War in All but Name
The U.S. is already at war, and Great Power Competition is that war.[1] The information war that has raged in various forms since the 1920s has evolved into cyber operations, such as Moonlight Maze, and disinformation campaigns, as seen in the 2016 U.S. Presidential election.[2] The U.S. National Security Strategy has recently tried to prioritize cyber and information warfare—a necessary step in our modern world. Yet, these steps do not go far enough to counter adversaries in these domains. Information warfare, combined with political and economic acts of aggression, comprises the majority of actions between the United States and Russia, and the United States and China.[3] These actions are at levels of hostility not seen since the Cold War era, as evidenced by U.S. Cyber Command’s (USCYBERCOM) persistent engagement strategy and the Chinese strategy of Unrestricted Warfare.[4]
Implementing and prioritizing new cyber and information warfare initiatives as a part of the National Security Strategy will be crucial to America’s success in modern Great Power Competition.
Ultimately, Russia and China plan on winning the Great Power Competition by undermining the U.S., sowing discord, and continuing a secret war until the positions in the world order are reversed.[5] Implementing and prioritizing new cyber and information warfare initiatives as a part of the National Security Strategy will be crucial to America’s success in modern Great Power Competition. Specifically, the U.S. must more effectively leverage its cyber capabilities, as well as improve its understanding of adversary information warfare tactics, to keep the balance in its favor. To compete in this raging war, the authors of the National Security Strategy must answer the question: how can the U.S. leverage strengths and overcome weaknesses in cyber and information warfare to regain domain superiority?
Understanding the information space and cyber domain, how they have evolved, and how adversaries seek to leverage its advantages to achieve national goals is key to setting a new National Security Strategy. First, we must define the term “information warfare.” The private sector understands information warfare as disinformation, propaganda, and other activities based purely on the use and manipulation of information itself. The Department of Defense’s definition, which also includes intelligence, cyber, and electronic warfare activities, is used here instead.[6] As nations figure out how to leverage the power of the Internet while protecting their interests, there is a growing balkanization of the Internet into territorial boundaries which must be defended.[7] With growing balkanization efforts, countries are increasingly using the Internet to control narratives, conduct espionage, and launch destructive attacks on adversary countries.
The first shots of this war happened years ago. On the Russian front, 1999’s Moonlight Maze is essentially an opening salvo.[8] Millions of dollars worth of DoD data was exfiltrated, yet there was no retaliation from the U.S. This lack of retaliation showed Russia that it could conduct information warfare against the U.S. with impunity. Since then, Russia has grown bolder.[9] Vladimir Putin became President of the Russian Federation the same year that Moonlight Maze occurred, and began a gradual shift back towards Cold War stances. His actions against Estonia and Ukraine are apt case studies in how to integrate information warfare and cyber operations with kinetic forces.[10] Russia's successful integration represents a huge leap forward for military utilization of the information domain, and a level of proficiency that the United States has not yet come close to achieving.
Meanwhile, China is playing a long game in cyberspace, on a scale unfathomable to western strategists. Michael Pillsbury’s examination of this Chinese strategy in The Hundred-Year Marathon describes many events which could be considered an opening salvo.[11] The 2007 test of a Chinese anti-satellite missile serves as a turning point towards increasingly aggressive actions.[12] Aside from public condemnation of China’s disregard for the space environment due to the debris field created that will be in orbit for decades, China faced little repercussion from the international community. Since then, and perhaps even before then, China has singularly demonstrated its intent to become a world power. Due to the world’s continued ignorance, China pursues this goal more aggressively with each passing year. Since 2007, China has become more combative than ever, especially in the cyber domain. In the past few years, the Chinese government has conducted cyber espionage operations against U.S. companies, and even meddled in the 2020 U.S. election.[13]
Information warfare provides the perfect mechanism to erode U.S. power without resorting to direct conflict.
