Now showing items 1-10 of 14
The Cyber Deterrence Problem
(Nato Ccd Coe, 2018-05-30)
What is the role of deterrence in an age where adept hackers can credibly hold strategic assets at risk? Do conventional frameworks of deterrence maintain their applicability and meaning against state actors in cyberspace? ...
Cyber Actions by State Actors: Motivation and Utility
Covert action is as old as political man. The subversive manipulation of others is nothing new. It has been written about since Sun Tzu and Kautilya. People and nations have always sought the use of shadowy means to influence ...
The Most Governed Ungoverned Space: Legal and Policy Constraints on Military Operations in Cyberspace
Winning wars in cyberspace might sound easy: the click of a mouse or the press of the enter key on a keyboard. Yet, the web of networks that constitutes cyberspace is imbued with challenges. Seemingly every day there is a ...
Back to Reality: Cross domain deterrence and cyberspace
This paper examines cross domain deterrence strategies involving cyber incidents. By focusing on efforts to halt Russian and Chinese cyber operations against the United States this paper examines the importance of developing, ...
The Cyber Losers
National security cyber activities harm human rights and democracy activists. With increasing state cyber capabilities comes heightened pressure on civil society and democracy activists.We often think of the cyber arms ...
Bitcoin and Cryptocurrencies
(Virginia Tech, 2018-05-18)
This panel includes three presentations: “Cryptocurrencies and Financial Crimes” by Marie Vasek; “Cryptocurrencies and Specific Drug Types” by Eric Jardine; and “Bitcoin and OPSEC for Terrorists” by Aaron Brantly. (Please ...
Conceptualizing Cyber Deterrence by Entanglement
Dr. Brantly was invited to give one of three keynote lectures for the opening of the Cyber Governance and Policy Center at the University of Oklahoma.
Subverting Reality: The Role of Propaganda in 21st Century Intelligence
The digital era has placed most of humanity’s knowledge within a few clicks of a computer mouse or the touches of a smart phone screen. Yet in an age where knowledge is so readily available it is also seemingly elusive. ...
When everything becomes intelligence: machine learning and the connected world
By 2020, the number of IOT devices will surpass 20.1 billion, and these devices combined with user interactions will generate enormous data streams that will challenge analytic capabilities constrained by human faculties, ...
Defending the Borderland: Ukrainian Military Experiences with IO, Cyber, and EW
(Army Cyber Institute at West Point, 2017-12-01)
Ukraine is currently experiencing a conflict in two separate regions within its boundaries that challenges traditional conceptions of war, intervention, international law, and peacekeeping. The involvement of foreign ...