U.S. Naval War College faculty members publish their learned opinions on diverse topics and time periods in various media outlets including academic journals, online publications, scholarly texts, and popular editions.
The theft of intellectual property and classified data within the cyber domain poses a threat to the global economy and national security. In this paper, we discuss the concept of digital offensive countermeasures that the United States can use to defend its sensitive data and intellectual property, even after stolen data leaves U.S. Government networks.
Jeffrey Thomas Biller, Chapter 5 "Air Power, International Law and Ethics"
Michael N. Schmitt, Jeffrey Thomas Biller, Sean C. Fahey, David S. Goddard, Chad Highfill, Part III, Chapter 13, "Joint and Combined Targeting"
International humanitarian law (IHL) imposes a complex array of laws regarding the use of markings, signals, symbols and other indicators. Protections related to indicators are also directly implicated in the laws of perfidy and ruses. Although these laws are generally well accepted in principle, practitioners struggle to apply these rules in the newer, manmade domain of cyberspace.
Cyber-Terrorism: Finding a Common Starting Point Attacks on computer systems for both criminal and political purposes are on the rise in both the United States and around the world. Foreign terrorist organizations are also developing information technology skills to advance their goals.