Browse by

Publications

Results:
Category: Cybersecurity

Dec. 1, 2011

Deterrence and Escalation in Cross-domain Operations: Where Do Space and Cyberspace Fit?

Warfare has become even more complicated since Richard Smoke wrote this description of escalation in 1977. The National Security Space Strategy describes space as “congested, contested, and competitive,” yet satellites underpin U.S. military and economic power. Activity in cyberspace has permeated every facet of human activity, including U.S. military operations, yet the prospects for effective cyber defenses are bleak. Many other actors depend on continued access to these domains, but not nearly as much as the United States.

Sept. 1, 2009

Cyberspace and the “First Battle” in 21st-century War

Wars often start well before main forces engage. In the 19th and early 20th centuries, combat often began when light cavalry units crossed the border. For most of the 20th century, the “first battle” typically involved dawn surprise attacks, usually delivered by air forces. While a few of these attacks were so shattering that they essentially decided the outcome of the struggle or at least dramatically shaped its course—the Israeli air force’s attack at the opening of the June 1967 Six-Day War comes to mind—in most cases the defender had sufficient strategic space—geographic and/or temporal—to recover and eventually redress the strategic balance to emerge victorious. The opening moments of World War II for Russia and the United States provide two examples.

Jan. 1, 2008

Cyber Influence and International Security

Cyber influence is an ongoing source of power in the international security arena. Although the United States has an enormous cyber information capacity, its cyber influence is not proportional to that capacity. Impediments to American cyber influence include the vastness and complexity of the international information environment, multiplicity of cultures and differing audiences to which communications must be addressed, extensiveness and significance of contending or alternative messages, and complexity and importance of using appropriate influential messengers and message mechanisms.

Jan. 1, 2008

Strategic Fragility: Infrastructure Protection and National Security in the Information Age

Modern societies have reached unprecedented levels of prosperity, yet they remain vulnerable to a wide range of possible disruptions. One significant reason for this growing vulnerability is the developed world’s reliance on an array of interlinked, interdependent critical infrastructures that span nations and even continents. The advent of these infrastructures over the past few decades has resulted in a tradeoff: the United States has gained greater productivity and prosperity at the risk of greater exposure to widespread systemic collapse. The trends that have led to this growing strategic fragility show no sign of slowing. As a result, the United States faces a new and different kind of threat to national security.

Feb. 1, 2007

I-Power: The Information Revolution and Stability Operations

Information and information technology (I/IT) can significantly increase the likelihood of success in stability operations— if they are engaged as part of an overall strategy that coordinates the actions of outside intervenors and focuses on generating effective results for the host nation. Properly utilized, I/IT can help create a knowledgeable intervention, organize complex activities, and integrate stability operations with the host nation, making stability operations more effective.

Feb. 1, 2006

Custer in Cyberspace

The combination of abundant networked information and fluid, unfamiliar situations in the current era makes it at once possible and imperative to improve decisionmaking in combat. The key to improvement is to integrate faster reasoning and more reliable intuition into a cognitive whole to achieve battle-wisdom. Although the technologies that both demand and facilitate battle- wisdom are new, military history holds lessons on combining reasoning and intuition in conditions of urgency, danger, and uncertainty.

Oct. 1, 2005

Sweden’s Use of Commercial Information Technology for Military Applications

Sweden, a nation of only 9 million people with a political climate that has fostered a posture of nonalignment for over half a century, has nevertheless maintained highly credible, modern, and high-technology military forces. Sweden has expanded the mission of forces originally designed for the Cold War to include international peacekeeping. The focus of this study is the Swedish formula for achieving the high-technology military capabilities that successfully compensate for a small standing force. What policies and processes enabled the Swedish military to take advantage of leading-edge producers of commercial information technology (CIT)? What lessons does the Swedish model hold for the U.S. Department of Defense?