… effective cyber deterrence policies require regular, sustained disruption of malicious cyber activity. Such disruption can be technical, legal, logistical, financial, diplomatic, and, in some extreme cases, kinetic. Increasing the scope, scale and tempo of disruption activities should impose high costs on adversaries …
Post new comment