Bibliography

  1. Abbate, Janet, Inventing the Internet (Cambridge, MA: MIT Press, 2000).
  2. Adamsky, Dmitry, “From Moscow with Coercion: Russian Deterrence Theory and Strategic Culture,” Journal of Strategic Studies 41/1–2 (2018): 33–66.
  3. Anderson, Julie, “The Chekist Takeover of the Russian State,” International Journal of Intelligence and CounterIntelligence 19/2 (2006): 237–88.
  4. Arquilla, John, “Cyberwar Is Already Upon Us,” Foreign Policy 192 (2012): 84-5.
  5. Arquilla, John, and David F. Ronfeldt, Cyberwar is Coming! (Santa Monica, CA: RAND, 1992).
  6. Arquilla, John, and David Ronfeldt, “Cyber War is Coming!” Comparative Strategy 12/2 (1993): 141–65.
  7. Austin, Greg, Cyber Policy in China (New York: Polity, 2014).
  8. Bakioǧlu, Burcu S., “The Gray Zone: Networks of Piracy, Control, and Resistance,” The Information Society 32/1 (2015): 40–50.
  9. Baron, Joshua, Angela O’Mahony, David Manheim and Cynthia Dion-Schwarz, National Security Implications of Virtual Currency (Santa Monica, CA: RAND, 2015).
  10. Bauman, Zygmunt, Didier Bigo, Paulo Esteves, et al., “After Snowden: Rethinking the Impact of Surveillance,” International Political Sociology 8/2 (2014): 121–44.
  11. Beehner, Lionel, Liam Collins, Steve Ferenzi, Robert Person and Aaron Brantly, A Contemporary Battlefield Assessment (West Point, NY: Modern War Institute, March 20, 2018).
  12. Berger, J. M., and Jonathon Morgan, The ISIS Twitter Census: Defining and Describing the Population of ISIS Supporters on Twitter (Washington, DC: Center for Middle East Policy at Brookings, 2015).
  13. Betz, David, “The Mystique of ‘Cyberwar’ and the Strategic Latency of Networked Social Movements,” Strategic Insights 10 (2011): 61–77.
  14. Bizeul, David, “Russian Business Network Study,” 2007, www.bizeul.org/files/RBN_study.pdf.
  15. Bohdanova, Tetyana, “Unexpected Revolution: The Role of Social Media in Ukraine’s Euromaidan Uprising,” European View 13/1 (2014): 133–42.
  16. Braman, Sandra, “The Interpenetration of Technical and Legal Decision-Making for the Internet,” Information, Communication & Society 13/3 (2010): 309–24.
  17. Brantly, Aaron F., “Financing Terror Bit by Bit,” CTC Sentinel 7/10 (2014): 1–5.
  18. Brantly, Aaron F., “Innovation and Adaptation in Jihadist Digital Security,” Survival 59/1 (2017): 79–102.
  19. Brantly, Aaron F., “Public Health and Epidemiological Approaches to National Cybersecurity: A Baseline Comparison,” in US National Cybersecurity, ed. Van Puyvelde and Brantly, 91–109.
  20. Brantly, Aaron F., “The Cyber Deterrence Problem,” in Proceedings of the 10th International Conference on Cyber Conflict, NATO Cyber Defense Center of Excellence (Tallinn: IEEE, 2018), 31–54.
  21. Brantly, Aaron F., “The Cyber Losers,” Democracy and Security 10/2 (2014): 132–55.
  22. Brantly, Aaron F., The Decision to Attack: Military and Intelligence Cyber Decision-Making (Athens: University of Georgia Press, 2016).
  23. Brantly, Aaron F., “The Most Governed Ungoverned Space: Legal and Policy Constraints on Military Operations in Cyberspace,” SAIS Review of International Affairs 36/2 (2016): 29–39.
  24. Brantly, Aaron F., “The Violence of Hacking: State Violence and Cyberspace,” Cyber Defense Review 2/1 (2017): 1–19.
  25. Brantly, Aaron F., “When Everything Becomes Intelligence: Machine Learning and the Connected World,” Intelligence and National Security 33/4 (2018): 562–73.
  26. Brantly, Aaron F., Nerea M. Cal and Devlin P. Winkelstein, Defending the Borderland: Ukrainian Military Experiences with IO, Cyber, and EW (West Point, NY: US Army Cyber Institute, 2017).
  27. Brooking, Emerson T., “Anonymous vs. the Islamic State,” Foreign Policy, November 13, 2015, https://foreignpolicy.com/2015/11/13/anonymous-hackers-islamic-state-isis-chan-online-war.
  28. Brown, Gary, and Christopher D. Yung, “Evaluating the US–China Cybersecurity Agreement, Part 1: The US Approach to Cyberspace,” Diplomat, January 19, 2017, https://thediplomat.com/2017/01/evaluating-the-us-china-cybersecurity-agreement-part-1-the-us-approach-to-cyberspace.
  29. Buchanan, Ben, “Cyber Deterrence Isn‘t MAD; It’s Mosaic,” Georgetown Journal of International Affairs 4 (2018): 130–40.
