Last updated: 2016-02-14. Some old JFQ links are broken due to JFQ having been moved in Q1/2014; I still need to fix the links.
Below are selected publications on (military) philosophy, policy and strategy in the digital domain. The list does not include other topics. (If you’re interested in privacy/surveillance: Snowden-documents can be found at http://cryptome.org/2013/11/snowden-tally.htm, https://www.eff.org/nsa-spying/nsadocs, and the National Security Archive at GWU at http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB436/.)
Selected NATO CCD-CoE publications are listed at the bottom. Access CCD-CoE’s Publication Library for all available publications.
I will keep this post updated. Contact me at mrkoot[at]gmail[dot]com with your suggestions, broken links, et cetera.
2016
- Beyond the Build: How the Component Command Support the U.S. Cyber Command Vision, U.S. Cyber Command Combined Action Group in JFQ-80, Jan 2016
2015
- Resiliency in Future Cyber Combat (.pdf), COL Willieam D. Bryant / USAF in SSQ Winter 2015
- Deterrence Stability in the Cyber Age (.pdf), Edward Geist in SSQ Winter 2015
- Defense Intelligence Analysis in the Age of Big Data, Paul B. Symon & Arzan Tarapore in JFQ-79, Oct 2015
- Countering Extremist Groups in Cyberspace, Robert William Schultz in JFQ-79, Oct 2015
- Strategic Development of Special Warfare in Cyberspace, Patrick Michael Duggan in JFQ-79, Oct 2015
- One Size Does Not Fit All: The Multifaceted Nature of Cyber Statecraft, Andrea Little Limbago in JFQ-78, Jul 2015
- Detangling the Web: A Screenshot of U.S. Government Cyber Activity, G. Alexander Crowther & Shaheen Ghori in JFQ-78, Jul 2015
- Why International Order in Cyberspace is Not Inevitable (.pdf), Brian M. Mazanec in SSQ Summer 2015
- On the Future Order in Cyberspace (.pdf), Christopher Whyte in SSQ Summer 2015
- Deterring Malicious Behavior in Cyber Space (.pdf), Scott Jasper in SSQ Spring 2015
- Power and Predation in Cyberspace (.pdf), Christopher Whyte in SSQ Spring 2015
- Rethinking the Cyber Domain and Deterrence, Dorothy E. Denning in JFQ-77, Apr 2015
- A Theater-Level Perspective on Cyber, J. Marcus Hicks in JFQ-76, Jan 2015
2014
- Structural Causes and Cyber Effects: Why International Order is Not Inevitable in Cyberspace (.pdf), James Wood Forsyth Jr. and Major Billy E. Pope (USAF) in SSQ Winter 2014
- Offensive Cyber Operations in US Military Doctrine, Steven Aftergood, FAS, October 2014
- Cyber Security as a Field of Military Education and Study, Eneken Tikk-Ringas, Mika Kerttunen, and Christopher Spirito in JFQ-75, Oct 2014
- Determining Hostile Intent in Cyberspace, Ramberto A. Torruella, Jr. in JFQ-75, Oct 2014
- The Limits of Cyberspace Deterrence, Clorinda Trujillo in JFQ-75, Oct 2014
- Cybersecurity, Terrorism, and Beyond: Addressing Evolving Threats to the Homeland, US Senate Committee on Homeland Security and Governmental Affairs (HSGAC) Hearings, September 2014
- Cyber Power in 21st-Century Joint Warfare, E. Lincoln Bonner III in JFQ-74, Jul 2014
- The Strategic Significance of the Internet Commons (.pdf), Michael Chertoff in SSQ Summer 2014
- China’s Military Modernization and Cyber Activities (.pdf), testimony of Dr. Larry M. Wortzel before the House Armed Services Committee, SSQ Summer 2014
