69,321
Views
225
CrossRef citations to date
0
Altmetric
Original Articles

Cyber War Will Not Take Place

Pages 5-32 | Published online: 05 Oct 2011

Bibliography

  • Adair , Steven . 13 Aug. 2008 . “ ‘Georgian Attacks: Remember Estonia?’ ” . In Shadow Server
  • Adee , Sally . May 2008 . “ ‘The Hunt for the Kill Switch’ ” . In IEEE Spectrum
  • Arquilla , John and David , Ronfeldt . 1993 . ‘Cyberwar is Coming!’ . Comparative Strategy , 12/2 : 141 – 65 .
  • Arthur , Charles . 6 Feb. 2011 . “ ‘William Hague reveals hacker attack on Foreign Office in call for cyber rules’ ” . In Guardian
  • Blakely , Rhys . 1 Dec. 2007 . “ ‘MI5 alert on China's cyberspace spy threat’ ” . In The Times
  • Bright , Peter . 15 Feb. 2011 . “ ‘Anonymous speaks: the inside story of the HBGary hack’ ” . In Ars Technica
  • Broad , J. William , John , Markoff and David , Sanger E. 16 Jan. 2011 . “ ‘Israeli test on worm called crucial in Iran nuclear delay’ ” . In New York Times A1
  • Carr , Jeffrey . 20 March 2009 . “ ‘Project Grey Goose Phase II Report’ ” . In GreyLogic Chapter 2
  • Clarke , A. Richard and Robert , Knake K. 2010 . Cyber War , New York : Ecco .
  • Clausewitz , Carl von . 1832, 1980 . Vom Kriege , Berlin : Ullstein .
  • Clover , Charles . 11 March 2009 . “ ‘Kremlin-backed group behind Estonia cyber blitz’ ” . In Financial Times
  • Courtney , Siobhan . 21 May 2009 . “ ‘Pornographic videos flood YouTube’ ” . In BBC News
  • Crenshaw , Adrian . 28 March 2011 . “ ‘Crude, Inconsistent Threat: Understanding Anonymous’ ” . In Irongeek.com <http://bitly.com/e87PeA>
  • Daniel , Lisa . 11 Feb. 2011 . “ ‘Panetta: Intelligence Community Needs to Predict Uprisings’ ” . In American Forces Press Service
  • Deibert , Ron and Rafal , Rohozinsky . 2009 . Tracking Ghostnet , Toronto : Munk Centre for International Studies .
  • Dinstein , Yoram . 2002 . ‘Computer Network Attacks and Self-Defense’ . International Law Studies , 76 : 99 – 120 .
  • Espiner, Tim, ‘Estonia's cyberattacks: lessons learned, a year on’, ZDNet UK, 1 May 2008
  • Evron , Gadi . 2008 . “ ‘Battling Botnets and Online Mobs’ ” . In Science & Technology , 121 – 8 . Winter/Spring .
  • Evron , Gadi . 17 March 2009 . “ ‘Authoritatively, Who was Behind the Estonian Attacks?’ ” . In Darkreading
  • Falliere , Nicolas , Liam , Murchu O and Eric , Chien . 2011 . W32.Stuxnet Dossier. Version 1.4 , Symantec .
  • Fulghum , A. David , Robert , Wall and Amy , Butler . 16 Nov. 2007 . ‘Cyber-Combat's First Shot’ . Aviation Week & Space Technology , 167 : 28 – 31 .
  • Fulghum , A. David , Robert , Wall and Amy , Butler . 25 Nov. 2007 . ‘Israel Shows Electronic Prowess’ . Aviation Week & Space Technology , 168
  • Galula , David . 1964 . Counterinsurgency Warfare: Theory and Practice , New York : Praeger .
  • Gandhi , Robin , Anup , Sharma , William , Mahoney , William , Sousan , Qiuming , Zhu and Phillip , Laplante . Spring 2011 . “ ‘Dimensions of Cyber Attacks’ ” . In IEEE Technology and Society Magazine 28 – 38 .
  • Gibbs , P. Jack . 1986 . “ ‘Deterrence Theory and Research’ ” . In Law as a Behavioral Instrument , Edited by: Melton , Gary , Nader , Laura and Dienstbier , Richard A. Lincoln : Univ. of Nebraska Press .
