Cyberinsurgency

4G Warfare for 3G Computing

Skip to content
  • Home
  • About
  • Versions

Table of Contents

Introduction: About

  1. The Doctrine of Cyberinsurgency
  2. Moral Doctrines of Cyberinsurgency
  3. Dear Wage Slave – an Open Letter to “gig” laborers and subcontractors
  4. Strategies
    • Embedding
    • Resource Consumption Attacks (RCA)
    • Denial Of Clue Attacks (DOC)
  5. Tactics
    • Disambiguation Cost Attacks
    • Channel-Stuffing Attacks

Postings by category:

  • Defensive Operations
  • Offensive Operations
  • Strategy
  • Tactics
  • Tradecraft

Library and Links


Login

Proudly powered by WordPress | Theme: Just Write by Ryan Cowles.

Recent

  • The Best Ninja
  • Gestating Attacks

Categories

  • Cyberinsurgency
  • Strategy

Tags

Gestating Attacks Strategy Tradecraft