  30. Calleja, Alejandro, and Juan Caballero, A Look Into 30 Years of Malware Development from a Software Metrics Perspective (Cham: Springer, 2016).
  31. Campbell-Kelly, Martin, William Aspray, Nathan Ensmenger and Jeffrey R. Yost, Computer: A History of the Information Machine (New York: HarperCollins, 2017).
  32. Cartwright, James E., “Memorandum: Joint Terminology for Cyberspace Operations,” November 2010.
  33. Center for Long-Term Cybersecurity, Cybersecurity Futures 2020 (San Francisco: University of California–Berkeley, 2016).
  34. Cerf, Vinton G., and Robert E. Kahn, “A Protocol for Packet Network Intercommunication,” Data Communications of the IEEE Communications Society 22/5 (1974): 1–13.
  35. Ceruzzi, Paul E., Computing: A Concise History (Cambridge, MA: MIT Press, 2012).
  36. Chen, Hsinchun, et al., “Uncovering the Dark Web: A Case Study of Jihad on the Web,” Journal of the American Society for Information Science and Technology 59/8 (2008): 1347–59.
  37. Clarke, Richard A., and Robert K. Knake, Cyber War: The Next Threat to National Security and What to Do About It (New York: Ecco, 2010).
  38. Clausewitz, Karl, On War (New York: Random House, 1943).
  39. Cohen, Eliot, “Changes and Transformation in Military Affairs,” Journal of Strategic Studies 27/3 (2004): 395–407.
  40. Collinger, Jennifer L., B. Wodlinger, J. E. Downey et al., “High-performance Neuroprosthetic Control by an Individual with Tetraplegia,” Lancet 381 (2013): 557–64.
  41. Conti, Greg, and David Raymond, On Cyber: Towards an Operational Art for Cyber Conflict (n.p.: Kopidion Press, 2017).
  42. Council of Europe, Convention on Cybercrime, Budapest, November 23, 2001, www.coe.int/en/web/conventions/full-list/-/conventions/rms/0900001680081561.
  43. D’Ovidio, Robert, and James Doyle, “Study on Cyberstalking: Understanding Investigative Hurdles,” FBI Law Enforcement Bulletin 72/3 (2003): 10–17.
  44. De Mauro, Andrea, Marco Greco and Michele Grimaldi, “What Is Big Data? A Consensual Definition and a Review of Key Research Topics,” in American Institute of Physics Conference Proceedings, ed. Georgios Giannakopoulos, Damianos P. Sakas and Daphne Kyriaki-Manessi, 1644/1 (2015): 97–104.
  45. Deibert, Ronald J., Black Code: Surveillance, Privacy, and the Dark Side of the Internet (Toronto: McClelland & Stewart, 2013).
  46. Deibert, Ronald J., and Rafal Rohozinski, “Liberation vs. Control: The Future of Cyberspace,” Journal of Democracy 21/4 (2010): 43–57.
  47. Deibert, Ronald J., and Rafal Rohozinski, “Tracking GhostNet: Investigating a Cyber Espionage Network,” Information Warfare Monitor, March 29, 2009, 17–45.
  48. Deibert, Ronald J., Rafal Rohozinski and Masashi Crete-Nishihata, “Cyclones in Cyberspace: Information Shaping and Denial in the 2008 Russia Georgia War,” Security Dialogue 43/1 (2012): 3–24.
  49. Demchak, Chris, Wars of Disruption and Resilience: Cybered Conflict, Power, and National Security (Athens: University of Georgia Press, 2011).
  50. Demchak, Chris, and Peter Dombrowski, “Cyber Westphalia: Asserting State Prerogatives in Cyberspace,” Georgetown Journal of International Affairs (2013): 29–38.
  51. Demchak, Chris, and Peter Dombrowski, “Rise of a Cybered Westphalian Age,” Strategic Studies Quarterly 5/1 (2011): 32–61.
  52. DeNardis, Laura, Protocol Politics: The Globalization of Internet Governance (Cambridge, MA: MIT Press, 2009).
  53. DeNardis, Laura, The Global War for Internet Governance (New Haven, CT: Yale University Press, 2014).
  54. Deseriis, Marco, “Hacktivism: On the Use of Botnets in Cyberattacks,” Theory, Culture & Society 34/4 (2017): 131–52.
  55. Diamond, Larry, “Liberation Technology,” Journal of Democracy 21/3 (2010): 69–83.
  56. Dinniss, Heather Harrison, Cyber Warfare and the Laws of War (New York: Cambridge University Press, 2012).
  57. DiNucci, Darcy, “Fragmented Future,” Print 53/4 (1999): 32, 221–2.
  58. Dombrowski, Peter, and Chris C. Demchak, “Cyber War, Cybered Conflict, and the Maritime Domain,” Naval War College Review 67/2 (2014): 71–96.
  59. Dunn Cavelty, Myriam, Cyber-Security and Threat Politics: US Efforts to Secure the Information Age (London: Routledge 2008).
  60. Dupont, Benoit, “Cybersecurity Futures: How Can We Regulate Emergent Risks?” Technology Innovation Management Review (2013): 6–11.
