Beyond Denial: Toward a Credible Cyber Deterrence Strategy

…reports blocking more than 100 million phishing attempts per day, and their TAG services track over 270 government-backed threat actors.32Google. “Threat Analysis Group.” Google Blog. Accessed September 26, 2025. https://blog.google/threat-analysis-group/….

A Choke-point Strategy on the Dark Web

By Levi Maxey:  Did you know that when you “google” something you only access a fraction of the World Wide Web? Indeed, commercial search engines only scratch the surface, about…

Chronology Sources

…2010 https://www.spacesecurity.org/space.security.2011.revised.pdf January 19, 2011 https://www.defense.gov/home/features/2011/0111_nsss/docs/NationalSecuritySpaceStrategyUnclassifiedSummary_Jan2011.pdf July 8, 2011 https://www.spacesecurity.org/space.security.2011.revised.pdf September 24, 2011 https://earthsky.org/space/where-will-nasas-uars-satellite-land November 11, 2011 https://www.bbc.co.uk/news/science-environment-24894611 December 23, 2011 https://www.upi.com/Science_News/2011/12/23/Russian-satellite-crashes-in-failed-launch/UPI-34291324667658/ December 29, 2011 https://www.google.com/search?q=chinese+white+paper+space+2011&oq=chinese+white+paper+space+2011&aqs=chrome.0.69i59j0.2384j0j4&sourceid=chrome&espv=210&es_sm=93&ie=UTF-8 January 11, 2012 https://www.spacesecurity.org/SSI2013.pdf…

Seeking Refuge in the 21st Century

…basic mobile device. But the value of mobile technology starts long before arriving at a refugee camp. Many refugees utilize GPS and Google Maps to navigate terrain, relay routes to…