# Critiques on theories of cyber.
Any theory or framework of cyber conflict that is unable to incorporate the full range of offensive cyber actions is inherently flawed. Here are examples of cyber operations that meet any reasonable criteria for offensive cyber attacks.
- kpop vs ACAB
- Teens vs Trump (Tulsa, 2020)
- Lazarus vs Sony
- Belarusian cyber partisans vs. rail network
Many theories work poorly when forced to model these offensive cyber events. Like “cyber is an intelligence contest.” So explain the k-pop stans disabling police snitch apps for reporting BLM protestors by flooding them with loads of pictures of k-pop artists.
* a non state actor (just a community ot people)
* Attacking state security forces
* To support non state actors
* With the intent of causing political change
This breaks so many theories of cyber. They typically just ignore it instead, but you can’t. If for no other reason than this type of activity is will become more and more relevant as cyber infrastructure becomes increasingly embedded into society.
So, when I tried putting in https://climatejustice.social/@Leszek_Karlik in my Twitter bio, I got information that the URL is considered malware.
This is what peak Freedom of Speech looks like, apparently.
#introduction I'm a journalist and analyst specialising in online privacy and cybersecurity. I do also some research on disinformation and media psychology. Thanks for having me!
Dziennikarka. Prywatność, cyberbezpieczeństwo, dezinformacja, cyfrowa polityka i dyplomacja. Piszę o tym, jak rozwój technologii zmienia nasz świat we wszystkich jego aspektach. Edukuję, piję kawę, czytam książki, kocham góry, pióra wieczne i cygara • #techspressocafe