Using cyber-based tools and techniques to disrupt military operations, communications networks, and other information systems or networks, including using sophisticated computer viruses and automated attack routines, allowing adversaries to launch untraceable attacks from anywhere in the world.