Frank J. Cilluffo
| Title: | Associate Vice President & Director, Center for Cyber and Homeland Security |
|---|---|
| Email: |
cilluffo@gwu.edu |
Background
Frank J. Cilluffo is an Associate Vice President at The George Washington University where he leads a number of national security and cyber security policy and research initiatives. Cilluffo directs the Center for Cyber and Homeland Security, is co-director of GW’s Cyber Center for National and Economic Security and along with the School of Business, launched the university’s World Executive MBA in Cybersecurity program.
Cilluffo is routinely called upon to advise senior officials in the Executive Branch, US Armed Services, and State and Local governments on an array of national and homeland security strategy and policy matters. He also frequently briefs Congressional committees and their staffs and has testified before Congress over 25 times at high profile hearings on counterterrorism, cyber threats, security and deterrence, weapons proliferation, organized crime, intelligence and threat assessment, as well as emergency management, border and transportation security. Similarly, he works with US allies and organizations such as NATO and Europol. He has presented at a number of bi-lateral and multi-lateral summits on cybersecurity and countering Islamist terrorism, including the UN Security Council.
Cilluffo has published extensively in academic, law, business, and policy journals, and magazines and newspapers worldwide, including: ABC News, Foreign Policy, The Journal of International Security Affairs, The National Interest, Parameters, Politico, Studies in Conflict and Terrorism, USA Today, US News & World Report, The Washington Quarterly and the Washington Post. He currently serves on the editorial advisory board for Military and Strategic Affairs and routinely acts as a reviewer for other publications and for grant-making foundations.
Cilluffo serves or has served on various national security-related committees sponsored by the US government and non-profit organizations, including the Homeland Security Advisory Council, where he served as the Vice Chairman of the Future of Terrorism Task Force, chaired by Congressman Lee Hamilton. Cilluffo also served as a member of the Secure Borders and Open Doors Advisory Committee, Defense Science Board committees and summer studies, and along with Norm Augustine, chaired the first Quadrennial Homeland Security Review Advisory Council. He continues to remain active in the non-profit, educational and think tank communities serving on various committees and panels. His current leadership positions include serving on the National Council of Advisors for the Center for the Study of the Presidency and Congress and as chairman of the National Consortium for Advanced Policing.
Cilluffo joined GW in 2003, establishing CCHS as a prominent nonpartisan “think and do tank” dedicated to the building bridges between theory and practice to advance US security. CCHS has hosted numerous Cabinet Members and agency directors, military and law enforcement officers, Members of Congress, diplomats, business executives and academics and has issued dozens of reports that are widely cited by media, research institutions, think tanks and governments.
Prior to joining GW, Cilluffo served as Special Assistant to the President for Homeland Security. Immediately following the September 11, 2001 terrorist attacks, Cilluffo was appointed by President George W. Bush to the newly created Office of Homeland Security. During his tenure at The White House, he was involved in a wide range of counterterrorism and homeland security strategy and policy initiatives, served as a principal advisor to Governor Tom Ridge, and directed the President’s Homeland Security Advisory Council.
Before his White House appointment, Cilluffo spent eight years in senior policy positions with the Center for Strategic & International Studies (CSIS), a Washington-based think tank. At CSIS, he chaired or directed numerous committees and task forces on homeland defense, counterterrorism, transnational organized crime, as well as information warfare and information assurance.
