The majority of primary sources that informed this book are not included in this bibliography. These sources are fully documented in the footnotes. Below is a selection of books, articles, and a few reports.
Adee, Sally, “The Hunt for the Kill Switch,” IEEE Spectrum, May 2008.
Aelst, Peter Van and Stefaan Walgrave, “New Media, New Movements? The Role of the Internet in Shaping the ‘Anti-Globalization’ Movement,” Information, Communication & Society, vol. 5, 4 (2002), pp. 465–93.
Agnoli, Johannes, Subversive Theorie, Freiburg: Ça ira, 1996.
Air Material Command, Reconnaissance Aircraft and Aerial Photographic Equipment 1915–1945, Wright Field: Historical Division, 1946.
Alperovitch, Dmitri, Revealed: Operation Shady RAT, Santa Clara, CA: McAfee, 2 Aug. 2011.
Arendt, Hannah, On Violence, New York: Harcourt, Brace, Jovanovich, 1970.
Arquilla, John and David Ronfeldt, The Advent of Netwar, Santa Monica: RAND, 1996.
——— “Cyberwar is Coming!” Comparative Strategy, vol. 12, 2 (1993), pp. 141–65.
Austin, John, The Province of Jurisprudence Determined, Plaistow: Curwen Press, 1832 (1954).
Belote, Howard D., Once in a Blue Moon, Maxwell, AL: Air University Press, 2000.
Belsham, William, Memoirs of the Reign of George III to the Session of Parliament Ending A.D. 1793, vol. I, London: J. Robinson, 1795.
Benjamin, Walter, “Critique of Violence,” in Reflections, pp. 277–300, New York: Schocken Books, 1978.
Bennett, W. Lance, “Communicating Global Activism,” Information, Communication & Society, vol. 6, 2 (2003), pp. 143–68.
Best, Steven and Anthony J. Nocella, Igniting a Revolution: Voices in Defense of the Earth, Oakland, CA: AK Press, 2006.
Betz, David and Tim Stevens, Cyberspace and the State, Adelphi Series, London: IISS/Routledge, 2011.
Blainey, Geoffrey, The Causes of War, New York: Free Press, 1973.
Boebert, W. Earl, “A Survey of Challenges in Attribution,” in Committee on Deterring Cyberattacks (ed.), Proceedings of a Workshop on Deterring Cyberattacks, pp. 41–54, Washington, DC: National Academies Press, 2011.
Brenner, Joel, America the Vulnerable, New York: Penguin Press, 2011.
Brito, Jerry and Tate Watkins, “Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy,” Harvard National Security Journal (2011).
Broad, William J., John Markoff, and David E. Sanger, “Israeli Test on Worm Called Crucial in Iran Nuclear Delay,” The New York Times, 16 Jan. 2011, p. A1.
Brusnitsin, Nikolai, Openness and Espionage, Moscow: Military Pub. House, USSR Ministry of Defense, 1990.
Burke, Edmund, Reflections on the Revolution in France, London: J. Dodsley, 1790.
Byres, Eric and Justin Lowe, “The Myths and Facts Behind Cyber Security Risks for Industrial Control Systems,” paper read at Proceedings of the VDE Congress, at VDE Association for Electrical Electronic & Information Technologies, Oct. 2004.
Cartwright, Gary, “Search and Destroy,” Texas Monthly, Mar. 1989, pp. 122–71.
Clark, David D. and Susan Landau, “Untangling Attribution,” in Committee on Deterring Cyberattacks (ed.), Proceedings of a Workshop on Deterring Cyberattacks, pp. 25–40, Washington, DC: National Academies Press, 2011.
Clark, John D. and Nuno S. Themudo, “Linking the Web and the Street: Internet-Based ‘Dotcauses’ and the ‘Anti-Globalization’ Movement,” World Development, vol. 34, 1 (2005), pp. 50–74.
