15 Feb 2018

Commanding the Trend: Social Media as Information Warfare

This article demonstrates how social media is a tool for modern information-age warfare. It builds on analysis of three distinct topics: social networking, propaganda, and news and information sharing. Two case studies are used to show how state and non-state actors use social media to employ time-tested propaganda techniques to

18 Dec 2017

U.S. National Security Strategy 2017

An America that is safe, prosperous, and free at home is an America with the strength, confidence, and will to lead abroad. It is an America that can preserve peace, uphold liberty , and create enduring advantages for the American people. Puting America first is the duty of our government

04 Aug 2017

The Persistent Terror Threat to America

ISIS’ campaign to encourage and guide terrorist attacks in the West continues. So far in 2017, there have been 14 homegrown jihadi cases in America and the FBI continues to investigate cases in all 50 states. “They [ISIS] are dangerous. I prefer them not having the caliphate, to the extent

20 Jul 2017

DHS Issues Report on AI Risk to Critical Infrastructure

Artificial Intelligence (AI) is an emerging risk that will affect critical infrastructure (CI) as it becomes common throughout the United States. The purpose of this research paper is to analyze the narratives about AI to understand the prominence of perceived key benefits and threats from AI adoption and the resulting

02 Mar 2017

Defense Science Board Report on Cyber Deterrence

The United States gains tremendous economic, social, and military advantages from cyberspace. However, our pursuit of these advantages has created extensive dependencies on highly vulnerable information technologies and industrial control systems. As a result, U.S. national security is at unacceptable and growing risk. Over the past several years, the United

10 Feb 2017

DHS enhanced analysis of Grizzly Steppe election hack

DHS analysts leverage the Cyber Kill Chain model to analyze, discuss, and dissect malicious cyber activity. The phases of the Cyber Kill Chain are Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control, and Actions on the Objective. This section will provide a high-level overview of GRIZZLY STEPPE activity within this

04 Feb 2017

State Department Report on Gray Zone Conflict

The study addresses the challenges facing the United States from the increasing use by rivals and adversaries – state and non-state alike – of what have come to be called “Gray Zone” techniques. The term Gray Zone (“GZ”) denotes the use of techniques to achieve a nation’s goals and frustrate

04 Feb 2017

Baseline Comparison of US and Foreign Anarchist Extremist Movements

This joint DHS and FBI Assessment examines the possible reasons why anarchist extremist attacks in certain countries abroad and in the United States differ in the frequency of incidents and degree of lethality employed in order to determine ways US anarchist extremists actions might become more lethal in the future.

27 Jan 2017

ODNI Global Trends Report 2017 – Paradox of Progress

We are living a paradox: The achievements of the industrial and information ages are shaping a world to come that is both more dangerous and richer with opportunity than ever before. Whether promise or peril prevails will turn on the choices of humankind. The progress of the past decades is

06 Jan 2017

Intelligence Community Report on Election Hacking

Assessing Russian Activities and Intentions in Recent US Elections Russian efforts to influence the 2016 US presidential election represent the most recent expression of Moscow’s longstanding desire to undermine the US-led liberal democratic order, but these activities demonstrated a significant escalation in directness, level of activity, and scope of effort