The Cyber Espionage Predominant Purpose Test
Can international law meaningfully distinguish between cyberespionage for national security purposes and economic espionage?
Can international law meaningfully distinguish between cyberespionage for national security purposes and economic espionage?
The unrelenting tempo of combat operations at the Corps and below level in the Army creates unique challenges for the execution of Offensive Cyber Operations.
For naval intelligence to effectively support the Chief of Naval Operation’s new strategy, it must first adapt to the realities of the digital information age.
The potential for this cyber war in the underworld to expand or to spill out into real world violence is high.
Conventional and cyber conflict diffusion diverge on two points: third-party intervention (escalation) and collateral damage (pathogen). The findings raise questions regarding state neutrality, non-state actors, and authenticating attackers.
Russia has integrated cyber operations into its military doctrine.
As cyberspace operations continue to evolve, they raise some unique questions regarding the nature of conflict and how it should be discussed and regulated.
Our physical world instincts often fail us when thinking about cyberspace.
The evolution of al-Qaeda's media strategy.
Cyber warfare isn’t hype; it’s real.