China and Russia both seek to undermine U.S. power and influence.[14] Adversaries of the U.S. have made strides in defending their defined Internet boundaries whether it is Russia demonstrating their ability to cut themselves off from the rest of the world or China’s great firewall.[15] Russia meddled in the 2016 U.S. election through hack and leak operations and disinformation campaigns, and tried it again in 2020.[16] China, meanwhile, is on a trajectory to overtake the U.S. as the world’s superpower well before their target date of 2049, largely through economic cyberespionage, and Belt and Road Initiative efforts. One cannot misconstrue these adversary actions as a simple nuisance, or “growing pains” within far away nations. They are, in fact, carefully planned and executed stratagems. Any misinterpretation of this fact is likely by design: both China and Russia recognize that direct conflict would be devastating if it happened today and so they rely on other means to achieve their goals.[17] This affords them a way to fight the U.S. below the threshold of armed conflict. Though some countries, such as France, are beginning to quantify what constitutes an act of war in cyberspace, the U.S. has yet to follow suit.[18] Simultaneously, China’s pursuit of “assassin’s mace” weapons and other strategic advantages that will improve their odds of winning a war if it turns into direct conflict.[19]
This confluence of advantages combined with the ability to conduct operations from nearly anywhere on Earth and the indecision around whether information warfare exists below the threshold of armed conflict makes this an ideal domain to compete in for adversary nations looking to supplant the United States.
Information warfare provides the perfect mechanism to erode U.S. power without resorting to direct conflict. Developing or buying even the most sophisticated cyber capabilities are orders of magnitude cheaper than the research, development, production, and maintenance of kinetic forces and equipment.[20] Utilizing social media and other Internet platforms has made disinformation and propaganda cheaper and more effective than ever.[21] Cyber and information operations also have the advantage in difficulty of attribution.[22] A sublimely executed information warfare operation would erase its own tracks and sow doubt about whether it even happened, or spread misinformation about an operation that did—or didn’t—happen. The elements for a good information warfare campaign also apply to conspiracy theories.[23] Emotionally charged, self-sealing information utilizing human psychology as a weapon that spreads like wildfire and is impossible to dislodge or contain once it has taken hold. This confluence of advantages combined with the ability to conduct operations from nearly anywhere on Earth and the indecision around whether information warfare exists below the threshold of armed conflict makes this an ideal domain to compete in for adversary nations looking to supplant the United States.
Legacy systems create a target in the network that few people know well enough to defend.
This is especially the case where American legacy systems abound. Banking systems are infamously old and still run on thirty-year-old legacy software, giving adversaries an easy target.[24] While efforts are underway to upgrade, some will likely remain for another few decades. Especially as programmers willing to learn and work with these aging systems dwindle. Exacerbating this, many utility companies and Industrial Control Systems/Supervisory Control And Data Acquisition (ICS/SCADA) systems can easily be found on publicly available tools that constantly scan the Internet.[25] This is also a problem for the U.S. military which often clings to Windows XP and older systems. The Department of Defense has demonstrated its dependence on these legacy systems by paying Microsoft millions each year for continued support.[26] The Department of Defense is notorious for its struggle with its own acquisitions process ensures this is not a problem that will just go away.[27] Rob Joyce, the former head of Tailored Access Operations, in a 2016 talk, said the National Security Agency succeeds when intelligence professionals know a target’s network better than even its administrators do.[28] Legacy systems create a target in the network that few people know well enough to defend.
Demonstrations of the power and importance of cyber and information warfare frequently occur worldwide. Russia conducted cyber operations in Ukraine in order to facilitate the annexation of critical territory.[29] The malware NotPetya alone caused more damage worldwide than if an adversary had sunk a U.S. warship—not considering loss of life—something that would almost certainly garner a declaration of war.[30] Warfare has changed, cyber operations can no longer be relegated to the sidelines. Cyber, like aviation in the early 20th century, is not fully utilized and the nations who bring it to its full potential will become major players in future conflict. As former Estonian President Toomas Ilves said, “you don’t need to physically attack a country to debilitate it”.[31] Chief of Naval Operations, Admiral Gilday captured it perfectly when he said “We’re not fighting an enemy that people can see, and we’re not fighting a war where international norms exist. But make no mistake, we are in conflict day-in and day-out in the cyber realm.”[32] Our modern world doesn’t care much about formal declarations of war and strictly classifying actions.
Though the U.S. has been slow to respond, there are many changes to the National Security Strategy that, if incorporated now, would counter adversarial strategies and better defend the Nation. First, the U.S. should re-establish the United States Information Agency. Second, learning from Estonia, the U.S. must establish programs to teach people how to implement better cybersecurity and recognize disinformation. Third, the U.S. needs to incentivize the overhaul of legacy systems and better cybersecurity posturing. Fourth, the U.S. must grow cyber expertise in the military and better integrate cyberspace operations with kinetic forces.
A new United States Information Agency could coordinate information dissemination government wide and help to ensure the truth is available worldwide.
