The articles linked to on this page are republished with permission of their respective publishers or authors.
|China in Cyberspace
By Nigel Inkster, Director of Transnational Threats and Political Risk at the IISS. Publication: Survival Publisher: Taylor & Francis
Jan 8, 2010 Copyright © 2010 Routledge
|China’s Cyber Power and America’s National Security
COL Spade's monograph examines the growth of Chinese cyber power and their known and demonstrated capabilities for offensive, defensive and exploitive computer network operations. Comparing China’s capacity and potential to the United States’ current efforts for cyber security, Spade highlights the degree to which the People’s Republic of China’s cyber power poses a threat to United States’ national security and offers proposals to improve future U.S. policy for cyber security and defense.
|Cyber Intelligence: Setting the Landscape for an Emerging Discipline
INSA, a non-partisan national security organization, says the U.S. must develop strategies beyond the current "patch and pray" procedures, create cyber intelligence policies, coordinate and share intelligence better among government agencies and businesses, and increase research on attack attribution and warnings.
|Cyber War Will Not Take Place by Thomas Rid
The author argues "that the world never experienced an act of cyber war, which would have to be violent, instrumental, and – most importantly – politically attributed. No attack on record meets all of these criteria. Unless significantly more evidence and significantly more detail are presented publicly by more than one agency, we have to conclude that there will not be a Pearl Harbor of cyber war in the future either."
by Thomas Rid and Peter McBurney, The RUSI Journal, Feb 2012, Vol. 157, No. 1
|Don't Draw the (Red) Line
by LTC John A. Mowchan, US Army, Proceedings Magazine- October 2011. Instead of setting thresholds, the United States should maintain ambiguity in responding to digital threats. That will ensure security and keep the enemy guessing.
|Google Confronts China’s “Three Warfares”
BY TIMOTHY L. THOMAS, Parameters - Summer 2010, Timothy L. Thomas is an analyst at the Foreign Military Studies Office at Fort Leavenworth, Kansas, and the author of three books on Chinese information warfare.
|IA Newsletter Volume 12 Number 1 Spring 2009
The IAnewsletter is published quarterly
by the Information Assurance
Technology Analysis Center (IATAC).
IATAC is a Department of Defense
(DoD) sponsored Information Analysis
Center, administratively managed by
the Defense Technical Information
Center (DTIC), and Director, Defense
Research and Engineering (DDR&E).
|Navy Information Dominance Vision - May 2010
The CNO has directed that the Navy position itself to remain pre-eminent in the fields of Intelligence, Cyber Warfare, Command and Control, Electronic Warfare and Battle & Knowledge Management.
|SSQ - Strategic Studies Quarterly – Spring 2011
This issue includes a commentary The Future of Things “Cyber” by Gen Michael V. Hayden, USAF, Retired Former Director, National Security Agency and Former Director, Central Intelligence Agency, as well as several timely articles that address issues pertaining to cyber.
|UK Cyber Security Strategy
"Although we have ways of managing risks in cyberspace, they do not match this complex and dynamic environment. So we need a new and transformative programme to improve our game domestically, as well as continuing to work with other countries on an international response."
All Reference Materials
|CYBERSPACE POLICY REVIEW
This paper summarizes the review team's conclusions and outlines the beginning of the way forward towards a reliable, resilient, trustworthy digital infrastructure for the future.