By Andru E. Wall* — Click here to read the full text of the Article Modern warfare requires close integration of military and intelligence forces. The Secretary of Defense possesses authorities under Title 10 and Title 50 and is best suited to lead US government operations against external unconventional and cyber threats. Titles 10 and […]
Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy
By Jerry Brito* & Tate Watkins** — Click here to read the full text of the Article There has been no shortage of attention devoted to cybersecurity, with a wide range of experts warning of potential doomsday scenarios should the government not act to better secure the Internet. But this is not the first time […]
Can It Really Work? Problems with Extending EINSTEIN 3 to Critical Infrastructure
By Steven M. Bellovin*, Scott O. Bradner**, Whitfield Diffie***, Susan Landau****, and Jennifer Rexford***** — Click here to read the full text of the Article In an effort to protect its computer systems from malevolent actors, the U.S. government has developed a series of intrusion-detection and intrusion- prevention systems aimed at monitoring and screening traffic […]
Pointing the Finger of Scorn at Iran
The Obama administration has publicly accused Iran of plotting to kill Saudi Arabia’s ambassador in Washington. Why?
Regulatory Obstacles to Military Operational Readiness
The full complexity, benefits, and costs of the regulatory state, especially as they relate to national security, are too infrequently discussed or appreciated publicly in the United States.
U.S. Drone Strike Kills Al-Aulaqi
On September 30, a United States drone strike in northern Yemen killed Anwar al-Aulaqi, an influential and American-born member of al-Qaeda. Al-Aulaqi is believed to have inspired several successful and attempted terrorist attacks, including the Fort Hood shooting in 2009 and the Times Square bomb attempt in 2010. There is a great deal of debate […]


