An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

The Cyber Defense Review

Articles

1 ... 26 27 28 29 30 31 32 33 34 35 ... 38

Clear Thinking About Protecting the Nation in the Cyber Domain*

July 31, 2018 — The key systems and networks that are colloquially referred to as cyberspace constitute a set of critical assets that enable communication, promote economic growth and prosperity, advance the cause of freedom globally, and help ensure US national security and that of our allies. At the same time, cyberspace has become a digital battleground where nation-states and their proxies, organized criminal groups, terrorists, hacktivists, and others seek to gain an advantage over one another, whether through surveillance and espionage, criminal activity, recruitment, planning, and incitement to attacks, and the repression of free speech and expression. MORE

Bridging the Cyber-Analysis Gap: The Democratization of Data Science

July 31, 2018 — The challenges of ever growing and ever changing Big Data are broad and far-reaching, particularly in the cyber-defense domain. The task of analyzing and making sense of this data is difficult, and only getting worse. We propose that by democratizing data science and making it accessible to everyone, we can expand the breadth and depth of analytics available to a point where we can potentially meet the challenges of Big Data. MORE

Book Review: Black Code: Surveillance, Privacy, and the Dark Side of the Internet

July 31, 2018 — Dr. Ronald J. Deibert’s book Black Code: Surveillance, Privacy, and the Dark Side of the Internet addresses growing concerns regarding international cyber threats and argues against current countries’ methods of responding to these threats. Deibert presents a solid, well-rounded argument, with intriguing evidence to support his assertions regarding our flawed cybersecurity environment, and closes Black Code with personal recommendations to secure and regulate the cyberspace domain. Readers receive a broad spectrum analysis of cyberspace and cybersecurity and are provided specific information on the actions and interactions of hackers, international governments, and related cyber industries. Black Code reads like a cyber novel; brilliantly crafted with a strong foundation and argument against current cybersecurity techniques and practices. Dr. Deibert is Professor of Political Science, and Director of the Citizen Lab at the Munk School of Global Affairs, University of Toronto. The Citizen Lab is described as “an interdisciplinary research and development laboratory working at the intersection of the digital technologies, global security, and human rights.” MORE

Anonymous’ Cyberwar Against ISIS and the Asymmetrical Nature of Cyber Conflicts

July 31, 2018 — Warfare in the physical world, both asymmetrical and conventional, has occurred throughout history. However, war in cyberspace is a more recent phenomenon, and there is still much to be explored and understood. Because cyberspace is inherently asymmetric, many lessons learned from asymmetric warfare in the physical world also apply to cyber conflicts. This article will examine the online battle waged by Anonymous against ISIS and analyze five asymmetrical characteristics of cyber conflicts: the vulnerability of conventionally-powerful actors to attacks from relatively weaker adversaries, the unconventional nature of offensive tactics, the low level of intensity of those tactics, the ability of actors to organize and aggressively operate in an extremely decentralized manner, and the strategic goal of breaking willpower or forcing a change of policy. Understanding the asymmetrical nature of cyber conflicts and applying appropriate lessons learned will lead to a more effective defensive posture against cyber-aggressors and facilitate a more secure operating environment in cyberspace. MORE

An Airman’s View on Deterrence and Cyberspace

July 31, 2018 — Deterrence, military strategy, and national power are taught at all our United States service academies. As a military officer, you will repeatedly study these subjects as you mature and grow into more senior positions. In this article, I would like to share with you my thoughts on deterrence, and what we have been doing to improve our ability in the Air Force to fly, fight and win–in, thru, and from cyberspace. MORE

Thinking Outside-the-Box for Cyber Defense: Introducing an Innovation Framework for the 21st Century

July 18, 2018 — ABSTRACTInnovation is critical to improving society and is key to the cyber domain. The rapid growth of the internet has meant that tools for operating in cyberspace have constantly evolved. It has often been said, however, that the only innovation taking place in cyber warfare is in offensive operations. So where is the innovation for the defense? MORE

Virtual Currency in a Cashless Society: A Potential Window into Economic Cyberwarfare

February 26, 2018 — Science and technology have been an enormous part of America’s economic success since its formation. In the modern age, innovation lends itself to cyberspace, and more specifically, to financial technology (fintech). Global trade and investment are now increasingly tied to nation-state actors, with fintech playing a massive role in this connection MORE

Stabilizing the Borderland: Confronting IO, EW and Cyber in Ukraine

December 7, 2017 — The report provides a detailed and robust look at the challenges Ukraine has faced, the perceptions of those involved in its security, defense, and education, and provides recommendations for future engagements. Our mission was to look beyond the headlines, to delve into the details, and give an unvarnished look at the utilization of cyber, EW, and IO in a hybrid conflict. MORE

Book Review: Data and Goliath: The Hidden Battles to Collect Your Data and Control your World

August 1, 2017 — We all surrender privacy in some form and fashion and allow companies to gather data so these enterprises can better serve us. Our cell phone provider needs to know where we are to route calls to the appropriate cell tower. As consumers and users, we allow the cell phone company to track and follow our moves because the convenience of being able to receive a call is greater than our perceived loss of privacy. For the last twenty years, Americans have accepted that the benefit of convenience outweighs the loss of privacy. MORE

The Cyberspace Workforce: An Array of Opportunities

May 1, 2017 — In private industry, businesses identify employment needs, create job openings, and attempt to attract talent. Likewise, the U.S. Army created the Cyber branch in a similar manner. MORE

1 ... 26 27 28 29 30 31 32 33 34 35 ... 38