Cyber & Foreign Terrorist Organizations
TOPIC SPONSOR: US Cyber Command
What are foreign terrorist organization (FTO) cyber tactics, techniques, and procedures? What are the trends in FTO cyber operations? How do FTOs use commercial entities to enable cyber operations? What are the trends in FTO use of technology and social media platforms?
- DeStefano, CDR Anthony (USCG), "Contemporary Tactical Realignment: Preparing a Military Force to Work with Department of Justice Prosecutors to Fight Terrorism, Cyberhacking and Other National Security Issues," ACSC paper, 2021.
- Hill, Maj. Amanda G., "The Ultimate Challenge: Attribution for Cyber Operations," ACSC paper, 2018.
- Lowery Maj. Jason, "Softwar: A Novel Theory on Power Projection and the National Strategic Significance of Bitcoin," AFF/MIT thesis, 2023, 400 pgs.
-
McDemott, Maj. Dylan, "The Myth of Cyber Dominance," ACSC Elective paper, 2019, 30 pgs.
-
Neate, Joshua, "A Method for Allocating Cyber Resources to Defend Critical Civilian Infrastructure," AWC Strategic Studies paper, 2019, 30 pgs.
-
Ramtahal, LTC Eldred K,. "Power Projection Platforms—Protecting Critical Infrastructure against Cyber Intrusion to Maintain America's Strategic Military Advantage," AWC Strategic Studies Paper, 2021, 23 pgs.
-
Randall, Justin, "National Instruments of Power at Risk: Mitigating the Effects of China's Cyber Strategy on National Security," GCPME thesis, 2024, 43 pgs.
-
Sivertson, Kristen, "Innovative Financial Technology: Are We Ready?" AWC Strategic Studies paper, 2018, 21 pgs.