Frank J. Cilluffo, Director

Frank Cilluffo


Frank J. Cilluffo is the director of Auburn University’s McCrary Institute for Cyber and Critical Infrastructure Security.
Cilluffo is a member of the Cyberspace Solarium Commission and the Department of Homeland Security’s Advisory Council, and he’s routinely called upon to advise senior officials in the executive branch, U.S. Armed Services, and state and local governments on an array of matters related to national and homeland security strategy and policy. In addition to briefing Congressional committees and their staffs, he has publicly testified before Congress on numerous occasions, serving as a subject matter expert on policies related to cyber threats, counterterrorism, security and deterrence, weapons proliferation, organized crime, intelligence and threat assessments, emergency management, and border and transportation security. Similarly, he works with U.S. allies and organizations such as NATO and Europol. He has presented at a number of bi-lateral and multi-lateral summits on cybersecurity and countering terrorism, including the U.N. Security Council.
Following the Sept. 11, 2001 terrorist attacks, Cilluffo was appointed by President George W. Bush to the newly created Office of Homeland Security. There, he was involved in a wide range of homeland security and counterterrorism strategies, policy initiatives and served as a principal advisor to Director Tom Ridge, directing the president’s Homeland Security Advisory Council.

Cilluffo then joined George Washington University in 2003, establishing the Center for Cyber and Homeland Security as a prominent nonpartisan "think and do tank" dedicated to building bridges between theory and practice to advance U.S. security. He served as an associate vice president where he led a number of national security and cybersecurity policy and research initiatives. He directed the Center for Cyber and Homeland Security and, with the School of Business, launched the university’s World Executive MBA in Cybersecurity program.

Prior to his White House appointment, Cilluffo spent eight years in senior policy positions with the Center for Strategic and International Studies, a Washington-based think tank. There, he chaired or directed numerous committees and task forces on homeland defense, counterterrorism and transnational organized crime, as well as information warfare and information assurance.

He has published extensively in academic, law, business and policy journals, as well as magazines and newspapers worldwide. His work has been published through ABC News, Foreign Policy, The Journal of International Security Affairs, The National Interest, Parameters, Politico, Studies in Conflict and Terrorism, USA Today, U.S. News & World Report, The Washington Quarterly and The Washington Post. He currently serves on the editorial advisory board for Military and Strategic Affairs, and has served as an on-air consultant for CBS News and as a reviewer for a number of publications and foundations. 

Congressional Testimonies

A Borderless Battle: Defending Against Cyber Threats
March 22, 2017

Emerging Cyber Threats to the United States
February 25, 2016

A Global Perspective on Cyber Threats
June 16, 2015

Stakeholder Perspectives on Priorities for the Quadrennial Homeland Security Review (QHSR)
June 20, 2014

Understanding the Threat to the Homeland from AQAP (PDF)
September 18, 2013

Countering the Use of the Internet for Terrorist Purposes (PDF)
May 24, 2013

Cyber Threats from China, Russia and Iran: Protecting American Critical Infrastructure (PDF)
March 20, 2013

A Line in the Sand: Assessing Dangerous Threats to Our Nations Borders (PDF)
November 16, 2012

The Department of Homeland Security: An Assessment of the Department and a Roadmap for its Future (PDF)
September 20, 2012

The Future of Homeland Security: Evolving and Emerging Threats (PDF)
July 11, 2012

The Iranian Cyber Threat to the United States (PDF)
April 26, 2012

U.S.-India Counterterrorism Cooperation: Deepening the Partnership (PDF)
September 14, 2011

Moving Beyond the First Five Years: Evolving the Office of Intelligence and Analysis to Better Serve State, Local, and Tribal Needs (PDF)
April 24, 2011

Religious Discrimination and Prisoner's Rights (PDF)
April 08, 2008

Assessing and Addressing the Threat: Defining the Role of a National Commission on the Prevention of Violent Radicalization and Homegrown Terrorism (PDF)
June 14, 2007

The Internet: A Portal to Violent Islamist Extremism (PDF)
May 03, 2007

The Homeland Security Implications of Radicalization (PDF)
September 20, 2006

Prisoner Radicalization: Are Terrorist Cells Forming in U.S. Cell Blocks? (PDF)
September 19, 2006

Bioterrorism and Pandemic Influenza: Are We Prepared? (PDF)
May 23, 2006

The National Guard and Homeland Defense (PDF)
May 04, 2006

Hurricane Katrina: Recommendations for Reform (PDF)
March 08, 2006

Preventing Terrorist Attacks on America's Chemical Plants (PDF)
June 15, 2005

Combating Terrorism: Developing Effective Strategies Against Terrorism (PDF)
February 03, 2004

Critical Infrastructure Protection: Who's in Charge? (PDF)
October 04, 2001

The Threat of Bioterrorism and the Spread of Infectious Diseases (PDF)
September 05, 2001

