new kind of submarine hunter;
Missile defense looks left of launch;
Blimp funding deflated

 
Russia Reform Monitor - No. 2067
Bulletins - June 6, 2016
 

Russian elites: increasingly anti-American and statist;
How Russia rigged the Sochi Games

 
Defense Technology Monitor - No. 4
Bulletins - June 3, 2016
 

Penetrating the Pentagon's network;
Protecting power grids through fingerprinting;
Part man, part machine?;
How to down drones;
The Pentagon focuses on cyber-hardening

 
Strategic Primer - Cybersecurity
Policy Papers - April 1, 2016
 

The goal of the new Strategic Primer initiative is to provide a concise, comprehensive overview of specific defense technology issues presented in a clear, direct, and graphical manner that serves as an accessible reference to policymakers. Volume 2 of the series focuses on Cybersecurity.

 
 
Cyber Threats in the Space Domain
Policy Papers - March 31, 2016
 

The ability to access and exploit space has long been woven into the fabric of American national power. It is a critical component of global political leadership, the economy, and military power. Unfortunately, those pillars are increasingly at risk. The spread of space technology to new international actors and the increasing sophistication of those capabilities have made it possible to threaten American space systems directly. The national security community is accustomed to analyzing these threats and vulnerabilities and is pursuing a reasonable mix of policies and programs to address them. (Whether those actions are sufficient is subject to debate). However, over the last decade space and cyberspace have grown increasingly integrated. This opens up new vulnerabilities in American space systems, and gives a greater number of actors the potential to exploit those vulnerabilities...

 
Defense Technology Monitor - No. 2
Bulletins - March 3, 2016
 

U.S. space dominance a double edged sword;
The Air Force's new cyber shield;
All eyes on electronic warfare;
China pushing new boundaries with its drones

 

 
Defense Technology Monitor - No. 1
Bulletins - February 19, 2016
 

Legal questions about laser weapons;
Russia's A2AD strategy;
New drone capabilities needed;
Hardening future fighters;
Hackers turned out the lights in Ukraine

 
Understanding Cybersecurity - Part 5 | Military Cyber Operations
Policy Papers - November 10, 2015
 

 What is the role of cybersecurity in the conduct of war and ongoing security operations? Policymakers, academics, and journalists often think of cybersecurity as a single domain problem. That is to say, they view cyber operations as taking place solely within its own domain—one that is separate from land, sea, air or space. This perspective, however, overlooks the fact that computer systems and networks pervade society and the physical environment, and are present to some degree in all physical environs and across the three levels of war (strategic, operational, and tactical). Modern militaries employ forces in a “joint” manner, combining the specific platforms and technologies of different services to achieve a more effective force. National security policymakers should similarly see both kinetic and cyber capabilities as part of a broad set of tools available to achieve their objectives. Thinking of cybersecurity as a limited or separate space, wholly distinct from the other domains of conflict, limits the potential for understanding its strategic utility...

 
Understanding Cybersecurity - Part 4 | Internet Security Governance
Policy Papers - October 2, 2015
 

Internet Security Governance covers the policy challenges that arise from building and governing security in the Internet’s architecture and key protocols. It is not a description of security for computers and networks (Information Assurance),  how to manage the negotiated structure and key functions of the Internet (Internet Governance), or the pursuit of criminal groups and other threat actors (Cyber Crime). Internet Security Governance is the discussion of defensively oriented technical and legal topics that cross national boundaries and/or involve security of the underlying protocols and hardware which make up the Internet...

 
The War Against ISIS Through Social Media
Policy Papers - July 7, 2015
 

On July 7, the American Foreign Policy Council (AFPC) held the fourth installment of its Defense Technology Program’s Understanding Cybersecurity lunch briefing series for Congressional Staffers. This event, entitled, “How the Caliphate is Communicating:” Understanding and Countering the Islamic State’s Messaging outlined how and why the Islamic State has been winning the “war of ideas” through the use of social media, and how the group is using social media to further its operations...

 
 
Understanding Cybersecurity - Part 3 | Cyber Crime
Policy Papers - June 30, 2015
 

Cyber crime covers a wide range of activities that includes theft, fraud and harassment; stealing valuable intellectual property as part of industrial espionage; committing financial fraud and credit card theft; and disrupting internet services for ideological goals (“hacktivism”). The crimes target both firms and consumers, and while they rarely result in physical harm or property damage, there can still be severe consequences...

