Home

Warfare

General

Air Land Battle

Asymmetric Warfare

Effect Based Operations (EBO)

Fourth Generation Warfare(4GW)

Future Warfare

Gray Zone Warfare

Hybrid Warfare

Information Warfare

Irregular Warfare

All Domain Operations

Multi Domain Operations (MDO)

Maneuver Warfare

Mountain Warfare

NBC/WMD

New Generation Warfare (NGW)

Network Centric Warfare (NCW)

Peace Keeping Operations

Small War

Space Warfare

Special Forces

Water Warfare

Net Assessment

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
NEXT
Cyber Warfare
AMERICAS CYBER FUTURE SECURITY AND PROSPERITY IN THE INFORMATION AGE : VOLUME I  

Cyber threats imperil America, now and for the foreseeable future. They endanger the enormous economic, social and military advances enabled by cyberspace, not only for the United States but also for the ...Read more >

64 Pages
3.49 MB
AMERICAS CYBER FUTURE SECURITY AND PROSPERITY IN THE INFORMATION AGE : VOLUME II  

The cyber domain is a new and a volatile manmade environment. The characteristics of cyberspace often reduce power differentials among actors, and thus provide a good example of the diffusion of power that typifies global politics in this ...Read more >

232 Pages
4.16 MB
THE PLA’S CYBER WARFARE CAPABILITIES AND INDIA’S OPTIONS  By Maj Gen PK Mallick, VSM (Retd)

China’s People’s Liberation Army (PLA) has understood that dominance in the information domain is the priority in modern conflict. Through the reorganisation of the PLA and the establishment of the Strategic Support Force, China has brought space, cyber, electronic warfare and psychological warfare under one umbrella to use these capabilities in a more efficient and effective manner. No other country, including the US, has done this. China has no threat from land. Presently, its main aim ...Read more >

9 Pages
787.79 KB
TEN YEARS IN : IMPLEMENTING STRATEGIC APPROACHES TO CYBERSPACE  By Jacquelyn G Schneider, Emily O. Goldman, and Michael Warner

Harvard’s Samuel Huntington, then just 27, asked the U.S. Navy in 1954, “What function do you perform which obligates society to assume responsibility for your maintenance?” His seminal article in the U.S. Naval Institute’s Proceedings argued that the basis of a military Service—or any military element—is its purpose or role in implementing national policy. Huntington called this a Service’s “strategic concept,” which justifies public support by explaining ...Read more >

207 Pages
10.70 MB
CHINESE CYBER EXPLOITATION IN INDIA'S POWER GRID - IS THERE A LINKAGE TO MUMBAI POWER OUTAGE?  By Maj Gen P K Mallick, VSM (Retd)

On Feb. 28, 2021 The New York Times (NYT), based on analysis by a U.S. based private intelligence firm Recorded Future, reported that a Chinese entity penetrated India’s power grid at multiple load dispatch points. Chinese malware intruded into the control systems that manage electric supply across India, along with a high-voltage transmission substation and a coal-fired power plant. The NYT story1 gives the impression that the alleged activity against critical Indian infrastructure ...Read more >

19 Pages
1.36 MB
CYBER THREATS AND NATO 2030: HORIZON SCANNING AND ANALYSIS  By A. Ertan, K. Floyd, P. Pernik, T. Stevens (Eds.)

All members of NATO benefit greatly from digital connectivity and the many opportunities it provides for social, economic and political development. At the same time, it is widely recognised that heightened dependency on digital networks and systems is a systemic vulnerability that can be exploited by a wide range of criminal and strategic ...Read more >

267 Pages
br / b Warning /
ALLIED JOINT DOCTRINE FOR CYBERSPACE OPERATIONS  By Allied Joint Publication-3.20

The Alliance finds itself operating in increasingly interconnected environments, in particular, cyberspace and the information environment (IE). The free flow of data and seamless functioning of networks have become critical for functions and services for civil society and for military ...Read more >

53 Pages
970.56 KB
GUIDELINES FOR A NATIONAL CYBER STRATEGY  By Gabi Siboni and Ofer Assaf

The purpose of the Institute for National Security Studies is first, to conduct basic research that meets the highest academic standards on matters related to Israel’s national security as well as Middle East regional and international security affairs. Second, the Institute aims to contribute to the public debate and governmental deliberation of issues that are – or should be – at the top of Israel’s national security ...Read more >

105 Pages
688.11 KB
GUIDELINES FOR A NATIONAL CYBER STRATEGY  By Gabi Siboni and Ofer Assaf

The purpose of the Institute for National Security Studies is first, to conduct basic research that meets the highest academic standards on matters related to Israel’s national security as well as Middle East regional and international security affairs. Second, the Institute aims to contribute to the public debate and governmental deliberation of issues that are – or should be – at the top of Israel’s national security ...Read more >

105 Pages
688.11 KB
SPECIAL REPORT : CYBERWAR AND THE FUTURE OF CYBERSECURITY  By Jason Hiner

Cyber criminals are as varied as other internet users: just as the web has allowed businesses to sell and communicate globally, so it has given fraudsters the ability ...Read more >

34 Pages
1.69 MB
CYBERSPACE AND NATIONAL SECURITY  By Gabi Siboni

The success of the Islamic State (henceforth: ISIS) includes the integration of interrelated elements in a way that helps the organization consolidate its control of extensive regions, serve as the current spearhead in ...Read more >

176 Pages
906.96 KB
THE CYBERSPACE OPERATIONS PLANNER  By Jason M. Bender

After nearly three years in the cyber community, my continual experience is one where we regularly confront our own shortcomings in understanding cyberspace, as well as a general misunderstanding of cyberspace operations ...Read more >

34 Pages
323.58 KB
THE VULNERABILITY OF UAVS TO CYBER ATTACKS - AN APPROACH TO THE RISK ASSESSMENT  By Kim Hartmann

By 2012 the U.S. military had increased its investment in research and production of unmanned aerial vehicles (UAVs) from $2.3 billion in 2008 to $4.2 billion. Currently UAVs are used for a wide range of ...Read more >

23 Pages
489.84 KB
CHINAS CYBERESPIONAGE: THE NATIONAL SECURITY DISTINCTION AND U.S. DIPLOMACY  By Greg Austin

In January 2011, the United States and China agreed for the first time at head of state level to include cybersecurity as an important bilateral agenda item, albeit one of around two dozen identified in a laundry list well ...Read more >

33 Pages
419.54 KB
CYFY 15-17 OCT 2014 REPORT  By OBSERVER RESEARCH FOUNDATION

Cyfy 2014: The India Conference on Cyber Security and Cyber Governance was held in New Delhi, from 15-17 October 2014. It was attended by 350 participants, with speakers from over 12 countries representing ...Read more >

100 Pages
13.06 MB
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
NEXT