Skip to main content

apollo111 Favorites

apollo111 Favorites


Show sorted alphabetically
Show sorted alphabetically
SHOW DETAILS
up-solid down-solid
eye
Title
Date Favorited
Creator
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 26
favorite 0
comment 0
Air Force interest in pursuing a solution to telemetry through a plasma sheath has been renewed recently since the resulting methodology may dictate some hypersonic vehicle design requirements. (Note that the United States Air Force began researching solutions to telemetry through reentry plasma layers in 1959.) The design of a hypersonic vehicle is a complex series of trade-offs between highly coupled systems, including, but not limited to, propulsion, control, volumetric, payload, fuel,...
Topics: DTIC Archive, Starkey, Ryan P, MARYLAND UNIV COLLEGE PARK DEPT OF AEROSPACE ENGINEERING, *SPACE...
Defense Technical Information Archive
texts
eye 15
favorite 0
comment 0
The main task of an air data system, namely to deduce from measurement on the body the aerodynamic free stream conditions will be outlined. Emphasis will also be given to the limitations of aerodynamic systems. A short review of the aerodynamic probe functions relating measured quantities to the desired free stream conditions and vehicle orientation will be given. After explaining the principle elements of an air data system the design of individual components will be outlined. The design of an...
Topics: DTIC Archive, Koppenwallner, Georg, HTG HYPERSCHALL TECHNOLOGY GOETTINGEN (GERMANY), *HYPERSONIC...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 56
favorite 2
comment 0
Hypersonic flight test applies to suborbital, space transit, and space access vehicles. Recent programs are being initiated by the US Air Force, Defense Advanced Research Programs Agency (DARPA), NASA, and commercial companies. The USAF and DARPA are pursuing technologies to meet the objectives of the High Speed Strike Weapon program. DARPA is also looking for new ways to satisfy the goal of Operationally Responsive Space; a means of inserting a payload into orbit in hours instead of months at...
Topics: DTIC Archive, AIR FORCE TEST CENTER EDWARDS AFB CA, *HYPERSONIC FLIGHT, *HYPERSONIC VEHICLES,...
Books to Borrow
by Burnam, Tom
texts
eye 50
favorite 4
comment 0
Topic: Common fallacies
National Intelligence University Publications
National Intelligence University Publications
collection
46
ITEMS
16,703
VIEWS
collection
eye 16,703
Publications from the National Intelligence University, operated by the DIA. The files were originally collected and bulk uploaded by Joshua Smith.
Topic: DIA, NIU, Intelligence, Tradecraft, National Intelligence University
-
search
favorite 0
National Intelligence University Publications
by National Intelligence University; DIA
texts
eye 450
favorite 0
comment 0
Critical Analysis and the Intelligence Profession
Topics: National Intelligence University, NIU, DIA, Defense Intelligence Agency, Defence Intelligence...
National Intelligence University Publications
by National Intelligence University; DIA
texts
eye 295
favorite 0
comment 0
Critical Analysis and the Intelligence Profession
Topics: National Intelligence University, NIU, DIA, Defense Intelligence Agency, Defence Intelligence...
National Intelligence University Publications
by National Intelligence University; DIA
texts
eye 826
favorite 3
comment 0
Critical Analysis and the Intelligence Profession
Topics: National Intelligence University, NIU, DIA, Defense Intelligence Agency, Defence Intelligence...
Books to Borrow
by Barnett, Frank R; Lord, Carnes
texts
eye 65
favorite 4
comment 0
Includes bibliographies and index
Topic: Psychological warfare
US National Library of Medicine
by Linebarger, Paul Myron Anthony, 1913-1966, author
texts
eye 984
favorite 10
comment 0
45 pages : 26 cm
Topics: Psychological Warfare, Propaganda, Military Science, United States
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 48
favorite 0
comment 0
Hybrid warfare will be the dominant form of warfare in the 21st century due to the prevalence of hybrid threats that currently exist throughout the world. A combination of conventional and irregular warfighting capabilities, hybrid warfare is the 21st century kind of warfare with its own limiting conditions and its own peculiar preconceptions. It is critical for the Department of Defense to determine the strategic implications of hybrid warfare on the National Military Strategy and the way that...