Publications
Congressional Testimonies
- A Global Perspective on Cyber Threats - U.S. House of Representatives, Committee on Financial Services, Subcommittee on Oversight and Investigations (2015)
- Wanted: Foreign Fighters – The Escalating Threat of ISIL in Central Asia - Commission on Security & Cooperation in Europe (the Helsinki Commission) (2015)
- Stakeholder Perspectives on Priorities for the Quadrennial Homeland Security Review (QHSR) - U.S. House of Representatives, Committee on Homeland Security, Sub-Committee on Oversight and Management Efficiency (2014)
- Countering Use of the Internet for Terrorist Purposes – United Nations Security Council Counter Terrorism Committee (2013)
- Cyber Threats from China, Russia and Iran: Protecting American Critical Infrastructure – U.S. House of Representatives, Committee on Homeland Security (2013)
- A Line in the Sand: Assessing Dangerous Threats to Our Nation’s Borders – U.S. House of Representatives Committee on Homeland Security (2012)
- The Department of Homeland Security: An Assessment of the Department and a Roadmap for its Future – U.S. House of Representatives Committee on Homeland Security (2012)
- The Future of Homeland Security: Evolving and Emerging Threats – U.S. Senate Committee on Homeland Security & Governmental Affairs (2012)
- The Iranian Cyber Threat to the United States – U.S. House of Representatives Committee on Homeland Security (2012)
- U.S.-India Counterterrorism Cooperation: Deepening the Partnership – U.S. House of Representatives Committee on Foreign Affairs, Subcommittee on Terrorism, Non-proliferation and Trade (2011)
- Moving Beyond the First Five Years: Evolving the Office of Intelligence and Analysis to Better Serve State, Local, and Tribal Needs – U.S. House of Representatives Committee on Homeland Security (2008)
- Religious Discrimination and Prisoner’s Rights – U.S. Commission on Civil Rights (2008)
- Assessing and Addressing the Threat : Defining the Role of National Commission on the Prevention of Violent Radicalization and Homegrown Terrorism – U.S. House of Representatives Committee on Homeland Security, Subcommittee on Intelligence, Information Sharing and Terrorism Risk Assessment (2007)
- The Internet: A Portal to Violent Islamist Extremism – U.S. Senate Committee on Homeland Security and Governmental Affairs (2007)
- The Homeland Security Implications of Radicalization – U.S. House of Representatives Committee on Homeland Security, Subcommittee on Intelligence, Information Sharing and Terrorism Risk Assessment (2006)
- Prisoner Radicalization: Are Terrorist Cells Forming in U.S. Cell Blocks – U.S. Senate Committee on Homeland Security and Governmental Affairs (2006)
- Bioterrorism and Pandemic Influenza: Are We Prepared? – U.S. Senate Committee on Appropriations, Subcommittee on Homeland Security (2006)
- Preventing Terrorist Attacks on America’s Chemical Plants – U.S. House of Representatives Committee on Homeland Security, Subcommittee on Economic Security, Infrastructure Protection, and Cybersecurity (2005)
- The National Guard and Homeland Defense – U.S. Commission on the National Guard and Reserves (2004)
- Hurricane Katrina: Recommendations for Reform – U.S. Senate Committee on Homeland Security and governmental Affairs (2008)
- Preventing Terrorist Attacks on America’s Chemical Plants – U.S. House of Representatives Committee on Homeland Security, Subcommittee on Economic Security, Infrastructure Protection and Cybersecurity (2005)
- Combating Terrorism: Developing Effective Strategies Against Terrorism – U.S. House of Representatives Committee on Oversight and Government Reform, Subcommittee on National Security, Emerging Threats, and International Relations (2004)
- Critical Infrastructure Protection: Who’s in Charge – U.S. Senate Committee on Government Reform (2001)
- The Threat of Bioterrorism and the Spread of Infectious Diseases – U.S. Senate Committee on Foreign Relations (2001)
- Wired World: Cyber Security and the U.S. Economy – U.S. Congress Joint Economic Committee (2001)
- Combating terrorism: Options To Improve The Federal Response – U.S. House of representatives Committee on Transportation and Infrastructure, Subcommittee on Economic Development, Public Buildings, and Emergency Management, and the U.S. House of Representatives Committee on Oversight and Government Reform, Subcommittee on National Security, Veteran Affairs, and International Relations (2001)
- Protecting American Interests Abroad: U.S. Citizens, Businesses, and Non-Governmental Organizations – U.S. House of Representatives Committee on Oversight and Government Reform, Subcommittee on National Security, Veterans Affairs, and International Relations (2001)
