Now showing items 1821-1830 of 1847
Defending the Borderland: Ukrainian Military Experiences with IO, Cyber, and EW
(Army Cyber Institute at West Point, 2017-12-01)
Ukraine is currently experiencing a conflict in two separate regions within its boundaries that challenges traditional conceptions of war, intervention, international law, and peacekeeping. The involvement of foreign ...
Subverting Reality: The Role of Propaganda in 21st Century Intelligence
The digital era has placed most of humanity’s knowledge within a few clicks of a computer mouse or the touches of a smart phone screen. Yet in an age where knowledge is so readily available it is also seemingly elusive. ...
Battling the Bear: Ukraine's Approach to National Cybersecurity
Ukraine has faced substantial challenges across multiple fronts its successful 2014 Revolution of Dignity. Among the greatest challenges Ukraine has faced is the establishment of a national cybersecurity infrastructure ...
Back to Reality: Cross domain deterrence and cyberspace
This paper examines cross domain deterrence strategies involving cyber incidents. By focusing on efforts to halt Russian and Chinese cyber operations against the United States this paper examines the importance of developing, ...
When everything becomes intelligence: machine learning and the connected world
By 2020, the number of IOT devices will surpass 20.1 billion, and these devices combined with user interactions will generate enormous data streams that will challenge analytic capabilities constrained by human faculties, ...
The Cyber Losers
National security cyber activities harm human rights and democracy activists. With increasing state cyber capabilities comes heightened pressure on civil society and democracy activists.We often think of the cyber arms ...
The Most Governed Ungoverned Space: Legal and Policy Constraints on Military Operations in Cyberspace
Winning wars in cyberspace might sound easy: the click of a mouse or the press of the enter key on a keyboard. Yet, the web of networks that constitutes cyberspace is imbued with challenges. Seemingly every day there is a ...
Assessing the Methodology for Testing Body Armor