The Modern War Institute at West Point hosted a multi-disciplinary panel to discuss how the war in Ukraine is—or is not—changing core assumptions about conflict in the cyber domain. In many ways,...

Select Page
The Modern War Institute at West Point hosted a multi-disciplinary panel to discuss how the war in Ukraine is—or is not—changing core assumptions about conflict in the cyber domain. In many ways,...
In ancient China, the general Sun Tzu counseled that “all warfare is based on deception.” Could that still be the case millennia later—after an industrial and then a digital revolution have left...
As a senior first lieutenant, I volunteered to teach new second lieutenants about defensive cyberspace operations. Over the course of a year, I spent over twelve hours with three different Cyber...
In the early 2010s, mass protests and riots ripped through the Middle East and North Africa as the Arab Spring gathered support. Longtime authoritarians like Zine El Abidine Ben Ali of Tunisia,...
Throughout George Lucas’s depiction of the conflicts that gripped a galaxy long ago and far, far away, both the heroes and the villains employ a myriad of unconventional capabilities and tactics....
The Russian invasion of Ukraine has become a test bed for theories about the conduct of modern warfare, and one of the mostly hotly debated topics has been the role of technology in contemporary...
Earlier this year, we announced the launch of C2P—the Competition in Cyberspace Project—a joint initiative for which the Modern War Institute partnered with the Army Cyber Institute. The project's...
Last month, Microsoft published a report on the emerging lessons from the “cyber war” in Ukraine. It provides a rich storyline and a number of historical analogies and, in emphasizing the...
Editor’s note: This article is part of the series “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors to present expert commentary on diverse...
Editor’s note: This article is part of the series “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors to present expert commentary on diverse...
Editor’s note: This article is part of the series “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors to present expert commentary on diverse...
Editor’s note: This article is part of the series “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors to present expert commentary on diverse...
Editor’s note: This article is part of the series “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors to present expert commentary on diverse...
Editor’s note: This article is part of the series “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors to present expert commentary on diverse...
This article is part of the series “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors to present expert commentary on diverse issues surrounding...
Editor's note: This article is part of the contribution made by the Cyber & Innovation Policy Institute at the US Naval War College to the series “Compete and Win: Envisioning a Competitive...
Editor’s note: This article is part of the series “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors to present expert commentary on diverse...
This article is part of the contribution made by the Joint Special Operations University to the series “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series...
This article is part of the contribution made by the US Army War College to the series “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors to...
This article is part of the contribution made by the US Army War College to the series “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors to...
This article is part of the contribution made by the US Army War College to the series “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors to...
This article is part of the series “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors to present expert commentary on diverse issues surrounding...
In Aesop’s fable, “The Astrologer,” a man looks up toward the stars for signs about the future. While focusing his gaze upward, however, he trips and falls in a hole on the ground in front of him....
This article is part of the contribution made by the US Army War College to the series “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors to...
This article is part of the contribution made by the US Army War College to the series “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors to...
This article is part of the contribution made by the US Army War College to the series “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors to...
This article is part of the contribution made by the US Army War College to the series “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors to...
This article is part of the National War College’s contribution to the series “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors to present...
This article is part of the National War College’s contribution to the series “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors to present...
This article is part of the National War College’s contribution to the series “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors to present...
This article is part of the National War College’s contribution to the series “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors to present...
Editor’s note: This article is part of the Army Cyber Institute’s contribution to the series, “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors...
Editor’s note: This article is part of the Army Cyber Institute’s contribution to the series, “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors...
Editor’s note: This article is part of the Army Cyber Institute’s contribution to the series, “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors...
The Army Cyber Institute, in cooperation with the Modern War Institute and the Competition in Cyberspace Project, is pleased to announce an essay contest to generate new ideas and expand the...
The Modern War Institute and Army Cyber Institute are proud to announce the Competition in Cyber Project (C2P). C2P’s purpose is to provide a forum to support increased conversation between military...
Editor’s note: This article is part of the Army Cyber Institute’s contribution to the series, “Compete and Win: Envisioning a Competitive Strategy for the Twenty-First Century.” The series endeavors...
Editor’s note: This article is the final piece in a series, “Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment.” The series endeavors to present expert commentary...
Editor’s note: This article is part of a series, “Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment.” The series endeavors to present expert commentary on diverse...
Editor’s note: This article is part of a series, “Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment.” The series endeavors to present expert commentary on diverse...
Editor’s note: This article is part of a series, “Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment.” The series endeavors to present expert commentary on diverse...
Editor’s note: This article is part of a series, “Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment.” The series endeavors to present expert commentary on diverse...
Editor’s note: This article is part of a series, “Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment.” The series endeavors to present expert commentary on diverse...
Editor’s note: This article is part of a series, “Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment.” The series endeavors to present expert commentary on diverse...
Editor's note: This article is the eleventh in a series, "Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment." The series endeavors to present expert commentary on...
Editor’s note: This article is the tenth in a series, “Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment.” The series endeavors to present expert commentary on...
Editor's note: This article is the ninth in a series, "Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment." The series endeavors to present expert commentary on...
Editor's note: This article is the eighth in a series, "Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment." The series endeavors to present expert commentary on...
Editor's note: This article is the seventh in a series, "Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment." The series endeavors to present expert commentary on...
Editor's note: This article is the sixth in a series, "Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment." The series endeavors to present expert commentary on...
Editor's note: This article is the fifth in a series, "Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment." The series endeavors to present expert commentary on...
Editor's note: This article is the fourth in a series, "Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment." The series endeavors to present expert commentary on...
Editor's note: This article is the third in a series, "Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment." The series endeavors to present expert commentary on...
Editor's note: This article is the second in a series, "Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment." The series endeavors to present expert commentary on...
Editor's note: This article is the first in a series, "Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment." The series endeavors to present expert commentary on...