109 Items

An F-35A Lightning II flies above the Mojave Desert

USAF/Public Domain

Analysis & Opinions - Bulletin of the Atomic Scientists

To Enhance National Security, the Biden Administration Will Have to Trim an Exorbitant Defense Wish List

| Mar. 13, 2024

David Kearn argues that even in the absence of restrictive resource and budgetary constraints, a focus on identifying and achieving concrete objectives that will position the United States and its allies to effectively deter aggression in critical regional flashpoints should be the priority given the stressed nature of the defense industrial base and the nuclear enterprise.

teaser image

Journal Article - Journal of Cybersecurity

Rules of Engagement for Cyberspace Operations: A View From the USA

| March 2017

As cyber weapons are incorporated into US military planning, policy makers and field commanders will increasingly confront a core issue: How to formulate the rules of engagement (ROEs) for US forces with regard to military operations that may use such weapons. Michael Sulmeyer, Herbert Lin, and C. Robert Kehler address ROEs from the perspective of US military operators. 

Analysis & Opinions - Lawfare

Decoding the 2017 NDAA's Provisions on DoD Cyber Operations

| Jan. 30, 2017

Cyber Security Project Director Michael Sulmeyer and Project Affiliate Charley Snyder examine some of the most important provisions to the recently signed into law 2017 National Defense Authorization Act that the Trump Administration must grapple with during its first year in office.

Thucydides statue image

Foto: Wienwiki/Walter Maderbacher

Analysis & Opinions - Council on Foreign Relations

The Cybersecurity Dilemma: Where Thucydides Meets Cyberspace

    Author:
  • Ben Buchanan
| Jan. 30, 2017

Cyber Security Project Fellow Dr. Ben Buchanan discusses how the traditional concept of the "security dilemma" applies to conflict in cyberspace, arguing that as states play offense and defense in the digital domain, they risk tension no one wants.