Articles

3 Items

FORT GORDON NELSON HALL, Augusta, Georgia, June 10, 2014 – The U.S. Army’s ‘Cyber Center of Excellence’, Fort Gordon in Augusta, Georgia, hosted a multi-service ‘NetWar’ to show, and build, cyber Warrior capabilities Tuesday, June 10.

Georgia Army National Guard photo by Staff Sgt. Tracy J. Smith

Journal Article - Quarterly Journal: International Security

The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations

    Author:
  • Lennart Maschmeyer
| Fall 2021

Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. The subversive trilemma explains why cyber operations tend to fall short of their promise in both warfare and low-intensity competition.

A worker is silhouetted against a computer display showing a live visualization of the online phishing and fraudulent phone calls across China during the 4th China Internet Security Conference in Beijing. Aug. 16, 2016 (Ng Han Guan/Associated Press, File). Keywords: China, cyberattack

Ng Han Guan/Associated Press, File

Newspaper Article - The Wall Street Journal

Review: An Uneasy Unpeace

| Jan. 21, 2018

In the cyber arena, the same technologies that are creating unprecedented benefits for billions are also democratizing destruction. Graham Allison reviews ‘The Virtual Weapon and International Order’ by Lucas Kello.

What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment

AP

Journal Article - Quarterly Journal: International Security

What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment

    Author:
  • Rebecca Slayton
| Winter 2016/17

Does cyberspace favor the offense, as many analysts and policymakers claim? Three factors undermine any cyber offensive advantage, as demonstrated in a cost-benefit analysis of the Stuxnet operation against Iran. First, any measurement of the offense-defense balance must consider a cyber operation’s value as well as its cost to both sides. Second, organizational capabilities play a significant role in determining the balance. Third, offensive advantages decline when attackers target physical infrastructure rather than information networks.