Virtual Library

Our virtual library is an online repository of all of the reports, papers, and briefings that IST has produced, as well as works that have influenced our thinking.

Submit your Content

Reports

Why Venture Capital Is Indispensable for U.S. Industrial Strategy: Activating Investors to Realize Disruptive National Capabilities

Michael Brown and Pavneet Singh

viewpdf

Reports

The Implications of Artificial Intelligence in Cybersecurity: Shifting the Offense-Defense Balance

Jennifer Tang, Tiffany Saade, Steve Kelly

viewpdf

Fact Sheet

IST’s Efforts in the Age of AI: An Overview

viewpdf

Reports

Unlocking U.S. Technological Competitiveness: Proposing Solutions to Public-Private Misalignments

Ben Purser, Pavneet Singh

viewpdf

Articles

The Phone-a-Friend Option: Use Cases for a U.S.-U.K.-French Crisis Communication Channel

Daniil Zhukov

viewpdf

Articles

China: Nuclear Crisis Communications and Risk Reduction

Dr. Tong Zhao

viewpdf

Articles

Use-Cases of Resilient Nuclear Crisis Communications: A View from Russia

Dmitry Stefanovich

viewpdf

Contribute to our Library!

We also welcome additional suggestions from readers, and will consider adding further resources as so much of our work has come through crowd-sourced collaboration already. If, for any chance you are an author whose work is listed here and you do not wish it to be listed in our repository, please, let us know.

SUBMIT CONTENT

Hacking in Plain Sight: Offensive Cyber Operations in the Russo-Ukrainian War

Erica D. Lonergan, Silas Cutler, Marc Rogers, and Megan Stifel

EVENT DESCRIPTION

When Russia invaded Ukraine, much was said about the perceived lack of cyber operations being used in the early part of the war. However, offensive cyber campaigns have indeed been key components of the ongoing conflict, and are important to investigate and understand.

On May 11, 2022, the Army Cyber Institute’s Erica D. Lonergan, Stairwell’s Silas Cutler, Okta’s Marc Rogers, and IST’s Megan Stifel had a conversation about the range of cyber operations seen in the Russo-Ukrainian war, how each country responded, the implications for both countries, and what we can learn when it comes to modern cyber operations in wartime.