- Why Cyber War Will Not and Should Not Have Its Grand Strategist (.pdf), Martin C. Libicki, SSQ Summer 2014
- Toward Attaining Cyber Dominance (.pdf), Martin R. Stytz & Sheila B. Banks, SSQ Summer 2014
- Act and Actor Attribution in Cyberspace – A Proposed Analytic Framework (.pdf), Col. Eric F. Mejia / USAF, SSQ Summer 2014
- Semantics Matter: NATO, Cyberspace and Future Threats (.pdf), Christine Hegenbart, NATO Defense College
- The Joint Force Commander’s Guide to Cyberspace Operations (.pdf) (web) [RECOMMENDED READ], Maj.Gen. Brett T. Williams (USAF/CYBERCOM), JFQ-73
- Achieving Accountability in Cyberspace – Revolution or Evolution? (.pdf), Maj.Gen. John N.T. Shanahan (USAF; Commander of a USAF ISR Agency), JFQ-73
- Information-Sharing with the Private Sector (.pdf), Veronica A. Chinn, Lee T. Furches, and Barian A. Woodward, JFQ-73
2013
- The Cyberspace Operations Planner, Jason M. Bender, Small Wars Journal, November 5th 2013
- Combat Identification in Cyberspace, Robert Zager and John Zager, Small Wars Journal, August 25th 2013
- Bandwidth Cascades: Escalation and Pathogen Models for Cyber Conflict Diffusion, James D. Fielder, Small Wars Journal, June 19th 2013
- The International Community Must Hold Russia Accountable for Its Cyber Militias, Casimir C. Carey III, Small Wars Journal, March 27th 2013
- What Great Powers Make It: International Order and the Logic of Cooperation in Cyberspace (.pdf), James Wood Forsyth Jr., SSQ Spring 2013
- Four Core Questions for U.S. Cyberattack Guidance (.pdf), Col. Jonathan C. Rice IV / USAF, March 2013
- Welcome to the Malware-Industrial Complex, Tom Simonite, MIT Technology Review, February 13th 2013
- Cyber Warfare and Deterrence: Trends and Challenges in Research, Amir Lupovici (INSS), i-HLS, February 1st 2013
- Cyber Operations: Bridging from Concept to Cyber Superiority, Jan Kallberg and Bhavani Thuraisingham, JFQ-68, January 2013
2012
- Virtual Patriots and a New American Cyber Strategy: Changing the Zero-Sum Game (.pdf), Matthew Crosston, SSQ Winter 2012 (perspectives)
- Industry’s Vital Role in National Cyber Security (.pdf), James P. Farwell, SSQ Winter 2012 (feature)
- On the Spectrum of Cyberspace Operations, Gary D. Brown and Owen W. Tullos, December 2012, Small Wars Journal
- Why Your Intuition About Cyber Warfare is Probably Wrong, Matthew Miller, Jon Brickey and Gregory Conti, Small Wars Journal, November 2012
- Stuxnet, Schmitt Analysis, and the Cyber “Use of Force” Debate, Andrew C. Foltz, JFQ-67, October 2012
- Cyber Warfare: Critical Perspectives – NL ARMS 2012, P. Ducheine, F. Osinga, and J. Soeters (eds.), The Hague: TMC Asser Press, 2012
- The Case for Cyber, Jon Brickey, Jacob Cox, John Nelson and Gregory Conti, Small Wars Journal, September 2012
- Deterrence and Escalation in Cross-domain Operations: Where Do Space and Cyberspace Fit? (.pdf), Vincent Manzo, JFQ66, August 2012 (Forum)
- Shadow Boxing: Cyber Warfare and Strategic Economic Attack, Soren Olson, JFQ66, August 2012 (Forum)
- Offensive Cyber for the Joint Force Commander: It’s Not That Different, Rosemary M. Carter, Brent Feick, and Roy C. Undersander, JFQ66, August 2012 (Forum)
- Sharing the Cyber Journey (.pdf), Suzanne M. Vautrinot (USAF), SSQ Fall 2012 (perspectives)