- Cyber Threats and Information Security in the 21st Century – U.S. House of representatives Leadership Caucus on Cyber-Security (2001)
- Combating Terrorism: In Search of a National Strategy – U.S. House of Representatives Committee on Oversight and Government Reform, Subcommittee on National Security, Veterans Affairs, and International Relations (2001)
- The Threat Posed from the Convergence of Organized Crime, Drug Trafficking, and Terrorism – U.S. House of Representatives Committee on the Judiciary, Subcommittee on Crime (2000)
- Cyber Attack: The National Protection Plan and its Privacy Implications – U.S. Senate Committee on the Judiciary, Subcommittee on Technology, Terrorism, and Government Information (2000)
- Weapons of Mass Destruction, Terrorism, and U.S. Preparedness – U.S. House of Representatives Committee on Oversight and Government Reform, Subcommittee on National Security, Veterans Affairs, and International Relations (1998)
- The Department of Defense Domestic Preparedness Program – U.S. House of Representatives Committee on Government Reform and Oversight, Subcommittee on National Security, International Affairs, and Criminal Justice (1998)
- Nuclear Terrorism and Countermeasures – U.S. House of Representatives Committee on National Security, Subcommittee on Research and Development (1997)
- The role of Intelligence in Identifying, Preventing and Responding to Transnational Terrorism: A Framework for U.S. National Security Planners – American bar Association Standing Committee on Law and National Security (1996)
Journal Articles and Book Chapters
- A Strategy of Cyber Deterrence -Choosing to Lead: American Foreign Policy for a Disordered World (2015)
- Shoot, Move, Communicate: Thinking Through Cyber's Role in Ground Combat - Military Review (2015)
- Securing the U.S. Electrical Grid - Center for the Study of the Presidency and Congress (2014)
- Preparing for Netwars: Repurposing Cyber Command -Strategic Studies Institute (2013)
- Estonia's Cyber Defence League: A Model for the United States - Taylor & Francis Online (2013)
- Cyber Domain Conflict in the 21st Century in “Conflict in the 21st Century: The Evolving Atmosphere” – The Whitehead Journal of Diplomacy and International Affairs (2013)
- Getting Serious with Cybersecurity – The Journal of International Security Affairs – Co-authored with J. Richard Knop (2012)
- A Blueprint for Cyber Deterrence: Building Stability Through Strength – Military and Strategic Affairs (2012)
- Thinking About Strategic Hybrid Threats – In Theory and in Practice – Prism, Center for Complex Operations, National Defense University (2012)
- Open Relationship – Foreign Policy (2012)
- The U.S. response to Cyber Threats – Defense Dossier (2012)
- Defining “War” in the Cyber Era, in “#CyberDoc: No Borders, No Boundaries” – Potomac Institute for Policy Studies, U.S. Army War College (2012)
- Mainstreaming CT for Whole-of-Government – 4th Asia-Pacific Programme for Senior National Security officers, Singapore, S. Rajaratnam School for International Studies (2010)
- Where Does it Fit? – Homeland Security Policy Institute (2009)
- Storm Surge – Foreign Policy (2009)
- How to Beat al Qaeda at Its Own Game – Foreign Policy (2009)
- Reflections on Jihad: A Former Leader’s Perspective – Homeland Security Policy Institute (2009)
- Deep Dive on New Methods for a New Threat, in “Building Strategic Concepts for the Intelligence Enterprise” – Office of the Director of National Intelligence (2008)
- Radicalization: Behind Bars and Beyond Borders – Brown Journal of World Affairs (2007)
- Cyberstrategy 2.0 – Journal of International Security Affairs (2006)
- The Mission of Homeland Security – New York University Review of Law and Security (2004)
- The Use of Limits and U.S. Intelligence – The Washington Quarterly (2002)
- Fighting terrorism – NATO Review (2001)
- Preface to textbook “Understanding Terrorism and Managing the Consequences” – Prentice Hall, Person Education (2001)
- Cyber Threats: Ten Issues to Consider – Georgetown Journal of International Affairs (2000)
- Cyber Attack: The National Protection Plan and its Privacy Implications – The Journal of Homeland Security (2000)
- Cyberware: A Snapshot in 2005, in “Puissances et Influences” – European Center for the Study of Conflicts (2000)
- Bad Guys and Good Stuff: when and Where Will the Cyber Threats Converge? – The Depaul Business and Law Journal (1999)
- Dealing with Transnational Threats: terrorism, Crime, Narcotics, and Information Warfare in “U.S.-Russian Partnership: Meeting the New Millennium” – National Defense University Press (1999)