Topics: DTIC Archive, ARMY WAR COLL CARLISLE BARRACKS PA, *CONVENTIONAL WARFARE, *MILITARY DOCTRINE,...
This paper reports on the ongoing international project "System architecture for ICALL" and the progress made by the Swedish partner. The Swedish team is developing a web-based exercise generator reusing available annotated corpora and lexical resources. Apart from the technical issues like implementation of the user interface and the underlying processing machinery, a number of interesting pedagogical questions need to be solved, e.g., adapting learner-oriented exercises to...
Topics: ERIC Archive, Foreign Countries, Swedish, Open Source Technology, Web Based Instruction, Learning...
Books to Borrow
by Hyde, Margaret O. (Margaret Oldroyd), 1917-2013
texts
eye 112
favorite 8
comment 0
147 pages ; 21 cm
Topics: Brainwashing, Control (Psychology), Lavage de cerveau, Contrôle (Psychologie), Behavior,...
Books to Borrow
texts
eye 123
favorite 12
comment 0
xviii, 338 p. : 24 cm +
Topics: Brainwashing, Deprogramming, Control (Psychology), Thought and thinking
Community Texts
by William Sargant
texts
eye 486
favorite 10
comment 0
The sinister ways of mind control and brainwashing
Topics: Mindcontrol, Brainwashing
Community Texts
by christopher hadnagy
texts
eye 765
favorite 7
comment 0
this book is about how to use social psychology to manipulate people into giving up private information.
Topics: social engineering, psychology, manipulation, psychological warfare, mind control, brainwashing
Books to Borrow
by Goldstein, Frank L., 1945- edt;Findley, Benjamin F. edt
texts
eye 48
favorite 6
comment 0
At head of t.p.: AU Shield
Topics: Psychological warfare, Psychological warfare, Psychological warfare, vojaška psiholiogija...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 26
favorite 1
comment 0
Space capabilities are vital to United States national power, commerce, science, and prestige. These capabilities will grow even more vital to the United States and the global economy by 2035. What will the space technology and operating environment look like in 2035? Technology trends in two fundamental areas -- spacecraft and space transportation -- indicate space technologies, capabilities, products, and services will become far more affordable, ubiquitous, globally available, and...
Topics: DTIC Archive, Buck,Darren J, Air War College Air University Maxwell AFB United States, space...
There is no crystal ball unveiling the future with perfect accuracy. The USAF must prepare for uncertainty; but it is certain that the future requires global strike capabilities. Effective global strike requires accurate targeting information. Surveillance and reconnaissance conducted in air, space, and cyberspace is the best way to gain this information and turn it into knowledge; all three domains are important, and all are required. In light of increasing technologic change, and fiscal...
Topics: DTIC Archive, Lee,Douglas J, Air War College Maxwell AFB United States, surveillance, measurement...
The attached visual illustrates the impressive nature of Americas 21st Century globally networked Joint Force. From bases in the United States, Airmen fly MQ-1 Predator, MQ-9 Reaper and RQ-4 Global Hawk Remotely Piloted Aircraft (RPA) over hostile battlefields in distant lands. The platforms collect vast quantities of information that are streamed back to Distributed Common Ground System (DCGS) intelligence centers located around the world. DCGS Airmen identify threats and relay vital...
Topics: DTIC Archive, Downs,Michael L, Air War College Air University Maxwell AFB United States, airborne...
This paper provides an argument for the U.S. Air Force to invest in a robust space-based Intelligence, Surveillance, and Reconnaissance (ISR) architecture to support Global Strike in 2035. The detailed investigation provides recommends on future technologies the Air Force can pursue, which will provide relevant space-based ISR capabilities in a congested, contested, and competitive space environment. As these technologies progress and enable continuous space-based ISR collection in the...