- Internet Governance and National Security (.pdf), Panayotis A. Yannakogeorgos, SSQ Fall 2012 (perspectives)
- Escalation Dynamics and Conflict Termination in Cyberspace (.pdf), Herbert Lin, SSQ Fall 2012 (perspectives)
- Depleted Trust in the Cyber Commons (.pdf), Roger Hurwitz, SSQ Fall 2012 (perspectives)
- The Customary International Law of Cyberspace (.pdf), Gary Brown (USAF) and Keira Poellet (USAF), SSQ Fall 2012 (perspectives)
- Claiming the Lost Cyber Heritage (.pdf), Jason Healey (CSIAC), SSQ Fall 2012 (commentary)
- Defining Cyberterrorism: Capturing a Broad Range of Activities in Cyberspace, Jonalan Brickey, CTC Sentinel, August 23rd 2012
- DoD Cyber Range – Open and Ready for Customers, Neil Gaudreau and Jeffrey Combs, CHIPS Articles, July-September 2012
- Offensive Cyber for the Joint Force Commander: It’s Not That Different, Rosemary M. Carter, Brent Feick, and Roy C. Undersander, JFQ-66, July 2012
- Shadow Boxing: Cyber Warfare and Strategic Economic Attack, Soren Olson, JFQ-66, July 2012
- Deterrence and Escalation in Cross-domain Operations: Where Do Space and Cyberspace Fit?, Vincent Manzo, , JFQ-66, July 2012
- Dutch MoD’s Defense Cyber Strategy (NL->UK translation), Matthijs R. Koot, July 18th 2012
- PacNet #41A – A Plea for an Alliance-Based ‘AirSeaCyber’ Joint Operational Concept, July 16th 2012, Harry J. Kazianis
- Putting the “war” in cyberwar: Metaphor, analogy, and cybersecurity discourse in the U.S., July 2nd 2012, Steven Lawson
- Dutch Military Intelligence Dives into Cyber, May 22nd 2012, Don Eijndhoven
- ENISA report: “National Cyber Security Strategies” (.pdf), May 2012, ENISA
- Military officials push to elevate cyber unit to full combatant command status (news article), The Washington Post, May 2nd 2012
- Cybersecurity: Authoritative Reports and Resources (.pdf), Rita Tehan, U.S. Congressional Research Service, April 26th 2012
- Dutch AIV/CAVV Council’s Advice on CYBER WARFARE – No 77, AIV/No 22, CAVV (.pdf), December 2011 (English translation published April 26th 2012)
- Sailing the Cyber Sea (also available as .pdf), James G. Stavridis and Elton C. Parker, JFQ-65, April 2012
- NATO Rapid Reaction Team to fight cyber attack, NATO, March 13th 2012
- NATO Announces Largest-Ever Cyber Warfare Spending, NATO, March 8th 2012
- NATO’s Cyber Capabilities: Yesterday, Today, and Tomorrow, Jason Healey and Leendert van Bochoven, ACUS, February 2012
- Designer Satellite Collisions from Covert Cyber War (.pdf), Jan Kallberg, SSQ Spring 2012
- Cyber-Weapons (.pdf) Thomas Rid and Peter McBurney, The RUSI Journal 157:1 6-13, February 29th 2012
- Intelligence Leaders Urge Congress to Act on Cyber Laws, Lisa Daniel, American Forces Press Service, February 2012
- Cyber weapons growing concern in hyper connected world, experts say, Steven Beardsley, Stars and Stripes, February 2012
- Disagreements on cyber risk East-West “Cold War”, Peter Apps, Reuters, February 2012
- Defense Bill Approves Offensive Cyber Warfare, J. Nicholas Hoover, Information Week Government, January 2012
- Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy (.pdf), Jerry Brito and Tate Watkins, Harvard NatSec Journal, 2012
2011
- Dutch Council on Int’l Affairs’ Advise On Digital Warfare (.pdf), Dutch Council on Int’l Affairs, December 2011 (in Dutch; here is an unauthorized translation to English)