Dissolved in 1999, the United States Information Agency served to consolidate and coordinate “all of the foreign information activities.”[33] The agency operated many programs such as the Voice of America, Radio Free Europe, and more. These programs disseminated accurate information and helped combat the USSR who was notorious for disinformation and propaganda. The coordinated effort helped U.S. interests abroad. While the world has more access than ever to information thanks to the Internet, balkanization, censorship, and disinformation campaigns make it difficult for individuals to know what is true. Not to mention a growing distrust of major media outlets which pander to their audiences for ratings rather than maintain journalistic integrity. A new United States Information Agency could coordinate information dissemination government wide and help to ensure the truth is available worldwide. The U.S. cannot stoop to the level of China and Russia. It must instead be a bastion of truth. A coordinating body is needed to maximize the impact of this information. The Department of State’s recent fumbling of a campaign to raise awareness and gather information on election meddling highlights the need for better coordination.[34] With human psychology, information systems we’ve become so reliant on being used as weaponry, and the sheer scale of these campaigns, it’s easy to see the need for a coordinating body.
The United States Information Agency would also be a good candidate to lead the second initiative, teaching individuals how to recognize disinformation. In a joint effort, the United States Information Agency and the Cybersecurity and Infrastructure Security Agency could take lessons from Estonia and push similar initiatives. Issuing digital certificates to every individual and company, improving their cybersecurity posture, and launching education programs are just two examples of the many successful efforts that are keys to Estonia’s success.[35] While the cost would be significantly higher for the U.S. than Estonia, the benefits of such a program would be exponentially greater. With costs for cybercrime alone costing upwards of five trillion dollars worldwide annually, and over one hundred billion in the U.S., even small improvements would cover the cost of the effort.[36] When security becomes ingrained in society, mistakes from government employees allowing incidents like the Office of Personnel Management hack and other attacks that allowed China to steal trillions of dollars worth of research on platforms like the F-35, will become less frequent.[37]
Additionally, the United States Information Agency and Cybersecurity & Infrastructure Security Agency could work with major technology platforms to combat disinformation. Assisting private companies in removing disinformation and accounts creating that sort of content would benefit from direct coordination with the government. Large platforms have shown that they will take these actions themselves, at least to some degree.[38] Facebook has even gone so far as to purchase and use exploits to help the FBI arrest people abusing its platform.[39] If the Cybersecurity & Infrastructure Security Agency were able to partner directly with the private sector, great strides could be made in defending the American people. Doing so would not take too much effort as many major companies already maintain a small cadre of personnel with security clearances, which could help facilitate this collaboration.
While the U.S. is already at war, if it can incorporate and prioritize these four actions in the new National Security Strategy it will be significantly better positioned to compete, defend, and fight with information warfare.
Next, the U.S. needs to remove legacy systems. The insurance industry is attempting to improve cybersecurity with companies like Resilience offering incentive rates for significant security improvements.[40] The U.S. could similarly incentivize industries with tax breaks or preferential treatment in contract negotiations for taking steps to improve cybersecurity. This would push utility companies to make necessary upgrades or incentivize manufacturers of Industrial Control and Supervisory Control and Data Acquisition systems to build security into their products.
Finally, the Department of Defense needs to continue to grow its cyber force. U.S. Cyber Command has come a long way in demonstrating its value, conducting operations, and even helping the information security community through malware disclosures.[41] This momentum needs to be seized upon. As U.S. Cyber Command continues to hone its craft, it needs to start integrating with the more traditional parts of the military. Special Operations Forces are the obvious first candidate for integrating with cyber operations. Special Operations personnel are already asked to do more than the average unit and often are the first to experiment with new technology. The innovative and can-do mindset present in these units combined with the many unique skills and cross-training these units receive creates the perfect environment for the military to experiment with cyber and kinetic operations integration. Add in Special Operations’ history of psychological operations and influence campaigns which are already considered Information Warfare, and cyber becomes the logical next step for bringing the force into the future. Eventually the U.S. will need to realize the goal of integrating cyberspace operations with every operational branch of the military from infantry and armor, to ships, aircraft, and spacecraft. Furthermore, retired Admiral James Stavridis articulates the argument for a separate cyber branch of the military.[42]
While the U.S. is already at war, if it can incorporate and prioritize these four actions in the new National Security Strategy it will be significantly better positioned to compete, defend, and fight with information warfare. Adversaries will avoid a direct conflict and instead seek to leverage information warfare to undermine the U.S. and gain a dominant global position. A strategy enabling the U.S. to fight back must incorporate the rebuilding of the United States Information Agency, lessons from Estonia, incentivize the overhaul of our legacy systems, and fully integrate cyberspace operations throughout the military.
