John’s Bookclub! A quasi book review: Russian Information Warfare by Bilyana Lilly

 I try to read a book a week — yeah, I know, peak nerd behavior — but it’s my way to unwind. When I really enjoy one, I figure, why not share? Think of it like Oprah’s Book Club, but with fewer celebrities and absolutely no fan base.

Dr. Bilyana Lilly’s Russian Information Warfare is an amazing deep dive into one of the most complex and consequential aspects of modern conflict: Russia’s strategic use of information as a weapon via the FSB, GRU, SVR, and Russia based threat actors. We live in an era where cyber operations, propaganda, and disinformation campaigns shape global events as much (or more so) as traditional military tactics, Lilly delivers a compelling and meticulously researched analysis that demystifies and simplifies the Russian approach to information warfare.

Russian Information Warfare by Bilyana Lilly

Key Themes and Insights:
1. A Multi-Layered Approach to Warfare
Lilly expertly illustrates how Russia does not see information warfare as a standalone tool but as an integrated part of its military and geopolitical strategy. From state-sponsored cyberattacks to psychological operations that manipulate public opinion, she highlights how Russia seamlessly blends traditional military tactics with digital deception to achieve its strategic objectives.

2. The Role of Cyber Operations
The book provides a detailed examination of Russia’s sophisticated cyber capabilities, demonstrating how Russian actors have repeatedly exploited vulnerabilities in Western infrastructure. Through real-world examples, such as election interference and critical infrastructure breaches, Lilly explains how these cyber operations are not random acts but deliberate, strategic maneuvers aimed at destabilizing adversaries.

3. Disinformation as a Weapon
One of the most striking aspects of the book is its exploration of Russian disinformation campaigns. Lilly dissects the ways in which Russian operatives use social media, state-sponsored news agencies, and covert influence campaigns to sow discord, erode trust in democratic institutions, and create confusion among adversaries. She provides case studies that showcase how narratives are carefully constructed to influence global events.

4. The Concept of "Reflexive Control"
A particularly insightful section delves into the Russian military doctrine of “reflexive control,” a psychological strategy that involves shaping an opponent’s perception and decision-making process to guide them toward a predetermined outcome—often without them realizing they are being manipulated. This concept, Lilly argues, is central to Russia’s success in information warfare.

5.Lessons for the West
Rather than just diagnosing the problem, Russian Information Warfare offers invaluable insights into how Western nations can recognize and counter these tactics. Lilly provides policy recommendations, strategic frameworks, and practical steps that governments, cybersecurity experts, and intelligence agencies can take to fortify their defenses against Russia’s sophisticated influence operations.

Why This Book Stands Out
Lilly’s expertise in cybersecurity, Russian geopolitics, and military strategy shines through in this book. She combines rigorous academic research with real-world case studies, making the content both highly informative and incredibly engaging. Unlike many analyses that focus purely on technical aspects, Russian Information Warfare connects the dots between history, strategy, and modern-day tactics, giving readers a comprehensive understanding of the broader geopolitical implications.

My Final Thoughts:
For anyone interested in cybersecurity, geopolitics, or modern warfare, Russian Information Warfare is an absolute essential read. Dr. Bilyana Lilly not only unpacks and simplifies the complexities of Russia’s information warfare tactics but also provides a roadmap for defending against them. It is an enlightening, eye-opening, and ultimately empowering book that should be on the reading list of policymakers, security professionals, and global strategists alike.

— John

#bookreview #reading #CyberSecurity #infosec #russia #china #us #nsa #gru #ccp #pla #cia #svr

Linktree

Medium

Substack

LinkedIn

The Silent Cybersecurity Crisis No One's Talking About

Let’s cut through the crap and noise. While the headlines focus on Trump and Musk gutting the CIA, NSA, and CISA, there’s a much bigger issue that U.S. businesses cannot afford to ignore — the security of your company’s data, networks, and operations.





For years, federal intelligence agencies have been the quiet guardians of the internet, identifying threats, sharing critical intelligence, and helping private businesses defend against cyberattacks. That safety net is unraveling fast.

If these agencies are defunded, dismantled, or have their authority gutted, here’s what happens next:

🔥 The Coming Cyberstorm: What Businesses Should Expect 🔥

🔴 More Ransomware & Data Breaches — The FBI and CISA help disrupt ransomware gangs like REvil and Conti before they cripple entire industries. Without them? Expect more attacks like the Colonial Pipeline hack, which shut down gas supplies for the East Coast, or MGM Resorts, where hackers used social engineering to bring casino operations to a halt.

🔴 Nation-State Cyberattacks on U.S. Companies — China, Russia, North Korea, and Iran don’t just target governments — they target private businesses, stealing intellectual property, financial data, and customer records. CISA and the NSA alert companies to these threats — but if they’re weakened, who will warn you?

🔴 Supply Chain Attacks Will Skyrocket — Remember SolarWinds? A Russian-backed attack compromised 18,000 businesses and U.S. agencies. The private sector didn’t detect it — government intelligence did. Without those agencies in full force, businesses may not know they’re compromised until it’s too late.

