7,623
Views
29
CrossRef citations to date
0
Altmetric
Original Articles

Fancy bears and digital trolls: Cyber strategy with a Russian twist

, &

Bibliography

  • BAE Systems, The Snake Campaign (Feb. 2014).
  • Baraniuk, Chris, ‘Could Russian Submarines Cut off the Internet?’, BBC, 26 Oct. 2015.
  • Beaufre, Andre, An Introduction of Strategy (London: Faber and Faber 1965 R.H. Barry translation).
  • Bennett, Cory, ‘Hackers Breach the Warsaw Stock Exchange’, The Hill, Oct. 2014.
  • Biasini, Nick, ‘Connecting the Dots Reveals Crimeware Shake-Up’, Talso, 7 Jul. 2016.
  • Borghard, Erica and Shawn Lonergan, ‘The Logic of Coercion in Cyberspace’, Security Studies 26/3 (2017), 452–81. doi:10.1080/09636412.2017.1306396
  • Carson, Austin, ‘Facing off and Saving Face: Covert Intervention and Escalation Management in the Korean War’, International Organization 70/1 (2016), 103–31. doi:10.1017/S0020818315000284
  • Carson, Austin, ‘Obama Used Covert Retaliation in Response to Russian Election Meddling. Here’s Why’, Washington Post, 29 Jun. 2017.
  • Carson, Austin and Keren Yarhi-Milo, ‘Covert Communication: The Intelligibility and Credibility of Signaling in Secret’, Security Studies 26/1 (2017), 124–56. doi:10.1080/09636412.2017.1243921
  • Clayton, Mark, ‘Ukraine Election Narrowly Avoided ‘Wanton Destruction’ from Hackers’, Christian Science Monitor (17June2014).
  • Collins, Ben, Kevin Poulsen, and Spencer Ackerman, ‘Russia’ Facebook Fake News Could Have Reached 70 Million Americans’, Daily Beast, 8 Aug. 2017.
  • CrowdStrike, 2015 Global Threat Report, (2015).
  • Director of National Intelligence, Background to Assessing Russian Activities and Intentions in Recent US Elections: The Analytical and Cyber Incident Attribution (6 Jan. 2017).
  • Downs, George and David Rocke Downs, Tacit Bargaining: Arms Races, Arms Control (Ann Arbor: University of Michigan Press 1990).
  • Fearon, James D., ‘Rationalist Expectations for War’, International Organization 49/3 (1995), 379–414. doi:10.1017/S0020818300033324
  • Fearon, James D., ‘Signaling Foreign Policy Interests Tying Hands versus Sinking Costs’, Journal of Conflict Resolution 41/1 (1997), 68–90. doi:10.1177/0022002797041001004
  • Freedman, Lawrence, ‘Strategic Studies and the Problem of Power’, in Thomas Mahnken and Joseph A. Maiolo (eds.), Strategic Studies: A Reader (New York: Routledge 2008).
  • Gallagher, Sean, ‘Seven Years of Malware Linked to Russian State-Backed Cyber Espionage’, Arstechnica, 17 Sept. 2015.
  • Gartzke, Erik and Jon R. Lindsay, ‘Coercion through the Cyberspace: The Stability-Instability Paradox Revisited’, in Kelly Greenhill and Peter Krause (eds.), The Power to Hurt in the Modern World (Oxford: Oxford University Press 2017).
  • George F. Kennan on Organizing Political Warfare, ‘History and Public Policy Program Digital Archive, Obtained and Contributed to CWIHP by A. Ross Johnson’, Cited in his book Radio Free Europe and Radio Liberty, Ch1 n4 – NARA release courtesy of Douglas Selvage. Redacted final draft of a memorandum dated May 4, 1948, and published with additional redactions as document 269, FRUS, Emergence of the Intelligence Establishment, 30 Apr. 1948.
  • Gerasimov, ‘The Value of Science in Prediction’, in Military-Industrial Kurier (27Feb.2013).
  • Giles, Kier, ‘Putin’s Troll Factories’, Chatham House 71/4 (2015).
  • Greenberg, Adam, ‘Russia Hacked “Older” Republican Emails, FBI Director Says’, Wired, 10 Jan. 2017.
  • Greenberg, Andy, ‘How an Entire Nation Became Russia’s Test Lab for Cyberwar’, Wired, 20 Jun. 2017.
  • Hacquebord, Feike, Operation Pawn Storm Ramps up Its Activities, Targets NATO, White House (Trend Micro 16 Aug. 2015).
  • Healy, Patrick, David Sanger, and Maggie Haberman, ‘Donald Trump Finds Improbable Ally in WikiLeaks’, New York Times, 12 Oct. 2016.
  • Heuser, Beatrice, The Evolution of Strategy: Thinking War from Antiquity to the Present (New York: Cambridge University Press 2010).
  • Hulcoop, Adam, John Scott-Railton, Peter Tanchak, Matt Brooks, and Ron Deibert, Tainted Leaks: Disinformation and Phishing with a Russian Nexus (Citizen Labs May 2017).
