Homeland Security Strategy & Policy Journal Articles Archive

Estonia's Cyber Defence League: A Model for the United States?

August 01, 2013

The cyber threat spectrum that prevails today is both broad and deep. While we cannot protect everything, everywhere, all the time, we can and must make a concerted and sustained effort to shore up national defenses as they pertain to cybersecurity. Despite considerable differences of scale and scope, Estonia's made-in-country cyber solutions may hold promise for the United States, at least with some adjustments and tailoring to take into account differing requirements and traditions. There may be much to learn from a country that bills itself as “e-Estonia, the digital society,” and also delivers on that promise. Specifically, the country's Cyber Defence League is a concept and construct that may prove useful for the United States to consider and contemplate at a time when significant cyber threats continue to multiply, but the skilled personnel needed to counter the challenge are in short supply on the U.S. side.

Countering Terrorist Financing: We Need a Long-Term Prioritizing Strategy (PDF)

April 01, 2003

Hawalas, charities, commodities—each of these has one aspect in common: They are methods by which terrorists launder and remit their money. In the wake of 11 September, much has been discovered about the financial support structure of the terrorist cells that perpetrated the attacks on the United States.

The Use and Limits of U.S. Intelligence (PDF)

November 01, 2002

After spending nearly $30 billion annually on intelligence gathering efforts, why did the intelligence community (IC) fail to predict the September 11 terrorist attacks? How could they have prevented the attacks? How can the United States improve its ability to ensure that an event like this will not happen again?

Create a House Select Committee on Homeland Security and Terrorism (PDF)

February 01, 2002

As smoke rose in to the sky over New York, Pennsylvania, and Virginia on 11 September 2001, members of Congress pledged to work together and support the President’s strategy to counter the terrorists’ attack. Today, Congress has succeeded in making homeland security a national priority, but it has failed to effectively coordinate its actions.

Cyber-Attack: The National Protection Plan and Its Privacy Implications (PDF)

November 01, 2000

The information technology revolution has given us an unrivaled, perhaps unsurpassable, lead over the rest of the world in virtually every facet of modern life. Unfortunately there is a “dark side” to this revolution.

Cyber Threats: Ten Issues to Consider (PDF)

September 01, 2000

While few adversaries would attempt to confront the United States in a conventional war on the traditional battlefield, its adversaries recognize that terrorism and other asymmetric forms of conflict, such as cyber attacks, are more effective methods of striking the United States where it is most vulnerable.

Responding to New Terrorist Threats (PDF)

July 01, 1998

The face of terrorism is changing and so are its methods. A new breed of terrorists is seeking out and using weapons of greater lethality that can affect scores of victims over large areas. For conspirators hoping, or at least willing, to inflict mass casualties, nuclear, chemical, and biological weapons are the tools of choice in their arsenal.

Information Warfare and Strategic Terrorism (PDF)

February 01, 1997

A dedicated adversary can procure and employ capabilities that present a grave threat to U.S. national security, specifically: a synergistic attack that capitalizes on IW strategies to multiply the effects of traditional terrorist tactics.