Policy Library
McCrary Institute Announces New Senior Fellows McCrary Institute | February 2024
Powering Through Requires Securing the Grid | December 2023
CSC 2.0 Report April 2023 | April 2023
Backbone is everything, don’t be owned by your infrastructure: Lessons from Ukraine for America | February 2022
Reflections on Executive Order 13010 | July 2021
Gas pipeline hack reveals cyber vulnerabilities. But Biden infrastructure plan doesn't fix them. | May 2021
Illuminating Digital Supply Chain Risk | April 2021
Relaunching the Cyber Diplomacy Act | April 2021
An Epidemic Becomes a Pandemic | February 2021
Cyber diplomacy: Time to up our game | February 2021
U.S. Supply Chain: Stop Driving Blind | January 2021
Cybersecurity at the Capitol | January 2021
SolarWinds: What It Means & What’s Next | December 2020
Guiding Principles for Emergency Management on Cybersecurity | November 2020
New FBI Cyber Strategy | October 2020
Election Security Amid COVID-19 | September 2020
Claire the Coder: The Rosie the Riveter for the cyber age | September 2020
Bad Cyber Actors Don’t Fear the Law. We Can Change That. | August 2020
A Multi-Layered Air Defense Model to Protect Shared Air in Critical Infrastructure Sectors | July 2020
Why the FBI’s cyber attachés are so valuable | June 2020
Securing the Grid | June 2020
The Coronacanes are Coming | June 2020
Is Deterrence Possible in Cyberspace? | April 2020
After Soleimani: Iran and cyber domain | January 2020
National Cyber Moonshot Ecosystem Workshop | November 2019
The Need of the Hour: Encryption | November 2019
Leaders on the Plains featuring former NSA Director and U.S. Cyber Command Commander Admiral Mike Rogers | November 2019
Securing Elections – Global Lessons Learned | September 2019
Should Cities Ever Pay Ransom to Hackers? | September 2019
Former Deputy Secretaries of Homeland Security Look Back and Ahead | September 2019
The Future of the Cybersecurity and Infrastructure Security Agency featuring Chris Krebs | August 2019
2019 Insights into Data Protection | July 2019
The Forward Leaning CIO | June 2019
Cybersecurity Challenges for State and Local Governments: Assessing How the Federal Government Can Help | June 2019
The GPS Rollover: What You Need to Know | March 2019
Unintended consequence: Federal cybersecurity workforce a potential casualty of the shutdown | January 2019
What’s wrong with Huawei, and why are countries banning the Chinese telecommunications firm? | December 2018
The Magnitude of the Cyber Threat Facing America | November 2018
Evolving Menace: Iran’s Use of Cyber-Enabled Economic Warfare | November 2018
What Did Clausewitz Have to Say About "Sybre"? | September 2018
Getting Ready to Fight the Next (Cyber) War | February 2018
Perspective: Security and the Management of the Reputation Risk | February 2018
Mutual Legal Assistance: Understanding the Challenges for Law Enforcement in Global Cybercrime Cases | January 2018
Innovate and Invest to Sharpen America's Competitive Edge | December 2017
Israel: The Making of a Cyber Power Case Study | November 2017
Cybersecurity in the Financial Services Sector | November 2017
Space, Satellites, and Critical Infrastructure | November 2017
Trends in Technology and Digital Security | November 2017
Parsing the North Korean Cyber Threat | October 2017
Trust Between Criminals is the Darknet's Real Currency | August 2017
Restructuring the U.S. Intelligence Community | June 2017
A Borderless Battle: Defending Against Cyber Threats | March 2017
A Reference for Cyber Operations | March 2017
Federal Support and Guidance in the Establishment of Information Sharing Environments | February 2017
Emerging Mobile Technologies and the REAL ID Act | February 2017
How the Private Sector Can Remake U.S. Cybersecurity | January 2017
We Don't Need a Crisis to Act Unitedly Against Cyber Threats | January 2017
Mounting an Active Defense Against Cyber Threats | November 2016
What the Federal CISO Needs to Get the Job Done | October 2016
Into the Gray Zone | October 2016
Russia's Aggressive Power is Resurgent, Online and Off | August 2016
NATO After Brexit | July 2016
Cybersecurity for State and Local Law Enforcement: A Policy Roadmap to Enhance Capabilities | June 2016
Emerging Cyber Threats to the United States | February 2016
Estonia: A Hub of Cyber Innovation | January 2016
Homeland Defense: Policy Judgments and Lessons Learned | December 2015
Someone Needs to Run the U.S. Effort to Defeat ISIS Online | December 2015
Paris Insights | November 2015
Could New Global Regime Tame "Wild West" of Cyberspace? | November 2015
Evaluating Intelligence and Information Sharing Networks: Examples from a Study of the National Network of Fusion Centers | October 2015
Vulnerability and Resilience in the Internet of Everything | September 2015
Economic Cyber-Espionage: Time to Tame the Dragon | September 2015
A Global Perspective on Cyber Threats | June 2015
Cyber Deterrence is a Strategic Imperative | April 2015
The Bear is Inside the Wire | April 2015
Obama's Cybersecurity Initiative | February 2015
Learn from France's counter-extremism push | February 2015
Risk-Based Security and the Aviation System | January 2015
How Dangerous Is Vladimir Putin? | January 2015
Putin's Russia: A Geopolitical Analysis | November 2014
Raising the Bar on Cybersecurity and Acquisition | October 2014
Seven Cybersecurity Questions Bank Boards Need to Ask | October 2014
The Homegrown Jihadist Threat Grows | October 2014
US needs to be prepared for Russian cyber-retaliation | September 2014
Cybersecurity Challenges for State and Local Governments: Assessing How the Federal Government Can Help” | September 2014
