Bibliography
- Anderson, Nate and Cyrus Farivar, ‘How the feds took down the Dread Pirate Roberts’, Ars Technica, 3 Oct. 2013.
- APT1, Alexandria, VA: Mandiant, 18 Feb. 2013.
- Arquilla, John and David Ronfeldt, The Advent of Netwar (Santa Monica, CA: RAND 1996).
- Axelrod, Robert and Rumen Iliev, ‘Timing of cyber conflict’ PNAS. 111/4 (28 Jan. 2014), 1298–303.
- Barzashka, Ivanka, ‘Are Cyber-Weapons Effective?,’ RUSI Journal 158/2 (April/May 2013), 48–56.
- Betts, Richard K, ‘Analysis, War, and Decision: Why Intelligence Failures Are Inevitable’, World Politics. 31/1 (Oct. 1978), 61–89
- Betz, David and Tim Stevens, Cyberspace and the State, Adelphi Series (London: IISS/Routledge 2011)
- Boebert, W. Earl, ‘A Survey of Challenges in Attribution’, in Committee on Deterring Cyberattacks (ed.), Proceedings of a Workshop on Deterring Cyberattacks. (Washington DC: National Academies Press 2011), 41–54.
- Brenner, Susan, ‘‘‘At Light Speed”: Attribution and Response to Cybercrime/Terrorism/Warfare’, Journal of Criminal Law & Criminology, 97/2 (2007), 379–475.
- Bronk, Christopher and Eneken Tikk, ‘The Cyber Attack on Saudi Aramco’, Survival 55/2 ( April–May 2013), 81–96.
- Caltagirone, Sergio, Andrew Pendergast and Christopher Betz, The Diamond Model of Intrusion Analysis, ADA586960 (Hanover, MD: Center for Cyber Threat Intelligence and Threat Research 5 July 2013)
- Churchill, Winston S., The Gathering Storm: The Second World War, Volume 1, (New York: Rosetta Books 2002).
- Clark, David D. and Susan Landau, ‘Untangling Attribution’, in Committee on Deterring Cyberattacks (ed.), in Proceedings of a Workshop on Deterring Cyberattacks, (Washington DC: National Academies Press 2011), 25–40.
- Clausewitz, Carl von, On War, translated by Michael Howard and Peter Paret (Princeton UP 1976).
- Clayton, Richard, Anonymity and Traceability in Cyberspace, Vol. 653, Technical Report (Cambridge: Univ. of Cambridge Computer Laboratory 2005).
- Deibert, Ronald J., Rafal Rohozinski and Masashi Crete-Nishihata, ‘Cyclones in Cyberspace’, Security Dialogue 43/1 (2012), 3–24.
- Department of Defense, Cyberspace Policy Report, Nov. 2011.
- Gauss, Kaspersky Lab, 9 Aug. 2012.
- Global Threat Report, Arlington, VA: CrowdStrike, 22 Jan. 2014.
- Goldsmith, Jack and Tim Wu, Who Controls the Internet? Illusions of a Borderless World (Oxford: OUP 2006).
- Gostev, Alexander, The Flame: Questions and Answers, Kaspersky Lab, 28 May 2012.
- Hartley, Nathaniel, Hat-tribution to PLA Unit 61486 ( CrowdStrike, 9 June 2014).
- Healey, Jason, A Fierce Domain (Washington DC: The Atlantic Council 2013).
- Hutchins, Eric M., Michael J. Cloppert and Rohan M. Amin, Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains (Bethesda, MD: Lockheed Martin Corporation 2010).
- Kent, Sherman, ‘Estimates and Influence’, Studies in Intelligence 12, ( Summer 1968), 11–21.
- Knake, Robert K., ‘Untangling Attribution: Moving to Accountability in Cyberspace, Planning for the Future of Cyber Attack’, Washington DC: Subcommittee on Technology and Innovation, 111th Congress, 15 July 2010.
- Langner, Ralph, ‘Stuxnet’s Secret Twin’, Foreign Policy, 19 Nov. 2013.
- Libicki, Martin, Cyberdeterrence and Cyberwar (Santa Monica, CA: RAND Corporation, 2009).
- Lindsay, Jon R., ‘Stuxnet and the Limits of Cyber Warfare’, Security Studies 22/3, (2013), 365–404.