 
Missile Defense Briefing Report - No. 337
Bulletins - June 23, 2015
 

Missile defense for the Gulf;
Ukraine seeks BMD as a hedge against Russia;
In the Army, a focus on integration;
Beijing, Moscow make missile moves

 
Understanding Cybersecurity - Part 2 | Information Assurance
Policy Papers - April 15, 2015
 

Information Assurance is the art and science of securing computer systems and networks against efforts by third parties to disable, intrude, or otherwise impede operations. It is the focus of most “cybersecurity” professionals in the technical community. The principal goals are to maintain an information system’s Confidentiality (the secrecy of information as it is used and stored), Integrity, reliability of data and equipment, and Availability, that a computer system is ready and able to function as needed. Information Assurance includes writing secure software, deploying it safely, and managing it to minimize the risk of compromise.

 
Understanding Cybersecurity - Part 1 | Redefining Cybersecurity
Policy Papers - January 22, 2015
 

Cybersecurity is an often abused and much misused term that was once intended to describe and now serves better to confuse. While originally intended to cover security related issues associated with “cyberspace,” a phrase coined by author William Gibson in the short story “Burning Chrome,” it has become the byword for a staggeringly diverse array of topics. While this is frustrating, the term is popular as shorthand, so we offer this paper to identify and explain four clusters of related topics under the larger umbrella of “cybersecurity.”  Each is a distinct issue area with unique technical and policy challenges, while retaining some association to the others...

 
Protecting the Warfighter in an Austere Budget Environment
Policy Papers - September 24, 2014
 

Winston Churchill is often quoted as saying, “Gentlemen, we have run out of money. Now we have to think.” A similar statement is attributed to Ernest Rutherford, a New Zealand physicist often cited as the “father” of nuclear physics. Regardless of who uttered this quote, many believe it appropriately summarizes the state of America’s defense establishment today. “Fiscal austerity” is the environment in which national security decisions are made...

 
Cybersecurity: New Threats and Challenges
Policy Papers - September 27, 2013
 

In recent years the vast expansion of cyberspace, not only in terms of user but content and applications, has brought about a set of new threats and challenges never anticipated by the net’s designers. At the outset of this technological revolution access to the net was only through a few connected mainframe computers; there was literally nothing to steal or attack; and no infrastructure was connected to the net. Cybersecurity was simply not an issue...

 
A more sober approach to the Russian ‘reset’
Articles - August 27, 2013
 

Today, the U.S. and Moscow share few common interests

The fate of controversial National Security Agency whistleblower Edward Snowden, who was recently granted asylum by the Kremlin, is of little importance. His case, however, shines a revealing spotlight on the true state of U.S.-Russian relations, and on the sorry state of American policy toward Vladimir Putin’s Russia.

 
Getting On The Same Wavelength
Articles - July 8, 2013
 

Largely unnoticed among the acrimonious back-and-forth over Syria at the recent Group of Eight summit in Fermenagh, Ireland, the United States and Russia took a small but meaningful step forward in cyberspace. On the sidelines of the summit, the two nations signed a pact filled with “confidence-building measures” designed to prevent miscalculations and unwarranted escalations in the event of a cyberconflict.

 
Trouble on the Chinese Seas
Articles - June 19, 2013
 

Media coverage of the June 7-8 "shirt sleeves" summit between President Obama and new Chinese president Xi Jinping in Rancho Mirage, California has largely focused on the two issues that dominated the official agenda. The first was China's extensive intellectual property theft and hacking activities in cyberspace. The second was the threat posed by the regime of reckless "young leader" Kim Jong Un in North Korea.

 
Rules of Engagement, the Cybercrime Edition
Articles - April 2, 2013
 

Late last month, computers in Seoul became the latest victims of the growing number of cyber-intrusions now taking place worldwide. Approximately 32,000 computers belonging to South Korean banks and broadcasting stations were shut down by an unknown perpetrator, strongly suspected to be the notoriously unpredictable Stalinist regime in North Korea.

 
SYMPOSIUM: The New Cold War?
Articles - December 28, 2012
 

In late October, speaking at the Intrepid Museum in New York, U.S. Secretary of Defense Leon Panetta delivered a stark warning. The United States, Panetta said, could soon face a mass disruption event of catastrophic proportions, a "cyber Pearl Harbor" of sorts.

 
Banking Without Borders
Articles - December 14, 2012
 

Money laundering and terrorism financing are global problems that transcend national boundaries, and launderers and terrorists are constantly adapting their techniques to exploit vulnerabilities in the financial system to disguise the movement of funds.