- Asymmetric Threats to U.S. National Security in “Defense Preparedness” – Department of Defense (1999)
- And the Winner is… the Albanian Mafia – The Washington Quarterly (1999)
- Responding to New Terrorist Threats – Orbis (1998)
- Information Warfare and Strategic Terrorism – Terrorism and Political Violence (1997)
- Between War and Peace: Deterrence and Leverage – The Brown Journal of World Affairs (1997)
Monographs and Reports
- Drones in Yemen: Is the U.S. on Target? – Homeland Security Policy Institute (2012)
- Counterterrorism Intelligence: Fusion Center Perspectives – Counterterrorism Intelligence Survey Research (2012)
- Mexico and the Triple Threat – Joint Study: U.S. Army War College & Homeland Security Policy Institute (2011)
- The Hybrid Threat: Crime, Terrorism and Insurgency in Mexico – Joint Study: Center for Strategic Leadership and Development, U.S. Army College & Homeland Security Policy Institute (2011)
- Counterterrorism Intelligence: Law Enforcement Perspectives – Counterterrorism Intelligence Survey Research (2011)
- Yemen & Al Qaeda in the Arabian Peninsula: Exploiting Window of Counterterrorism Opportunity – Homeland Security Policy Institute (2011)
- What’s the Big Idea? Confronting the Ideology of Islamist Extremism – Joint Study: The Washington Institute for Near East Policy & Homeland Security Policy Institute (2011)
- Foreign Fighters: Trends, Trajectories & Conflict Zones – Joint Study: Homeland Security Policy Institute & Swedish National Defense College (2010)
- Cloud Computing Risks and National Security Keeping Pace with Expanding Technology – Homeland Security Policy Institute (2010)
- Hammami the Jihadist Pop Star Bridging Worlds: From Mobile to Mogadishu – Homeland Security Policy Institute (2010)
- The Homeland Security Council: Considerations for the Future – Homeland Security Policy Institute (2009)
- Networked Radicalization: A Counter-Strategy – Joint Study: Homeland Security Policy Institute & University of Virginia (2008)
- Report of the Future Terrorism Task Force – U.S. Department of Homeland Security Advisory Council (2007)
- Out of the Shadows: Getting Ahead of Prisoner Radicalization – Joint Study: Homeland Security Policy Institute & University of Virginia (2007)
- Regionalizing Homeland Security: Unifying National Preparedness and Response – Homeland Security Policy Institute (2006)
- Empowering America: A Proposal for Enhancing Regional Preparedness – The Heritage Foundation (2006)
- Terrorism Risk Insurance: Assessing TRIA and the Way Forward – Homeland Security Policy Institute (2005)
- Back to the Future: An Agenda for Federal Leadership of Emergency Medical Services – Homeland Security Policy Institute (2005)
- Public Preparedness: A National Imperative Symposium Report – Joint Study: American Red Cross & Homeland Security Policy Institute (2005)
- Consolidating the House’s homeland security efforts: The time to act is now – Homeland Security Policy Institute (2004)
- Cyber Threats and Information Security – Center for Strategic and International Studies (2001)
- Combating Chemical, Biological, Radiological and Nuclear Terrorism: A Comprehensive Strategy – Center for Strategic and International Studies (2000)
- Russian Organized Crime and Corruption: Putin’s Challenge – Center for Strategic International Studies (2000)
- Cybercrime, Cyberterrorism, Cyberwarfare – Center for Strategic International Studies (1998)
- Global Organized Crime: The New Empire of Evil – Center for Strategic International Studies (1994)
Commentaries and Opinion Pieces
- Paris Insights - (2015)
- Time for the United States and Russia to Take ISIS Together in Syria (Commentary #2015-04) - (2015)
- Cyber Changes Everything, Cyber Changes Nothing: On Admiral Rogers' Vision and Guidance for Cyber Command - Lawfare (2015)
- Vulnerability and Resilience in the Internet of Everything - U.S. Chamber of Commerce Foundation (2015)
- Economic cyber-espionage: Time to tame the dragon - The Hill (2015)
- Economic Espionage: A Case for Why the U.S. Needs to Push Back - Wall Street Journal (2015)
- Massive government employee data theft further complicates US-China relations- The Conversation (2015)
- Cyber Deterrence Is a Strategic Imperative - Wall Street Journal (2015)
- How to Stop Putin Hacking the White House - Newsweek (2015)
- The Bear is Inside the Wire - Atlantic Council (2015)
- Opinion: Fortifying the Internet of Things means baking in security at the beginning - The Christian Science Monitor (2015)
- Obama’s cybersecurity initiative: a start but businesses – and individuals – need to do more - The Conversation (2015)
- How Dangerous Is Vladimir Putin? - The International Economist (2015)
- Seven Cybersecurity Questions Bank Boards Need to Ask - American Banker (2014)