Topics: DTIC Archive, Stuger,Shaun R, Air War College Maxwell AFB United States, air force personnel, Space...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 15
favorite 1
comment 0
This paper explores the feasibility of hypersonic weapons and aircraft as global strike options in the 2035 timeframe. The paper proposes there are currently two limitations or gaps in U.S. prompt global strike capabilities; timeliness, and increasingly the ability to gain access to the highly-defended target area. Additionally, the USAF has a long history of using advanced technology to stay ahead of the threat defense systems and gaining access to target sets, and by 2035, anti-access and...
Topics: DTIC Archive, Letsinger,Jonathan M, Air War College Maxwell Air Force Base United States,...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 23
favorite 1
comment 0
This paper examines global strike, a core Air Force capacity to quickly and precisely attack any target anywhere, anytime, from a cyber perspective. Properly used, cyberspace capabilities can significantly enhance Air Force (AF) capabilities to provide the nation the capacity to influence the strategic behavior of existing and potential adversaries.This paper argues that the AF must improve both the quantity and quality of its cyberspace operations force, by treating cyber warfare capabilities...
Topics: DTIC Archive, Clothier,Dean A, Air War College Air University Maxwell AFB United States, military...
Defense Technical Information Archive
texts
eye 12
favorite 1
comment 0
Legal practitioners must rely on current international law and norms to address the legalities of injurious cyber operations conducted by one State against another State.1 Cyber operations can be surprising and debilitating especially if States conduct such operations against U.S. armed forces. With its focus on defensive operations, the U.S. military appears to be less prepared to act offensively. In Cyber War, Richard A. Clarke and Robert K. Knake wrote there is no conventional military force...
Topics: DTIC Archive, Williams,Ja Rai A, Air Command and Staff College, Air University Maxwell Air Force...
Community Texts
texts
eye 43
favorite 2
comment 0
Internal 2018 FBI documents which evaluate what the Bureau thought were our primary domestic and international terrorism threats (22pp).
Topics: White Nationalists, Black Identity Extremists
In March of 2016, the Air Force released an operating concept for the Combat Cloud, defined as ...an overarching meshed network for data distribution and information sharing within a battlespace, where each authorized user, platform, or node transparently contributes and receives essential information and is able to utilize it across the full range of military operations. The Combat Cloud represents the intellectual construct necessary to unify Air Force and Department of Defense efforts in...
Topics: DTIC Archive, Kiser, Aaron, AIR COMMAND AND STAFF COLL MAXWELL AFB AL MAXWELL AFB United States,...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 44
favorite 1
comment 0
The Russian experience with irregular warfare runs deep. Russian forces used irregular warfare to defeat Napoleons army in 1812. Russia conquered vast territory in the latter half of the 19th century, defeating irregulars with impressive economy of force. The Soviets employed partisan guerrillas with increasing skill during the Bolshevik Revolution and the Great Patriotic War. In Afghanistan, the Soviets avoided a Vietnam-like collapse while employing irregular tactics fighting against the...
Topics: DTIC Archive, Hargrove,Paul, Naval Postgraduate School Monterey United States, military history,...
-
search
favorite 0
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 38
favorite 0
comment 0
The evolution of war and warfare types has transcended all cultures and nations alike. Through this strategic research paper I will shed some light on how a few of these cultures see the enemy (The evil United States) through their lenses. I will address how war has evolved to its current form and the strategic level considerations to combat and defend against an enemy willing to go to any lengths to destroy and terrorize the infidels (again the US and her allies). We will explore various...
Topics: DTIC Archive, ARMY WAR COLL CARLISLE BARRACKS PA, *UNCONVENTIONAL WARFARE, *CULTURE,...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 42
favorite 0
comment 0
Briefing on designing war games for 21st century conflict.
Topics: DTIC Archive, CENTER FOR NAVAL ANALYSES ALEXANDRIA VA, *WAR GAMES, *UNCONVENTIONAL WARFARE,...
