Search
Now showing items 1-10 of 17
Analyzing the Russian Way of War: Evidence from the 2008 Conflict with Georgia
(Modern War Institute, 2018-03-20)
In the dog days of August 2008, a column of Russian tanks and troops rolled across the Republic of Georgia’s northern border and into South Ossetia, sparking a war that was over almost before it began. The war, while not ...
The Cyber Deterrence Problem
(Nato Ccd Coe, 2018-05-30)
What is the role of deterrence in an age where adept hackers can credibly hold strategic assets at risk? Do conventional frameworks of deterrence maintain their applicability and meaning against state actors in cyberspace? ...
Cyber Actions by State Actors: Motivation and Utility
(2014-05-12)
Covert action is as old as political man. The subversive manipulation of others is nothing new. It has been written about since Sun Tzu and Kautilya. People and nations have always sought the use of shadowy means to influence ...
The Most Governed Ungoverned Space: Legal and Policy Constraints on Military Operations in Cyberspace
(2016)
Winning wars in cyberspace might sound easy: the click of a mouse or the press of the enter key on a keyboard. Yet, the web of networks that constitutes cyberspace is imbued with challenges. Seemingly every day there is a ...
Back to Reality: Cross domain deterrence and cyberspace
(2018-09-01)
This paper examines cross domain deterrence strategies involving cyber incidents. By focusing on efforts to halt Russian and Chinese cyber operations against the United States this paper examines the importance of developing, ...
The Cyber Losers
(2014-05-22)
National security cyber activities harm human rights and democracy activists. With increasing state cyber capabilities comes heightened pressure on civil society and democracy activists.We often think of the cyber arms ...
Bitcoin and Cryptocurrencies
(Virginia Tech, 2018-05-18)
This panel includes three presentations: “Cryptocurrencies and Financial Crimes” by Marie Vasek; “Cryptocurrencies and Specific Drug Types” by Eric Jardine; and “Bitcoin and OPSEC for Terrorists” by Aaron Brantly. (Please ...
Conceptualizing Cyber Deterrence by Entanglement
(2018-03-01)
Dr. Brantly was invited to give one of three keynote lectures for the opening of the Cyber Governance and Policy Center at the University of Oklahoma.
Subverting Reality: The Role of Propaganda in 21st Century Intelligence
(2017-02-08)
The digital era has placed most of humanity’s knowledge within a few clicks of a computer mouse or the touches of a smart phone screen. Yet in an age where knowledge is so readily available it is also seemingly elusive. ...
When everything becomes intelligence: machine learning and the connected world
(2018-06-01)
By 2020, the number of IOT devices will surpass 20.1 billion, and these devices combined with user interactions will generate enormous data streams that will challenge analytic capabilities constrained by human faculties, ...