Cyberspace
Archived         
The articles linked to on this page are republished with permission of their respective publishers or authors.
All Publications
A Common Future? NATO and the Protection of the Commons - by Michael Horowitz
The Chicago Council on Global Affairs - TRANSATLANTIC PAPER SERIES NO. 3 OCTOBER 2010
A Cyberworm that Knows no Boundaries
RAND Report, by Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay. Dec 2011
A Strategic Approach to Network Defense: Framing the Cloud
Timothy K. Buennemeyer, Parameters, Autumn 2011, Vol. 41, No. 3
A Taxonomy of Network Centric Warfare Architectures
Anthony Dekker Defence Science & Technology Organisation DSTO Fern Hill Department of Defence, Canberra ACT 2600, Australia
America’s Cyber Future: Security and Prosperity in the Information Age
The Center for a New American Security (CNAS)
Backgrounds and Principles of Network-Centric Warfare
Lt.Col (G.S.) Sakari Ahvenainen (Ret., Finnish Army) National Defence College November 2003 Course of Network-Centric Warfare for Post-Graduate Students
Battle Wise: Seeking Time-Information Superiority in Network Warfare
CTNSP NDU
Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise
DHS Cyber Strategy, Nov 2011
Building a Deterrence Against Strategic Information Warfare
Geoffrey S. French (June 2002)
Building Cyber Security Leadership for the 21st Century
Dr. James Jay Carafano PhD, and Eric Sayers (The Heritage Foundation December 16, 2008)
Capability Surprise Report from Defense Science Board Sep 2009
See the cyber surprise discussion on pages 10-15 of this report.
China in Cyberspace
By Nigel Inkster, Director of Transnational Threats and Political Risk at the IISS. Publication: Survival Publisher: Taylor & Francis Jan 8, 2010 Copyright © 2010 Routledge
China’s Cyber Power and America’s National Security
COL Spade's monograph examines the growth of Chinese cyber power and their known and demonstrated capabilities for offensive, defensive and exploitive computer network operations. Comparing China’s capacity and potential to the United States’ current efforts for cyber security, Spade highlights the degree to which the People’s Republic of China’s cyber power poses a threat to United States’ national security and offers proposals to improve future U.S. policy for cyber security and defense.
CHINA’S PROLIFERATION PRACTICES, AND THE DEVELOPMENT OF ITS CYBER AND SPACE WARFARE CAPABILITIES
HEARING BEFORE THE U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION ONE HUNDRED TENTH CONGRESS SECOND SESSION (MAY 20, 2008)
China's Electronic Long Range Reconnaissance
Timothy L. Thomas (Military Review Nov-Dec 2008)
Common Vulnerabilities in Critical Infrastructure Control Systems
Jason Stamp, John Dillinger, William Young Jennifer DePoy Sandia National Laboratories (22 May 2003)
Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations
John Rollins and Anna C. Henning Congressional Research Service (March 10, 2009)
Creating the Demand Curve for Cybersecurity - Melissa E. Hathaway
ATLANTIC COUNCIL - ISSUE BRIEF - PROGRAM ON INTERNATIONAL SECURITY
CRS Spyware: Background and Policy Issues for Congress
Updated September 26, 2007
CYBER ANALYSIS AND WARNING
GAO (July 2008)
Cyber Influence and International Security
Franklin D. Kramer and Larry Wentz Defense Horizons CTNSP NDU (January 2008)
Cyber Intelligence: Setting the Landscape for an Emerging Discipline
INSA, a non-partisan national security organization, says the U.S. must develop strategies beyond the current "patch and pray" procedures, create cyber intelligence policies, coordinate and share intelligence better among government agencies and businesses, and increase research on attack attribution and warnings.
Cyber Operations - The New Balance by Stephen W. Korns
A new normalcy is ascendant in cyberspace. What does this mean, and what are the implications...
CYBER POWER - by Joseph S. Nye, Jr.
Harvard Kennedy School Belfer Center for Science and International Affairs, May 2010
Cyber Ricochet: Risk Management and Cyberspace Operations
by Benjamin Leitzel, CSL Issue Paper, July 2012
Cyber Threat to Critical Infrastructure 2010-2015
Peter D. Gasper September 2008 Prepared for presentation at: Information & Cyberspace Symposium Fort Leavenworth, Kansas 22-24 September 2008
Cyber War Will Not Take Place by Thomas Rid
The author argues "that the world never experienced an act of cyber war, which would have to be violent, instrumental, and – most importantly – politically attributed. No attack on record meets all of these criteria. Unless significantly more evidence and significantly more detail are presented publicly by more than one agency, we have to conclude that there will not be a Pearl Harbor of cyber war in the future either."
