Toggle navigation
TWunroll
TWunroll
faq
Contact US
Andrew Thompson
anthomsec
In recent wars, improvised explosive devices (IED) were a commonly used weapon. Often the person putting it in the ground was not the person who constructed it. The emplacer was
Read more
This graphic taken from the U.S. military Joint Publication 3-12 Cyberspace Operations demonstrates how current doctrine includes cyberspace attack for DEFENSIVE purposes. DCO-RA, specifically. Also included is the language used
Read more
One reason it matters to distinguish an attack from espionage is so bad arguments can’t be made about deterrence. The threat of a counterattack in and through cyberspace or other
Read more
By continuing to use the site, you are consenting to the use of cookies as explained in our
Cookie Policy
to improve your experience.
I agree