  61. Durairajan, Ramakrishnan, Paul Barford, Joel Sommers and Walter Willinger, InterTubes (New York: ACM Press, 2015).
  62. Etzioni, Amitai, and Oren Etzioni, “Designing AI Systems that Obey Our Laws and Values,” Communications of the ACM 59/9 (2016): 29–31.
  63. Ferris, John, “A New American Way of War? C4ISR, Intelligence and Information Operations in Operation ‘Iraqi Freedom’: A Provisional Assessment,” Intelligence and National Security 81/3 (2003): 155–74.
  64. Fireye, “Redline Drawn: China Recalculates Its Use of Cyber Espionage,” June 20, 2016.
  65. Folsom, Thomas C., “Defining Cyberspace (Finding Real Virtue in the Place of Virtual Reality),” Tulane Journal of Technology and Intellectual Property 9/1 (2007): 75–121.
  66. Gartzke, Erik, “The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth,” International Security 38/2 (2013): 41–73.
  67. Gartzke, Erik, and Jon R. Lindsay, “Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace,” Security Studies 24/2 (2015): 316–48.
  68. George, Alexander L., and Richard Smoke, Deterrence in American Foreign Policy: Theory and Practice (New York: Columbia University Press, 1974).
  69. Gibson, William, Neuromancer (New York: Ace Books, 1984).
  70. Goode, Luke, “Anonymous and the Political Ethos of Hacktivism,” Popular Communication 13/1 (2015): 74–86.
  71. Goodman, Marc, Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It (New York: Doubleday, 2015).
  72. Goodman, Will, “Cyber Deterrence: Tougher in Theory than in Practice?” Strategic Studies Quarterly 4/3 (2010): 102–35.
  73. Gray, Colin, Another Bloody Century: Future Warfare (London: Orion Books, 2006).
  74. Gvodsev, Nicholas, “The Bear Goes Digital: Russia and Its Cyber Capabilities,” in Cyberspace and National Security, ed. Reveron, 173–89.
  75. Haddad, Saïd, “Le Cyberespace ou la construction d’un ‘champ de confrontation à part entière,’” in La Cyberdéfense. Politique de l’espace numérique, ed. Amaël Cattaruzza, Didier Danet and Stéphane Taillat (Paris: Armand Collin, 2018), 44–51.
  76. Hafner, Katie, and Matthew Lyon, Where Wizards Stay Up Late: The Origins of the Internet (New York: Simon & Schuster, 1996).
  77. Hanson, Fergus, Revolution @State: The Spread of EDiplomacy (Sydney: Lowy Institute for International Affairs, 2012).
  78. Harnett, Eric, “Welcome to Hyperwar,” Bulletin of the Atomic Scientists 48/7 (1992): 14–21.
  79. Healey, Jason, A Fierce Domain: Conflict in Cyberspace, 1986 to 2012 (Arlington, VA: Cyber Conflict Studies Association, 2013).
  80. Healey, Jason, “The Five Futures of Cyber Conflict and Cooperation,” Atlantic Council Issue Brief, 2011.
  81. Heffelfinger, Christopher, “The Risks Posed by Jihadist Hackers,” CTC Sentinel 6/7 (2013): 1–5.
  82. Hinduja, Sameer, and Justin W. Patchin, “Bullying, Cyberbullying, and Suicide,” Archives of Suicide Research 14 (2010): 206–21.
  83. Holt, Thomas J., George W. Burruss and Adam M. Bossler, Policing Cybercrime and Cyberterror (Durham: Carolina Academic Press, 2015).
  84. Inkster, Nigel, China’s Cyber Power (Abingdon: Routledge, 2016).
  85. Inkster, Nigel, “The Chinese Intelligence Agencies: Evolution and Empowerment,” in China and Cybersecurity, ed. Lindsay, Cheung and Reveron, 29–50.
  86. Internet Society, Paths to Our Digital Future, 2017, Executive Summary, https://future.internetsociety.org/introduction/executive-summary.
  87. Jarmon, Jack, and Pano Yannakogeorgos, The Cyber Threat and Globalization: The Impact on U.S. National and International Security (New York: Rowman and Littlefield, 2018).
  88. Jasper, Scott, “U.S. Cyber Threat Intelligence Sharing Frameworks,” International Journal of Intelligence and CounterIntelligence 30/1 (2016): 53–65.
  89. Jeangène Vilmer, Jean-Baptiste, “Successfully Countering Russian Electoral Interference: 15 Lessons Learned from the Macron Leaks,” CSIS Brief, 2018.
  90. Jianwei, Zhuge, Gu Lion, Duan Haixin and Taylor Roberts, “Investigating the Chinese Online Underground Economy,” in China and Cybersecurity, ed. Lindsay, Cheung and Reveron, 87–120.
  91. Johnston, Alastair Iain, “Thinking about Strategic Culture,” International Security 19/4 (1995): 32–64.
  92. Johnston, Jessica, Technological Turf Wars: A Case Study of the Computer Antivirus Industry (Philadelphia: Temple University Press, 2009).
