Skip to main content (Press Enter).
Toggle navigation
US Army War College - Strategic Studies Institute
US Army War College - Strategic Studies Institute
Search Army War College - SSI:
Search
Search
Search Army War College - SSI:
Search
Home
Who We Are
Faculty & Staff
Contact Us
Opportunities
Visiting Professors
Carlisle
Events
List of Events
CLSC
CLSC Dialogues
About CLSC
Carlisle PLA
Research
Insights
External Articles
Regional Issues
European Security
South & Latin America
Research & Commentary
Annual Estimate
2023 PLA Conference
PLA Logistics and Sustainment (PLA) Conference 2022
SSI Worldwide
INDOPACOM
Study of Internal Conflict
SOIC Study Methodology
SOIC Conflict Studies
Integrated Research Project Topics (IRPs)
Archived Content
Remembering 9/11, 20 Years Later
Special Commentary COVID-19
SSI Media
Podcasts
Decisive Point Podcast
Conversations on Strategy
CLSC Dialogues
SSI Live Podcast
Lectures and Panels
Recent Publications
National Hispanic Heritage Month
USAWC Press
Parameters
Decisive Point Podcast
Conversations on Strategy Podcast
Parameters Bookshelf
Articles & Editorials
Publications Site
Publishing Guide
Press Tips
CLSC Dialogues
Home
:
SSI Media
:
Recent Publications
1
2
Results:
Tag:
Cyber
Parameters | Winter 2022–23
November 18, 2022
— Parameters | Winter 2022–23From the Acting Editor in ChiefConrad C. CraneIn FocusPresent Danger: Nuclear Power Plants and Modern WarfareHenry D. SokolskiPutin Chooses between a Series of Bad OptionsJeffrey D. McCauslandIndo-PacificIndian Perspectives: Insights for Indo-American PartnershipTyrell O. MayfieldSecurity Force Assistance Brigades and US...
MORE
NATO Cyberspace Capability: A Strategic and Operational Evolution
June 1, 2016
— Author: Mr Jeffrey L CatonThe development of cyberspace defense capabilities for the North Atlantic Treaty Organization (NATO) has been making steady progress since its formal introduction at the North Atlantic Council Prague Summit in 2002. Bolstered by numerous cyber attacks, such as those in Estonia (2007), Alliance priorities were formalized in...
MORE
Bridging the Planning Gap: Incorporating Cyberspace Into Operational Planning
May 4, 2015
— Colonel Martha S. H. VanDrielCyberspace operations have a far-reaching, permanent impact on military operations. At the conceptual level, the U.S. Department of Defense (DoD) now recognizes five warfighting domains: land, maritime, air, space, and cyber.1 While there are examples of how cyberspace support to military operations have advanced over...
MORE
Confidence Building in Cyberspace: A Comparison of Territorial and Weapons-Based Regimes
April 1, 2015
— Author: Dr Mary Manjikian View the Executive SummaryAn analysis of weapons-based confidence-building measures shows how academics can work together to self-police their research for national security implications, socialize new members of the academic community into the importance of considering security issues, and develop and disseminate norms...
MORE
Army Support of Military Cyberspace Operations: Joint Contexts and Global Escalation Implications
January 23, 2015
— Author: Mr Jeffrey L Caton View the Executive SummaryMilitary cyberspace operations have evolved significantly over the past 2 decades and are now emerging into the realm of military operations in the traditional domains of land, sea, and air. The goal of this monograph is to provide senior policymakers, decisionmakers, military leaders, and their...
MORE
Iran’s Emergence as a Cyber Power
August 20, 2014
— As international scrutiny remains focused on the Islamic Republic of Iran’s nuclear program, a capability is developing in the shadows inside Iran that could pose an even greater threat to the United States. The 2010 National Security Strategy discusses Iran in the context of its nuclear program, support of terrorism, its influence in regional activities, and its internal problems. There was no mention of Iran’s cyber capability or of that ability to pose a threat to U.S. interests. This is understandable, considering Iran has not been a major concern in the cyber realm. Furthermore, Russia and China’s cyber activities have justifiably garnered a majority of attention and been widely reported in the media over the past decade. Iran’s cyber capabilities have been considered third-tier at best. That is rapidly changing. This report discusses the growing cyber capability of Iran and why it poses a new threat to U.S. national interests...
MORE
Cyberterrorism after STUXNET
June 1, 2014
— Author: Dr Thomas M Chen View the Executive SummaryThe discovery of STUXNET was a recent milestone in the arena of cyber security because it was the first malware designed to cause real world damage to industrial control systems. It demonstrated that a sufficiently determined adversary might be able to cause physical damage to U.S. critical...
MORE
An Assessment of the DoD Strategy for Operating in Cyberspace
September 23, 2013
— Author: Dr Thomas M Chen View the Executive SummaryIn July 2011, the U.S. Department of Defense (DoD) issued the DoD Strategy for Operating in Cyberspace, which outlines five strategic initiatives: 1) Treat cyberspace as another operational domain; 2) Employ new defense operating concepts to protect DoD networks; 3) Partner with other U.S...
MORE
Cyber Infrastructure Protection: Vol. II
May 3, 2013
— Authors: Dr Vincent Boudreau, COL Louis H Jordan Jr, Dr Tarek N Saadawi View the Executive SummaryIncreased reliance on the Internet and other networked systems raise the risks of cyber attacks that could harm our nation’s cyber infrastructure. The cyber infrastructure encompasses a number of sectors including: the nation’s mass transit and other...
MORE
Making Strategic Sense of Cyber Power: Why the Sky Is Not Falling
April 1, 2013
— Author: Dr Colin S Gray View the Executive SummaryCyber is now recognized as an operational domain, but the theory that should explain it strategically is, for the most part, missing. It is one thing to know how to digitize; it is quite another to understand what digitization means strategically. The author maintains that, although the technical...
MORE
Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition Conference
March 4, 2013
— Dr. Robert J. BunkerThe “Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition” conference was held on November 1-2, 2012, in Pittsburgh, PA. The conference was sponsored by the Matthew B. Ridgway Center for International Security Studies, University of Pittsburgh, and the Strategic Studies Institute of the U.S. Army War...
MORE
Colloquium Brief: Cyber Infrastructure Protection
December 19, 2011
— Dr. Tarek N. Saadawi,COL Louis H. Jordan, JrA partnership between: U.S. Army War College, Strategic Studies Institute; Center of Information Networking and Telecommunications, Grove School of Engineering; Colin Powell Center for Public Policy; and City University of New...
MORE
1
2