Cybersecurity Journal Articles Archive

Repurposing Cyber Command (PDF)

December 01, 2013

Abstract: Recent debates about the organizational relationship between Cyber Command and the NSA stress political issues over force employment.

Estonia's Cyber Defence League: A Model for the United States?

August 01, 2013

The cyber threat spectrum that prevails today is both broad and deep. While we cannot protect everything, everywhere, all the time, we can and must make a concerted and sustained effort to shore up national defenses as they pertain to cybersecurity. Despite considerable differences of scale and scope, Estonia's made-in-country cyber solutions may hold promise for the United States, at least with some adjustments and tailoring to take into account differing requirements and traditions. There may be much to learn from a country that bills itself as “e-Estonia, the digital society,” and also delivers on that promise. Specifically, the country's Cyber Defence League is a concept and construct that may prove useful for the United States to consider and contemplate at a time when significant cyber threats continue to multiply, but the skilled personnel needed to counter the challenge are in short supply on the U.S. side.

Cyber Domain Conflict in the 21st Century

January 01, 2013

The article discusses international political conflict in cyberspace, with a particular focus on policy issues related to cyberspace. The authors stress the speed with which events occur in cyberspace and the importance of security at the public, private, and individual levels. According to the author, digital technologies have empowered nonstate actors who were previously unable to play a major role in national and international security issues. Details on the relationship between cyber warfare and physical warfare are presented.

Cyberstrategy 2.0 (PDF)

April 01, 2006

This article focuses on two understudied but fertile grounds for radicalization in the United States: the nation’s prison system and cyberspace. Until the bounds of the challenge in each of these contexts are better understood, effective, appropriately tailored prevention and response measures cannot be formulated and implemented.

Cyber-Attack: The National Protection Plan and Its Privacy Implications (PDF)

November 01, 2000

The information technology revolution has given us an unrivaled, perhaps unsurpassable, lead over the rest of the world in virtually every facet of modern life. Unfortunately there is a “dark side” to this revolution.

Cyber Threats: Ten Issues to Consider (PDF)

September 01, 2000

While few adversaries would attempt to confront the United States in a conventional war on the traditional battlefield, its adversaries recognize that terrorism and other asymmetric forms of conflict, such as cyber attacks, are more effective methods of striking the United States where it is most vulnerable.

Information Warfare and Strategic Terrorism (PDF)

February 01, 1997

A dedicated adversary can procure and employ capabilities that present a grave threat to U.S. national security, specifically: a synergistic attack that capitalizes on IW strategies to multiply the effects of traditional terrorist tactics.