Derek S. Bernsen is an officer in the U.S. Navy. He has a master’s degree in computer science from Georgia Tech and is a graduate of The Citadel. The views expressed are the author’s alone and do not reflect those of the U.S. Navy, the Department of Defense, or the U.S. Government.
Have an idea for your own article? Follow the logo below, and you too can contribute to The Bridge:
Enjoy what you just read? Please help spread the word to new readers by sharing it on social media.
Header Image: Hacker Binary Code 1993 (Markus Spiske),
Notes:
[1] “National Security Strategy of the United States of America.” 2017. National Security Strategy Archive. https://nssarchive.us/wp-content/uploads/2020/04/2017.pdf.
[2] Rid, Thomas. 2020. Active Measures: The Secret History of Disinformation and Political Warfare. N.p.: Farrar, Straus and Giroux.
[3] Howard, LeAnne N., and Derek Reveron. 2018. “NATO’s Achilles Heel: Russian Political Warfare.” The National Interest. https://nationalinterest.org/blog/the-buzz/natos-achilles-heel-russian-political-warfare-25010.
“How China's Economic Aggression Threatens the Technologies and Intellectual Property of the United States and the World.” 2018. The White House. https://www.whitehouse.gov/wp-content/uploads/2018/06/FINAL-China-Technology-Report-6.18.18-PDF.pdf.
[4] Lopez, C. Todd. 2019. “Persistent Engagement, Partnerships, Top Cybercom’s Priorities.” Department of Defense. https://www.defense.gov/Explore/News/Article/Article/1847823/persistent-engagement-partnerships-top-cybercoms-priorities/.
Liang, Qiao, and Wang Xiangsui. 1999. “Unrestricted Warfare.” Archive.org. https://archive.org/details/Unrestricted_Warfare_Qiao_Liang_and_Wang_Xiangsui.
[5] “Military and Security Developments Involving the People's Republic of China 2020.” 2020. Department of Defense. https://media.defense.gov/2020/Sep/01/2002488689/-1/-1/1/2020-DOD-CHINA-MILITARY-POWER-REPORT-FINAL.PDF.
[6] “Information Operations.” 2014. Joint Chiefs of Staff. https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_13.pdf.
[7] Roberts, Jeff J. 2018. “The GDPR and Our Balkanized Internet.” Fortune. https://fortune.com/2018/05/26/gdpr-internet/.
[8] Guerrero-Saade, Juan A., Costin Raiu, Daniel Moore, and Thomas Rid. 2017. “Penquin’s Moonlit Maze: The Dawn of Nation-State Digital Espionage.” Kaspersky Lab. https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07180251/Penquins_Moonlit_Maze_PDF_eng.pdf.
[9] Dugas, Mari, and Russia Matters Staff. 2020. “Timeline of US-Russia Relations (1983-February 2020).” Russia Matters. https://www.russiamatters.org/facts/timeline-us-russia-relations-1983-february-2020.
[10] Greenberg, Andy. 2019. Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers. N.p.: Doubleday.
[11] Pillsbury, Michael. 2015. The Hundred-Year Marathon: China's Secret Strategy to Replace America as the Global Superpower. N.p.: Henry Holt and Co.
[12] Zissis, Carin. 2007. “China’s Anti-Satellite Test.” Council on Foreign Relations. https://www.cfr.org/backgrounder/chinas-anti-satellite-test.
[13] “China’s Maritime Disputes 1895 – 2020.” n.d. Council on Foreign Relations. Accessed January 29, 2021. https://www.cfr.org/timeline/chinas-maritime-disputes.
Adams, Michael. 2016. “Why the OPM Hack Is Far Worse Than You Imagine.” Lawfare. https://www.lawfareblog.com/why-opm-hack-far-worse-you-imagine.
Lyngaas, Sean. 2020. “Taiwan accuses Chinese hackers of aggressive attacks on government agencies.” Cyber Scoop. https://www.cyberscoop.com/taiwan-china-hacking-apt40/.
Wong, Edward, Matthew Rosenberg, and Julian E. Barnes. 2020. “Chinese Agents Helped Spread Messages That Sowed Virus Panic in U.S., Officials Say.” New York Times. https://www.nytimes.com/2020/04/22/us/politics/coronavirus-china-disinformation.html.
