CIA calls

Based on the examples that Buchanan offers in part two of his book, how effective is cyber as a tool for disruption, sabotage, and coercion? What is the potential for what the CIA calls blowback (i.e. unintended adverse effects of a particular action) in using cyber for these purposes?

Our customer support team is here to answer your questions. Ask us anything!