Cyber Activities

cyber activities graph

We assessed each state in terms of their available information on cyber-related responsibilities and efforts, their internal command and control relationships, cyber doctrine, cyber organization of the military, and defensive measures. Information that was examined came from reporting in defense white papers, official defense websites, and policy papers from defense and other government-related ministries.