TOPIC SPONSOR: US Cyber Command
What is the relationship between cybercriminal groups and state actors? Is there a command and control or tasking relationship? When do cybercrime and/or ransomware operations reach a threshold that constitutes a national security risk, not just a law enforcement matter?
- Ahn, Lt. Col. David, "Countering Vulnerabilities and Threats to Cybersecurity," AWC elective paper, 2022, 8 pgs.
- Davis III, Lt. Col. Royal A., et al, "Air Force Cyber Law Primer," Published as an AU Press Perspective on Cyber Power Paper, 2022, 154 pgs.
- DeStefano, CDR Anthony (USCG), "Contemporary Tactical Realignment: Preparing a Military Force to Work with Department of Justice Prosecutors to Fight Terrorism, Cyberhacking and Other National Security Issues," ACSC paper, 2021.
- Hill, Maj. Amanda G., "The Ultimate Challenge: Attribution for Cyber Operations," ACSC paper, 2018.
- Jones, Steven M., "Guarding the Cyber Seams in Homeland Defense," SAASS thesis, 2024, 97 pgs.
- Lowery Maj. Jason, "Softwar: A Novel Theory on Power Projection and the National Strategic Significance of Bitcoin," AFF/MIT thesis, 2023, 400 pgs.
-
Neman, Maj. Robert, "Ready, Set, Game...Game?: Engaging Nonlethal Targets for Offensive and Defensive Cyber Effects in the Electronic Era," ACSC elective paper (Joint Fires & Targeting), 2019, 10 pgs.
-
Ramtahal, LTC Eldred K,. "Power Projection Platforms—Protecting Critical Infrastructure against Cyber Intrusion to Maintain America's Strategic Military Advantage," AWC Strategic Studies Paper, 2021, 23 pgs.
-
Sivertson, Kristen, "Innovative Financial Technology: Are We Ready?" AWC Strategic Studies paper, 2018, 21 pgs.