Cyberdeterrence and Cyberwar -- A Monograph by Martin Libicki
The study was conducted to help clarify and focus attention on the operational realities behind the phrase “fly and fight in cyberspace.” -- The basic message is simple: Cyberspace is its own medium with its own rules.
Cybersecurity – Assessing Our Vulnerabilities and Developing an Effective Defense
James A. Lewis Center for Strategic and International Studies Testimony Before Senate Committee on Commerce, Science, and Transportation Cybersecurity March 19, 2009
Cyber-Security through Arms Control: An Approach to International Co-Operation
Paul Meyer, RUSI Journal 156, no. 2 (April-May 2011): 22-27.
Cybersecurity two years later -- Center for Strategic & International Studies (CSIS)
A report of the CSIS Commission on cybersecurity for the 44th presidency
Cyberspace and the Changing Nature of Warfare
Kenneth Geers, U.S. Representative Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia
CYBERSPACE DOMAIN: A WARFIGHTING SUBSTANTIATED OPERATIONAL ENVIRONMENT IMPERATIVE
COLONEL OLEN L. KELLEY (15 MAR 2008)
Cyberwar: The United States and China Prepare for the Next Generation of Conflict
George Patterson Manson. Comparative Strategy 30, no. 2 (April-June 2011): 121-133.
Cyber-Weapons
by Thomas Rid and Peter McBurney, The RUSI Journal, Feb 2012, Vol. 157, No. 1
Cyberweapons: Leveling the International Playing Field
Ross M. Rustici, Parameters, Autumn 2011, Vol. 41, No. 3
DEFENSE DEPARTMENT CYBER EFFORTS -- DOD Faces Challenges In Its Cyber Activities
Highlights of GAO-11-75, a report to congressional requesters
Defense Imperatives for the New Administration
Defense Science Board (August 2008)
Department of Defense Cyberspace Policy Report
A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934, November 2011
Determining Communication Shortfalls for Homeland Defense
MAJ Kevin P. Wilson, Strategic Insights (December 2007)
Deterrence and Escalation in Cross-domain Operations: Where Do Space and Cyberspace Fit?
by Vincent Manzo, JFQ Issue 66, 3rd Quarter 2012
Developing Situation Awareness Metrics in a Synthetic Battlespace Environment
(2005)
Diplomatic Alternatives to Cyber-Warfare: A Near-Term Agenda
by Paul Meyer, The RUSI Journal, 157:1, 14-19
Does EW + CNO = Cyber?
Lt Col Jesse Bourque (September 2008)
Don't Draw the (Red) Line
by LTC John A. Mowchan, US Army, Proceedings Magazine- October 2011. Instead of setting thresholds, the United States should maintain ambiguity in responding to digital threats. That will ensure security and keep the enemy guessing.
Emerging Cyber Threats Report 2012
Georgia Tech Cyber Security Summit 2011
Enabling Distributed Security in Cyberspace - Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action
Department of Homeland Security White Paper, Published 23 March 2011
Estonia: Cyber Window into the Future of NATO
Joint Forces Quarterly 63 (October 2011)
Federal Plan for Cyber Security and Information Assurance Research and Development
Interagency Working Group on Cyber Security and Information Assurance (April 2006)
Five Dimensional (Cyber) Warfighting: Can the Army After Next be Defeated Through Complex Concepts and Technologies?
Robert J. Bunker (July 10, 1998)
From Cyber Space to Cyberpower: Defining the Problem
Dr. Dan Kuehl (2008)
Google Confronts China’s “Three Warfares”
BY TIMOTHY L. THOMAS, Parameters - Summer 2010, Timothy L. Thomas is an analyst at the Foreign Military Studies Office at Fort Leavenworth, Kansas, and the author of three books on Chinese information warfare.
IA Newsletter Volume 12 Number 1 Spring 2009
The IAnewsletter is published quarterly by the Information Assurance Technology Analysis Center (IATAC). IATAC is a Department of Defense (DoD) sponsored Information Analysis Center, administratively managed by the Defense Technical Information Center (DTIC), and Director, Defense Research and Engineering (DDR&E).