38pg
Topics: INDUSTRIAL ELECTRONICS, PRACTICAL, AMPLIFIERS, HANDBOOK, INVENTORS, DICTIONARY, ANALOG, DIGITAL,...
Books to Borrow
by Time-Life Books
texts
eye 73
favorite 4
comment 0
Bibliography: p. 122-124
Topics: Artificial intelligence, Machine learning
-
search
favorite 0
Books to Borrow
texts
eye 22
favorite 1
comment 0
xvii, 269 pages : 24 cm
Topics: Computer networks -- Security measures, Computer security, Artificial intelligence, Machine...
Books to Borrow
by Amoroso, Edward G
texts
eye 199
favorite 2
comment 0
Includes bibliographical references (p. 357-387) and index
Topic: Computer security
Defense Technical Information Archive
texts
eye 27
favorite 2
comment 0
This second iteration of the Blue Horizons study, commissioned by the USAF chief of staff, provides ?a new look at the future.? Its original purpose was to develop a prioritized list of concepts and their key enabling technologies the USAF would need to maintain dominance in air, space, and cyberspace to the year 2030. In addition, the study examined whether the USAF could leverage a targeted investment today to position itself to address a broad set of possible challenges over the next 20?30...
Topics: DTIC Archive, AIR WAR COLL MAXWELL AFB AL CENTER FOR STRATEGY AND TECHNOLOGY, *AIR FORCE, *SPACE...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 31
favorite 0
comment 0
The 2011 Air Force (AF) Science and Technology (S&T) Plan contains AFRL's response to the 2010 Air Force S&T Strategy. The plan contains S&T focus areas as well as objectives for each of the S&T strategy priorities.
Topics: DTIC Archive, AIR FORCE RESEARCH LAB WRIGHT-PATTERSON AFB OH, *AIR FORCE RESEARCH, PLANNING,...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 14
favorite 0
comment 0
The Air Force's technological advantage is threatened by the worldwide proliferation of advanced technologies, including integrated air defenses, long-range ballistic missiles, and advanced air combat capabilities. In addition, advances in adversarial capabilities in space control and cyber warfare technologies may limit Air Force operations in air, space, and cyberspace. Some of these technologies may be achievable at relatively minimal cost, resulting in lowering the barriers to entry that...
Topics: DTIC Archive, AIR FORCE RESEARCH LAB WRIGHT-PATTERSON AFB OH, *AERIAL WARFARE, *AIR FORCE RESEARCH,...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 26
favorite 0
comment 0
The United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent utilizing cyber capabilities in combination with all of their military and intelligence capabilities (a full spectrum adversary). While this is also true for others (e.g. Allies, rivals, and public/private networks), this Task Force strongly believes the DoD needs to take the lead and build an effective response to measurably...
Topics: DTIC Archive, DEFENSE SCIENCE BOARD WASHINGTON DC, *COMPUTER NETWORKS, *DEPARTMENT OF DEFENSE,...
Books to Borrow
texts
eye 2
favorite 1
comment 0
volumes : 26 cm
Topics: Medical jurisprudence -- Periodicals, Forensic sciences -- Periodicals, Médecine légale --...
Books to Borrow
texts
eye 49
favorite 4
comment 0
xvii, 327 pages : 24 cm
Topics: Gerechtelijke psychiatrie, Stalking, Crime Victims -- psychology, Social Behavior Disorders --...
Understanding space and how America plans to use it in the new millennium has captured the attention of our national leadership. Each branch of service within the military has discovered the tremendous warfighting potential of space. Such realization has fired intense doctrinal debates as well as fiscal competition for dwindling resources under the umbrella of this new frontier. These emerging debates and the bottom-line budget battles have brought an entirely new dimension to our national...
Topics: DTIC Archive, Carey, Steven D, RAND CORP SANTA MONICA CA, *SPACE SYSTEMS, *AEROSPACE ENVIRONMENTS,...
