Based on the examples that Buchanan offers in part two of his book, how effective is cyber as a tool for disruption, sabotage, and coercion? What is the potential for what the CIA calls blowback (i.e. unintended adverse effects of a particular action) in using cyber for these purposes?
Recent Comments