The document discusses cyber influence operations (ICOs), which are defined as operations that affect the logical layer of cyberspace with the intention of influencing attitudes, behaviors, or decisions of target audiences. It provides definitions of related terms like information operations, information warfare, and cyber attacks. Examples are given of different types of ICOs, such as unauthorized access, false flag cyberattacks, DDoS attacks, website defacements and doxing. Specific incidents like the attacks on Estonia, NATO, and doxing of Victoria Nuland are analyzed in terms of their goals of undermining credibility and spreading disinformation. The challenges of attributing ICOs and their generally limited impact are also noted.