In the summer of 1995 the Air Force chief of staff tasked Air University to conduct a year-long study Air Force 2025 to generate ideas and concepts on the capabilities the United States will require to possess the dominant air and space forces in the future, detail.....new or high-leverage concepts for employing air and space power detail....the technologies required to enable the capabilities envisioned. To support this goal an operational analysis was conducted to identify high-value system...
Topics: DTIC Archive, Jackson, Jack A , Jr, AIR COMMAND AND STAFF COLL MAXWELL AFB AL, *SPACE SYSTEMS,...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 26
favorite 2
comment 0
In the summer of 1995 the Air Force chief of staff tasked Air University to do a year-long study, 2025, to "generate ideas and concepts on the capabilities the United States will require to possess the dominant air and space forces in the future ,TO detail. . . new or high-leverage concepts for employing air and space power I, and to detail . . . the technologies required to enable the capabilities envisioned." To support this goal a 2025 study team conducted an operational analysis...
Topics: DTIC Archive, Jackson, Jack A., Jr., AIR UNIV MAXWELL AFB AL, *SPACE SYSTEMS, *AIR FORCE PLANNING,...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 10
favorite 0
comment 0
The primary goals of the CERT Program are to ensure that appropriate technology and systems management practices are used to resist attacks on networked systems and to limit damage and ensure continuity of critical services in spite of attacks, accidents, or failures. CERT is part of the Software Engineering Institute (SEI), a federally funded research and development center (FFRDC) sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI advances software...
Topics: DTIC Archive, CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST, *COMPUTER NETWORK...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 28
favorite 0
comment 0
This book is intended to address important issues in the security and protection of information systems and network infrastructure. This includes the strategic implications of the potential failure of our critical network and information systems infrastructure; identifying critical infrastructure networks and services; analysis and risk assessment of current network and information systems infrastructure; classification of network infrastructure attacks; automating the management of...
Topics: DTIC Archive, ARMY WAR COLL STRATEGIC STUDIES INST CARLISLE BARRACKS PA, *INFORMATION SECURITY,...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 12
favorite 0
comment 0
The dynamic nature of the cyberspace environment presents opportunities for both attackers and defenders to conduct complex cyber operations in serial or parallel across multiple networks and systems. Defensive operators must be vigilant to identify new attack vectors, real-time attacks as they happen, and signs of attacks that have gotten through the security perimeter. This means that defenders must continuously sift through vast amounts of sensor data that could be made more efficient with...
Topics: DTIC Archive, AIR FORCE RESEARCH LAB ROME NY INFORMATION DIRECTORATE, *CYBERWARFARE, *DATA MINING,...
Naval Postgraduate School
texts
eye 58
favorite 1
comment 0
When faced with any type of irregular warfare, technology integration has proved to be problematic for developed countries with technologically advanced militaries. Developed countries train and equip their militaries and develop military doctrines that tend to focus on protection from other developed countries. Thus, these military agencies are well prepared for conventional warfare and assume they can use the same operational concepts against irregular adversaries as well. Unfortunately, this...
Topics: Technology strategy, irregular warfare, unconventional warfare, high-tech, low-tech, special...
Naval Postgraduate School
by Deterding, Stephen L.; Safko, Blake
texts
eye 122
favorite 2
comment 0
Experts have been predicting the onset of cyber warfare for decades. Yet, despite the relative ease and anonymity with which cyber-attacks can be conducted on military targets, the preponderance of historical cyber-related actions has been largely confined to the realms of espionage and crime. So far, close integration of cyberspace operations with terrestrial military operations is a rare, if slightly growing, occurrence in warfare. While discussions about cyber warfare have raged in academia...
Topics: cyber, Internet, cyber-war, MDB, CYBERCOM
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 25
favorite 1
comment 0
The conduct of operations in Cyberspace1 represents the adaptation of enduring truths to emerging threats2 prescribed by CJCS and relies on a strategy of achieving information superiority3 in the battlespace. Information Operations (Info-Ops) provides the framework for success by translating superior decision making into a competitive advantage4 for the Joint Force Commander (JFC). The key principles of joint information operations are the synergy of three categories of Info-Ops capabilities;...
