Journal Articles

Repurposing Cyber Command (PDF)

December 01, 2013

Abstract: Recent debates about the organizational relationship between Cyber Command and the NSA stress political issues over force employment.

Foreign Fighters in Syria: Still Doing Battle, Still a Multidimensional Danger (PDF)

August 31, 2013

Syria is the new hub for foreign fighters who are gaining battlefield experience. A subset of these fighters falls within the jihadist-terrorist camp. These individuals may return to their home country and target it, using their newfound skill and their native knowledge. To address this threat a multidimensional, transnational response is needed.

Estonia's Cyber Defence League: A Model for the United States?

August 01, 2013

The cyber threat spectrum that prevails today is both broad and deep. While we cannot protect everything, everywhere, all the time, we can and must make a concerted and sustained effort to shore up national defenses as they pertain to cybersecurity. Despite considerable differences of scale and scope, Estonia's made-in-country cyber solutions may hold promise for the United States, at least with some adjustments and tailoring to take into account differing requirements and traditions. There may be much to learn from a country that bills itself as “e-Estonia, the digital society,” and also delivers on that promise. Specifically, the country's Cyber Defence League is a concept and construct that may prove useful for the United States to consider and contemplate at a time when significant cyber threats continue to multiply, but the skilled personnel needed to counter the challenge are in short supply on the U.S. side.

Cyber Domain Conflict in the 21st Century

January 01, 2013

The article discusses international political conflict in cyberspace, with a particular focus on policy issues related to cyberspace. The authors stress the speed with which events occur in cyberspace and the importance of security at the public, private, and individual levels. According to the author, digital technologies have empowered nonstate actors who were previously unable to play a major role in national and international security issues. Details on the relationship between cyber warfare and physical warfare are presented.

Meet Our Staff

Read about our Staff and other pieces they’ve authored.

Meet Our Senior Fellows

Read about our Senior Fellows and other pieces they’ve authored.