Journal Articles



Shoot, Move, Communicate: Thinking Through Cyber's Role in Ground Combat

April 01, 2015

FOREWORD: The phrase ‘cyber components and capabilities’ is used as a catch all phrase. It is imprecise.

A Blueprint for Cyber Deterrence: Building Stability Through Strength

September 10, 2014

"Cyber threats pose a real and growing problem, and to date, United States efforts to counter them have lagged.

Repurposing Cyber Command (PDF)

December 01, 2013

Abstract: Recent debates about the organizational relationship between Cyber Command and the NSA stress political issues over force employment.

Foreign Fighters in Syria: Still Doing Battle, Still a Multidimensional Danger (PDF)

August 31, 2013

Syria is the new hub for foreign fighters who are gaining battlefield experience. A subset of these fighters falls within the jihadist-terrorist camp. These individuals may return to their home country and target it, using their newfound skill and their native knowledge. To address this threat a multidimensional, transnational response is needed.

Estonia's Cyber Defence League: A Model for the United States?

August 01, 2013

The cyber threat spectrum that prevails today is both broad and deep. While we cannot protect everything, everywhere, all the time, we can and must make a concerted and sustained effort to shore up national defenses as they pertain to cybersecurity. Despite considerable differences of scale and scope, Estonia's made-in-country cyber solutions may hold promise for the United States, at least with some adjustments and tailoring to take into account differing requirements and traditions. There may be much to learn from a country that bills itself as “e-Estonia, the digital society,” and also delivers on that promise. Specifically, the country's Cyber Defence League is a concept and construct that may prove useful for the United States to consider and contemplate at a time when significant cyber threats continue to multiply, but the skilled personnel needed to counter the challenge are in short supply on the U.S. side.

Cyber Domain Conflict in the 21st Century

January 01, 2013

The article discusses international political conflict in cyberspace, with a particular focus on policy issues related to cyberspace. The authors stress the speed with which events occur in cyberspace and the importance of security at the public, private, and individual levels. According to the author, digital technologies have empowered nonstate actors who were previously unable to play a major role in national and international security issues. Details on the relationship between cyber warfare and physical warfare are presented.

Open Relationship

February 15, 2012

"Are Pakistan's Federally Administered Tribal Areas (FATA) still the prime destination for jihad-minded foreign fighters from the West?

Thinking About Strategic Hybrid Threats – In Theory and in Practice

January 01, 2012

"As the United States resets in the wake of Iraq and Afghanistan, and in the face of growing uncertainty in the South China Sea, a good and important debate is occurring about how

Getting Serious About Cyberwarfare

January 01, 2012

"The future of military conflict will certainly include a cyber component.

Counterterrorism Intelligence: Fusion Center Perspectives

September 01, 2011

"In the United States local law enforcement is not the only line of defense against terrorism, but given its ability to detect threats within our communities and its first responder function — it i

Reflections on Jihad: A Former Leader’s Perspective

October 16, 2009

"While many counterterrorism experts pay much attention to the tactics and modus operandi of specific organizations in an effort to defeat them, al‐Qaeda, its franchises, and like‐minded groups tap

Where Does it Fit?

September 15, 2009

"As the debate regarding the bureaucratic placement of the Federal Emergency Management Agency (FEMA) within the executive branch intensifies, we implore pundits and policymakers alike to pause and

Radicalization: Behind Bars and Beyond Borders (PDF)

April 01, 2007

This article focuses on two understudied but fertile grounds for radicalization in the United States: the nation’s prison system and cyberspace. Until the bounds of the challenge in each of these contexts are better understood, effective, appropriately tailored prevention and response measures cannot be formulated and implemented.

Cyberstrategy 2.0 (PDF)

April 01, 2006

This article focuses on two understudied but fertile grounds for radicalization in the United States: the nation’s prison system and cyberspace. Until the bounds of the challenge in each of these contexts are better understood, effective, appropriately tailored prevention and response measures cannot be formulated and implemented.

Countering Terrorist Financing: We Need a Long-Term Prioritizing Strategy (PDF)

April 01, 2003

Hawalas, charities, commodities—each of these has one aspect in common: They are methods by which terrorists launder and remit their money. In the wake of 11 September, much has been discovered about the financial support structure of the terrorist cells that perpetrated the attacks on the United States.

Meet Our Staff

Read about our Staff and other pieces they’ve authored.

Meet Our Senior Fellows

Read about our Senior Fellows and other pieces they’ve authored.