Since the invasion of Crimea and eastern Ukraine by Russia, there have been many well-documented cases of the use of computer network operations for intelligence collection and even force projection. Over time, the scale and impact of these attacks has risen considerably, including the remote, unauthorized manipulation of Ukraine’s electricity grid and a country-wide...