🔴 More AI-Powered Fraud & Deepfake Scams — Cybercriminals are already using AI-generated deepfakes to impersonate CEOs and steal millions. The NSA and FBI work to disrupt these threats, but without them, businesses will be completely on their own.

📉 Why This is a Business Problem, Not Just a Government One 📉

If these agencies are gutted, the burden shifts directly to private companies. The Fortune 500 might have the resources to adapt, but what about mid-size businesses, hospitals, manufacturers, and local governments?

Cybersecurity has always been underfunded in the private sector. Now, without strong federal intelligence backing, companies must increase cybersecurity budgets, hire more experts, and implement stronger protections — or risk being the next headline.

🚀 What Business Leaders Must Do NOW 🚀

Increase Cybersecurity Budgets — Security is no longer a “nice to have.” It’s as critical as payroll and legal compliance. If your cybersecurity budget is less than 5% of IT spending, it’s time for a serious adjustment.

Hire & Retain Cybersecurity Talent — Your overworked security team won’t be able to handle nation-state attacks and sophisticated ransomware alone. Invest in hiring, training, and paying them what they’re worth.

Prioritize Threat Intelligence & Incident Response — If you can’t rely on CISA alerts, you need your own threat intelligence strategy. Subscribe to private threat intel services, conduct regular penetration testing, and have an incident response plan ready to go.

Bolster Zero Trust & Security Controls — The days of relying on perimeter security are over. Adopt Zero Trust architecture, enforce multi-factor authentication (MFA), and strengthen endpoint security.

Educate Leadership on the Risk — Cybersecurity isn’t just IT’s problem. CEOs, CFOs, and boards must understand that cyber threats are existential business risks. A single breach can cost millions — or even destroy a company.

💡 The Bottom Line: Step Up or Get Left Behind

If federal cybersecurity agencies are defunded or dismantled, private businesses must take up the fight. There is no cavalry coming — we ARE the front line now.

The question isn’t IF your business will be attacked — it’s WHEN. Will you be ready?


 — John

#CyberSecurity #BusinessRisk #Infosec #CISA #NSA #CIA #RiskManagement #ZeroTrust #CyberThreats

Links:

Linktree

Medium

Substack

LinkedIn

John's Bookclub! A quasi book review: Shadow Warfare by Elizabeth Van Wie Davis

I try to read a book a week—yeah, I know, peak nerd behavior—but it’s my way to unwind. When I really enjoy one, I figure, why not share? Think of it like Oprah’s Book Club, but with fewer celebrities and absolutely no fan base.
In Shadow Warfare, Elizabeth Van Wie Davis unpacks the shifting nature of modern conflict, focusing on cyber warfare, espionage, proxy battles, and the increasing role of non-state actors. She explores how traditional military engagements have been replaced by covert operations, disinformation campaigns, and digital battlegrounds, where influence is as powerful as firepower.

Davis effectively bridges policy analysis with real-world examples, examining how nations leverage cyber capabilities and intelligence networks to achieve strategic goals. From Russian disinformation tactics to China's cyber operations and the U.S.'s evolving counterterrorism strategies, the book provides concrete case studies that illustrate the complex interplay between technology, warfare, and international relations.

While some sections lean heavily into policy discussion, Davis presents her insights in a way that remains accessible and engaging. For anyone interested in intelligence, cybersecurity, or global security strategy, Shadow Warfare is a compelling and thought-provoking read.

--John
#bookreview #reading #CyberSecurity #infosec #russia #china #us #nsa #gru #ccp #pla #cia #svr 





Nobody Is Coming to Save You!!

Nobody Is Coming to Save You: The Critical Need for Personal and Commercial Cyber Awareness



The past week’s federal cybersecurity headlines serve as a stark reminder of a harsh truth: nobody is coming to save you, and certainly not the government. As *Krebs on Security (link below) highlights, significant vulnerabilities persist in even the most critical public-sector infrastructure. This reality underscores the urgent need for individuals and businesses to take their own cybersecurity defenses seriously.

Despite billions invested in bolstering national defenses, federal systems remain vulnerable to attack. While government initiatives aim to address these weaknesses, they are reactive by nature and often years behind the rapidly evolving tactics of cybercriminals. Waiting for government intervention or sweeping regulations to protect your digital assets is a losing strategy.

For businesses, this means understanding that your network, customer data, and intellectual property are prime targets. Proactive measures—such as implementing multi-factor authentication, maintaining up-to-date systems, training staff, and running frequent audits—are no longer optional. Every breach is not just a technical failure but also a business failure that can erode trust and cripple operations.

On a personal level, the stakes are no less dire. Cybercriminals aren’t just after major corporations—they’re targeting individuals through phishing schemes, identity theft, and ransomware attacks. It’s your responsibility to safeguard your online life by practicing strong password hygiene, avoiding suspicious links, and backing up your data.

The bottom line is that both individuals and organizations must approach cybersecurity with the mindset that no one else will protect them. It’s not about paranoia—it’s about preparation. When it comes to your digital safety, the best defense is self-reliance.

--John
#cyber #infosec #prepared #vigilant #IT #government #CISA #security




*https://krebsonsecurity.com/2025/01/a-tumultuous-week-for-federal-cybersecurity-efforts/