1. WAR BY OTHER MEANS

  1. Andy Greenberg, “Hackers Gain Direct Access to US Power Grid Controls,” Wired, September 6, 2017.

  2. Andy Greenberg, “How an Entire Nation Became Russia’s Test Lab for Cyberwar,” Wired, July 25, 2018.

  3. Ellen Nakashima, “US Officials Say Russian Government Hackers Have Penetrated Energy and Nuclear Company Business Networks,” Washington Post, July 8, 2017.

  4. Adam Segal, The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age (New York: Council on Foreign Relations, 2016), p. 113.

  5. National Cyber Strategy (Washington, D.C.: White House, 2018), https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf.

  6. Michael Sulmeyer, “How the US Can Play Cyber Offense,” Foreign Affairs, March 22, 2018.

  7. Simple Sabotage Field Manual (Washington, D.C.: Office of Strategic Services, 1944), http://www.gutenberg.org/files/26184/page-images/26184-images.pdf?session_id=5cc0d158d771c1fc4d22b8548a44a3ae4928268d.

  8. Pavel Sudoplatov and Anatoli Sudoplatov, Special Tasks: The Memoirs of an Unwanted Witness—A Soviet Spymaster (Boston: Little, Brown, 1994).

  9. Department of Defense Science Board, Task Force Report: Resilient Military Systems and the Advanced Cyber Threat (Washington, D.C.: US Department of Defense, 2013), p. 6.

  10. Brian Grow, Keith Epstein, and Chi-Chu Tschang, “The New E-spionage,” BusinessWeek, April 8, 2008.

  11. Grow, Epstein, and Tschang, “The New E-spionage.”

  12. Cybersecurity expert Mark Espinoza, in a video lecture entitled “The Five Laws of Cybersecurity,” argues both that everything is vulnerable in some way and that every cybervulnerability will be exploited without doubt.

  13. Dan Goodin, “How ‘Omnipotent’ Hackers Tied to NSA Hid for 14 Years—And Were Found at Last,” Ars Technica, February 16, 2015.

  14. Fred Kaplan, Dark Territory: The Secret History of Cyber War (New York: Simon & Schuster, 2016) pp. 78–82.

  15. Kaplan, p. 83.

  16. Neri Zilber, “The Rise of the Cyber Mercenaries,” Foreign Policy, August 31, 2018.

  17. Nick Lewis, “Is Equation Group Malware a Game Changer for Advanced Attack Defense?,” SearchSecurity, https://searchsecurity.techtarget.com/tip/Is-Equation-Group-malware-a-game-changer-for-advanced-attack-defense.

  18. Michael Riley, “How the US Government Hacks the World,” Bloomberg Businessweek, May 23, 2013, https://www.bloomberg.com/news/articles/2013-05-23/how-the-u-dot-s-dot-government-hacks-the-world.

  19. Cliff Stoll, “Stalking the Wily Hacker,” Communications of the ACM 31, no. 5 (1998): pp. 484–497.

  20. Sanger, p. 140.

  21. Sanger, p. 91.

  22. Sanger, p. 84.

  23. Kaplan, Dark Territory pp. 3–5.

  24. Sanger, p. 199.

  25. Nathan Hodge, “Inside Moldova’s Twitter Revolution,” Wired, April 8, 2009.

  26. Natalia Morar, “I Am Not a Communist!” LiveJournal, April 7, 2009, https://natmorar.livejournal.com/36886.html.

  27. Ellen Barry, “Protests in Moldova Explode, with Help of Twitter,” New York Times, April 7, 2009.

  28. Neil MacFarquhar, “A Powerful Russian Weapon: The Spread of False Stories,” New York Times, August 28, 2016.

  29. “Andrei Soldatov,” PBS, https://www.pbs.org/wgbh/frontline/interview/andrei-soldatov/.

  30. “Edict of the Russian Federation President,” Instituto Español de Estudios Estratégicos, http://www.ieee.es/Galerias/fichero/OtrasPublicaciones/Internacional/2016/Russian-National-Security-Strategy-31Dec2015.pdf.

  31. Clay Shirky’s book Here Comes Everybody: The Power of Organizing Without Organizations provides a good overview of the optimism common in the United States at the time about how the internet and social media would facilitate the liberalization of societies across the world.

  32. “Alliance for Youth Movements: Using Technology to Change the World,” Be, September 28, 2010, http://www.bemagazine.org/alliance-for-youth-movements-using-technology-to-change-the-world/.

  33. Tim Rutten, “Tyranny’s New Nightmare: Twitter,” Los Angeles Times, June 24, 2009, http://articles.latimes.com/2009/jun/24/opinion/oe-rutten24.

  34. Evgeny Morozov, The Net Delusion (New York: Public Affairs, 2011), p. 128.

  35. Andrei Soldatov and Irina Borogan, The Red Web (New York: Public Affairs, 2015), p. 116.

  36. Morozov, The Net Delusion, p. 126.

  37. Will Stewart, “Putin’s Poster Girl: Pin-Up Politician Hates the West, Loves Thatcher,” Daily Mail, March 14, 2009, https://www.dailymail.co.uk/news/article-1161977/Putins-poster-girl-Pin-politician-hates-West--loves-Thatcher.html.

  38. Soldatov and Borogan, The Red Web, p. 117.

  39. Morozov, The Net Delusion, p. 125.

  40. In a 2014 article, “SMI i Informatsionnie Voini [Mass Media and Information Wars],” Ekaterina Yakushina argues that censorship is a crude tool to be used only as a last resort and that blatant fabrication of facts is unsustainable in an age where information is easily verifiable via the internet. The best long-term strategy, she argues, is to allow a wide range of views and to reframe negative news in the government’s preferred narrative.

  41. “Number of Social Media Users Worldwide from 2010 to 2021 (in Billions),” Statista, https://www.statista.com/statistics/278414/number-of-worldwide-social-network-users/.

  42. James Farwell, a longtime political campaign professional, interview with the author, June 5, 2018.

  43. Thomas Rid, Cyber War Will Not Take Place (New York: Oxford University Press, 2013) pp. 120–121.