- The Jester Dynamic: A Lesson in Asymmetric, Unmanaged Cyber Warfare (.pdf), TJ OConnor, December 2011
- Joint Targeting in Cyberspace (.pdf), Maj Steven J. Smart (USAF), Air and Space Power Journal 2011-4, Winter 2011
- Can It Really Work? Problems with Extending EINSTEIN 3 to Critical Infrastructure (.pdf), Steven M. Bellovin, Scott O. Bradner, Whitfield Diffie, Susan Landau, and Jennifer Rexford, Harvard NatSec Journal 3:1, ? 2011
- Demystifying the Title 10-Title 50 Debate: Distinguishing Military Operations, Intelligence Activities & Covert Action (.pdf), Andru E. Wall, Harvard NatSec Journal 3:1, ? 2011
- Nuclear Lessons for Cyber Security? (.pdf), Joseph S. Nye Jr., SSQ Winter 2011
- NDAA Section 934 – US DoD Cyberspace Policy Report (.pdf), US DoD, November 2011
- There is no cyber war the same way there is no nuclear war, Richard Stiennon, Forbes, November 3rd, 2011
- Arms control in the fifth domain, Charlemagne, The Economist, October 2011
- Estonia: Cyber Window into the Future of NATO, Häly Laasme, JFQ-63, October 2011
- Stuxnet and Strategy: A Space Operation in Cyberspace, Lukas Milevski, JFQ-63, October 2011
- Why Iran Didn’t Admit Stuxnet Was an Attack, Gary D. Brown, JFQ-63, October 2011
- Protecting Against Predatory Practice (.pdf), CrossTalk special issue, Sep/Oct 2011
- The Wrong War: The Insistence on Applying Cold War Metaphors to Cybersecurity Is Misplaced and Counterproductive, Peter W. Singer and Noah Shachtman, Brookings, August 2011
- US GAO: “DOD Faces Challenges In Its Cyber Activities” (.pdf), US GAO, July 2011
- DoD Cyber Plan – A Rare (Theoretical) Policy Home Run, Steven Bucci, Security Debrief, July 2011
- US DoD Strategy for Operating in Cyberspace (.pdf), US DoD, July 2011
- Cyber Weapons: The New Arms Race, Michael Riley and Ashlee Vance, Business Week, June 2011
- Cyber Doctrine – Towards a coherent evolutionary framework for learning resilience (.pdf), JP MacIntosh, J Reid and LR Tyler, June 2011
- Building a New Command in Cyberspace (.pdf), GEN Keith B. Alexander, USA, SSQ Summer 2011
- Deciphering Cyberpower: Strategic Purpose in Peace and War (.pdf), John B. Sheldon, SSQ Summer 2011
- Nine Deadly Cyberwarfare Sins, Jesus Oquendo, Infosec Island, May 2011
- The Developing Legal Framework for Defensive and Offensive Cyber Operations (.pdf), Steven G. Bradbury, Harvard NatSec Journal, March 16th, 2011 April 18th 2011
- Establishing a Framework for Intelligence Education and Training, Rebecca L. Frerichs and Stephen R. Di Rienzo, JFQ-62, April 2011
- Untangling Attribution (.pdf), David D. Clark and Susan Landau, Harvard NatSec Journal, March 16th, 2011
- Rise of a Cybered Westphalian Age (.pdf), Chris C. Demchak and Peter Dombrowski, SSQ Spring 2011
- The Future of Things “Cyber” (.pdf), Gen Michael V. Hayden, USAF, Retired , SSQ Spring 2011
- Retaliatory Deterrence in Cyberspace (.pdf), Eric Sterner, SSQ Spring 2011
- Perspectives for Cyber Strategists on Law for Cyberwar (.pdf), Maj Gen Charles J. Dunlap Jr., USAF, Retired, SSQ Spring 2011
- World Gone Cyber MAD: How “Mutually Assured Debilitation” Is the Best Hope for Cyber Deterrence (.pdf), Matthew D. Crosston, SSQ Spring 2011
