Brantly, Aaron F.2018-01-172018-01-172014-05-12http://hdl.handle.net/10919/81826Covert action is as old as political man. The subversive manipulation of others is nothing new. It has been written about since Sun Tzu and Kautilya. People and nations have always sought the use of shadowy means to influence situations and events. Covert action is and has been a staple of the state system. A dark and nefarious tool often banished to philosophical and intellectual exile, covert action is in truth an oft-used method of achieving utility that is frequently overlooked by academics. Modern scholars contend that, for utility to be achieved, activities such as war and diplomacy must be conducted transparently. Examined here is the construction of utility for a subset of covert action: cyber attacks.In CopyrightCyber Actions by State Actors: Motivation and UtilityArticle - RefereedInternational Journal of Intelligence and Counterintelligencehttps://doi.org/10.1080/08850607.2014.900291273Brantly, AF [0000-0003-4193-3985]