Bytes, Bombs, and Spies: The Strategic Dimensio...
Bytes, Bombs, and Spies: The Strategic Dimensio...

Bytes, Bombs, And: Spies: The Strategic Dimensio...

Tackles the "cyber quagmire" of whether offensive actions prevent conflict or accidentally trigger it. It identifies five primary escalatory pressures, including public opinion and unintended damage.

The strategic use of cyberattacks to overwhelm the digital command-and-control systems used by terror organizations. Bytes, Bombs, and Spies: The Strategic Dimensio...

A central argument is that technical development of cyber weapons has far outpaced our strategic and conceptual understanding of how to use them safely and effectively. Tackles the "cyber quagmire" of whether offensive actions

The use of a computer worm to physically damage Iranian nuclear centrifuges, highlighting the bridge between digital code and physical destruction. A central argument is that technical development of

The volume uses high-profile real-world events to illustrate the strategic application of "bytes":

Deep dives into Unit 61398 of the People’s Liberation Army and its long-term exfiltration of corporate data from U.S. companies. Key Strategic Takeaways

Analysis of cyber campaigns intended to compromise and cause failures in ballistic missile launches.