Wired World: Cyber Security and the U.S. Economy (PDF)
June 21, 2001

Combating Terrorism: Options To Improve The Federal Response (PDF)
April 24, 2001

Protecting American Interests Abroad: U.S. Citizens, Businesses, and Non-Governmental Organizations (PDF)
April 03, 2001

Combating Terrorism: In Search of a National Strategy (PDF)
March 27, 2001

DECEMBER 13, 2000

February 1, 2000

Weapons of Mass Destruction, Terrorism, and U.S. Preparedness (PDF)
OCTOBER 2, 1998

DECEMBER 10, 1996

Issue Brief Series

Responding to Cybercrime at Scale: Operation Avalanche - A Case Study
March 28, 2017

Putin’s Russia: A Geopolitical Analysis
November 21, 2014

Detainee Release and Global Public Safety: Terrorist Disengagement and Deradicalization Programs—The Way Ahead
June 05, 2014

Pardon the Pivot, What About Africa? (PDF)
March 06, 2013

Drones in Yemen: Is the U.S. on Target? (PDF)
June 21, 2012

Mexico and the Triple Threat (PDF)
October 20, 2011

Yemen & Al Qaeda in the Arabian Peninsula: Exploiting a Window of Counterterrorism Opportunity (PDF)
June 24, 2011

Egyptian Crosscurrents: The Muslim Brotherhood and Democracy on the Nile (PDF)
March 02, 2011

What's the Big Idea? Confronting the Ideology of Islamist Extremism (PDF)
February 04, 2011

Cloud Computing Risks and National Security: Keeping Pace With Expanding Technology (PDF)
September 09, 2010

Serving America's Disaster Victims: FEMA, Where Does It Fit? (PDF)
January 13, 2009

Consolidating the House's Homeland Security Efforts: The Time to Act is Now (PDF)
December 29, 2004

Policy Reports

The Hybrid Threat: Crime, Terrorism and Insurgency in Mexico (PDF)
December 01, 2011

Foreign Fighters: Trends, Trajectories & Conflict Zones (PDF)
September 22, 2010

The H1N1 Influenza A Virus: A Test Case for a Global Response (PDF)
May 01, 2009

The Homeland Security Council: Considerations for the Future (PDF)
April 01, 2009

NETworked Radicalization: A Counter-Strategy (PDF)
May 03, 2007

Stopping Surprise Attacks: Thinking Smarter About Homeland Security
April 23, 2007

Report of the Future of Terrorism Task Force (PDF)
January 25, 2007

Out of the Shadows: Getting Ahead of Prisoner Radicalization (PDF)
September 19, 2006

Regionalizing Homeland Security: Unifying National Preparedness and Response (PDF)
June 30, 2006

Empowering America: A Proposal for Enhancing Regional Preparedness (PDF)
April 06, 2006

Terrorism Risk Insurance: Assessing TRIA and the Way Forward (PDF)
December 05, 2005

Enhancing Preparedness for Cyanide Terrorism (PDF)
September 20, 2005

Back to the Future: An Agenda for Federal Leadership of Emergency Medical Services (PDF)
May 02, 2005

Combating Chemical, Biological, Radiological, and Nuclear Terrorism: A Comprehensive Strategy (Purchase Book)
May 21, 2001

Cyber Threats and Information Security: Meeting the 21st Century Challenge
May 21, 2001

Journal Articles

Repurposing Cyber Command (PDF)
December 01, 2013

Foreign Fighters in Syria: Still Doing Battle, Still a Multidimensional Danger (PDF)
August 31, 2013

Estonia's Cyber Defence League: A Model for the United States?
August 01, 2013

Cyber Domain Conflict in the 21st Century
January 01, 2013

Radicalization: Behind Bars and Beyond Borders (PDF)
April 01, 2007

Cyberstrategy 2.0 (PDF)
April 01, 2006

The Use and Limits of U.S. Intelligence (PDF)
November 01, 2002

Cyber-Attack: The National Protection Plan and Its Privacy Implications (PDF)
November 01, 2000

Cyber Threats: Ten Issues to Consider (PDF)
September 01, 2000

And the Winner is...The Albanian Mafia (PDF)
September 01, 1999

Responding to New Terrorist Threats (PDF)
July 01, 1998

Information Warfare and Strategic Terrorism (PDF)
February 01, 1997

Between War and Peace: Deterrence and Leverage (PDF)
January 01, 1997

Op-Eds & Commentaries

Unintended consequence: Federal cybersecurity workforce a potential casualty of the shutdown
January 22, 2019

What’s wrong with Huawei, and why are countries banning the Chinese telecommunications firm?
December 19, 2018

With hacking of US utilities, Russia could move from cyberespionage toward cyberwar
July 27, 2018

