Espionage

Hacking for Influence

Cyber capabilities display attractive features for nation-states’ covert influence activities in the grey zone between war and peace. They can be used to support objectives of information warfare in several ways: collecting intelligence, doxing, infecting devices and webpages to spread propaganda, social media bots, and Distributed Denial of Service attacks.

Read more