Topics: DTIC Archive, Burris,Robert, Air War College Air University Maxwell AFB United States, computer...
Defense Technical Information Archive
texts
eye 19
favorite 1
comment 0
This study examines what the military should do to be resilient against cyber attacks. Its basis rests on two major assumptions. First, it assumes the United States adversaries will attempt to use attacks against the military. Second, it assumes some of these attacks will be successful despite established defenses. The military must be prepared to continue its mission despite cyber attacks. To do so, the military must act along two major axes of effort. First, those units that use cyberspace...
Topics: DTIC Archive, Wieland,Steven T, AIR UNIV MAXWELL AFB AL MAXWELL AFB United States, information...
In June 2012, the worldwide cyber security landscape changed when the presence of a new and sophisticated malware, later dubbed Stuxnet, was discovered in the computers of an Iranian nuclear facility. The malware was a cyber weapon, programmed to destroy the industrial machinery utilized for uranium enrichment. Stuxnet was soon dissected and diagnosed as a pioneering and politically motivated cyber attack that successfully infiltrated a high-security, government-run critical infrastructure and...
Topics: DTIC Archive, Lendvay,Ronald L, NAVAL POSTGRADUATE SCHOOL MONTEREY CA MONTEREY United States,...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 14
favorite 0
comment 0
Cyber security is often only seen as protecting networks. However, during critical operations, there is a desire to detect, assess and respond to cyber threats. Given the unknown vulnerabilities of large, complex Command and Control (C2) systems, organizations will protect the most critical assets essential for mission success. Cyber-ARGUS is a methodology that provides a mapping between the cyber and the operational domains, substantially improving the monitoring of information infrastructure...
Topics: DTIC Archive, GEORGE MASON UNIV FAIRFAX VA CENTER FOR EXCELLENCE IN COMMAND CONTROL COMMUNICATIONS...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 22
favorite 0
comment 0
In March 2012, NATO's Cooperative Cyber Defence Centre of Excellence organized its 2012 Cyber Defence Exercise (CDX12), Locked Shields, aimed at bringing different countries together to improve international cooperation in cyber defence. Computer specialists from various nations gathered to improve cyber defence capabilities; more than 200 participants, based in several European countries, participated in the training. The exercise involved Red Teams attacking Blue Teams, while Blue Teams...
Topics: DTIC Archive, RUAG HOLDING AG BERN (SWITZERLAND), *CYBERWARFARE, *MILITARY EXERCISES, COMMAND...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 23
favorite 0
comment 0
Security in cyberspace is a clear national priority, but the role of the US military in this new domain is not so clear. With the activation of US Cyber Command in 2010, debate concerning the militarization of cyberspace and the conduct of cyber warfare has taken center stage among US government policy makers. Complicating matters is the uncertain practice of governing behavior in cyberspace by applying domestic legal and policy guidelines as well as international treaties based on kinetic...
Topics: DTIC Archive, JUDGE ADVOCATE GENERAL (AIR FORCE) WASHINGTON DC, *CYBERWARFARE, *JOINT MILITARY...
Defense Technical Information Archive
texts
eye 13
favorite 0
comment 0
The initiative to protect against future cyber crimes requires a collaborative effort from all types of agencies spanning industry, academia, federal institutions, and military agencies. Therefore, a Cybersecurity Information Exchange (CYBEX) framework is required to facilitate breach/patch related in- formation sharing among the participants (firms) to combat cyber attacks. In this paper, we formulate a non-cooperative cybersecurity information sharing game that can guide: (i) the firms...