  • Giraudoux , Jean . 1955 . Tiger at the Gates [La Guerre De Troie N'aura Pas Lieu] , Edited by: Fry , Christopher . New York : Oxford University Press .
  • Graham , Bradley . 25 Aug. 2005 . “ ‘Hackers attack via Chinese web sites’ ” . In Washington Post
  • Gross , Joseph Michael . April 2011 . “ ‘A declaration of cyber-war’ ” . In Vanity Fair
  • Hayden , V. Michael . Spring 2011 . ‘The Future of Things Cyber’ . Strategic Studies Quarterly , 5/1 : 3 – 7 .
  • Langner , Ralph . 10 Jan. 2011 . “ ‘What Stuxnet is All About’ ” . In The Last Line of Cyber Defense
  • Langner , Ralph . 21 Feb. 2011 . “ ‘Matching Langner's Stuxnet analysis and Symantec's dossier update’ ” . In The Last Line of Cyber Defense
  • Langner , Ralph . March 2011 . “ ‘Cracking Stuxnet’ ” . In TED Talk
  • Langner , Ralph . 3 June 2011 . “ ‘A declaration of bankruptcy for US critical infrastructure protection’ ” . In The Last Line of Cyber Defense
  • Laqueur , Walter . 1976 . Guerrilla: A Historical and Critical Study , Boston : Little, Brown .
  • Libicki , Martin . 2009 . Cyberdeterrence and Cyberwar , Santa Monica , CA : RAND Corporation .
  • Lynn , J. William . 2010 . ‘Defending a New Domain’ . Foreign Affairs , 89/5 : 97 – 108 .
  • Mahnken , G. Thomas . 2011 . “ ‘Cyber War and Cyber Warfare’ ” . In America's Cyber Future: Security and Prosperity in the Information Age , Edited by: Lord , Kristin and Sharp , Travis . Vol. 2 , 53 – 62 . Washington , DC : CNAS .
  • Markoff , John . 26 Sept. 2010 . “ ‘A silent attack, but not a subtle one’ ” . In New York Times
  • Medetsky , Anatoly . 18 March 2004 . “ ‘KGB veteran denies CIA caused '82 blast’ ” . In Moscow Times
  • Nakashima , Ellen and Brian , Krebs . 24 Sept. 2007 . “ ‘Contractor blamed in DHS data breaches’ ” . In Washington Post A1
  • National Transportation Safety Board . “ ‘Pipeline Rupture and Subsequent Fire in Bellingham, Washington, June 10, 1999' ” . Pipeline Accident Report NTSB/PAR-02/02 (Washington DC, 2002)
  • Nazario , Jose . 2009 . “ ‘Politically Motivated Denial of Service Attacks’ ” . In The Virtual Battlefield , Edited by: Czosseck , Christian and Geers , Kenneth . 163 – 81 . Amsterdam/Washington , DC : IOS Press .
  • Obama , Barack . May 2011 . International Strategy for Cyberspace , Washington , DC : White House .
  • Ottis , Rain . ‘From Pitchforks to Laptops: Volunteers in Cyber Conflicts’ . Conference on Cyber Conflict Proceedings .
  • Reed , C. Thomas . 2004 . At the Abyss , New York : Random House .
  • Rid , Thomas and Marc , Hecker . December/Jan. 2010 . ‘The Terror Fringe’ . Policy Review , 158 : 3 – 19 .
  • Tikk , Eneken , Kadri , Kaska , Kristel , Rünnimeri , Mari , Kert , Anna-Maria , Talihärm and Liis , Vihul . 2008 . Cyber Attacks against Georgia , Tallinn : CCDCOE .
  • Tikk , Eneken , Kadri , Kaska and Liis , Vihul . 2010 . International Cyber Incidents , Tallinn : CCDCOE .
  • Waxman , C. Matthew . 2011 . ‘Cyber-Attacks and the Use of Force’ . Yale Journal of International Law , 36 : 421 – 59 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.