- Lupovici, Amir, ‘The “Attribution Problem” and the Social Construction of ‘Violence’’’International Studies Perspectives 2014, 1–21.
- McConnell, Michael, ‘Cyberwar is the New Atomic Age’ New Perspectives Quarterly 26/3 (Summer 2009), 72–7.
- McDonald, Geoff, Liam O Murchu, Stephen Doherty and Eric Chien, Stuxnet 0.5: The Missing Link, Version 1.0, Symantec, 26 Feb. 2013.
- Moran, Ned and James Bennett, Supply Chain Analysis: From Quartermaster to Sun-shop, FireEye Labs, 11 Nov. 2013.
- Moran, Ned, Joshua Homan and Mike Scott, Operation Poisoned Hurricane, FireEye, 6 Aug. 2014.
- Nye, Joseph S., Cyber Power (Fort Belvoir, VA: Defense Technical Information Center 2010).
- O’Gorman, Gavin and Geoff McDonald, The Elderwood Project, Symantec, 6 Sept. 2012.
- Panetta, Leon, ‘Remarks on Cybersecurity to the Business Executives for National Security’, New York City, Washington DC: Department of Defense, 12 October 2012.
- Putter Panda, CrowdStrike, 9 June 2014.
- Raiu, Costin, Igor Soumenkov, Kurt Baumgartner and Vitaly Kamluk, The MiniDuke Mystery, Kaspersky Lab, 25 Feb. 2013.
- ‘Red October’ Diplomatic Cyber Attacks Investigation, Version 1.0, Kaspersky Lab, 14 January 2013
- Rid, Thomas, Cyber War will Not Take Place (Oxford/New York: OUP 2013).
- Rivner, Uri, Anatomy of an Attack, RSA, 1 April 2011.
- Roscini, Marco, Cyber Operations and the Use of Force in International Law (Oxford: OUP 2014).
- Rosenbaum, Ron, ‘Cassandra Syndrome’, Smithsonian Magazine 43/1, (April 2012), 12.
- Schoen, Seth and Eva Galperin, ‘Iranian Man-in-the-Middle Attack Against Google Demonstrates Dangerous Weakness of Certificate Authorities’, Electronic Frontier Foundation, 29 Aug. 2011.
- Singer, P.W. and Allan Friedman, Cybersecurity and Cyberwar (New York/ Oxford: OUP 2014).
- Slay, Jill and Michael Miller, ‘Lessons Learned from the Maroochy Water Breach’, in E. Goetz and S. Shenoi (ed.), Critical Infrastructure Protection, Vol. 253, (Boston, MA: Springer 2008), 73–82.
- Stoll, Clifford, The Cuckoo’s Egg (New York: Doubleday 1989).
- The Epic Turla Operation, Kaspersky Lab, 7 Aug. 2014.
- The ‘Icefog’ APT, Kaspersky Lab, 25 Sept. 2013.
- The Nettraveler, Kaspersky Lab, 4 June 2013.
- Threat Report: Beyond the Breach, Reston, VA: Mandiant, 18 Feb. 2014.
- Tsagourias, Nicholas, ‘Cyber Attacks, Self-Defence and the Problem of Attribution’ Journal of Conflict & Security Law 17/2 (2013), 229–44.
- United States of America v Wang Dong, Sun Kailiang, Wen Xinyu, Huang Zhenyu, Gu Chunhui, Criminal Nr 14-118, Erie, PA: US District Court Western District of Pennsylvania, 1 May 2014.
- Unveiling ‘Careto’, Version 1.0, Kaspersky Lab, 6 Feb. 2014.
- Verton, Dan, Confessions of Teenage Hackers (New York: McGraw Hill 2000).
- Waxman, Matthew C., ‘Cyber-Attacks and the Use of Force’, The Yale Journal of International Law 36 (2011), 421–59.
- Weaver, Nicholas, ‘A Close Look at the NSA’s Most Powerful Internet Attack Tool’, Wired, 13 March 2014.
- Wheeler, David A. and Gregory N. Larsen, Techniques for Cyber Attack Attribution (Alexandria, VA: Institute for Defense Analysis 2003).
- W32.Duqu, Version 1.4, Symantec, 23 Nov. 2011.
- Zetter, Kim, ‘How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History’, Wired Magazine, 11 July 2011.
- Zetter, Kim, Countdown to Zero Day (New York: Crown 2014).