Cyber Infrastructure Protection: Vol. III Authored by: LTC John D Colwell, Jr, Dr Tarek N Saadawi. June 15, 2017

Despite leaps in technological advancements made in computing system hardware and software areas, we still hear about massive cyberattacks that result in enormous data losses. Cyberattacks in 2015 included: sophisticated attacks that targeted Ashley Madison, the U.S. Office of Personnel Management (OPM), the White House, and Anthem; and in 2014, cyberattacks were directed at Sony Pictures Entertainment, Home Depot, J.P. Morgan Chase, a German steel factory, a South Korean nuclear plant, eBay, and others. These attacks and many others highlight the continued vulnerability of various cyber infrastructures and the critical need for strong cyber infrastructure protection (CIP). This book addresses critical issues in cybersecurity. Topics discussed include: a cooperative international deterrence capability as an essential tool in cybersecurity; an estimation of the costs of cybercrime; the impact of prosecuting spammers on fraud and malware contained in email spam; cybersecurity and privacy in smart cities; smart cities demand smart security; and, a smart grid vulnerability assessment using national testbed networks.

Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies Authored by: Dr Mary Manjikian. December 01, 2016

Perhaps the best starting point for those looking to “borrow” a deterrent strategy for cyberspace from other fields is not the example of nuclear deterrence but instead the example of United States-Mexican border security. The nuclear deterrent analogy is not the best fit for understanding cyber-deterrence—due to the ways in which rewards and payoffs for would-be attackers in cyberspace are different from those in the nuclear analogy—among other factors. The emphasis here is not on deterrent effects provided by specific weapons but rather on the ways in which human actors understand deterrence and risk in making an attempt to violate a border, and the ways in which security architects can manipulate how would-be aggressors think about these border incursions. This Letort Paper thus borrows from the criminology literature rather than the military-security literature in laying out how individuals may be deterred from committing crimes in real space and in cyberspace through manipulating rewards and punishments. Lessons from attempts at deterring illegal immigration along America’s borders are then presented, with lessons derived from those situations, which are helpful in understanding how to deter incursions in cyberspace.

Implementing a New Vision: Unity of Effort in Preparing for and Responding to Catastrophic Events Authored by: Prof Bert B Tussing. March 24, 2011

The Consortium for Homeland Defense and Security in America - consisting of the United States Army War College's Center for Strategic Leadership (CSL); George Washington University's Homeland Security Policy Institute (HSPI); the Center for Strategic and International Studies (CSIS); and the Heritage Foundation - held its annual symposium to examine pressing issues of shared concern to the domestic security of the United States and its allies. This year's event was constructed around the challenges of achieving Unity of Effort in preparing for and responding to catastrophic events.

Toward a Unified Military Response: Hurricane Sandy and the Dual Status Commander Authored by: Dr Ryan Burke, Dr Sue McNeil. April 01, 2015

The 2013-14 Army War College Key Strategic Issues List stated: “If Hurricane Sandy is seen as an archetype of a complex catastrophe, then a careful analysis of the effectiveness of the DoD response within the context of dual status commanders [DSCs], lead federal agencies, and state response capabilities needs to be conducted.” This monograph does exactly that as it carefully and comprehensively analyzes the DSC-led military response to Hurricane Sandy in New York. Through this lens, it illustrates and discusses the perspectives of the DSC construct and offers recommendations for leveraging existing capabilities and improving those deemed insufficient. Using a case study approach, this analysis addresses notable issues of constitutionality, legality, policy, financial considerations, and even politics, all uniquely situated between individual states’ interests and those of the federal government. To provide military and defense officials with a greater understanding of the benefits and limitations of the DSC arrangement during a no-notice/limited-notice incident, this monograph offers objective and systematic documentation of the Sandy response. It concludes by offering a series of actionable recommendations aimed at improving operational decisionmaking, policy, and legislation specifically related to DSCs during no-notice/limited-notice incidents.

Maturing Defense Support of Civil Authorities and the Dual Status Commander Arrangement through the Lens of Process Improvement Authored by: Dr Ryan Burke, Dr Sue McNeil. April 01, 2015

The authors advocate the integration of process improvement methods into future Defense Support of Civil Authorities (DSCA) operations. They briefly discuss alternative process improvement strategies and their current state of employment in a variety of DoD programs. Methods discussed include Lean Six Sigma, Total Quality Management, and Capability Maturity Models, the utility of such methods is demonstrated, and the value in applying process improvement methods to DSCA operations is articulated. Three recommendations are given to demonstrate how a usable process maturity model can be built and employed for future operations. The monograph concludes by reaffirming the inherent utility of, and advocating for, process improvement techniques as a way to mature future DSCA operations using the dual status commander arrangement.

Investigating the Benefits and Drawbacks of Realigning the National Guard Under the Department of Homeland Security Authored by: Dr Ryan Burke, Dr Sue McNeil. August 01, 2016

Part I of the 2014-2015 Army War College’s Key Strategic Issues List (KSIL)—Army Priorities for Strategic Analysis—asks: “Given the growing importance of homeland defense, what would be the benefits and drawbacks of realigning the [National] Guard under the department of Homeland Security to enhance domestic security and disaster response, while retaining utility for overseas missions in support of the Department of Defense?” (pg. 10). This monograph details our efforts to research and evaluate the perceived benefits and drawbacks of realigning the National Guard under the Department of Homeland Security (DHS). We begin with a brief review of the relevant literature shaping the current policy and doctrinal approach to military civil support (CS) operations, including a summary of laws and strategic guidance relevant to the discussion. We then note the important distinctions between homeland security (HS) and homeland defense (HD) and the military role in each context. The seam between HS and HD provides a conceptual basis for discussing the roles and responsibilities of the National Guard, the DHS, and the Department of Defense (DoD) within domestic security and disaster response operations. After evaluating the National Guard’s role in each of the above contexts, we briefly discuss the realignment of the United States Coast Guard (USCG) within the DHS as a proxy for comparison of a similar realignment of a military-style entity under the DHS. The study concludes by listing and discussing the potential benefits and drawbacks of a National Guard realignment under the DHS and then makes five short recommendations in summary of the research effort.