Skip to main content (Press Enter).
Toggle navigation
US Army War College - Strategic Studies Institute
US Army War College - Strategic Studies Institute
Search Army War College - SSI:
Search
Search
Search Army War College - SSI:
Search
Home
Who We Are
Faculty & Staff
Contact Us
Opportunities
Visiting Professors
Carlisle
Events
List of Events
CLSC
CLSC Dialogues
About CLSC
Carlisle PLA
Research
Insights
External Articles
Regional Issues
European Security
South & Latin America
Research & Commentary
Annual Estimate
2023 PLA Conference
PLA Logistics and Sustainment (PLA) Conference 2022
SSI Worldwide
INDOPACOM
Study of Internal Conflict
SOIC Study Methodology
SOIC Conflict Studies
Integrated Research Project Topics (IRPs)
Archived Content
Remembering 9/11, 20 Years Later
Special Commentary COVID-19
SSI Media
Podcasts
Decisive Point Podcast
Conversations on Strategy
CLSC Dialogues
SSI Live Podcast
Lectures and Panels
Recent Publications
USAWC Press
Parameters
Decisive Point Podcast
Conversations on Strategy Podcast
Parameters Bookshelf
Articles & Editorials
Publications Site
Publishing Guide
Press Tips
CLSC Dialogues
Home
:
SSI Media
:
Recent Publications
1
2
Results:
Tag:
cyberspace
Book Review: The New Makers of Modern Strategy: From the Ancient World to the Digital Age
September 25, 2024
— John Erickson and John Nagl provide a useful overview of the latest (third) edition of Princeton University Press’s anthologies on modern strategy, directing readers to the most salient chapters of the book and giving insight into why “this third edition is the most interesting yet” and “are of immeasurable importance for students, practitioners, and scholars alike.” Erickson and Nagl write that “[the] essays provide excellent starting points for research on almost any...
MORE
Book Review: Armies in Retreat: Chaos, Cohesion, and Consequences
May 20, 2024
— Military History | Editors: Timothy G. Heck and Walker D. Mills | Reviewed by Dr. J.P. Clark, associate professor of strategy, Basic Strategic Art Program, US Army War College | Dr. J.P. Clark provides a thoughtful analysis of this anthology on retreat, an "under-studied topic in the US military." The book covers case studies spanning from the...
MORE
Cyber Intelligence: Actors, Policies, and Practices
August 29, 2023
— Technology and War Book Review: Cyber Intelligence: Actors, Policies, and Practices Author: Constance S. Uthoff | Reviewed by Dr. Robert J. Bunker, director of research and analysis, managing partner, C/O Futures LLC | From intelligence cycles and processes to intelligence agencies, security challenges, and more, Cyber Intelligence: Actors,...
MORE
“Assessing the Army’s Cyber Force Structure”
September 23, 2022
— The skill and capacity of Army cyber forces have grown in the decade since their creation. This podcast focuses on needed structural changes to the Army’s portion of the Cyber Mission Forces that will enable their continued growth and maturity since the Army’s past organizational and structural decisions impose challenges impacting current and future efficiency and effectiveness. This assessment of the current situation highlights the areas military leadership must address to allow the Army’s cyber forces to continue evolving to meet the needs of multi-domain operations. ...
MORE
The Army Role in Achieving Deterrence in Cyberspace
March 18, 2019
— Author: Mr Jeffrey L CatonView the Executive Summary In 2015, the Department of Defense (DoD) released the DoD Cyber Strategy which explicitly calls for a comprehensive strategy to provide credible deterrence in cyberspace against threats from key state and nonstate actors. To be effective, such activities must be coordinated with ongoing...
MORE
Implications of Service Cyberspace Component Commands for Army Cyberspace Operations
February 15, 2019
— Author: Mr Jeffrey L CatonView the Executive Summary The first 7 years of U.S. Cyber Command operations are paved with milestones that mark the steady operationalization of modern cyberspace as the newest domain of military conflict as well as a realm of international power. The creation of the Cyber Mission Force and Joint Force Headquarters-Cyber...
MORE
Examining the Roles of Army Reserve Component Forces in Military Cyberspace Operations
January 31, 2019
— Author: Mr Jeffrey L CatonView the Executive Summary Cyberspace operations have become pervasive in the United States, and they enable many aspects of modern life for the average citizen, such as entertainment, communication, education, transportation, banking, and voting. The continuing development of the U.S. Army and Department of Defense (DoD)...
MORE
The Land, Space, and Cyberspace Nexus: Evolution of the Oldest Military Operations in the Newest Military Domains
March 27, 2018
— Author: Mr Jeffrey L CatonView the Executive SummaryOver the last century, the domains of air, space, and cyberspace have joined the traditional warfighting domains of land and sea. While the doctrine for land operations is relatively mature, the doctrine for space and cyberspace continue to evolve, often in an unstructured manner. This monograph...
MORE
Evaluation of the 2015 DoD Cyber Strategy: Mild Progress in a Complex and Dynamic Military Domain
November 2, 2017
— Author: Mr Jeffrey L CatonView the Executive Summary In 2011, the Department of Defense (DoD) released its Strategy for Operating in Cyberspace, which officially recognized cyberspace as an operational domain akin to the traditional military domains of land, sea, air, and space. This monograph examines the 2015 DoD Cyber Strategy to evaluate how...
MORE
Prospects for the Rule of Law in Cyberspace
January 24, 2017
— Author: Mr Keir GilesView the Executive Summary The application of international law and legal principles in cyberspace is a topic that has caused confusion, doubt, and interminable discussions between lawyers since the earliest days of the internationalization of the Internet. The still unresolved debate over whether cyberspace constitutes a...
MORE
Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies
December 2, 2016
— Author: Dr Mary ManjikianView the Executive SummaryPerhaps the best starting point for those looking to “borrow” a deterrent strategy for cyberspace from other fields is not the example of nuclear deterrence but instead the example of United States-Mexican border security. The nuclear deterrent analogy is not the best fit for understanding...
MORE
Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition
August 11, 2016
— Editor: Dr Dighton Fiddner, Dr Phil WilliamsView the Executive SummaryThis volume has three parts: the first focuses on cyberspace itself; the second on some of the major forms of malevolence or threats that have become one of its defining characteristics; and the third on possible responses to these threats. One of the most significant features of...
MORE
1
2