What form of cyber espionage do you think is the most powerful and what, if anything, can we to prevent cyberespionage?
In a short paragraph or two, post on this module’s discussion board a response to this prompt: “One of the key concepts in Kubiak’s model of war policy stability and change is the distinction between the micro- and macropolitical agendas. He asserts that war very rarely leaves the macropolitical agenda or does so only for short periods. Is that still true today?”