Confronting Cyber Threats: Challenges and Opportunities
Editor’s note: This article is the final piece in a series, “Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment.” The series endeavors to present expert commentary on diverse issues surrounding US competition with peer and near-peer...
ODNI’s Critical Role in Cybersecurity: Facilitating Collaboration, Sharing, and A Combined Response to Foreign Threats
Editor’s note: This article is part of a series, “Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment.” The series endeavors to present expert commentary on diverse issues surrounding US competition with peer and near-peer competitors...
Breaking Out of Our Silos: How to Strengthen Relationships Between Service-Specific Information Operations Communities, and Why We Need To
Editor’s note: This article is part of a series, “Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment.” The series endeavors to present expert commentary on diverse issues surrounding US competition with peer and near-peer competitors...
Imposing Costs: Unconventional Warfare in the Information Environment
Editor’s note: This article is part of a series, “Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment.” The series endeavors to present expert commentary on diverse issues surrounding US competition with peer and near-peer competitors...
We Ignore the Human Domain at Our Own Peril
Editor’s note: This article is part of a series, “Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment.” The series endeavors to present expert commentary on diverse issues surrounding US competition with peer and near-peer competitors...
Our Digital Vulnerability Laid Bare: The Opening Gambit of the Next War
Editor’s note: This article is part of a series, “Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment.” The series endeavors to present expert commentary on diverse issues surrounding US competition with peer and near-peer competitors...
The Colonial Pipeline Hack Shows We Need a Better Federal Cybersecurity Ecosystem
Editor’s note: This article is part of a series, “Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment.” The series endeavors to present expert commentary on diverse issues surrounding US competition with peer and near-peer competitors...
In Africa, Great Power Competition Requires a Great Strategy for Information Operations
Editor's note: This article is the eleventh in a series, "Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment." The series endeavors to present expert commentary on diverse issues surrounding US competition with peer and near-peer...
Population-Centric Cybersecurity: Lessons from Counterinsurgency
Editor’s note: This article is the tenth in a series, “Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment.” The series endeavors to present expert commentary on diverse issues surrounding US competition with peer and near-peer...
Toward a Whole-of-Society Framework for Countering Disinformation
Editor's note: This article is the ninth in a series, "Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment." The series endeavors to present expert commentary on diverse issues surrounding US competition with peer and near-peer...
Manhunting the Manhunters: Digital Signature Management in the Age of Great Power Competition
Editor's note: This article is the eighth in a series, "Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment." The series endeavors to present expert commentary on diverse issues surrounding US competition with peer and near-peer...
Save Our Servers
Editor's note: This article is the seventh in a series, "Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment." The series endeavors to present expert commentary on diverse issues surrounding US competition with peer and near-peer...
Competing for Connections: Authoritarian Powers’ Use of Cyber and Influence in Latin America
Editor's note: This article is the sixth in a series, "Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment." The series endeavors to present expert commentary on diverse issues surrounding US competition with peer and near-peer...
Striking the Right Balance: How Russian Information Operations in the Baltic States Should Inform US Strategy in Great Power Competition
Editor's note: This article is the fifth in a series, "Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment." The series endeavors to present expert commentary on diverse issues surrounding US competition with peer and near-peer...
PSYOP, Cyber, and InfoWar: Combating the New Age IED
Editor's note: This article is the fourth in a series, "Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment." The series endeavors to present expert commentary on diverse issues surrounding US competition with peer and near-peer...
Authorities and Legal Considerations for US Cyber and Information Operations in a Contested Environment
Editor's note: This article is the third in a series, "Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment." The series endeavors to present expert commentary on diverse issues surrounding US competition with peer and near-peer...
Overclassification and Its Impact on Cyber Conflict and Democracy
Editor's note: This article is the second in a series, "Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment." The series endeavors to present expert commentary on diverse issues surrounding US competition with peer and near-peer...
Incorporating the Cyberspace Domain: How Russia and China Exploit Asymmetric Advantages in Great Power Competition
Editor's note: This article is the first in a series, "Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment." The series endeavors to present expert commentary on diverse issues surrounding US competition with peer and near-peer...