As the threat and effect of psychological warfare becomes more pronounced in cyberspace, policymakers must address this burgeoning security threat.
Operationalizing cyber is not about linear thinking and lines of operation.
The emergence of gray tactics in cyber operations, their utility as a political instrument, and reasons that twilight zone conflicts are no longer a mere science fiction fantasy.
Can international law meaningfully distinguish between cyberespionage for national security purposes and economic espionage?
The unrelenting tempo of combat operations at the Corps and below level in the Army creates unique challenges for the execution of Offensive Cyber Operations.
For naval intelligence to effectively support the Chief of Naval Operation’s new strategy, it must first adapt to the realities of the digital information age.
About the Author(s)
"Along with the rest of the U.S. government, the Department of Defense depends on cyberspace to function. It is difficult to overstate this reliance."
Conventional and cyber conflict diffusion diverge on two points: third-party intervention (escalation) and collateral damage (pathogen). The findings raise questions regarding state neutrality, non-state actors, and authenticating attackers.
As cyberspace operations continue to evolve, they raise some unique questions regarding the nature of conflict and how it should be discussed and regulated.