Skip to main content (Press Enter).
Toggle navigation
US Army War College - Strategic Studies Institute
US Army War College - Strategic Studies Institute
Search Army War College - SSI:
Search
Search
Search Army War College - SSI:
Search
Home
Who We Are
Faculty & Staff
Contact Us
Opportunities
Visiting Professors
Carlisle
Events
List of Events
CLSC
CLSC Dialogues
About CLSC
Carlisle PLA
Research
Insights
External Articles
Regional Issues
European Security
South & Latin America
Research & Commentary
Annual Estimate
2023 PLA Conference
PLA Logistics and Sustainment (PLA) Conference 2022
SSI Worldwide
INDOPACOM
Study of Internal Conflict
SOIC Study Methodology
SOIC Conflict Studies
Integrated Research Project Topics (IRPs)
Archived Content
Remembering 9/11, 20 Years Later
Special Commentary COVID-19
SSI Media
Podcasts
Decisive Point Podcast
Conversations on Strategy
CLSC Dialogues
SSI Live Podcast
Lectures and Panels
Recent Publications
National Hispanic Heritage Month
USAWC Press
Parameters
Decisive Point Podcast
Conversations on Strategy Podcast
Parameters Bookshelf
Articles & Editorials
Publications Site
Publishing Guide
Press Tips
CLSC Dialogues
Home
:
SSI Media
:
Recent Publications
Results:
Tag:
Threats
Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition
August 1, 2016
— Editor: Dr Dighton Fiddner, Dr Phil WilliamsThis volume has three parts: the first focuses on cyberspace itself; the second on some of the major forms of malevolence or threats that have become one of its defining characteristics; and the third on possible responses to these threats. One of the most significant features of cyberspace, however, is...
MORE
Another Brick in the Wall: The Israeli Experience in Missile Defense
April 13, 2015
— Author: Dr Jean-Loup Samaan View the Executive SummaryFor the last 4 decades, Israel has been challenged by the rise of ballistic arsenals in the Middle East. If, at first, the country kept relying on its traditional offensive doctrines, it eventually developed missile defense programs in the early-1980s through U.S.-Israel cooperation and then in...
MORE
An Assessment of the DoD Strategy for Operating in Cyberspace
September 23, 2013
— Author: Dr Thomas M Chen View the Executive SummaryIn July 2011, the U.S. Department of Defense (DoD) issued the DoD Strategy for Operating in Cyberspace, which outlines five strategic initiatives: 1) Treat cyberspace as another operational domain; 2) Employ new defense operating concepts to protect DoD networks; 3) Partner with other U.S...
MORE
Cyber Infrastructure Protection: Vol. II
May 3, 2013
— Authors: Dr Vincent Boudreau, COL Louis H Jordan Jr, Dr Tarek N Saadawi View the Executive SummaryIncreased reliance on the Internet and other networked systems raise the risks of cyber attacks that could harm our nation’s cyber infrastructure. The cyber infrastructure encompasses a number of sectors including: the nation’s mass transit and other...
MORE
Colloquium Brief: Kingston Conference on International Security (KCIS-2012): International Security in an Age of Austerity
March 4, 2013
— Mr. Dru LauzonA Partnership Between Strategic Studies Institute, U.S. Army War College, Centre for International and Defence Policy, Queen's University, Chair of Defence Management Studies, Queen's University, and Land Force Doctrine and Training System of the Canadian ForcesKey Insights. While the threat of another...
MORE
Jihadist Cells and “IED” Capabilities in Europe: Assessing the Present and Future Threat to the West
November 1, 2012
— Author: Dr Jeffrey M Bale The first of two interrelated security threats is multifaceted inasmuch as it stems from a complex combination of religious, political, historical, cultural, social, and economic motivational factors caused by the growing predilection for carrying out mass casualty terrorist attacks inside the territories of “infidel”...
MORE
Colloquium Brief: Cyber Infrastructure Protection
December 19, 2011
— Dr. Tarek N. Saadawi,COL Louis H. Jordan, JrA partnership between: U.S. Army War College, Strategic Studies Institute; Center of Information Networking and Telecommunications, Grove School of Engineering; Colin Powell Center for Public Policy; and City University of New...
MORE
Taming the Next Set of Strategic Weapons Threats
June 1, 2006
— Author: Mr Henry D Sokolski Missile defense and unmanned air vehicle related technologies, are proliferating for a variety of perfectly defensive and peaceful civilian applications. This same know-how can be used to defeat U.S. and allied air and missile defenses in new ways that are far more stressful than the existing set of ballistic missile...
MORE
American Grand Strategy After 9/11: An Assessment
April 1, 2005
— Author: Dr Stephen D Biddle In the three years since 9-11, the Administration has yet to arrive at a clear definition of the enemy or the aim in the War on Terrorism; to date, American policy has combined ambitious public statements with ambiguity on critical particulars. Heretofore, the costs of pursuing such ambitious but ill-defined goals have...
MORE
Street Gangs: The New Urban Insurgency
March 1, 2005
— Author: Dr Max G Manwaring The primary thrust of this monograph is to explain the linkage of contemporary criminal street gangs (that is, the gang phenomenon or third generation gangs) to insurgency in terms of the instability it wreaks upon government and the concomitant challenge to state sovereignty. Although there are differences between gangs...
MORE
Rethinking Asymmetric Threats
September 1, 2003
— Author: Dr Stephen J Blank For several years U.S. policymakers, officials, and writers on defense have employed the terms "asymmetric" or "asymmetry" to characterize everything from the nature of the threats we face to the nature of war and beyond. The author challenges the utility of using those terms to characterize the threats we face, one...
MORE