Dimensio... — Bytes, Bombs, And Spies: The Strategic

This report summarizes the key insights and strategic frameworks presented in edited by Herbert Lin and Amy Zegart . Published in 2019, this volume serves as an essential guide for understanding how offensive cyber capabilities are integrated into national security and "digital combat power". Core Themes and Strategic Framework

Cyber conflict is often found to be more escalatory than deterrent, especially when targeting sensitive systems like nuclear command and control. Resources for Further Reading Bytes, Bombs, and Spies - The Cyber Defense Review Bytes, Bombs, and Spies: The Strategic Dimensio...

Deep dives into Unit 61398 of the People’s Liberation Army and its long-term exfiltration of corporate data from U.S. companies. Key Strategic Takeaways This report summarizes the key insights and strategic

The use of a computer worm to physically damage Iranian nuclear centrifuges, highlighting the bridge between digital code and physical destruction. Resources for Further Reading Bytes, Bombs, and Spies

Examines the unique relationship between government offensive capabilities and private companies, which often serve as either targets or unwitting infrastructure for state-led operations. Notable Case Studies and Examples

The volume uses high-profile real-world events to illustrate the strategic application of "bytes":

Explores the practical side of offensive actions, such as "hacking" a nation's missile program or the strategic assessment of offensive planning—often compared to nuclear-age strategic planning (SIOP).