Burt, Tom. 2020. “New cyberattacks targeting U.S. elections.” Microsoft. https://blogs.microsoft.com/on-the-issues/2020/09/10/cyberattacks-us-elections-trump-biden/.
[14] Sciutto, Jim. 2019. The Shadow War: Inside Russia's and China's Secret Operations to Defeat America. N.p.: Harper Collins.
[15] Newman, Lily H. 2020. “Russia Takes a Big Step Toward Internet Isolation.” WIRED. https://www.wired.com/story/russia-internet-control-disconnect-censorship/.
Tarabay, Jamie. 2020. “China’s Great Firewall Looms Over Hong Kong As Surveillance Grows.” Bloomberg. https://www.bloomberg.com/news/articles/2020-06-16/china-s-great-firewall-looms-over-hong-kong-as-surveillance-grows.
[16] Vavra, Shannon. 2020. “NSA director ranks influence operations as a top concern.” Cyber Scoop. https://www.cyberscoop.com/nsa-director-nakasone-influence-operations/.
[17] Sciutto, Jim. 2019. The Shadow War: Inside Russia's and China's Secret Operations to Defeat America. N.p.: Harper Collins.
[18] “INTERNATIONAL LAW APPLIED TO OPERATIONS IN CYBERSPACE.” n.d. Ministere Des Armees. Accessed January 29, 2021. https://www.defense.gouv.fr/content/download/567648/9770527/file/international+law+applied+to+operations+in+cyberspace.pdf.
[19] LaBrecque, Leon. 2019. “Are U.S. Treasuries An Assassin's Mace Or China's Trump Card? Weaponizing Treasuries In A Trade War.” Forbes. https://www.forbes.com/sites/leonlabrecque/2019/09/04/are-u-s-treasuries-an-assassins-mace-or-chinas-trump-card-weaponizing-treasuries-in-a-trade-war/?sh=20ce99771d88.Hambling, David. 2009. “China Looks to Undermine U.S. Power, With 'Assassin's Mace.'” WIRED. https://www.wired.com/2009/07/china-looks-to-undermine-us-power-with-assassins-mace/.
[20] Tsyrklevich, Vlad. 2015. “Hacking Team: a zero-day market case study.” Vlad Tsyrklevich. https://tsyrklevich.net/2015/07/22/hacking-team-0day-market/.
Capaccio, Tony. 2019. “The Navy's New Nuclear Missile Submarines Are Probably Going to Cost More Than $128 Billion.” Time. https://time.com/5566107/navy-nuclear-missile-cost/.
[21] Insikt Group. 2019. “The Price of Influence: Disinformation in the Private Sector.” Recorded Future. https://www.recordedfuture.com/disinformation-service-campaigns/.
[22] Newman, Lily H. 2016. “Hacker Lexicon: What Is the Attribution Problem?” WIRED. https://www.wired.com/2016/12/hacker-lexicon-attribution-problem/.
[23] Shepherd, Marshall. 2020. “Why People Cling To Conspiracy Theories Like ‘Plandemic.’” Forbes. https://www.forbes.com/sites/marshallshepherd/2020/05/07/why-people-cling-to-conspiracy-theories-like-plandemic/?sh=2c68b3705049.
[24] Irrera, Anna. 2017. “Banks scramble to fix old systems as IT 'cowboys' ride into sunset.” Reuters. https://www.reuters.com/article/us-usa-banks-cobol-idUSKBN17C0D8.
[25] “Industrial Control Systems on the Internet.” n.d. Shodan. Accessed January 29, 2021. https://icsmap.shodan.io/.
n.d. Shodan.io. Accessed January 29, 2021. https://www.shodan.io/.
[26] Goldman, David. 2015. “Navy pays Microsoft $9 million a year for Windows XP.” CNN. https://money.cnn.com/2015/06/26/technology/microsoft-windows-xp-navy-contract/index.html.
[27] Weisgerber, Marcus. n.d. “Slow and Steady is Losing the Defense Acquisition Race.” Government Executive. Accessed January 29, 2021. https://www.govexec.com/feature/slow-and-steady-losing-defense-acquisition-race/.
[28] Joyce, Rob. 2016. “USENIX Enigma 2016 - NSA TAO Chief on Disrupting Nation State Hackers.” YouTube. https://www.youtube.com/watch?v=bDJb8WOJYdA.
