GTAC Intelligence Hub
KNOWLEDGE CENTER/GEOPOLITICS/ARTICLE #09
GEOPOLITICS ENCYCLOPEDIA

Cyber Warfare: The Invisible Battlefield Between State Actors

3 MIN READARTICLE 9 OF 52UPDATED FEBRUARY 14, 2026

Cyberspace has become the fifth domain of warfare, alongside land, sea, air, and space. State-sponsored cyber operations range from espionage and intellectual property theft to critical infrastructure sabotage and influence operations. Unlike conventional military operations, cyber attacks offer plausible deniability, low cost, and the ability to project power against adversaries regardless of geographical distance.

China's cyber capabilities are among the most sophisticated and prolific. Chinese state-sponsored groups have conducted massive espionage campaigns against Western defense contractors, stealing designs for the F-35 fighter, naval propulsion systems, and advanced missile technologies. The Volt Typhoon campaign, attributed to China, targeted US critical infrastructure including water treatment facilities, power grids, and transportation systems, apparently pre-positioning for potential disruption during a Taiwan contingency.

Russia's cyber operations combine technical sophistication with psychological warfare. The NotPetya attack in 2017, initially targeting Ukraine, caused over $10 billion in global damage. Russian groups have targeted electoral systems, energy infrastructure, and government networks across NATO nations. The integration of cyber attacks with conventional military operations during the Ukraine war demonstrated the emerging concept of multi-domain warfare.

North Korea has developed surprisingly capable cyber forces, primarily focused on financial theft to fund its weapons programs. Iranian cyber actors have targeted critical infrastructure in Saudi Arabia, Israel, and the United States. The proliferation of offensive cyber tools, including those leaked from intelligence agencies, has lowered the barrier to entry for both state and non-state actors. Establishing norms for responsible state behavior in cyberspace remains one of the most pressing challenges in international security.