Article Search

Research Articles

  • Emerging Cyber Powers

    What states are investing in military cyber capabilities and may emerge in the next 5-10 years as new advanced threats to the U.S. and our allies? (US Cyber Command)

  • Foreign Operating Concepts in Air Warfare

    How are nation-state and non-nation-state objectives and their associated operating concepts influencing the changing dynamics of air warfare? (HAF A5SM)

  • Hacktivists

    How might the emergence of hacktivists impact state dynamics in cyberspace during a conflict?  (US Cyber Command) 

  • Cyber-Physical System (CPS) concepts

    How can the AF gain strategic, operational, and tactical advantages over peer and near-peer competitors in future conflicts leveraging Cyber-Physical System (CPS) concepts to effectively identify, characterize, defend against, and respond to cyber-threats and attacks across all AFIN enclaves,

  • Crowdsourcing

    How can the Air Force more effectively crowdsource solutions to capability and capacity gaps across the industrial-military complex while balancing security concerns? (PACAF/A8X)

  • Iran's Cyber Policy

    What are Iran's policy, strategy and mission objectives for conducting cyberspace operations? What does Iran perceive as U.S. or partner red lines regarding cyberspace operations? What geopolitical events and/or actions would drive an Iranian retaliatory cyberspace attack against the U.S.

  • India's "Necklace of Diamonds" Strategy

    What cooperation should occur through other domains through the apparent naval-centric lens of India's "Necklace of Diamonds" Strategy?  (PACAF/A5I)  

  • Iran's cyber capabilities

    What are Iranian cyber tactics, techniques, and procedures? What are the trends in Iranian cyber operations? (US Cyber Command)

  • Democratic People's Republic of Korea (DPRK) cyber policy

    What is the DPRK policy and doctrine for cyberspace operations? What are DPRK's cyber red lines? What cyber actions by other nation-states might cause the DPRK to escalate to the use of military force? (US Cyber Command)