Topics: DTIC Archive, AIR FORCE RESEARCH LAB ROME NY, *COMPUTER NETWORK SECURITY, *GAME THEORY,...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 17
favorite 0
comment 0
The Airman seeks air superiority; the Sailor, maritime superiority. Does cyberspace superiority exist? Currently we have no clear consensus regarding that question. Some authors, such as RAND's cyber expert Martin Libicki argue that cybersupremacy is meaningless and, as such, is not a proper goal for operational cyberwarriors. The US Air Force disagrees, identifying cyberspace superiority as a key concept. According to Air Force Doctrine Document (AFDD), Cyberspace Operations, cyberspace...
Topics: DTIC Archive, AIR UNIV MAXWELL AFB AL AIR FORCE RESEARCH INST, *CYBERWARFARE, AIR FORCE, MILITARY...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 11
favorite 0
comment 0
Adversaries that conduct cyber crime continue to enjoy a significant head start on analysts who are tasked with discovering important information which can deter and ultimately defeat their attacks. A major reason for this problem is the slow process of the current analysis methodology. In this paper we present a new method of incident analysis which is artefact driven and not process driven. In our method, key aspects of the incident are revealed dynamically through the tracking of the...
Topics: DTIC Archive, NAVAL RESEARCH LAB WASHINGTON DC, *COMPUTER NETWORK SECURITY, COMPUTER VIRUSES,...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 13
favorite 0
comment 0
Topics: DTIC Archive, CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST, *COMPUTER NETWORK...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 17
favorite 0
comment 0
Historically, the United States Congress has acknowledged that a separate branch of military service is required to exert supremacy over each of the recognized Domains of Operation. Throughout the evolution of modern warfare, leading minds in military theory have come to the conclusion that due to fundamental differences inherent in the theory and tactics that must be employed in order to successfully wage war within a domain's associated environment, a specialized force was needed - until now....
Topics: DTIC Archive, Elbaum, Joseph M, AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH GRADUATE SCHOOL OF...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 37
favorite 0
comment 0
Power depends upon context, and the rapid growth of cyber space is an important new context in world politics. The low price of entry, anonymity, and asymmetries in vulnerability means that smaller actors have more capacity to exercise hard and soft power in cyberspace than in many more traditional domains of world politics. Changes in information have always had an important impact on power, but the cyber domain is both a new and a volatile manmade environment. The characteristics of...
Topics: DTIC Archive, HARVARD UNIV CAMBRIDGE MA BELFER CENTER FOR SCIENCE AND INTERNATIONAL AFFAIRS,...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 41
favorite 0
comment 0
To successfully navigate stormy and uncertain seas requires operating by an internationally agreed-to set of standards and norms affectionately known as the Rules of the Road. There are rules like these that apply to all the global commons -- what we in the Department of Defense have classified as domains, namely, land, sea, air, and space. There is now another domain. This is, of course, cyberspace, which is referred to herein as the Cyber Sea. Upon it, we set sail each day in the company of a...
Topics: DTIC Archive, EUROPEAN COMMAND APO NEW YORK 09128, *AGREEMENTS, *COMPUTER NETWORK SECURITY,...
Defense Technical Information Archive
texts
eye 85
favorite 0
comment 0
In 2013, Mandiant published a report linking one People's Liberation Army (PLA) unit to the virtual exploitation of 11 modern U.S. military platforms. In the last two decades, Chinese cyber espionage has cultivated a significant reputation in cyberspace for its high-volume, illicit exploitation of defense technology. At the same time, the PLA has also rapidly modernized its naval, fighter jet, and air defense technologies. This thesis examines trends in Chinese cyber espionage, PLA...
Topics: DTIC Archive, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *CHINA, *ESPIONAGE, *MILITARY MODERNIZATION,...
-
search
favorite 0
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 24
favorite 0
comment 0
Defining and understanding what constitutes a cyber-attack is a complicated matter, largely due to the fact that there has not yet been a large-scale cyber-attack upon any nation. With the help of Michael Schmitt's Tallinn Manual, published in 2013 by Cambridge University Press, it is possible to gain an understanding, although no policy expectations, of what elements need to be met for a cyber-attack to warrant a NATO response. This study analyzes and explores the unique position that NATO...
