24 Mar Based on the examples that Buchanan offers in part two of his book, how effective is cyber as a tool for disruption, sabotage, and coercion?? What is the potential for what the CIA cal
Based on the examples that Buchanan offers in part two of his book, how effective is cyber as a tool for disruption, sabotage, and coercion? What is the potential for what the CIA calls blowback (i.e. unintended adverse effects of a particular action) in using cyber for these purposes?
