Skip to content
Search

Latest Stories

cipherbrief

Welcome! Log in to stay connected and make the most of your experience.

Input clean

What are our Adversaries trying to achieve in the Gray Zone? 

This is part 2 of a 3-part series by Cipher Brief Expert and former Assistant Director of CIA for South and Central Asia Dave Pitts, who also serves as a member of The Cipher Brief’s new Gray Zone Group. 

EXPERT PERSPECTIVE — Even with a broad understanding of the gray zone, it can be difficult to put into strategic perspective the gray zone activities we see. The tools of the gray zone are diverse and evolving: cognitive warfare; cyber operations; use of surrogates, proxies, and ambiguous forces; aggressive espionage; political and economic coercion; and darker tools such as sabotage and assassinations come to the top of the list, but there are others.  

Keep reading...Show less
Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Related Articles

Winning the Innovation Race: Why America’s Allies Are the Key to Beating Beijing

OPINION — Precision U.S. airstrikes against Iran’s nuclear program last June demonstrate American technological prowess built on decades of 20th [...] More

Trump’s Next Test: Kim Jong Un’s Bid for Legitimacy and a Nuclear Normalization Deal

EXPERT OPINION — North Korean leader Kim Jong Un is ready to do business with President Donald Trump. Over the past few years, Mr. Kim has burnished [...] More

Why the U.S. Is Losing the Cognitive Competition

EXPERT OPINION — In order for the U.S. to successfully compete for global influence against its adversaries and to avoid a kinetic fight, we must [...] More

Viktor Orban’s Russia Problem Is Becoming Hungary’s Disaster

OPINION — Hungary’s prime minister does not seem to grasp the gravity of the moment. His ally, Russia, is bleeding by a thousand cuts from Ukrainian [...] More

The Future of U.S. Intelligence: Leaner, Smarter, and Tech-Focused

EXPERT OPINION — It is time to reimagine the US intelligence community (IC). The 1947 National Security Act established the CIA which arguably had [...] More

The Hidden Leverage of Digital Chokepoints

EXPERT PERSPECTIVE — When we think about the arteries of global power, images of oil pipelines or shipping lanes often come to mind. They are [...] More

{{}}