Quote Originally Posted by Bill Moore View Post
On the other hand the threat of subversion by a worthy adversary like the former USSR was very real, but fortunately we have good processes in place to mitigate that risk, and the resiliency of our democratic system also mitigates its impact.
Do the same Cold War processes work on cyber influence and subversion?