  93. Junio, Timothy J., “How Probable Is Cyber War? Bringing IR Theory Back In to the Cyber Conflict Debate,” Journal of Strategic Studies 36/1 (2013): 125–33.
  94. Kaplan, Fred M., Dark Territory: The Secret History of Cyber War (New York: Simon & Schuster, 2016).
  95. Kello, Lucas, The Virtual Weapon and International Order (New Haven, CT: Yale University Press, 2017).
  96. Kelly, Sanja, Mai Tuong, Adrian Shahba and Madeline Earp, “Silencing the Messenger: Communications Apps under Pressure,” in Freedom House, Freedom on the Net, 2016.
  97. Keohane, Robert O., and Joseph S. Nye, Power and Interdependence: World Politics in Transition (Boston: Little, Brown, 1977).
  98. King, Gary, Jennifer Pan and Margaret E. Roberts, “How Censorship in China Allows Government Criticism but Silences Collective Expression,” American Political Science Review 107/2 (2013): 326–43.
  99. Klausen, Jytte, “Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and Iraq,” Studies in Conflict & Terrorism 38/1 (2014): 1–22.
  100. Klimburg, Alexander, “Mobilising Cyber Power,” Survival 53/1 (2011): 41–60.
  101. Klimburg, Alexander, The Darkening: The War for Cyberspace (New York: Penguin Books, 2017).
  102. Kock, Ned, “E-Collaboration and E-Commerce in Virtual Worlds,” International Journal of E-Collaboration 4/3 (2008): 1–13.
  103. Koh, Harold Hongju, “International Law in Cyberspace,” Keynote Address at the US Cyber Command Inter-Agency Legal Conference, Ft. Meade, MD, September 18, 2002.
  104. Kramer, Franklin D., “Cyberpower and National Security: Policy Recommendations for a Strategic Framework,” in Cyberpower and National Security, ed. Kramer, Starr and Wentz, 3–23.
  105. Kramer, Franklin D., Stuart H. Starr, Larry K. Wentz (eds.), Cyberpower and National Security (Washington, DC: National Defense University, 2009).
  106. Kuehl, Daniel T., “From Cyberspace to Cyberpower: Defining the Problem,” in Cyberpower and National Security, ed. Kramer, Starr and Wentz, 24–42.
  107. Kurbalija, Jovan, An Introduction to Internet Governance, 7th edn. (Geneva: DiploFoundation, 2016).
  108. Lee, Chung-pin, Kaiju Chang, and Frances Stokes Berry, “Testing the Development and Diffusion of E-government and E-democracy: A Global Perspective,” Public Administration Review 71/3 (2011): 444–54.
  109. Leiner, Barry M., et al., “The Past and Future History of the Internet,” Communications of the ACM 40/2 (1997): 102–8.
  110. Levy, Steven, Hackers: Heroes of the Computer Revolution (Sebastopol, CA: O’Reilly Media, 2010).
  111. Lewis, James, Economic Impact of Cybercrime: No Slowing Down (Washington, DC: McAfee, 2018).
  112. Libicki, Martin C., Cyberdeterrence and Cyberwar (Santa Monica, CA: RAND, 2009).
  113. Libicki, Martin C., Cyberspace in Peace and War (Annapolis: Naval Institute Press, 2016).
  114. Libicki, Martin C., “Why Cyber War Will Not and Should Not Have Its Grand Strategist,” Strategic Studies Quarterly 8/1 (2014): 23–39.
  115. Lin, Herbert, “Operational Considerations in Cyber Attack and Cyber Exploitation,” in Cyberspace and National Security, ed. Reveron, 37–56.
  116. Lindsay, Jon R., “Introduction. China and Cybersecurity: Controversy and Context,” in China and Cybersecurity, ed. Lindsay, Cheung and Reveron, 1–26.
  117. Lindsay, Jon R., “Stuxnet and the Limits of Cyber Warfare,” Security Studies 22/3 (2013): 365–404.
  118. Lindsay, Jon R., “The Impact of China on Cybersecurity: Fiction and Friction,” International Security 39/3 (2015): 7–47.
  119. Lindsay, Jon R., “Tipping the Scales: The Attribution Problem and the Feasibility of Deterrence Against Cyberattack,” Journal of Cybersecurity 1/1 (2015): 53–67.
  120. Lindsay, Jon R., and Tai Ming Cheung, “From Exploitation to Innovation: Acquisition, Absorption, and Application,” in China and Cybersecurity, ed. Lindsay, Cheung and Reveron, 51–86.
  121. Lindsay, Jon R., Tai Ming Cheung and Derek S. Reveron (eds.), China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain (Oxford University Press, 2015).
  122. Lindsay, Jon R., and Derek S. Reveron, “Conclusion: The Rise of China and the Future of Cybersecurity,” in China and Cybersecurity, ed. Lindsay, Cheung and Reveron, 333–54.
  123. Lockheed Martin, “The Cyber Kill Chain,” www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html.
  124. Lotrionte, Catherine, “A Better Defense: Examining the United States’ New Norms-Based Approach to Cyber Deterrence,” Georgetown Journal of International Affairs (2016): 75–88.
