This article explores the complexities of cyberwarfare, emphasizing the need to reconsider how we categorize cyber operations within the framework of the Law of Armed Conflict (LOAC). It discusses the ...
“By 2026, cyber conflict will be a constant and hybrid domain. Nation-states will increasingly leverage criminal groups to carry out ransomware, data theft, and disruption, achieving strategic goals ...
Gentry Lane is the CEO and founder of ANOVA Intelligence, a national security software company, advisor and cyberpower strategy expert. The word “cyberwar” instantly evokes clicking keyboards in a ...
Regular readers may know that I have a longstanding interest in information warfare. I was reviewing materials that might be useful in a new elective graduate course for the Norwich University MSIA ...
The answer is probably not — at least an unprovoked attack — based on extensive new legal research appearing in an upcoming issue of the British journal INFO. The research describes a 150-year-old ...
Much is written today about cybersecurity, cyberwarfare and cyberstrategy. Now a new compendium, written by two Brookings Institution academics, offers a serious and intelligent discussion of these ...
The ancient book on war, "The Art of War" by Sun Tzu, holds many lessons that are surprisingly applicable to today's cybersecurity operations. One of the most important lessons is captured in the ...
Matthew Heiman kicks off this episode of the podcast with a breakdown of Russia's attack on Ukraine's largest mobile operator. The attack was strikingly effective in destroying much of Kyivstar's ...
Yurii Shchyhol doesn’t have a lot of time to spare. The head of the Derzhspetszviazok, Ukraine’s version of the US Cybersecurity and Infrastructure Security Agency, can be forgiven for working ...
Covert action is seductive to policymakers in a bind. When diplomacy fails and force falls short, presidents often turn to the CIA for secret solutions to vexing problems. Unable to make the air war ...