As Army Cyber Command shifts toward teaching information warfare, the cyber school is figuring out how to make the transition.
Being a Russia scholar interested in how artificial intelligence (AI) will influence international security and warfare, you often feel like the Jan Brady of the Bunch.
Cyber and intelligence experts unite to battle disinformation as character of warfare changes
This brief is part three of a three-part series. It outlines the stages in a social media kill chain for analyzing and mitigating the efforts of Advanced Persistent Manipulators.
Britain hosted a meeting of senior security ministers from the U.S.-led ‘Five Eyes’ intelligence alliance on Monday for talks on tackling cyber threats ranging from political hacking to child pornography.
Economic cyber intrusions are unlikely to violate international law – and that means “offensive” operations in response may be unlawful.
Non-governmental entities have an important role to play in the complex task of attributing cyber operations.
The U.S. Air Force claims to have the best intelligence, surveillance, and reconnaissance (ISR) force in the world, and a plan to enhance decisive advantage amidst great power competition.
Jim Miller and Neal Pollard offer an important and positive assessment of the strategy of persistent engagement. Here, the authors engage their perspective on how to describe cyber activity short of armed conflict.