Stakeholder Perspectives on Priorities for the Quadrennial Homeland Security Review (QHSR) | June 2014
Detainee Release and Global Public Safety | June 2014
Takedown from Capo to 'Chapo' -- Show Me the Money | March 2014
Repurposing Cyber Command | December 2013
Economic Espionage and Trade Secret Theft: An Overview of the Legal Landscape and Policy Responses | September 2013
Understanding the Threat to the Homeland from AQAP | September 2013
On 9/11, DHS is Missing in Action | September 2013
It's the Ideology, Stupid | June 2013
The FY 2014 Budget Request for the Department of Homeland Security: An Initial Assessment | April 2013
Boko Haram in Northern Nigeria: No Easy Fix | April 2013
Cyber Threats from China, Russia, and Iran: Protecting American Critical Infrastructure | March 2013
Pardon the Pivot, What About Africa? | March 2013
Cyber Domain Conflict in the 21st Century | January 2013
Chinese Telecom Firms Pose a Threat to U.S. National Security | November 2012
Beyond Benghazi: A Powerful New Counterterrorism Strategy? | October 2012
The Department of Homeland Security: An Assessment of the Department and a Roadmap for its Future | September 2012
Educating our Guardians | July 2012
Drones in Yemen: Is the U.S. on Target? | June 2012
The Iranian Cyber Threat to the United States | April 2012
Whatever Happened to the A-Team of Terrorism?: A Brief Assessment of Hizballah and Iran's Islamic Revolutionary Guard Corps | February 2012
The United States is doing something right in the war on terror | February 2012
Getting Serious About Cyberwarfare | January 2012
The Hybrid Threat: Crime, Terrorism, and Insurgency in Mexico | December 2011
Mexico and the Triple Threat | October 2011
Operationalizing Resilience: A Systems-Based Approach Emphasizing Risk Management is Required | October 2011
U.S.-India Counterterrorism Cooperation: Deepening the Partnership | September 2011
Counterterrorism Intelligence: Law Enforcement Perspectives | September 2011
Running a Three-Legged Race: the San Diego Police Department, the Intelligence Community, and Counterterrorism | August 2011
Yemen & Al Qaeda in the Arabian Peninsula: Exploiting a Window of Counterterrorism Opportunity | June 2011
Interim Task Force Report on Resilience | May 2011
The Global Muslim Brotherhood: Myth or Reality? | March 2011
Managing Complexity in a Wikileaks World | December 2010
Eurovision? Let's Hope It's Farsighted | October 2010
Foreign Fighters: Trends, Trajectories, & Conflict Zones | September 2010
Supply and Demand: The Case for Community Medical Resilience | September 2010
Cloud Computing Risks and National Security | September 2010
Baghdad Surprise? | August 2010
Flooded With Help -- But Still Flailing | June 2010
All Hands--and Eyes--Needed on Deck | May 2010
Stopping Terror In and On Its Tracks | March 2010
Al-Qaeda Central and the Internet | March 2010
Disaster Diplomacy | February 2010
Cons Gone Wild? | January 2010
Reflections on Jihad: A Former Leader's Perspective | October 2009
Storm Surge | October 2009
Fighting Piracy and Protecting National Interests | September 2009
Next Generation National Security | September 2009
Reckless Neglect: A Disaster Waiting to Happen...Again? | August 2009
East African Piracy | July 2009
The Metro Crash Shows Progress On Preparedness | June 2009
Radicalization: Made in the USA? | June 2009
How to Beat al Qaeda at Its Own Game | April 2009
Defeating Somali Pirates Won't Be Easy | February 2009
Hey Good Samaritans - Get a Lawyer! | January 2009
Dependence on Non-Profits During Major Disaster Relief | January 2009
FEMA: Where Does it Fit? | January 2009
In Afghanistan, hit'em where they aren't | September 2008
Not Your Father's FEMA | September 2008
How Can the U.S. Improve Human Intelligence? | July 2008
Religious Discrimination and Prisoner's Rights | April 2008
Poverty and Terrorism | August 2007
NETworked Radicalization: A Counter-Strategy | May 2007
Radicalization: Behind Bars and Beyond Borders | April 2007
Report of the Future of Terrorism Task Force | January 2007
The Homeland Security Implications of Radicalization | September 2006
Out of the Shadows: Getting Ahead of Prisoner Radicalization | September 2006
The National Guard and Homeland Defense | May 2006
Cyberstrategy 2.0 | April 2006
Hurricane Katrina: Recommendations for Reform | March 2006
Terrorism Risk Insurance: Assessing TRIA and the Way Forward | December 2005
Enhancing Preparedness for Cyanide Terrorism | September 2005
A Doomsday Priority | April 2005
Don't Rush Toward a Trinational Security Strategy | March 2005
Consolidating the House's homeland security efforts | December 2004
The Use and Limits of U.S. Intelligence | November 2002
Assessing State-Level Civil Preparedness for a Nuclear Attack | September 2002
Fighting Terrorism | January 2002
Critical Infrastructure Protection: Who's in Charge? | October 2001
The Threat of Bioterrorism and the Spread of Infectious Diseases | September 2001
Wired World: Cyber Security and the U.S. Economy | June 2001
Combating Chemical, Biological, Radiological, and Nuclear Terrorism: A Comprehensive Strategy | May 2001
Protecting American Interests Abroad: U.S. Citizens, Businesses, and Non-Governmental Organizations | April 2001
The Threat Posed from the Convergence of Organized Crime, Drug Trafficking, and Terrorism | December 2000
And the Winner is...The Albanian Mafia | November 2000
Responding to New Terrorist Threats | July 1998
Information Warfare and Strategic Terrorism | February 1997
Between War and Peace: Deterrence and Leverage | January 1997