  125. Lum, Kristian, and William Isaac, “To Predict and Serve?” Significance 13/5 (2016): 14–19.
  126. MacDuffee Metzger, Megan, and Joshua A. Tucker, “Social Media and EuroMaidan: A Review Essay,” Slavic Review 76/1 (2017): 187–91.
  127. Madsen, Wayne, “Intelligence Agency Threats to Computer Security,” International Journal of Intelligence and CounterIntelligence 6/4 (1993): 413–88.
  128. Mandiant Threat Intelligence Center, “APT1 Exposing One of China’s Cyber Espionage Units,” www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf.
  129. Manjikian, Mary McEvoy, “From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik,” International Studies Quarterly 54/2 (2010): 381–401.
  130. Marczak, Bill, and John Scott-Railton, “Keep Calm and (Don’t) Enable Macros: A New Threat Actor Targets UAE Dissidents – the Citizen Lab,” Citizen Lab, May 29, 2016, https://citizenlab.ca/2016/05/stealth-falcon.
  131. Margolis, Michael, “E-Government and Democracy,” in Russel J. Dalton and Hans-Dieter Klingemann (eds.), The Oxford Handbook of Political Behavior (Oxford University Press, 2009 online).
  132. Marquis-Boire, Morgan, and Bill Marczak, “From Bahrain with Love: FinFisher’s Spy Kit Exposed?” Citizen Lab, July 25, 2012, https://citizenlab.ca/2012/07/from-bahrain-with-love-finfishers-spy-kit-exposed.
  133. Mazanec, Brian, “The Outlook for Constraining International Norms for Offensive Cyber Operations”, in US National Cybersecurity, ed. Van Puyvelde and Brantly, 40–54.
  134. McGraw, Gary, “Cyber War Is Inevitable (Unless We Build Security In),” Journal of Strategic Studies 36/1 (2013): 109–19.
  135. Medvedev, Sergey, “Data Protection in Russian Federation: Overview,” Thomson Reuters Practical Law, December 1, 2017, uk.practicallaw.thomsonreuters.com/2-502-2227.
  136. Mowery, David C., and Timothy Simcoe, “Is the Internet a US Invention? An Economic and Technological History of Computer Networking,” Research Policy 31 (2002): 1369–87.
  137. Mueller, Milton, Networks and States: The Global Politics of Internet Governance (Cambridge, MA: MIT Press, 2010).
  138. Mueller, Milton, Will the Internet Fragment? Sovereignty, Globalization and Cyberspace (Malden, MA: Polity, 2017).
  139. Murray, Andrew, Information Technology Law: The Law and Society (Oxford University Press, 2016).
  140. Myers, Brad A., “A Brief History of Human–Computer Interaction Technology,” ACM Interactions (1998): 44–54.
  141. National Audit Office, “Investigation: WannaCry Cyber Attack and the NHS,” October 27, 2017, www.nao.org.uk/report/investigation-wannacry-cyber-attack-and-the-nhs.
  142. National Security Agency, “PRISM/US-984XN Overview,” April 2013, www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/?noredirect=on.
  143. NATO Cooperative Cyber Defence Centre of Excellence, “Cyber Security Strategy Documents,” October 18, 2018, https://ccdcoe.org/cyber-security-strategy-documents.html.
  144. NATO Cooperative Cyber Defence Centre of Excellence, “National Cyber Security Organisation,” https://ccdcoe.org/national-cyber-security-organisation.html.
  145. Naugle, Matthew G., Network Protocols (New York: McGraw-Hill Professional, 1999).
  146. Netmundial, “NetMundial Multistakeholder Statement,” Sao Paulo, Brazil, April 24, 2014, http://netmundial.br/netmundial-multistakeholder-statement.
  147. Nojeim, Gregory T., “Cybersecurity and Freedom on the Internet,” Journal of National Security Law & Policy 4/1 (2010): 119–37.
  148. Norris, Donald F., “E-Government 2020: Plus ça change, plus c’est la meme chose,” Public Administration Review 70/1 (2010): 180–1.
  149. Nye, Joseph S., “Get Smart: Combining Hard and Soft Power,” Foreign Affairs 88/4 (2009): 160–3.
  150. Nye, Joseph S., “Hard, Soft, and Smart Power,” in The Oxford Handbook of Modern Diplomacy, ed. Andrew F. Cooper, Jorge Heine and Ramesh Thakur (Oxford University Press, 2013 online).
  151. Office of the Director of National Intelligence, Background to “Assessing Russian Activities and Intentions in Recent US Elections: The Analytic Process and Cyber Incident Attribution,” January 6, 2017.
  152. Office of the President of the United States, “National Strategy for Global Supply Chain Security,” Washington, DC, 2012.
  153. Olson, Parmy, We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency (New York: Back Bay Books, 2013).
  154. Onuch, Olga, “EuroMaidan Protests in Ukraine: Social Media versus Social Networks,” Problems of Post-Communism 62/4 (2015): 217–35.
  155. Patchin, Justin W., “Summary of Our Cyberbullying Research (2004-2016),” Cyberbullying Research Center, November 26, 2016, https://cyberbullying.org/summary-of-our-cyberbullying-research.