Mastering the Art of Wiki: Understanding Social Networking and National Security - By James Jay Carafano
Joint Forces Quarterly 60 (1st Quarter, January 2011)
Nation at Risk: Policy Makers Need Better Information to Protect the Country
The Markle Foundation Task Force on National Security in the Information Age (March 2009)
National Cyber Security Research and Development Challenges Related to Economics, Physical Infrastructure and Human Behavior An Industry, Academic and Government Perspective 2009
I3P Institute for Information Infrastructure Protection (2009)
NATIONAL CYBER SECURITY STRATEGY: Key Improvements Are Needed To Strengthen The Nation's Posture
Statement of David Powner, Director, Information Technology Management Issues GAO. Testimony Before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology (March 10, 2009)
NATO and Cyber Defence: Mission Accomplished?
Rex B. Hughes Atlantisch Perspectief no. 8, 2008
Navy Information Dominance Vision - May 2010
The CNO has directed that the Navy position itself to remain pre-eminent in the fields of Intelligence, Cyber Warfare, Command and Control, Electronic Warfare and Battle & Knowledge Management.
NETWAR: Winning in the Cyberelectromagnetic Dimension of "Full Spectrum Operations"
MILITARY REVIEW March-April 2010 by Brigadier General Huba Wass de Czege,U.S. Army, Retired.
Network Centric Warfare Case Study: Vol I
Volume 1 Operations - U.S. V Corps and 3rd ID During Operation Iraqi Freedom Combat Operations (March to April 2003)
Network Centric Warfare Case Study: Vol II
A View of Command, Control Communicatons and Computer Architectures at the Dawn of Network Centric Warfare
Network Centric Warfare Case Study: Vol III
Network Centric Warfare Insights
Network-Centric Warfare: Leveraging the Power of Information
Dr. Jeffrey L. Groh (June 2008)
Nuclear Lessons for Cyber Security?
Strategic Studies Quarterly, Winter 2011, by Joseph S. Nye Jr.
Offensive Cyber for the Joint Force Commander: It's Not That Different
By ROSEMARY M. CARTER, BRENT FEICK, and ROY C. UNDERSANDER JFQ Issue 66, 3rd Quarter 2012
Power to the Edge: Command...Control...in the Information Age
DOD Command and Control Research Program (April 2005)
Pursuing Security in Cyberspace: Strategic and Organizational Challenges
Suzanne C. Nielsen, Orbis, Summer 2012
Reducing Systemic Cybersecurity Risk
Organisation for Economic Co-operation and Development/International Futures Programme -- OECD/IFP Project on "Future Global Shocks"
Remarks by the Director of National Intelligence
Mr. Mike McConnel (Nov 2008)
Sailing the Cyber Sea
by James Stavridis, JFQ, issue 65, 2d quarter 2012
Secret weapons & cyberwar
Armed Forces Journal, June 2012
Securing Cyberspace for the 44th Presidency
CSIS Commission on Cybersecurity for the 44th Presidency (December 2008)
Shadow Boxing: Cyber Warfare and Strategic Economic Attack
BY SOREN OLSON, JFQ Issue 66, 3rd Quarter 2012
SSQ - Strategic Studies Quarterly – Spring 2011
This issue includes a commentary The Future of Things “Cyber” by Gen Michael V. Hayden, USAF, Retired Former Director, National Security Agency and Former Director, Central Intelligence Agency, as well as several timely articles that address issues pertaining to cyber.
Statement of Franklin D. Kramer before the House Armed Services Committee Subcommittee on Terrorism and Unconventional Threats
(April 1, 2008)
Strategic Fragility: Infrastructure Protection and National Security in the Information Age
Robert A. Miller and Irving Lachow Defense Horizons CTNSP NDU (January 2008)
Stuxnet and Strategy: A Space Operation in Cyberspace
Joint Forces Quarterly 63 (October 2011)
Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
This booklet is based on the report Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. The project that resulted in the report was supported by the MacArthur Foundation, Microsoft Corporation, and the National Research Council.
The Comprehensive National Cybersecurity Initiative
White House release describing a summary of 12 component elements of the Cybersecurity Initiative
The New Reality of International Telecommunications Strategy
Robert C. Fonow, CTNSP NDU (January 2006)
The Political Power of Social Media
By Clay Shirky - Foreign Affairs - Published by the Council on Foreign Relations (The site may require you to register)
Toward Deterrence in the Cyber Dimension
President's Commission on Critical Infrastrcture Protection (1997)
UK Cyber Security Strategy
"Although we have ways of managing risks in cyberspace, they do not match this complex and dynamic environment. So we need a new and transformative programme to improve our game domestically, as well as continuing to work with other countries on an international response."