Topics: DTIC Archive, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *COMPUTER NETWORK SECURITY, *CYBERWARFARE,...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 17
favorite 0
comment 0
Topics: DTIC Archive, BIVIO NETWORKS INC PLEASANTON CA, *COMPUTER NETWORK SECURITY, COMPUTER VIRUSES,...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 46
favorite 0
comment 0
The Russian Federation is a key state actor in cyberspace; cyber events associated with Russian state and non - state actors have threatened Russia's neighbors , shaped international cyber norms, as well as influenced strategists understanding of cyber power. This thesis seeks to understand Russian cyber capability through the lens of Robert Jervis's offense - defense theory in order to answer the thesis's central question: Do Russian cyber capabilities reflect an investment in offensive or...
Topics: DTIC Archive, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *CYBERTERRORISM, *INFORMATION WARFARE,...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 15
favorite 0
comment 0
Software is a key component in nearly every critical system used by the Department of Defense. Attacking the software in a system-cyber warfare- is a revolutionary method of pursuing war. This article describes various cyber warfare approaches and suggests methods to counter them.
Topics: DTIC Archive, Alford, Lionel D, AIR FORCE MATERIEL COMMAND WRIGHT-PATTERSON AFB OH, *MILITARY...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 42
favorite 3
comment 0
Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating in. This section also examines why information warfare has become such an attractive alternative form of conflict, reviews the traditional principles of warfare and why they may or may not apply to cyber warfare, and proposes new principles of warfare that may be needed to conduct cyber...
Topics: DTIC Archive, O'Hara, Timothy F, ARMY WAR COLL CARLISLE BARRACKS PA, *STRATEGIC ANALYSIS, *THREAT...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 22
favorite 0
comment 0
As Defense agencies and services expand their reliance on computer networks, risk to information availability and integrity increases. It is no longer adequate to rely solely on the now traditional defense-in-depth strategy. We must recognize that we are engaged in a form of warfare, cyber warfare, and deploy our resources using the strategy and tactics of warfare. Most Defense organizations have not yet developed strategies or tactics for cyber warfare. This causes security devices to be used...
Topics: DTIC Archive, Howes, Norman R, MISSILE DEFENSE AGENCY WASHINGTON DC, *COMMAND AND CONTROL SYSTEMS,...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 25
favorite 0
comment 0
These viewgraphs discuss information warfare and cyber defense. Massive networking has made the U.S. the world's most vulnerable target for information attack. Public and private infrastructure have become virtually indistinguishable and largely global.
Topics: DTIC Archive, Wright, Larry, BOOZ-ALLEN AND HAMILTON INC MCLEAN VA, *NATIONAL SECURITY,...
The Finnish Defence Forces Concept Development & Experimentation Centre (FDF CD&E Centre) organised the MNE 7 Cyber Situational Awareness (SA) Limited Objective Experiment (LOE) in Riihimaeki 26-9 March 2012. The Multinational Experimentation 7 (MNE7) campaign consists of several work strands, each dealing with different aspects of the theme Access to the Global Commons . Cyberspace is one of the core study areas. It consists of five objectives each studying different aspects of...
Topics: DTIC Archive, MINISTRY OF DEFENCE HELSINKI (FINLAND), *CYBERWARFARE, EXPERIMENTAL DESIGN, FINLAND,...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 16
favorite 0
comment 0
This thesis postulates the need for a more proactive approach to cyber defense in Norway and offers recommendations about how Norway can be better prepared to counter cyber threats. It finds that Norway s strategic infrastructure is vulnerable to cyber attacks and that Norway has no coherent strategy for meeting this challenge. The thesis argues that an effective cyber defense requires a wide range of offensive and defensive measures as well as a central authority for command and control....
Topics: DTIC Archive, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *CYBERWARFARE, *DEFENSE SYSTEMS, *NORWAY,...
Books to Borrow
by Greenawalt, Kent, 1936-
texts
eye 14
favorite 1
comment 0
Includes bibliographical references
Topics: Freedom of speech, Criminal law