Clarke, Richard A. and Robert K. Knake, Cyber War, New York: Ecco, 2010.
Clausewitz, Carl von, Vom Kriege, Berlin: Ullstein, 1832 (1980).
Clayton, Richard, Anonymity and Traceability in Cyberspace, vol. 653, Technical Report, Cambridge: University of Cambridge Computer Laboratory, 2005.
Clutterbuck, Lindsay and William Rosenau, “Subversion as a Facet of Terrorism and Insurgency,” Strategic Insights, vol. 8, 3 (2009).
Coleman, Gabriella, “Our Weirdness is Free,” May, vol. 9, 6 (2012), pp. 83–95.
Convertino, Sebastian M. II, Lou Anne DeMattei, and Tammy M. Knierim, “Flying and Fighting in Cyberspace,” Air War College Maxwell Paper, 40 (2007).
Darlington, Ralph, Syndicalism and the Transition to Communism, Aldershot, England: Ashgate, 2008.
Deibert, Ron, “Tracking the Emerging Arms Race in Cyberspace,” Bulletin of the Atomic Scientists, vol. 67, 1 (2011), pp. 1–8.
Deibert, Ron and Rafal Rohozinsky, Tracking GhostNet, Toronto: Munc Centre for International Studies, 2009.
Deibert, Ron, Rafal Rohozinski and Masashi Crete-Nishihata, “Cyclones in Cyberspace: Information Shaping and Denial in the 2008 Russia-Georgia War,” Security Dialogue, vol. 43, 1 (2012), pp. 3–24.
Department of Defense, Cyberspace Policy Report, Nov. 2011.
Diederichsen, Diedrich, “Subversion—Kalte Strategie und heiße Differenz,” in Diedrich Diederichsen (ed.), Freiheit macht arm: das Leben nach Rock’n’Roll 1990–1993, pp. 33–52, Köln: Kiepenheuer & Witsch, 1993.
Dinstein, Yoram, “Computer Network Attacks and Self-Defense,” International Legal Studies, vol. 76 (2002).
Donovan, William J., Simple Sabotage Field Manual, Washington, DC: Office of Strategic Services, 1944.
Ernst, Thomas, Literatur und Subversion: Politisches Schreiben in der Gegenwart, Bielefeld: Transcript, 2012.
——— “Subversion. Eine kleine Diskursanalyse eines vielfältigen Begriffs,” Psychologie & Gesellschaftskritik, vol. 42, 4 (2009), pp. 9–34.
Evans, Jonathan, The Threat to National Security, London: The Worshipful Company of Security Professionals, 16 Sep. 2010.
Evron, Gadi, “Battling Botnets and Online Mobs,” Science & Technology (Winter/Spring 2008), pp. 121–8.
Falliere, Nicolas, Liam O Murchu, and Eric Chien, W32.Stuxnet Dossier. Version 1.4, Symantec, 2011.
Filkins, Dexter, The Forever War, New York: Knopf, 2008.
Flynn, Elizabeth Gurley, Sabotage, Cleveland, Ohio: IWW Publishing Bureau, 1916.
Fulghum, David, “Cyber Attack Turns Physical,” Aerospace Daily & Defense Report, vol. 235, 61 (2010), p. 3.
Galula, David, Counterinsurgency Warfare: Theory and Practice, New York: Praeger, 1964.
Garrett, R. Kelly, “Protest in an Information Society,” Information, Communication & Society, vol. 9, 2 (2006), pp. 202–24.
Gellner, Ernest, “Trust, Cohesion, and the Social Order,” in Diego Gambetta (ed.), Trust: Making and Breaking Cooperative Relations, pp. 142–57, London: Wiley-Blackwell, 1990.
Ghonim, Wael, Revolution 2.0, Boston: Houghton Mifflin Harcourt, 2012.
