Publications

Results:
Category: Cybersecurity

July 3, 2018

Intelligence in a Data-Driven Age

In this article, the authors explore alternative methods to create long-term competitive advantage by increasing collaboration between the intelligence community and machines, with an emphasis on artificial intelligence and machine learning. The intelligence community is battle-trained if overworked as a result of continuous operations since 2001, and its technological advantage may be at risk because intelligence systems are collecting data in too many disconnected and diverse formats, and relying on systems that are disconnected, non-standard or inaccessible. Nonetheless, artificial intelligence and machine learning will be instrumental to increase the effectiveness of future intelligence analysts and to sustain our competitive advantage.

April 19, 2018

Paradigm Change: Operational Art and the Information Joint Function

The need for this addition to the joint functions has become increasingly obvious to military leaders over time. It reveals itself in the difficulty of addressing gray zone challenges. During a recent effort by the Joint Staff to update Joint Publication (JP) 3-13, Information Operations, leaders recognized that the joint force was already attempting to use information as a function and that the time to institutionalize information as a function was therefore overdue.

April 11, 2018

The Practical Implications of Information as a Joint Function

The integration of the Information as a Joint Function (IJF) with the other six joint functions offers new opportunities for developing and conducting operational art and design. IJF will result in the development of executable plans to deal with future conflicts that are TMM in nature. The ultimate result will be that joint force commanders are able to dominate the informational aspect of their operating environment (the IE) the same way they dominate land, sea, air space, and cyberspace.

April 11, 2018

Introducing Information as a Joint Function

In July 2017, the Chairman of the Joint Chiefs of Staff issued a change to Joint Publication (JP) 1, Doctrine for the Armed Forces of the United States, introducing information as a new and seventh joint function. This issuance portends significant changes in how the joint force will plan and execute transregional, multidomain, and multifunctional operations. As such, it represents an opportunity to reimagine what “combined arms” means in 21st-century warfare.

March 1, 2018

Technology and National Security: The United States at a Critical Crossroads

Globalization of science and technology, emerging and unpredictable threats (both manmade and natural), conventional and emerging weapons of mass destruction, and an inversion of technology flow from the private to public sectors all present challenges to our national security.

Oct. 1, 2017

Open Sources for the Information Age: Or How I Learned to Stop Worrying and Love Unclassified Data

After years of major spending on intelligence, surveillance, and reconnaissance (ISR) collection capabilities, the Intelligence Community (IC) is beginning to make a commensurate investment in technology to improve intelligence analysis. However, absent a change that recognizes the increasing value of open source information, the IC will not realize a return on its investments.

May 22, 2017

Like, Comment, Retweet: The State of the Military's Nonpartisan Ethic in the World of Social Media

Through a survey of more than 500 military elites attending the United States Military Academy and National Defense University, this project seeks to establish the nature and extent of political expression by members of the military throughout social media and whether or not such expression is in keeping with the norm of nonpartisanship.

April 1, 2017

Information Warfare in an Information Age

In the past week, how many devices have you used that were connected to the Internet or relied on an algorithm to accomplish a task? Likely, the number is upward of 10 to 15, and most of those devices are used daily, if not hourly. Examples may include a Fit-Bit, cell phone, personal computer, work computer, home monitoring system, car, Internet television, printer, scanner, maps, and, if you are really tech savvy, maybe your coffee pot or refrigerator.

April 1, 2017

Operational Graphics for Cyberspace

Symbols have been part of military tactics, operations, and strategy since armies became too large for personal observation on the battlefield. In joint military operations, it is crucial to have a set of common symbols familiar to all users. The inability of cyber warriors to easily express operational concepts inhibits the identification of cyber key terrain, development of tactics and strategies, and execution of command and control.

Dec. 12, 2016

Chapter 8 | Cyber Policy

The effective use of the informational instrument of national power in all domains, and the use of all the instruments of national power in the cyber domain, will be a serious and growing challenge for the United States. The next U.S. President must have a clear understanding of the relationship of technology, law, and policy in formulating options. Centralized but not procrustean, leadership at the highest level, providing a clear and rational delineation of authorities, will be needed to coordinate and effectively employ U.S. cyber and information capabilities. Internationally, engaging with allies and partners will be vital to our defense; engaging with adversaries will require a new understanding of deterrence and counter-espionage in cyberspace. Domestically, new approaches to public-private partnerships will be key to addressing threats, preserving civil liberties, and unleashing our potential for improved governance and expanded commerce.