Innovate And Invest To Sharpen America's Competitive Edge
December 06, 2017

Parsing the North Korean Cyber Threat
October 18, 2017

Trust Between Criminals is the Darknet’s Real Currency
August 13, 2017

New Executive Order on Cybersecurity Highlights Need for Deterrence, Protection of Key Industries
May 11, 2017

Police Around the World Learn to Fight Global-Scale Cybercrime
April 26, 2017

Tackling the MS-13 Problem: A New Designation for a Hybrid Threat?
April 25, 2017

North Korea Cyberspace Offensives Pose Challenge in US-China Relations
April 05, 2017

How the Private Sector Can Remake US Cybersecurity
January 31, 2017

Trump Administration can Help Finance Sector Shift Cybersecurity Paradigm
January 18, 2017

Mounting an Active Defense Against Cyber Threats
November 10, 2016

What the Federal CISO Needs to get the Job Done
October 31, 2016

Russia's Aggressive Power is Resurgent, Online and Off
August 25, 2016

Overview and Analysis of PPD-41: US Cyber Incident Coordination
July 27, 2016

NATO After Brexit
July 04, 2016

A Cyber JSOC Could Help the US Strike Harder and Faster
April 25, 2016

Beyond Brussels: Turning the Tide against ISIL in Europe
March 31, 2016

Vulnerability and Resilience in the Internet of Everything
September 22, 2015

Economic cyber-espionage: Time to tame the dragon
September 16, 2015

Economic Espionage: A Case for Why the U.S. Needs to Push Back
August 17, 2015

Massive government employee data theft further complicates US-China relations
June 08, 2015

We Don't Need a Crisis to Act Unitedly Against Cyber Threats
June 01, 2015

The Bear is Inside the Wire
April 09, 2015

Fortifying the Internet of Things means baking in security at the beginning
March 06, 2015

Obama’s cybersecurity initiative: a start but businesses – and individuals – need to do more
February 24, 2015

How Dangerous Is Vladimir Putin?
January 01, 2015

Seven Cybersecurity Questions Bank Boards Need to Ask
October 10, 2014

US needs to be prepared for Russian cyber-retaliation
September 23, 2014

“Takedown: From Capo to `Chapo’ – Show Me The Money”
May 07, 2014

Chinese Telecom Firms Pose a Threat to U.S. National Security: Huawei and ZTE could be vehicles for Chinese espionage
December 30, 2013

It's the Ideology, Stupid
June 03, 2013

While Congress Dithers, Cyber Threats Grow Greater
July 24, 2012

Is America's View of Iran and Hezbollah Dangerously Out of Date?
March 20, 2012

How to Beat al Qaeda at Its Own Game
August 11, 2010

Storm Surge
October 05, 2009

To Beat Terrorists, Use Judo, Not Boxing
August 13, 2009

A Message to Congress from National Security and Terrorism Experts (PDF)
July 10, 2009

How Can the U.S. Improve Human intelligence?
July 06, 2008

Ice Cube on Plate Glass Window: First Responders Should Support Increased EMS Funding (PDF)
July 07, 2005

Fighting Terrorism
January 11, 2002

For A Limited Time – Advice for A New Secretary
Commentary Series

Time for the United States and Russia to Take on ISIS Together in Syria
November 13, 2015

AQAP Loses Its Chief of External Operations: Counterterrorism Implications (PDF)
July 29, 2013

Beyond Benghazi: A Powerful New Counterterrorism Strategy? (PDF)
October 19, 2012

After bin Laden the Threat Remains: Drones, CIA and SOF Still the Only Game in Town (PDF)
May 02, 2011

Tumult in the Middle East: When and Where Will the Next Shoe Drop? (PDF)
February 11, 2011

Managing Complexity in a WikiLeaks World (PDF)
December 13, 2010

Eurovision? Let's Hope It's Farsighted (PDF)
October 08, 2010

Baghdad Surprise? (PDF)
August 20, 2010

Hammami the Jihadist Pop Star--Bridging Worlds: From Mobile to Mogadishu (PDF)
August 09, 2010

All Hands—and Eyes—Needed on Deck (PDF)
May 28, 2010

Stopping Terror In and On Its Tracks (PDF)
March 31, 2010

Disaster Diplomacy (PDF)
February 26, 2010

Cons Gone Wild? (PDF)
January 28, 2010

No Longer On Auto-Pilot: Aviation Security and Intelligence Reform (PDF)
January 09, 2010

Reckless Neglect: A Disaster Waiting to Happen...Again? (PDF)
August 28, 2009

Canada and the United States: Time for a Joint Threat Assessment? (PDF)
April 22, 2009

Micro-Diplomacy in Afghanistan: Disaggregating and Engaging the Taliban (PDF)
February 17, 2009