Gibbs, Jack P., “Deterrence Theory and Research,” in Gary Melton, Laura Nader, and Richard A. Dienstbier (eds), Law as a Behavioral Instrument, Lincoln: University of Nebraska Press, 1986.
Gibson, William, Neuromancer, New York: Ace Books, 1984.
Giraudoux, Jean, Tiger at the Gates (La guerre de Troie n’aura pas lieu), translated by Christopher Fry, New York: Oxford University Press, 1955.
Goldsmith, Jack and Tim Wu, Who Controls the Internet? Illusions of a Borderless World, Oxford: Oxford University Press, 2006.
Gross, Michael Joseph, “A Declaration of Cyber-War,” Vanity Fair, Apr. 2011.
Hardin, Russell, Trust and Trustworthiness, New York: Russell Sage Foundation, 2002.
Harpham, Geoffrey Galt, The Ascetic Imperative in Culture and Criticism, Chicago: University of Chicago Press, 1987.
Hayden, Michael V., “The Future of Things ‘Cyber’,” Strategic Studies Quarterly, vol. 5, 1 (2011), pp. 3–7.
Hegel, G.W.F., Phänomenologie des Geistes, Berlin: Duncker und Humblot, 1832.
Hobbes, Thomas, Leviathan, London: Penguin, 1651 (1996).
Hoffman, Bruce, “Why Terrorists Don’t Claim Credit,” Terrorism and Political Violence, vol. 9, 1 (1997), pp. 1–6.
Igure, Vinay M., Sean A. Laughter, and Ronald D. Williams, “Security Issues in SCADA Networks,” Computers & Security, vol. 25 (2006), pp. 498–506.
Ingraham, Barton L., Political Crime in Europe, Berkeley: University of California Press, 1979.
Inkster, Nigel, “Intelligence Agencies and the Cyber World,” in Strategic Survey, London: International Institute for Strategic Studies, 2012.
James, Charles, Military Dictionary, In French and English, London: Egerton, 1810.
Johnson, Samuel, Dictionary of the English Language, Dublin: G Jones, 1768.
Jordan, John, “Our Resistance is as Transnational as Capital,” in David B. Solnit (ed.), Globalize Liberation, pp. 9–17, San Francisco, CA: City Lights Books, 2004.
Kalyvas, Stathis, The Logic of Violence in Civil War, Cambridge: Cambridge University Press, 2006.
Kaspersky Lab, “Gauss: Abnormal Distribution,” 9 Aug. 2012.
Katz, Samuel M., The Hunt for the Engineer, New York: Fromm International, 1999.
Kelsen, Hans, Pure Theory of Law (Second Edition), Berkeley: University of California Press, 1984.
Kitson, Frank, Low Intensity Operations: Subversion, Insurgency and Peacekeeping, London: Faber and Faber, 2010.
Kraus, Jürgen, Selbstreproduktion bei Programmen, Dortmund: Universität Dortmund, 1980.
Krepinevich, Andrew F., Cyber Warfare: A Nuclear Option? Washington, DC: Center for Strategic and Budgetary Assessments 2012.
Kuhn, Thomas, Structure of Scientific Revolutions, Chicago: Chicago University Press, 1962.
Laqueur, Walter, Guerrilla: A Historical and Critical Study, vol. 4, Boston: Little, Brown, 1976.
Leader, Stefan H. and Peter Probst, “The Earth Liberation Front and Environmental Terrorism,” Terrorism and Political Violence, vol. 15, 4 (2003), pp. 37–58.
Leslie, James, Dictionary of the Synonymous Words and Technical Terms in the English Language, Edinburgh: John Moir, 1806.
Leverett, Éireann P., Quantitatively Assessing and Visualising Industrial System Attack Surfaces, Cambridge, UK: University of Cambridge, 2011.
Lewis, J. David and Andrew J. Weigert, “Social Atomism, Holism, and Trust,” The Sociological Quarterly, vol. 26, 4 (1985), pp. 455–71.
