5,317
Views
33
CrossRef citations to date
0
Altmetric
Articles

‘Cumulative Deterrence’ as a New Paradigm for Cyber Deterrence

Bibliography

  • Adamsky, Dmitry Dima, ‘The 1983 Nuclear Crisis – Lessons for Deterrence Theory and Practice’, Journal of Strategic Studies 36/1 (2013), 4–41.
  • Adamsky, Dimitry Dima and Baidatz Yossi, ‘The Development of the Israeli Approach to Deterrence: a Critical Discussion on its Theoretical and Practical Aspects’, Eshtonot (8) Israel’s National Security Collage (2014) (in Hebrew).
  • Adler, Emanuel, ‘Complex Deterrence in the Asymmetric-Warfare Era’, in T.V. Paul, Patrick M. Morgan, and James, J. Wirtz (eds.), Complex Deterrence: Strategy in the Global Age (Chicago: The University of Chicago Press, 2009), 85–109.
  • Agence Nationale de la Sécurité des SystèmesD’information (ANSSI), Défense et Sécurité des Systèmes D’information Stratégie de la France (February 2011).
  • Albright, David, Brannan, Paul and Walrond, Christina, ‘Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? Preliminary Assessment’, ISIS Report 22 December 2010.
  • Albright, David, Brannan, Paul and Walrond, Christina, ‘Stuxnet Malware and Natanz: Update of ISIS December 22, 2010 Report’, ISIS Report 15 February 2011.
  • Almog, Doron, ‘Cumulative Deterrence and the War on Terrorism’, Parameters 34/4 (2004/2005).
  • Arquilla, John and Ronfeldt, David, The Advent of Netwar (Santa Monica, California: RAND, 1996).
  • Arquilla, John and Ronfeldt, David, ‘Cyberwar is Coming!’ Comparative Strategy 12/2 (1993), 65–141.
  • Atzili, Boaz and Wendy Pearlman, ‘Triadic Deterrence: Coercing Strength, Beaten by Weakness’, Security Studies 21 (2012), 301–35.
  • Baldor, Lolita C., ‘US: Hackers in Iran Responsible for Cyber attacks’, CBS News 11 November 2012, http://m.nbcnews.com/technology/technolog/us-hackers-iran-responsible-cyberattacks-1C6423908
  • Bar-Joseph, Uri, ‘Variations on a Theme: The Conceptualization of Deterrence in Israeli Strategic Thinking’, Security Studies 7/3 ( Spring, 1998), 149–84.
  • Barzashka, Ivanka, ‘Are Cyber-Weapons Effective? Assessing Stuxnet’s Impact on the Iranian Enrichment Programme’, RUSI Journal 158/2 (April 2013).
  • BBC News, ‘Sony Hack: White House Views Attack as Security Issue’, 19 December 2014. http://www.bbc.com/news/world-us-canada-30538154
  • Booton, Jennifer, Egan Matt and Samson Adam, ‘Bank of America Hit by Cyber Attack’, FOX Business, 18 September 2012, http://www.foxbusiness.com/industries/2012/09/18/bank-america-website-experiencing-sporadic-outages
  • Box, G.E.P. and N.R. Draper, Empirical Model Building and Response Surfaces (New York: Wiley, 1987).
  • Clark, David D. and Susan Landau, ‘Untangling Attribution’, Committee on Deterring Cyberattacks, National Research Council, Proceedings of a Workshop on Deterring Cyber Attacks: Informing Strategies and Developing Options for U.S. Policy (2011), 25–40.
  • Cohen, Daniel and Rotbart, Aviv, ‘The Proliferation of Weapons in Cyberspace’, Military and Strategic Affairs 5/1 (May, 2013).
  • Crosston, Matthew D., ‘World Gone Cyber MAD: How “Mutually Assured Debilitation” Is the Best Hope for Cyber Deterrence’, Strategic Studies Quarterly 115 (Spring, 2011).
  • Czech Republic, Cyber Security Strategy for the Czech Republic (2011).
  • Dunn Cavelty, Myriam, ‘Unlocking the “Stuxnet Effect”: On Continuity and Change in the Discourse on Cyber Threats’, Military and Strategic Affairs 3/3 (December, 2011) (in Hebrew).
  • Dwyer, Devin, ‘President Obama Sanctions North Korea after Sony Cyber attack’, ABC News, 2 January 2015. http://abcnews.go.com/Politics/obama-sanctions-north-korea-sony-cyberattack/story?id=27965524
  • Falliere, Nicolas, Liam O. Murchu and Eric Chien, W32. Stuxnet Dossier. Version 1.4 (Symantec, 2011).
  • Farwell, James P. and Rafal Rohozinski, ‘Stuxnet and the Future of Cyber War’, Survival 53 (2011), 23–40.
  • Federal Ministry of the Interior, The New Cyber Security Strategy for Germany ( February, 2011).
