JD Work
@HostileSpectrum
Former intel, now academic @NDU_CIC, @TheKrulakCenter, @SIWPSColumbia @ColumbiaSIPA, @CyberStatecraft, @ElliottSchoolGW, @PAISWarwick. Apolitical, views=own
Seeing the destruction of chain hotel building just outside Georgetown, one is reminded just how much of intelligence work evolved as an accident of history. With path dependence built on unique sensitivity to initial conditions, some measure of institutional memory (or at least…
The US condemns the Hong Kong government’s latest round of arrest warrants on activists for exercising freedom of expression, including US-based persons. This Administration will always stand up for fundamental freedoms & will not tolerate transnational repression on US soil.
A new border war which proves precisely why all those endless JPME wargaming cycles playing out just about every possible militarized conflict dyad are entirely necessary to the further development of officers facing not only unknown futures, but what are guaranteed to be far…
Teams from around the world are deep into #CyberFlag 25-2, sharpening their lethality and resilience against simulated real-world cyber threats. This exercise enhances our combined ability to defend forward to strengthen deterrence. cybercom.mil/Media/News/Art…
The PDB (or any other finished intelligence) is not a palimpsest, to be rewritten to please. It is intended to be a vehicle for communicating best, objective view of current intentions, capabilities, and developments to the consumer. Breaking the decades long presumption that…
Engineer Pleads Guilty to Stealing for Chinese Government’s Benefit Trade Secret Technology Designed for Missile Launch and Detection justice.gov/opa/pr/enginee…
Given that I write the word adversary too many times in a week, I move to revive the term feondscipe to describe iterated hostile dyadic interactions. Further opening conceptual space to better describe intensification dynamics, instead of the default misuse of escalation…
Old English had a word for the opposite of a friendship: fēondsċipe, or ‘enemy-ship’. If the word survived, it would be ‘fiendship’, but since it went extinct, we have to translate it vaguely as ‘hostility’, ‘rivalry’, or ‘feud’.
Given the pace and intensity of ongoing engagements on the wire, it sure would have been nice had cyber conflict studies scholarship not apparently near fully collapsed. Cyberwar is not a myth, and no more opaque than other (thus far) small wars, but somehow seems uniquely to…
Folks out there complaining about militarized cyberspace when even the earliest Disney representations (1982) were in a story basically about a dev daydreaming about AI enabled cyber range testing of Strategic Air Command software. Cyberwar has always been with us, since the…

Justice Department Announces Arrest of Prolific Chinese State-Sponsored Contract Hacker justice.gov/opa/pr/justice…
Really need to hold a 4th of July attack / defense / countering capture the flag where the victory condition is firing sequence initiation.
New article published in Intelligence and National Security by JD Work, titled: "Modeling covert offensive cyber engagement decisions left of launch against limited ballistic missile fires" available here: tandfonline.com/doi/full/10.10…
My statement confirming CIA intelligence which contradicts illegally sourced public reporting regarding the destruction of key Iranian nuclear facilities.
.@SecDef: "This mission was not and has not been about regime change. The President authorized a precision operation to neutralize the threats to our national interests posed by the Iranian nuclear program."
the way i see it, you’re either monitoring the situation with me or you’re monitoring the situation against me