Department of Defense

(External Content) Cyber Deterrence Theory

Abstract: This study endeavors to identify the shortfalls of the United States current utilization of deterrence theory in light of a growing amount of asymmetric warfare, warfare from afar, and cyber warfare that may rise to the level of weapons of mass destruction level. It proposes that this deterrence theory should be modernized to less developing a strategic common practice where some aggression is tolerated, and intolerable acts of aggression are retaliated with through diplomatic and economic tools against individuals involved within the organization perpetuating the aggression.

Citation: Hallock, Danial (2018).  "Modernizing Deterrence Theory." AMU. Accessed at:

Related Articles: Paradox of ProgressRedefining the Cold War; Syria, North Korea, and Trump

Abstract: This study identifies prior authoritative research into attribution assessments, their shortfalls, and recommends several potential avenues of improvement, namely the targeting of individual persons within non-state actors and advanced persistent threat actors conducting cyber attacks against the U.S. and her allies utilizing prior research into pyschology and motivational theories. 

Citation: Hallock, Danial (2018).  "Solving the Issue of Attribution, Targeting, and Retaliation." AMU. Accessed at:

Related Articles: When Bots Become Bombs, Paradox of Progress, The Accidental World War

F-35 Deploys to RAF Lakenheath

F-35 Deploys to RAF Lakenheath

The F35's come from the 34th Fighter Squadron, Hill Air Force Base, Utah. Their commanderLt Col George Watkins, had this to say about the deployment to RAF Lakenheath:

"It's teamwork between us and the local population of the base here, as they're standing up their own F-35 squadrons here [...] so they can get some lesson's learned"

The deployment was planned months in advance according to the statement released by the Department of Defense, but the timing does come as international politics throughout the entire world are tense.