- US needs to be prepared for Russian cyber-retaliation - CNBC (2014)
- Takedown: From Capo To ‘Chapo’ - Show Me The Money - Homeland Security Today (2014)
- On 9/11, DHS is missing in action - Politico (2013)
- It’s the Ideology, Stupid – The National Interest (2013)
- Boston bombings show lines are blurring between U.S. and foreign terrorism plots – NY Daily News (2013)
- Recalibrate U.S. Cyber Efforts to Better Meet the High-end Threat From Nation-states – Huffington Post (2013)
- Chinese Telecom Firms Pose a Threat to U.S. National Security - U.S. News (2013)
- Preparing for a More Aggressive Iran – Huffington Post (2012)
- While Congress Dithers, Cyber Threats Grow Greater – Nextgov (2012)
- Should Congress Investigate Chinese Tech Firms? – U.S. News & World Report (2012)
- Is America’s view of Iran and Hezbollah dangerously out of date? – FoxNews (2012)
- AQAP Loses Its Chief of External Operations: Counterterrorism Implications – Homeland Security Policy Institute (2011)
- Time for Pakistan to Clean Up Its Backyard – Security Debrief (2011)
- U.S. Must Work with India – The Pioneer (2011)
- Defense Cyber Strategy Avoids Tackling the Most Critical Issues – Nextgov (2011)
- Countering the Threat Posed by AQAP: Embrace, Don’t Chase Yemen’s Chaos – Security Debrief (2011)
- Have we Forgotten that Loose Lips Sink Ships? – Security Debrief (2011)
- After bin Laden the Threat Remains: Drones, CIA and SOF Still the Only Game in Town – Homeland Security Policy Institute (2011)
- Tumult in the Middle East: When and Where Will the Next Shoe Drop? – Homeland Security Policy Institute (2011)
- Managing Complexity in a WikiLeaks World – Homeland Security Policy Institute (2011)
- Balboni and Cilluffo: Secrecy’s Role in Security – Newsday (2010)
- Eurovision? Let’s Hope It’s Farsighted – Homeland Security Policy Institute (2010)
- Baghdad Surprise? – Homeland Security Policy Institute (2010)
- All Hands – and Eyes – Needed on Deck – Homeland Security Policy Institute (2010)
- Stopping Terror In and On its Tracks – Homeland Security Policy Institute (2010)
- Disaster Diplomacy – Homeland Security Policy Institute (2010)
- Cons Gone Wild? – Homeland Security Policy Institute (2010)
- No Longer on Auto-pilot: Aviation Security and Intelligence Reform – Homeland Security Policy Institute (2010)
- A Stronger, More Resilient Future – The Times-Picayune (2009)
- Reckless Neglect: A Disaster Waiting to Happen…Again? – Homeland Security Policy Institute – (2009)
- To beat terrorists, use judo, not boxing – Asia Times (2009)
- The H1N1 Influenza A Virus: A Test Case for a Global Response – Homeland Security Policy Institute (2009)
- Canada and the United States: Time for a Joint Threat Assessment? – Homeland Security Policy Institute (2009)
- Micro-Diplomacy in Afghanistan: Disaggregating and Engaging the Taliban – Homeland Security Policy Institute (2009)
- How can the U.S. improve human intelligence? – The Washington Times (2008)
- Stopping Surprise Attacks: Thinking Smarter About Homeland Security – The Heritage Foundation (2007)
- Transit Security Requires Chaotic Approach – USA Today (2007)
- Don’t rush toward a trinational security strategy – The Globe and Mail (2005)
- Commission’s Proposals Fall on Deaf Ears – Roll Call (2004)
- A Homeland Security Model to be Emulated – Homeland Protection Professional (2004)
- Bio-Terror Threat Sparks US Scientific Interest – United Press International (2000)
- Cyberthreats: Eating at our Security – The Atlanta-Journal Constitution – With Senator Sam Nunn (2000)
- Time to pay our laundry bill – The Globe and Mail (2000)
- Rewarding Russia for What? – The Christian Science Monitor (1999)
- Russia: where Our Money goes to Die – The Toronto Star (1999)
- Should the West Save Russia? – The New York Times (1999)
- In Russia Today, Comparatively Speaking, Italy 20 Years Ago? A Symposium of Views – The International Economy (1998)
- First Responders to a Sneak Attack – The Washington Post (1998)
- The Dark Side of the Force – Newsweek (1998)
- Russian Crises Unmask ‘Reforms’ – The Journal of Commerce (1998)
- Sweet Nothings: Corruption in Russia – Winston-Salem Journal (1998)
- Corruption in the Kremlin – Jane’s International Police review (1997)
- Cults: Managing an Unconventional Threat – Jane’s International Police Review (1997)
- Terrorism in the U.S. – Jane’s International Police Review (1997)
- Kremlin Kapitalism – The International Economy (1997)
- Rise of the Russian Mafia – Jane’s International Police Review (1997)
- What Can Corporations Do To Protect Themselves from Sophisticated Cyberterrorists and Criminals? – Strategy & Leadership (1996)