  • Fredericks, Brian E., ‘Information Warfare at the Crossroads’, Joint Force Quarterly 17 ( Summer 1997).
  • Freedman, Lawrence, Deterrence (Cambridge: Polity, 2004).
  • Gellman, Barton and Greg Miller, ‘U.S. Spy Network’s Successes, Failures and Objectives’ detailed in ‘Black Budget’ Summary, The Washington Post, 29 August 2013. http://www.washingtonpost.com/world/national-security/black-budget-summary-details-us-spy-networks-successes-failures-and-objectives/2013/08/29/7e57bb78-10ab-11e3-8cdd-bcdc09410972_story.html?tid=ts_carousel
  • Glaser, Charles L., Deterrence of Cyber Attacks and U.S. National Security (Washington, DC: Elliot School of International Affairs, George Washington University, 2011).
  • Goodman, Will, ‘Cyber Deterrence – Tougher in Theory than in Practice?’, Strategic Studies Quarterly (Fall, 2010).
  • Harknett, Richard J., ‘Information Warfare and Deterrence’, Parameters 26/3 (1996), 93–107.
  • Harknett, Richard J., John P. Callaghan and Rudi Kauffman, ‘Leaving Deterrence Behind: War-Fighting and National Cyber Security’, Journal of Homeland Security and Emergency Management 7/1 (2010).
  • Henriksen, Dag, ‘Deterrence by Default? Israel’s Military Strategy in the 2006 War against Hizballah’, Journal of Strategic Studies 35/1 (February 2012), 95–120.
  • Knopf, Jeffrey W., ‘The Fourth Wave in Deterrence Research’, Contemporary Security Policy 31/1 (2010), 1–33.
  • Kugler, Richard L., ‘Deterrence of Cyber Attacks.’ in Franklin D. Kramer, Stuart H. Starr and Larry Wentz (eds.), Cyber Power and National Security (Washington, DC: National Defense University, 2009) Ch. 13, 309–40.
  • Langner, Ralph, ‘A Declaration of Bankruptcy for US Critical Infrastructure Protection’, The Last Line of Cyber Defense (June, 2011).
  • Langner, Ralph, ‘Matching Langner’s Stuxnet Analysis and Symantec’s Dossier Update’, The Last Line of Cyber Defense ( February, 2011).
  • Langner, Ralph, ‘What Stuxnet Is All About’, The Last Line of Cyber Defense ( January, 2011).
  • Libicki, Martin, Cyber Deterrence and Cyber War (Santa Monica, CA: RAND Corporation, 2009).
  • Liff, Adam P., ‘Cyberwar: A New ‘Absolute Weapon’? The Proliferation of Cyber Warfare Capabilities and Interstate War’, Journal of Strategic Studies (May 2012), 1–28.
  • Lindsay Jon R., ‘Stuxnet and the Limits of Cyber Warfare’, Security Studies 22/3 (August 2013), 365–404. http://dx.doi.org/10.1080/09636412.2013.816122
  • Lukasik, Stephen J., ‘A Framework for Thinking about Cyber Conflict and Cyber Deterrence with Possible Declaratory Policies for These Domains’, in Committee on Deterring Cyber Attacks, National Research Council, Proceedings of a Workshop on Deterring Cyber Attacks: Informing Strategies and Developing Options for US Policy (2011), 101.
  • Lupovitz, Amir, ‘Cyber Warfare and Deterrence: Trends and Challenges in Research’, Military And Strategic Affairs 3/3 (December 2011) (in Hebrew).
  • Malka, Amos, ‘Israel and Asymmetrical Deterrence’, Comparative Strategy 27/1 (2008), 1–19.
  • Nakashima, Ellen, ‘Iran Blamed for Cyber attacks on US Banks and Companies’, The Washington Post, 21 September 2012, http://articles.washingtonpost.com/2012-09-21/world/35497878_1_web-sites-quds-force-cyberattacks#
  • McGraw, Gary, ‘Cyber War is Inevitable (Unless We Build Security In)’, Journal of Strategic Studies ( February 2013).
  • Morgan, Patrick M., ‘Applicability of Traditional Deterrence Concepts and Theory to the Cyber Realm’, in Committee on Deterring Cyber Attacks, National Research Council, Proceedings of a Workshop on Deterring Cyber Attacks: Informing Strategies and Developing Options for US Policy (2011).
  • Morgan, Patrick M., ‘The State of Deterrence in International Politics Today’, Contemporary Security Policy 33/1 (2012), 85–107.
  • Netherlands Cabinet, The National Cyber Security Strategy (2011).
  • Obama, Barack, US International Strategy for Cyberspace - Prosperity, Security, and Openness in A Networked World (Washington, DC: The White House, 2011).
  • Ortal, Eran, ‘The Paradigm of Deterrence Operations: a Strategic Pattern at a Dead-End’, Eshtonot (1), Israel’s National Security Collage (2013) (in Hebrew).