[29] Greenberg, Andy. 2019. Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers. N.p.: Doubleday.
[30] Greenberg, Andy. 2018. “The Untold Story of NotPetya, the Most Devastating Cyberattack in History.” WIRED. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/.
“Sinking of USS Maine.” n.d. Naval History and Heritage Command. https://www.history.navy.mil/our-collections/photography/wars-and-events/spanish-american-war/sinking-of-uss-maine.html.
Paterson, Pat. 2008. “The Truth About Tonkin.” Naval History Magazine 22, no. 1 (February). https://www.usni.org/magazines/naval-history-magazine/2008/february/truth-about-tonkin.
[31] Lopez, Julyssa. 2014. “Estonian President Gives GW Community Cybersecurity Advice.” GW Today. https://gwtoday.gwu.edu/estonian-president-gives-gw-community-cybersecurity-advice.
[32] VanDuser, Namoi. 2020. “NCWDG Celebrates Opening of Cyber Foundry.” Defense Visual Information Distribution Service. https://www.dvidshub.net/news/363356/ncwdg-celebrates-opening-cyber-foundry.
[33] “Records of the United States Information Agency (RG 306).” 2020. National Archives. https://www.archives.gov/research/foreign-policy/related-records/rg-306.
[34] Satter, Raphael, and Humeyra Pamuk. 2020. “State Department: We're responsible for Russian, Iranian text message campaign.” Reuters. https://www.reuters.com/article/us-cyber-iran-text-messages-idUSKCN25325L.
[35] Lopez, Julyssa. 2014. “Estonian President Gives GW Community Cybersecurity Advice.” GW Today. https://gwtoday.gwu.edu/estonian-president-gives-gw-community-cybersecurity-advice.
[36] Morgan, Steve. n.d. “2019 Official Annual Cybercrime Report.” Herjavec Group. https://www.herjavecgroup.com/wp-content/uploads/2018/12/CV-HG-2019-Official-Annual-Cybercrime-Report.pdf.
“The Cost of Malicious Cyber Activity to the U.S. Economy.” 2018. The White House. https://www.whitehouse.gov/wp-content/uploads/2018/03/The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf.
[37] Fruhlinger, Josh. 2020. “The OPM hack explained: Bad security practices meet China's Captain America.” CSO Online. https://www.csoonline.com/article/3318238/the-opm-hack-explained-bad-security-practices-meet-chinas-captain-america.html.
Coats, Daniel R. 2017. “Worldwide Threat Assessment of the U.S. Intelligence Community.” Director of National Intelligence. https://www.dni.gov/files/documents/Newsroom/Testimonies/SSCI%20Unclassified%20SFR%20-%20Final.pdf
[38] Bell, Karissa. 2020. “Facebook and Twitter take down accounts linked to Russian troll farm.” Engadget. https://www.engadget.com/2020-03-12-facebook-and-twitter-take-down-accounts-linked-to-internet-research-agency.html.
[39] Fisher, Christine. 2020. “Facebook paid for a tool to hack its own user, then handed it to the FBI.” Engadget. https://www.engadget.com/facebook-fbi-hacking-tool-targeted-child-abuser-171753372.html.
[40] n.d. Resilience Insurance. https://www.resilienceinsurance.com/.
[41] Nakasone, Paul M., and Michael Sulmeyer. 2020. “How to Compete in Cyberspace: Cyber Command’s New Approach.” Foreign Affairs. https://www.foreignaffairs.com/articles/united-states/2020-08-25/cybersecurity.
Anderson, Len, Nathan Fleischaker, and Brian Russell. 2020. “We Are Already Behind Enemy Lines: Lessons from the Secretive Online Fight Against the Islamic State.” War on the Rocks. https://warontherocks.com/2020/09/we-are-already-behind-enemy-lines-lessons-from-the-secretive-online-fight-against-the-islamic-state/.
“U.S. Cyber Command Shares 11 New Malware Samples.” 2019. Cybersecurity and Infrastructure Security Agency. https://us-cert.cisa.gov/ncas/current-activity/2019/09/08/us-cyber-command-shares-11-new-malware-samples.
[42]Stavridis, James, and David Weinstein. 2014. “Time for a U.S. Cyber Force.” Proceedings 140/1/1,331 (January). https://www.usni.org/magazines/proceedings/2014/january/time-us-cyber-force.