——— “Trust as a Social Reality,” Social Forces, vol. 63, 4 (1985), pp. 967–85.
Libicki, Martin, Cyberdeterrence and Cyberwar, Santa Monica: RAND Corporation, 2009.
Lin, Herbert, “Escalation Dynamics and Conflict Termination in Cyberspace,” Strategic Studies Quarterly (2012), pp. 46–70.
Lobban, Iain, Iain Lobban Address, London: International Institute of Strategic Studies, 12 Oct. 2010.
Locke, John, Two Treatises of Government, Cambridge: Cambridge University Press, 1689 (1988).
Lorents, Peeter and Rain Ottis, “Knowledge Based Framework for Cyber Weapons and Conflict,” Conference on Cyber Conflict Proceedings, 2010, pp. 129–42.
Luck, M., P. McBurney, and C. Preist, “A Manifesto for Agent Technology: Towards Next Generation Computing,” Autonomous Agents and Multi-Agent Systems, vol. 9, 3 (2004), pp. 203–52.
Lynn, William J., “Defending a New Domain,” Foreign Affairs, vol. 89, 5 (2010), pp. 97–108.
——— “The Pentagon’s Cyberstrategy, One Year Later,” Foreign Affairs, 28 Sep. 2011
Mahnken, Thomas G., “Cyber War and Cyber Warfare,” in Kristin Lord and Travis Sharp (eds), America’s Cyber Future: Security and Prosperity in the Information Age, vol. 2, pp. 53–62, Washington, DC: CNAS, 2011.
Makaryk, Irene Rima, Encyclopedia of Contemporary Literary Theory, Toronto: University of Toronto Press, 1993.
Mandiant, “APT1. Exposing one of China’s Cyber Espionage Units,” Alexandria, Virginia, 19 February 2013.
Mark A. Stokes, Jenny Lin, L.C. Russell Hsiao, “The Chinese People’s Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure,” Project 2049 Institute, 11 Nov. 2011.
Moore, D., V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, “Inside the Slammer Worm,” IEEE Security & Privacy, vol. 1, 4 (2003), pp. 33–9.
Murray, W.H., “The Application of Epidemiology to Computer Viruses,” Computers & Security, vol. 7 (1988), pp. 139–50.
Nagaraja, Shishir and Ross Anderson, The Snooping Dragon, Cambridge: University of Cambridge, Mar. 2009.
Nietzsche, Friedrich, Über Wahrheit und Lüge im außermoralischen Sinne. Unzeitgemässe Betrachtungen, Leipzig: Alfred Kröner, 1873 (1921).
Nonaka, Ikujiro, “A Dynamic Theory of Organizational Knowledge Creation,” Organization Science, vol. 5, 1 (1994), pp. 14–37.
——— The Knowledge-Creating Company, New York: Oxford University Press, 1995.
Nye, Joseph S., “Nuclear Lessons for Cyber Security?” Strategic Studies Quarterly (Winter 2011), pp. 18–38.
Office of the National Counterintelligence Executive, Foreign Spies Stealing US Economic Secrets in Cyberspace, Washington, DC, October 2011.
Olson, Parmy, We Are Anonymous, Little Brown & Co, 2012.
Onley, Dawn and Patience Wait, “Red Storm Rising,” Government Computer News, 17 Aug. 2006.
Overill, Richard E., “Trends in Computer Crime,” Journal of Financial Crime, vol. 2, 6 (1998), pp. 157–62.
Parson, Sean, “Understanding the Ideology of the Earth Liberation Front,” Green Theory & Praxis, vol. 4, 2 (2009), pp. 50–66.
d’Entrèves, Alessandro Passerin, The Notion of the State, Oxford: Oxford University Press, 1967.
Pavlovic, Dusko, “Gaming Security by Obscurity,” arXiv 1109.5542, 9, 2011.
Pickering, Leslie James, The Earth Liberation Front, 1997–2002, Portland, OR: Arissa Media Group, 2007.