  • Paul, T.V., ‘Complex Deterrence – An Introduction’ in T.V. Paul, Patrick M. Morgan, James J. Wirtz (eds.), Complex Deterrence (Chicago: The University of Chicago Press, 2009).
  • Panetta, Leon, ‘Serious Cyber-attacks Are Imminent Warns Leon Panetta: A Cyber Pearl Harbor or Cyber 9/11’, IDG News Service, 11 October 2012, http://www.youtube.com/watch?v=z1IF0bEMZts
  • Patterson Manson, George III., ‘Cyberwar: The United States and China Prepare for the Next Generation of Conflict’, Comparative Strategy 30/2 (2011), 121–33.
  • Peterson, Dale, ‘Offensive Cyber Weapons: Construction, Development, and Employment’, Journal of Strategic Studies (February 2013), 1–5.
  • Rid, Thomas, ‘More Attacks, Less Violence’, Journal of Strategic Studies (February, 2013).
  • Rid, Thomas and Ben Buchanan, ‘Attributing Cyber Attacks’, Journal of Strategic Studies 38/1-2 (2015), 4–37.
  • Rid, Thomas and Peter McBurney, ‘Cyber-Weapons’, The RUSI Journal 157/1 (2012), 6–13.
  • Rid, Thomas, ‘Deterrence beyond the State: the Israeli Experience’, Comparative Security Policy 33/1 (2012), 124–47.
  • Rid, Thomas, ‘Cyber War Will Not Take Place’, Journal of Strategic Studies (October 2011), 1–28.
  • Russia, 2011. Conceptual Views on the Activates of the Armed Forces of the Russian Federation in Information Space. For a partial translation into English, see Atlantic Organization for Security, http://www.aofs.org/2012/04/15/russia%C2%B4s-cyber-strategy-published/
  • Russia Ministry of Foreign Affairs, Doctrine of the Information Security of the Russian Federation (September 2000).
  • Sanger, David E., Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power (New York: Random House, 2012).
  • Sanger, David E. and Nicole Perlroth, ‘U.S. Said to Find North Korea Ordered Cyber attack on Sony’. The New York Times, 17 December 2014. http://www.nytimes.com/2014/12/18/world/asia/us-links-north-korea-to-sony-hacking.html?_r=0
  • Sanger, David E. and Nicole Perlroth, ‘North Korea Loses Its Link to the Internet.’ The New York Times, 22 December 2014. http://www.nytimes.com/2014/12/23/world/asia/attack-is-suspected-as-north-korean-internet-collapses.html
  • Solomon, Jonathan, ‘Cyber deterrence between Nation-States-Actors: Plausible Strategy or a Pipe Dream?’ Strategic Studies Quarterly ( Spring 2011).
  • State of Israel, Report of the National Council for Research and Development, 2010-2011 (July 2012), 10–18 (in Hebrew).
  • State of Israel, Promoting National Capability in Cyberspace, Decision 3611 of the 32nd Government (August 2011) (in Hebrew).
  • Sterner, Eric, ‘Retaliatory Deterrence in Cyberspace’, Strategic Studies Quarterly ( Spring 2011), 62–80.
  • Stevens, Tim, ‘A Cyberwar of Ideas? Deterrence and Norms in Cyberspace’, Contemporary Security Policy 33/1 (2012), 148–70.
  • The White House, U.S. National Strategy to Secure Cyberspace (2003).
  • The White House, U.S. International Strategy for Cyberspace: Prosperity, Security, and Openness In a Networked World (2011).
  • UK Cabinet Office, The U.K. Cyber Security Strategy – Protecting & Promoting the UK in a Digital World ( November 2011).
  • UK Cabinet Office, Cyber Security Strategy of the United Kingdom ( June 2009).
  • US Department of Homeland Security, Blueprint for a Secure Cyber Future (November 2011).
  • US Department of Justice - Office of Public Affairs. 2014 ‘U.S. Charges Five Chinese Military Hackers For Cyber Espionage against U.S. Corporations and a Labor Organization for Commercial Advantage’, 19 May 2011. http://www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor
  • US Senate, Advance Questions for Lieutenant General Keith Alexander, USA Nominee for Commander, United States Cyber Command (2010) http://www.armed-services.senate.gov/statemnt/2010/04%20April/Alexander%2004-15-10.pdf
  • US STRATCOM, ‘Cyberspace Deterrence vs. Deterrence – Is It a Meaningless Distinction?’, Deterrence Symposium, Panel 3, August 2011, http://www.youtube.com/watch?v=-ck6QH0pm6c
  • Wenger, Andreas and Alex Wilner (eds), Deterring Terrorism – Theory and Practice (Stanford, CA: Stanford Security Studies, 2012).
  • Zetter Kim, Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon (New York: Crown, 2014).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.