- Nuclear Crisis Management and “Cyberwar”: Phishing for Trouble? (.pdf), Stephen J. Cimbala, SSQ Spring 2011
- Cyberwar as a Confidence Game (.pdf), Martin C. Libicki, SSQ Spring 2011
- Blown to Bits: China’s War in Cyberspace, August-September 2020 (.pdf), Christopher Bronk, SSQ Spring 2011
- Cyberdeterrence between Nation-States: Plausible Strategy or a Pipe Dream? (.pdf), Jonathan Solomon, SSQ Spring 2011
- Mastering the Art of Wiki: Understanding Social Networking and National Security, James Jay Carafano, JFQ-61, January 2011
- Chinese Views on Deterrence, Dean Cheng, JFQ-61, January 2011
2010
- What U.S. Cyber Command Must Do, Wesley R. Andrues, JFQ-59, October 2010
- Cyber Deterrence: Tougher in Theory than in Practice? (.pdf), Will Goodman, SSQ Fall 2010
- War in the fifth domain, The Economist, July 2010
- Cyberwar is fiction, Robert David Graham, Errata Security, June 2010
- Cybersecurity and National Policy (.pdf), Dan Geer, Harvard NatSec Journal, April 7th, 2010
- Cyber Vision and Cyber Force Development (.pdf), Kamal Jabbour, SSQ Spring 2010
- Article 5 and the Strategic Concept (.pdf), Maria Mälksoom, ICDS, remarks at the NATO Defense College Conference, March 2nd 2010 – and slides (.pdf)
2009
- When Is Deterrence Necessary? Gauging Adversary Intent (.pdf), Gary Schaub Jr., SSQ Winter 2009
- The Virtual Battlefield: Perspectives on Cyber Warfare ($), C. Czosseck and K. Geers, October 2009
- The Monroe Doctrine in Cyberspace (.pdf), testimony by Mary Ann Davidson, March 2009
- Policy and Purpose: The Economy of Deterrence (.pdf), Gen Norton A. Schwartz, USAF, Lt Col Timothy R. Kirk, USAF, SSQ Spring 2009
2008
- USAF Cyberspace Command: To Fly and Fight in Cyberspace (.pdf), Maj Gen William T. Lord, USAF, SSQ Fall 2008
2007
- Air, Space, and Cyberspace Power for the Future? (.pdf), Lt Gen Stephen R. Lorenz, USAF, SSQ Winter 2007
- Flying and Fighting in Cyberspace (.pdf), Lt. Col. Sebastian M. Convertino II (USAF), Lou Anne DeMattei (DIA), Lt. Col. Tammy M. Knierim (USAF), Air War College / Air University, July 2007
2001
- Principles of Cyber-warfare (.pdf), Raymond C. Parks and David P. Duggan, Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, 5-6 June, 2001
NATO CCD-CoE
- Proceedings of the 7th NATO CCD-COE Conference 2015 (videos/slides, proceedings, gallery), May 2015
- Proceedings of the 6th NATO CCD-COE Conference 2014 (videos/slides, proceedings, gallery), Apr 2014
- Peacetime Regime for State Activities in Cyberspace, December 2013
- Proceedings of the 5th NATO CCD-COE Conference 2013 (videos/slides, proceedings), May 2013
- Tallinn Manual on the International Law Applicable to Cyber Warfare, March 2013
- National Cyber Security Framework Manual (.pdf), December 2012
- Proceedings of the 4th NATO CCD-COE Conference 2012 (videos/slides, proceedings), May 2012
- Proceedings of the 3rd NATO CCD-COE Conference 2011 (.pdf), June 2011
- Proceedings of the 2nd NATO CCD-COE Conference 2010, June 2010
- NATO CCD-CoE International Cyber Security Legal & Policy Proceedings 2010, June 2010
- Proceedings of the 1st NATO CCD-COE Conference 2009, June 2009
Cyber Glossaries
- SANS Glossary of Security Terms
- National Information Assurance Glossary (.pdf), Committee on National Security Systems (CNSS), April 2010
EOF