Publications By Category

Publications By Type


In-House Bulletins


Policy Papers

Publications Related to Defense Technology Program

back to publications page

Understanding Cybersecurity - Part 3 | Cyber Crime
Policy Papers - June 30, 2015

Cyber crime covers a wide range of activities that includes theft, fraud and harassment; stealing valuable intellectual property as part of industrial espionage; committing financial fraud and credit card theft; and disrupting internet services for ideological goals (“hacktivism”). The crimes target both firms and consumers, and while they rarely result in physical harm or property damage, there can still be severe consequences...

Understanding Cybersecurity - Part 2 | Information Assurance
Policy Papers - April 15, 2015

Information Assurance is the art and science of securing computer systems and networks against efforts by third parties to disable, intrude, or otherwise impede operations. It is the focus of most “cybersecurity” professionals in the technical community. The principal goals are to maintain an information system’s Confidentiality (the secrecy of information as it is used and stored), Integrity, reliability of data and equipment, and Availability, that a computer system is ready and able to function as needed. Information Assurance includes writing secure software, deploying it safely, and managing it to minimize the risk of compromise.

Understanding Cybersecurity - Part 1 | Redefining Cybersecurity
Policy Papers - January 22, 2015

Cybersecurity is an often abused and much misused term that was once intended to describe and now serves better to confuse. While originally intended to cover security related issues associated with “cyberspace,” a phrase coined by author William Gibson in the short story “Burning Chrome,” it has become the byword for a staggeringly diverse array of topics. While this is frustrating, the term is popular as shorthand, so we offer this paper to identify and explain four clusters of related topics under the larger umbrella of “cybersecurity.”  Each is a distinct issue area with unique technical and policy challenges, while retaining some association to the others...

American Deterrence and Future Conflicts
Policy Papers - December 22, 2014

On the centennial of the start of World War I—a war that began largely as a result of crisis miscalculations

and escalations—we are entering a new era with important implications for deterrence, escalation control, and coalition management. Today, like at the time of World War I, we confront a large number of actors who have the potential to misread cues and red lines while relying on treaty relationships if they miscalculate. Then, as now, military technologies were widely diffused. Prevailing assumptions about how an adversary (or potential adversary) would react in a crisis or confrontation were based on imperfect intelligence and inadequate understanding of red lines...
U. S. & European Perspectives of Current and Evolving Security Challenges
Policy Papers - October 31, 2014

As we think through the role that the United States might play in addressing future security challenges in the European and Eurasian arenas in coming years, it would seem appropriate to have some indication of the thinking, thoughts, and ideas of our partners and allies—especially those in NATO. Americans may feel strongly about issues such as missile defense, countering terrorism and stopping Iran from developing a nuclear capability, but do European and Eurasian allies feel the same?...

Protecting the Warfighter in an Austere Budget Environment
Policy Papers - September 24, 2014

Winston Churchill is often quoted as saying, “Gentlemen, we have run out of money. Now we have to think.” A similar statement is attributed to Ernest Rutherford, a New Zealand physicist often cited as the “father” of nuclear physics. Regardless of who uttered this quote, many believe it appropriately summarizes the state of America’s defense establishment today. “Fiscal austerity” is the environment in which national security decisions are made...

Security and Defense Dimensions of the Asia Pivot
Policy Papers - May 14, 2014

There is no question that the United States faces significant and increasing security challenges in the Asia-Pacific region, including the growing threat posed by ballistic missiles and their payloads. It is fair to argue that China is increasingly confident and assertive in addressing its perceived national interests, supported by its expanding military might and power projection capabilities. From appearances, it is also reasonable to assert that North Korea is not on a path to openness, reform, and reconciliation with its neighbors. As such, it is critical that the United States provide for its national defense in the Pacific...

Space in the National Interest: Security in a Global Domain
Policy Papers - April 16, 2014

Space as a domain and the systems that use it are integrated with American power, whether the soft power of culture, reputation, diplomacy and economics or the hard power of armed force. For that reason, it is no longer possible to stovepipe strategic thinking about space and national security. Developments in one area directly affect others. From civil space programs that help shape foreign spending on space and trade arrangements that impact access to space and have diplomatic consequence to military systems that civilian users have come to rely upon, policymakers must approach developments in space as an integrated whole, a single phenomenon that requires expertise across the range of space activities. 

Reckless Snowden No TV Star
Articles - March 11, 2014

Since its start in 1987, the South by Southwest (SXSW) festival in Austin has become famous for its cutting-edge music and film performances, in addition to a focus on technology. But this year's festivities featured a little something extra: a virtual appearance by controversial National Security Agency whistle-blower Edward Snowden.

Fatal Inaction
Articles - January 28, 2014

If all your friends jumped off a bridge, would you jump too? The answer clearly depends on how high the bridge is, but what the question really asks is if carelessly following others is in fact sensible.

The question comes to mind when debating whether to protect critical national infrastructure against large scale electromagnetic pulse, or EMP, events. Although EMP is a well-documented security issue, and one of the very few things that experts believe can dramatically alter our modern way of life, the U.S. government has sadly followed the lead of too many others and done little. This inaction could well prove fatal.