top of page

Returning to the Wilderness of Mirrors: Power and Cyberwarfare Could Start a Digital-Age Cold War

Updated: Feb 11, 2023

At the height of the Cold War, former CIA Chief of Counterintelligence James Jesus Angleton famously borrowed from T.S. Eliot to describe Soviet operations strategy as a "Wilderness of Mirrors" because they were " myriad of stratagems, deceptions, artifices, and all the other devices of disinformation which the Soviet bloc and its coordinated intelligence services use to confuse and split the West … an ever-fluid landscape where fact and illusion merge." This publication aims to objectively set a macro-level understanding of socioeconomic and geopolitical impacts on Russia, provide a baseline of the tools, tactics, procedures, methodologies, and strategies attributed to Russia, and establish a cybersecurity lens through which readers can better interpret the developing events and more effectively adapt to secure public and private U.S. critical infrastructure against potential retaliatory offensive campaigns. Due to the evolution and responses to the conflict at the time of this writing, ICIT, in partnership with our esteemed fellows, anticipate that this publication will be the first in a series documenting the nation-state weaponization of disruptionware in response to geopolitical or socioeconomic impetuses.

ICIT would like to thank the following experts for their contributions to this paper:

  • Michael Aisenberg, ICIT Fellow & Principal Cyber Policy Counsel, MITRE Center for National Security

  • Tim Callahan, ICIT Fellow & SVP & Global CISO, Aflac

  • Parham Eftekhari, Founder & Chairman, ICIT & EVP, CISO Community, Cyber Risk Alliance

  • Donald Heckman, ICIT Fellow & Defense Cyber Solutions Leader & Director, Cybersecurity Solutions, Guidehouse

  • Joyce Hunter, Executive Director, ICIT & Former Interim CIO and Deputy CIO, USDA

  • Itzik Kotler, ICIT Fellow & Co-Founder, and CTO, SafeBreach

  • Don Maclean, ICIT Fellow & Chief Cyber Security Strategist, DLT

  • Stan Mierzwa, ICIT Fellow & Director and Adjunct Professor, Center for Cybersecurity, Kean University & CTO, Vennue Foundation

  • Jim Routh, ICIT Fellow and Chief Security Advisor, Virsec

  • Pete Slade, ICIT Fellow & CTO, ThreatWarrior

Read the Whitepaper

Download PDF • 621KB

Related Posts

See All


bottom of page