cyber warfare
The Feet of the Masters: Lessons on Irregular Cyber Warfare
About the Author(s)
Cyber Offensive Operations: Is There a Digital Delta Force?
About the Author(s)
Information Operations as Force Protection
About the Author(s)
The New Global Competitive Model Based on Cyber and Asymmetrical Hybrid Warfare
Top Threat to Business, National Security and the American Dream: Detailing the New Global Competitive Model Based on Cyber and Asymmetrical Hybrid Warfare
- Read more about The New Global Competitive Model Based on Cyber and Asymmetrical Hybrid Warfare
- 2 comments
About the Author(s)
The Mouse Clicks of August: Hybrid Warfare, Nation-State Actors, and the Future of Cybersecurity
Although hacking has been part of espionage since at least 1989 nation-state sponsored attacks have grown dramatically throughout the past decade.
About the Author(s)
The United States military should develop cyber special operations capabilities to expand the menu of policy options for addressing threats to U.S. interests and national security.
The Cyber Underground – Resistance to Active Measures and Propaganda: “The Disruptors” - Motto: “Think For Yourself”
A cyber underground, organized around special operations principles can create a nationwide and global network that will seek out, identify, understand, and expose active measures and propaganda.
- Read more about The Cyber Underground – Resistance to Active Measures and Propaganda: “The Disruptors” - Motto: “Think For Yourself”
- 39 comments
About the Author(s)
Cyber Threat or Cyber Threat Inflation? - Assessing the Risk to U.S. National Security
There are two competing arguments regarding the gravity of the threat that cyber-attacks pose to the nation’s security.
About the Author(s)
Marketing to Extremists: Waging War in Cyberspace
ISIS’s cyber efforts have paid off; the FBI told Congress in July 2016 that “the message of radicalization spreads faster than we imagined just a few years ago.