  156. Philipson, Graeme, “A Short History of Software,” in Management, Labour Process and Software Development: Reality Bites, ed. Rowena Barrett (New York: Routledge, 2005), 13–44.
  157. Ponemon Institute, “2017 Cost of Data Breach Study,” Research Report, June 2017.
  158. Price, James H., and Jagdish Khubchandani, “Adolescent Homicides, Suicides, and the Role of Firearms: A Narrative Review,” American Journal of Health Education 48/2 (2017): 67–79.
  159. Raymond, Mark, and Laura DeNardis, “Multistakeholderism: Anatomy of an Inchoate Global Institution,” International Theory 7/3 (2015): 572–616.
  160. Reveron, Derek S. (ed.), Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World (Washington, DC: Georgetown University Press, 2012).
  161. Reveron, Derek S., An Introduction to National Security and Cyberspace,” in Cyberspace and National Security, ed. Reveron, 3–19.
  162. Rid, Thomas, “Cyber War Will Not Take Place,” Journal of Strategic Studies 35/1 (2012): 5-32.
  163. Rid, Thomas, Cyber War Will Not Take Place (London: Hurst, 2013).
  164. Rid, Thomas, Rise of the Machines: A Cybernetic History (London: Scribe, 2016).
  165. Rid, Thomas, and Ben Buchanan, “Attributing Cyber Attacks,” Journal of Strategic Studies 38/1–2 (2015): 4–37.
  166. Rid, Thomas, and Daniel Moore, “Cryptopolitik and the Darknet,” Survival 58/1 (2016): 7–38.
  167. Roberts, Lawrence G., “The Evolution of Packet Switching,” Proceedings of the IEEE 66/11 (1978): 1307–13.
  168. Rogin, Josh, “NSA Chief: Cybercrime Constitutes the ‘Greatest Transfer of Wealth in History,’” Foreign Policy, July 9, 2012, https://foreignpolicy.com/2012/07/09/nsa-chief-cybercrime-constitutes-the-greatest-transfer-of-wealth-in-history.
  169. Rollins, John, “U.S.–China Cyber Agreement,” CRS Insight, October 16, 2016, https://fas.org/sgp/crs/row/IN10376.pdf.
  170. Ross, Ron, Michael McEvilley and Janey Carrier Oren, Systems Security Engineering (Gaithersburg, MD: National Institute of Standards and Technology, 2016).
  171. Rumsfeld, Donald, “Transforming the Military,” Foreign Affairs 81/3 (2002): 20–32.
  172. Ryan, Camille, and Jamie M. Lewis, Computer and Internet Use in the United States: 2015 (Washington, DC: US Census Bureau, 2017).
  173. Sanger, David E., The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age (New York: Crown Publishers, 2018).
  174. Schmitt, Michael N., “Classification of Cyber Conflict,” Journal of Conflict & Security Law 17/2 (2012): 245–60.
  175. Schmitt, Michael N., Tallinn Manual on the International Law Applicable to Cyber Warfare: Prepared by the International Group of Experts at the Invitation of the NATO Cooperative Cyber Defence Centre of Excellence (Cambridge University Press, 2013).
  176. Schmitt, Michael N., and Liis Vihul, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (Cambridge University Press, 2017).
  177. Scott-Railton, John, and Seth Hardy, “Malware Attacks Targeting Syrian ISIS Critics,” Citizen Lab, December 18, 2014, https://citizenlab.ca/2014/12/malware-attack-targeting-syrian-isis-critics.
  178. Searle, Loyd, “The Bombsight War: Nordern vs. Sperry,” IEEE Spectrum (1989): 60–4.
  179. Segal, Adam, “Holding the Multistakeholder Line at the ITU,” Council on Foreign Relations, October 21, 2014, www.cfr.org/report/holding-multistakeholder-line-itu.
  180. Shadow Server Foundation, “AS40989 RBN as RBusiness Network,” www.shadowserver.org/wiki/uploads/Information/RBN-AS40989.pdf.
  181. Sheldon, John, “The Rise of Cyberpower,” in Strategy in the Contemporary World, ed. John Baylis, James J. Wirtz and Colin S. Gray (Oxford University Press, 2013), 303–19.
  182. Sheldon, Robert, and Joe McReynolds, “Civil–Military Integration and Cybersecurity: A Study of Chinese Information Warfare Militias,” in China and Cybersecurity, ed. Lindsay, Cheung and Reveron, 188–222.
  183. Shu, Xiaokui, Ke Tian, Andrew Ciambrone and Danfeng Yao, “Breaking the Target: An Analysis of Target Data Breach and Lessons Learned,” arXiv, January 2017, 1–10, https://arxiv.org/pdf/1701.04940.
  184. Singer, Peter W., and Allan Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know (Oxford University Press, 2014).
  185. Skoudis, Edward, “Evolutionary Trends in Cyberspace,” in Cyberpower and National Security, ed. Kramer, Starr and Wentz, 147–70.
  186. Slayton, Rebecca, “What Is the Cyber Offense–Defense Balance? Conceptions, Causes, and Assessment,” International Security 41/3 (2017): 72–109.
