Building Trust to Fight Cyber Crime

Reliable reputation online impedes cyber criminals By Steven Jones-Chaljub Escuela Superior de Guerra, Colombia Cyberspace is a dynamic domain that attracts attention from academics and policymakers. It represents the present and…

Wielding Intelligence as a Weapon

Defeating the Islamic State requires a patient commitment to building multinational spy networks By Col. (Ret.) József Kis-Benedek, Ph.D. Professor, National University of Public Service, Hungary The Islamic State (IS) is much more than…

Stopping the Spread of WMD

The U.S. Department of Energy works with the Kyrgyz Republic to fight proliferation By Bakyt T. Kakchekeev The Kyrgyz Republic is committed to the peaceful development of all countries, supports the peaceful resolution of conflicts and…

A New Russia Strategy

International relations theory requires NATO to reassess its strategy toward Russia By Capt. Evan Kerrane, U.S. Army Theories can bring structure to a chaotic world and, although sometimes viewed as impractical, they shed light on the…

Building Deterrence in Cyberspace

The U.S. Department of Defense’s new strategy focuses on prevention By Aaron Hughes, U.S. deputy assistant secretary of defense for cyber policy Malicious actors in cyberspace pose a complex and dynamic set of threats that leaders and…

Defining Cyber Terrorism

Few experts agree on a universally acceptable definition Ruben Tuitel Cyber terrorism is a difficult phenomenon for scholars, legal practitioners and international organizations to define. Additionally, confusion exists over the…

Baltic cyber Cooperation

Estonia, Latvia and Lithuania sign a historic document to align their cyber defense policies Vytautas Butrimas, senior advisor, Cybersecurity and IT Department, Ministry of National Defense, Republic of Lithuania It was a historic…

A New Cyber Security Curriculum

The Partnership for Peace Consortium offers a guide for cyber security education By Sean Costigan and Michael Hennessy Today’s news headlines regularly refer to commercial data hacks and breaches, electronic fraud, the disruption of…