by Paul Rexton Kan | Jun 27, 2013 | Monitor
By: Paul Rexton Kan The potential for this cyber war in the underworld to expand or to spill out into real world violence is high.
by James D. Fielder | Jun 19, 2013 | Monitor
By: James D. Fielder Conventional and cyber conflict diffusion diverge on two points: third-party intervention (escalation) and collateral damage (pathogen). The findings raise questions regarding state neutrality, non-state actors, and authenticating...
by aelkus | Jun 13, 2013 | Monitor
Edward Snowden is one of history’s great actors. But not in the way his admirers (and some detractors) believe, as will be made clear at the end of this post. An earlier draft of this entry looked at the leak, but not much useful things can really be written at...
by Casimir C. Carey III | Mar 27, 2013 | Monitor
By: Casimir C. Carey III Russia has integrated cyber operations into its military doctrine.
by Gary D. Brown and Owen W. Tullos | Dec 11, 2012 | Monitor
By: Gary D. Brown and Owen W. Tullos As cyberspace operations continue to evolve, they raise some unique questions regarding the nature of conflict and how it should be discussed and regulated.