  187. Soldatov, Andrei, and Irina Borogan, The Red Web: The Struggle Between Russia’s Digital Dictators and the New Online Revolutionaries (New York: Public Affairs, 2015).
  188. Sorell, Tom, “Human Rights and Hacktivism: The Cases of Wikileaks and Anonymous,” Journal of Human Rights Practice 7/3 (2015): 391–410.
  189. Soska, Kyle, and Nicolas Christin, “Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem,” Proceedings of USENIX Security Symposium, August 12–14, 2015, Washington, DC.
  190. Spitzberg, Brian H., and Gregory Hoobler, “Cyberstalking and the Technologies of Interpersonal Terrorism,” New Media and Society 4/1 (2002): 67–88.
  191. Staeder, Tracy, “Why Russia Is Building Its Own Internet,” IEEE Spectrum, January 17, 2018, https://spectrum.ieee.org/tech-talk/telecom/internet/could-russia-really-build-its-own-alternate-internet.
  192. Stolberg, Alan G., “Crafting National Interests in the 21st Century,” in U.S. Army War College Guide to National Security Issues, vol. II: National Security Policy and Strategy, ed. J. Boone Bartholomees Jr. (Carlisle, PA: Strategic Studies Institute, 2012), 13–25.
  193. Stoll, Clifford, “Stalking the Wily Hacker,” Communications of the ACM 31/5 (1988): 484–97.
  194. Stoll, Clifford, The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage (New York: Doubleday, 1989).
  195. Stone, John, “Cyber War Will Take Place!” Journal of Strategic Studies 36/1 (2013): 101–8.
  196. Stone-Gross, Brett, Marco Cova, Bob Gilbert, Richard Kemmerer, Christopher Kruegel and Giovanni Vigna, “Analysis of a Botnet Tracker,” IEEE Security & Privacy 9/1 (2011): 64–72.
  197. Stone-Gross, Brett, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald and Giovanni Vigna, “The Underground Economy of Fake Antivirus Software,” in Economics of Information Security and Privacy III, ed. Bruce Schneier (New York: Springer, 2013), 55–78.
  198. Surzhko-Harned, Lena, and Andrew J. Zahuranec, “Framing the Revolution: The Role of Social Media in Ukraine’s Euromaidan Movement,” Nationalities Papers 45/5 (2017): 758–79.
  199. Symantec, “Cybercrime Time-Line,” www.symantec.com/region/sg/homecomputing/library/cybercrime.html.
  200. Symantec, “Norton Cyber Security Insights Report Global Results 2017,” www.symantec.com/content/dam/symantec/docs/about/2017-ncsir-global-results-en.pdf.
  201. Syverson, Paul, “A Peel of Onion,” Proceedings of the 27th Annual Computer Security Applications Conference ACM (2011): 123–37.
  202. Tanczer, Leonie Maria, Ine Steenmans, Miles Elsden, Jason Blackstock and Madeline Carr, “Emerging Risks in the IoT Ecosystem: Who’s Afraid of the Big Bad Smart Fridge?” paper presented at Living in the Internet of Things: Cybersecurity of the IoT Conference, London, 2018, https://ieeexplore.ieee.org/document/8379720.
  203. Thomas, Timothy L., “Nation-State Cyber Strategies: Examples from China and Russia,” in Cyberpower and National Security, ed. Kramer, Starr and Wentz, 468–75.
  204. Thomas, Timothy L., “Russian Reflexive Control, Theory and the Military,” Journal of Slavic Military Studies 17/2 (2004): 237–56.
  205. Tzezana, Roey, “High-probability and Wild-card Scenarios for Future Crimes and Terror Attacks Using the Internet of Things,” Foresight 19/1 (2017): 1–14.
  206. UK Government, “National Cyber Security Strategy 2016 to 2021,” November 2016, www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021.
  207. US Army Training and Doctrine Command, “Multi-Domain Battle: Evolution of Combined Arms for the 21st Century, 2025–2040,” December 2017, www.arcic.army.mil/App_Documents/Multi-Domain-Battle-Evolution-of-Combined-Arms.pdf.
  208. US Army War College, “Strategic Cyberspace Operations Guide,” June 1, 2016, archive.org/details/USAWCStrategicCyberOpsGuide.
  209. US Cyber Command, “Achieve and Maintain Cyberspace Superiority: Command Vision for US Cyber Command,” 2018, www.hsdl.org/?view&did=812923.
  210. US Department of Defense, “The DoD Cyber Strategy,” April 2015, http://archive.defense.gov/home/features/2015/0415_cyber-strategy/final_2015_dod_cyber_strategy_for_web.pdf.
  211. US Government, “Improvement of Technical Management of Internet Names and Addresses; Proposed Rule,” in Federal Register, vol. LXIII (Washington, DC: Office of the Federal Register, 1998).
  212. US Government, “National Military Strategy for Cyberspace Operations,” December 2006, www.hsdl.org/?view&did=35693.
  213. US House of Representatives, Committee on Science, Space, and Technology Subcommittee on Technology and Competitiveness, Hearing: Computer Security, Statement of Winn Schwartau, 102nd Congress, 1st sess., June 27, 1991.