Polanyi, Michael, Personal Knowledge, Chicago: University of Chicago Press, 1962.
Popitz, Heinrich, Phänomene der Macht, Tübingen: Mohr Siebeck, 2004.
Pouget, Émile, Le sabotage, Paris: M. Rivière, 1910.
Pouget, Émile and Arturo M. Giovannitti, Sabotage, Chicago: C.H. Kerr & Co., 1913.
Prins, J.R., DigiNotar Certificate Authority Breach ‘Operation Black Tulip’, Delft: Fox-IT 2011.
Raviv, Dan and Yossi Melman, Spies Against Armageddon, Sea Cliff, NY: Levant Books, 2012.
Reed, Thomas C., At the Abyss, New York: Random House, 2004.
Rid, Thomas, “Cracks in the Jihad,” The Wilson Quarterly, vol. 34, 1 (2010), pp. 40–8.
——— “Cyber War Will Not Take Place,” Journal of Strategic Studies, vol. 35, 1 (2012).
——— War and Media Operations. The U.S. Military and the Press from Vietnam to Iraq, London: Routledge, 2007.
Rid, Thomas and Marc Hecker, War 2.0: Irregular Warfare in the Information Age, Westport: Praeger, 2009.
Rid, Thomas and Peter McBurney, “Cyber Weapons,” The RUSI Journal, vol. 157, 1 (2012), pp. 6–13.
Roscini, Marco, “World Wide Warfare—‘Jus Ad Bellum’ and the Use of Cyber Force,” Max Planck Yearbook of United Nations Law, vol. 14 (2010), pp. 85–130.
Rosenau, William, Subversion and Insurgency, Santa Monica, CA: Rand, 2007.
Sanger, David, Confront and Conceal, New York: Crown, 2012.
Schmitt, Michael N., “Computer Network Attack and the Use of Force in International Law,” Columbia Journal of Transnational Law, vol. 37 (1998), pp. 885–937.
Schneier, Bruce, Liars and Outliers, Indianapolis, IN: Wiley, 2012.
Senor, Dan and Saul Singer, Start-up Nation, New York: Twelve, 2009.
Shirky, Clay, Cognitive Surplus, New York: Penguin Press, 2010.
Slay, Jill and Michael Miller, “Lessons Learned from the Maroochy Water Breach,” in E. Goetz and S. Shenoi (eds), in: Critical Infrastructure Protection, vol. 253, pp. 73–82, Boston: Springer, 2008.
Sofsky, Wolfgang, Traktat über die Gewalt, Frankfurt am Main: Fischer, 1996.
Tabansky, Lior, “Basic Concepts in Cyber Warfare,” Military and Strategic Affairs, vol. 3, 1 (2011), pp. 75–92.
Tikk, Eneken, Kadri Kaska, Kristel Rünnimeri, Mari Kert, Anna-Maria Talihärm, and Liis Vihul, Cyber Attacks Against Georgia, Tallinn: CCDCOE, 2008.
Tikk, Eneken, Kadri Kaska, and Liis Vihul, International Cyber Incidents, Tallinn: CCDCOE, 2010.
Tzu, Sun, The Art of War, translated by Samuel B Griffith, Oxford: Oxford University Press, 1963.
Warner, Michael, “Reflections on Technology and Intelligence Systems,” Intelligence and National Security, vol. 27, 1 (2012), pp. 133–53.
Waxman, Matthew C., “Cyber-Attacks and the Use of Force,” The Yale Journal of International Law, vol. 36 (2011), pp. 421–59.
Weber, Max, Politik als Beruf, Berlin: Duncker & Humblot, 1968 (1919).
Weiner, Tim, Enemies: A History of the FBI, New York: Random House, 2012.
Wynne, Michael, “Flying and Fighting in Cyberspace,” Air & Space Power Journal (2007), pp. 5–9.