US Cyberspace Strategy and International Humanitarian Law
by Jody Prescott. The RUSI Journal Volume 156, Issue 6, 2011.
War in the Information Age: A Primer for Cyberspace Operations in the 21st Century
By Richard Crowell
War is War Issue Paper - By Professor Dennis Murphy
Initial Impressions Report on the War is War Cyberspace Operations Workshop held at the Collins Center for Strategic Leadership, US Army War College 26-28 Jan '10
War is War: A workshop on the strategic utility of cyberspace operations in the contemporary operational environment
The workshop will be held 26–28 January 2010 at the Collins Center for Strategic Leadership, U.S. Army War College, Carlisle Barracks, Pennsylvania.
Warfighting in Cyberspace
LTG Keith B. Alexander, (2007)
What do Senior Leaders Need to Know About Cyberspace? by Jeffrey Caton
THE CENTER FOR TECHNOLOGY AND NATIONAL SECURITY POLICY NATIONAL DEFENSE UNIVERSITY WASHINGTON, DC December 2009
What U.S. Cyber Command Must Do
By Wesley R. Andrues, Joint Forces Quarterly, Issue 59, 4th Quarter 2010
Who Should Lead U.S. Cybersecurity Efforts?
By Kevin P. Newmeyer, PRISM 3, no. 2
Why Iran Didn't Admit Stuxnet Was an Attack
Joint Forces Quarterly 63 (October 2011)
All Reference Materials
Botnets, Cybercrime, and Cyberterrorism:Vulnerabilities and Policy Issues for Congress
Congressional Research Service (January 2009)
Cyber Attacks Against Georgia: Legal Lessons Identified
Cooperative Cyber Defence Center of Excellence (November 2008)
CYBERCRIME: Public and Private Entities Face Challenges in Addressing Cyber Threats
GAO (June 2007)
CYBERSPACE POLICY REVIEW
This paper summarizes the review team's conclusions and outlines the beginning of the way forward towards a reliable, resilient, trustworthy digital infrastructure for the future.
Department of Defense NetOps Strategic Vision
December 2008 Department of Defense Chief Information Officer, The Pentagon – Washington, D.C.
Department of Defense Strategy for Operating in Cyberspace
July 2011
DOD Cloud Computing Strategy
July 2012
Emerging Cyber Threats Report 2009: Data, Mobility and Questions of Responsibility Will Drive Cyber Threats in 2009 and Beyond
Georgia Tech Information Security Center (October 2008)
Establishment of U.S. Cyber Command for Military Cyberspace Operations
Secretary of Defense Establishes a Subordinate Unified U.S. Cyber Command Under U.S. Strategic Command for Military Cyberspace Operations
FOREIGN SPIES STEALING U.S. ECONOMIC SECRETS IN CYBERSPACE
Report to Congress on Foreign Economic Collection and Industrial Espionage, 2009-2011. Office of the National Counterintelligence Executive.
International Strategy For Cyberspace
U.S. International Strategy for Cyberspace, the White House
MEMORANDUM OF AGREEMENT BETWEEN THE DEPARTMENT OF HOMELAND SECURITY AND THE DEPARTMENT OF DEFENSE REGARDING CYBERSECURITY
Signed by Secretary of Defense - Robert Gates & Secretary of Homeland Security - Janet Napolitano
National Communications System: Ensuring Essential Communications for the Homeland
Office of the Manager, National Communications System (FY 2002)
National Strategy for Information Sharing
(2007)
Russia-Georgia 2008 War - August Calendar
Reference used during the War is War Cyberspace Operations Workshop
SCADA and the Terrorist Threat: Protecting the Nation's Critical Control Systems
Statement of Dr. Samual G. Vernado (October 18, 2005)
Terrorist Capabilities for Cyberattack: Overview and Policy Issues
Congressional Research Service (January 2007)
The Convergence of Physical and Cyber Technologies and Related Security Management Challenges Working Group Final Report
NIAC (January 2007)
The Economic Impact of Cyber-Attacks
Congressioal Research Service (2004)
The National Strategy to Secure CYBERSPACE
The White Houese (February 2003)

**The appearance of hyperlinks does not constitute endorsement by the Department of the Army of this web site or the information, products or services contained therein. For other than authorized activities such as military exchanges and Morale, Welfare and Recreation sites, the Department of the army does not exercise any editorial control over the information you may find at these locations. Such links are provided and maintained as a convienience for visitors.**

© Copyright 2007 IAP