  214. US Joint Chiefs of Staff, Joint Publication 3-0, “Joint Operations,” Washington, DC, January 17, 2017.
  215. US Joint Chiefs of Staff, Joint Publication 3-12 (R), “Cyberspace Operations,” Washington, DC, 2013.
  216. Vacca, W. Alexander, “Military Culture and Cyber Security,” Survival 53/6 (2011): 159–76.
  217. Valeriano, Brandon, Benjamin Jensen and Ryan C. Maness, Cyber Strategy: The Evolving Character of Power and Coercion (Oxford University Press, 2018).
  218. Valeriano, Brandon, and Ryan C. Maness, Cyber War versus Cyber Realities: Cyber Conflict in the International System (New York: Oxford University Press, 2015).
  219. Valeriano, Brandon, and Ryan C. Maness, “The Coming Cyberpeace,” Foreign Affairs, May 13, 2015, www.foreignaffairs.com/articles/2015-05-13/coming-cyberpeace.
  220. Valeriano, Brandon, and Ryan Maness, “The Fog of CyberWar,” Foreign Affairs, November 21, 2012, www.foreignaffairs.com/articles/2012-11-21/fog-cyberwar.
  221. Van Puyvelde, Damien, “From Information to Cybersecurity: Bridging the Public–Private Divide,” in US National Cybersecurity, ed. Van Puyvelde and Brantly, 177–94.
  222. Van Puyvelde, Damien, and Aaron F. Brantly (eds.), US National Cybersecurity: International Politics, Concepts and Organization (New York: Routledge, 2017).
  223. Van Puyvelde, Damien, Stephen Coulthart and Shahriar Hossain, “Beyond the Buzzword: Big Data and National Security Decision-Making,” International Affairs 93/6 (2017): 1397–1416.
  224. Warner, Michael, “Cybersecurity: A Pre-history,” Intelligence and National Security 27/5 (2012): 781–99.
  225. Warner, Michael, “Intelligence in Cyber – and Cyber in Intelligence,” in Understanding Cyber Conflict, ed. George Perkovich and Ariel E. Levite (Washington, DC: Georgetown University Press, 2018), 17–29.
  226. Webroot, Game Changers: AI and Machine Learning in Cybersecurity (Broomfield, CO: Webroot, 2017).
  227. Weimann, Gabriel, “Cyberterrorism: The Sum of All Fears?” Studies in Conflict & Terrorism 28/2 (2005): 129–49.
  228. Weimann, Gabriel, Going Darker? The Challenge of Dark Net Terrorism (Washington, DC: Wilson Center, 2018).
  229. Weimann, Gabriel, Terrorism in Cyberspace: The Next Generation (New York: Columbia University Press, 2015).
  230. Wendt, Alexander, “Anarchy Is What States Make of It,” International Organization 46/2 (1992): 391–425.
  231. White House, “International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World,” May 2011, https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf.
  232. White House, National Security Decision Directive 145, “National Policy on Telecommunications and Automated Information Systems Security (U),” September 17, 1984, https://fas.org/irp/offdocs/nsdd145.htm.
  233. White House, Presidential Decision Directive/NSC-63, “Critical Infrastructure Protection,” May 22, 1998, https://fas.org/irp/offdocs/pdd/pdd-63.htm.
  234. White House, “Presidential Policy Directive 41 – United States Cyber Incident Coordination,” July 26, 2016, https://obamawhitehouse.archives.gov/the-press-office/2016/07/26/presidential-policy-directive-united-states-cyber-incident.
  235. White House, “The National Strategy to Secure Cyberspace,” 2003, https://georgewbush-whitehouse.archives.gov/pcipb.
  236. White, Sarah P., Understanding Cyberwarfare: Lessons from the Russia–Georgia War (West Point, NY: Modern War Institute, 2018).
  237. Wiener, Norbert, Cybernetics: Or, Control and Communication in the Animal and the Machine (New York: MIT Press, 1961).
  238. Williams, Meredydd, et al., ““Future Scenarios and Challenges for Security and Privacy,” paper presented at the IEEE International Forum on Research and Technologies for Society and Industry, Leveraging a better tomorrow (2016), https://ieeexplore.ieee.org/document/7740625.
  239. Wirtz, James J., “Cyber War and Strategic Culture: The Russian Integration of Cyber Power into Grand Strategy,” in Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers (Tallinn: NATO Cooperative Cyber Defence Centre of Excellence, 2015), 29–37.
  240. Wolfers, Arnold, “National Security as an Ambiguous Symbol,” Political Science Quarterly 67/4 (1952): 481–502.
  241. Zaman, R. Uz, “Strategic Culture: A ‘Cultural’ Understanding of War,” Comparative Strategy 28/1 (2009): 68–88.
  242. Zatko, Peiter Mudge, “If You Don’t Like the Game, Hack the Playbook,” presentation at DARPA Cyber Colloquium, November 7, 2011, Arlington, VA.
  243. Zetter, Kim, Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon (New York: Broadway Books, 2014).