  • Hultquist, John, Sandworm Team and the Ukrainian Power Authority Attacks (FireEye 7 Jan. 2016).
  • Inkster, Nigel, ‘Information Warfare and the US Presidential Election’, Survival 58/5 (2016), 23–32.
  • Isaac, Mike and Daisuke Wakabayashi, ‘Russian Influence Reached 126 Million Through Facebook Alone’, New York Times, 30 Oct. 2017.
  • Jensen, Benjamin, Forging the Sword: Doctrinal Change in the U.S. Army (Pal Alto: Stanford University Press 2016).
  • Kaspersky Labs, Lazarus under the Hood (25 Nov. 2017).
  • Kogan, Rami, Bedep Trojan Malware Spread by the Angler Exploit Kit Gets Political (Trustwave 29 Apr. 2015).
  • Kostyak, Nadia and Yuri Zhukov, ‘Invisible Digital Front: Can Cyber Attacks Shape Battlefield Events?’, Journal of Conflict Resolution (forthcoming).
  • Koval, Nikolay, ‘Revolution Hacking’, in Kenneth Geers (ed.), Cyber War in Perspective: Russian Aggression against Ukraine (Tallinn: NATO Cooperative Cyber Defence Center of Excellence 2015), 55–65.
  • Legum, Judd, ‘Trump Mentioned WikiLeaks 164 Times in the Last Month of Election, Now Claims It Didn’t Impact One Voter’, Think Progress, 8 Jan. 2017.
  • Levy, Jack, ‘Deterrence and Coercive Diplomacy: The Contributions of Alexander George’, Political Psychology 29/4, 537–52.
  • Libicki, Martin, Crisis and Escalation in Cyberspace (Santa Monica: Rand Corporation 2012).
  • Lichtblau, Eric, ‘Computer Systems Used by Clinton Campaign are Said to Be Hacked, Apparently by Russia’, New York Times, 20 Jul. 2016.
  • Lindsay, Jon R., ‘Stuxnet and the Limits of Cyber Warfare’, Security Studies 22/3 (2013), 365–404. doi:10.1080/09636412.2013.816122
  • Lindsay, Jon R., ‘The Impact of China on Cybersecurity: Fiction and Friction’, International Security 39/3 (2014), 7–47.
  • Masters, Sam, ‘Ukraine Crisis: Telephone Networks are First Casualty of Conflict’, The Independent, 25 Mar. 2014.
  • MSS Global Threat Response, Emerging Threat: Dragonfly/Energetic Bear – APT Group (Symantec 30 Jun. 2014).
  • Myers, Adam, Danger Close: Fancy Bear Tracking of Ukrainian Field Artillery Units (CrowdStrike 22 Dec. 2016).
  • Osgood, Robert, The Entangling Alliance (Chicago: University of Chicago Press 1962).
  • Pape, Robert, Bombing to Win: Air Power and Coercion in War (Ithaca: Cornell University Press 1996).
  • Peters, Sarah, ‘MiniDuke, CosmicDuke APT Group Likely Sponsored by Russia’, in Dark Reading (17 Aug. 2015).
  • Polityuk, Pavel, Ukraine Investigates Suspected Cyber-Attack on Kiev Power Grid (Reuters 20 Dec. 2016).
  • Prince, Brian, ‘“Operation Armageddon” Cyber Espionage Campaign Aimed at Ukraine’, Security Week, 28 Apr. 2015.
  • Rid, Thomas, ‘How Russia Pulled off the Biggest Election Hack in U.S. History’, Esquire, 20 Oct. 2016.
  • Rid, Thomas, ‘Disinformation: A Primer in Russian Active Measures and Influence Campaigns’, Hearings before the Select Committee on Intelligence, United States Senate, One Hundred Fifteenth Congress, 30 Mar. 2017.
  • Rupar, Aaron, ‘Former FBI Agent Details How Trump and Russia Team up to Weaponize Fake News’, Think Progress, 30 Mar. 2017.
  • Sanger, David, ‘D.N.C. Says Russian Hackers Penetrated Its Files, Including Dossier on Donald Trump’, New York Times, 14 Jun. 2016.
  • Sanger, David and Steven Erlanger, ‘Suspicion Falls on Russia as Snake Cyberattacks Target Ukraine’s Government’, The New York Times, 9 Mar. 2014.
  • Sanger, David and Charles Savage, ‘U.S. Says Russia Directed Hacks to Influence Elections’, New York Times, 7 Oct. 2016.
  • Schelling, Thomas, Strategy of Conflict (Cambridge: Harvard University Press 1960).
  • Schelling, Thomas, Arms and Influence (New Haven: Yale University Press 1968).
  • Scott, James and Drew Spaniel, Know Your Enemies 2.0 (Institute for Critical Infrastructure Technology 2016).
  • Sharp, Travis, ‘Theorizing Cyber Coercion: The 2014 North Korea Operation against Sony’, Journal of Strategic Studies (2017).
  • Shevchenko, Vitaly, ‘Ukraine Conflict: Hackers Take Sides in Virtual War’, BBC, 20 Dec. 2014.
  • Slayton, Rebecca, ‘What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessments’, International Security 41/3 (2016), 72–109.
  • Stone, Jeff, ‘Meet Fancy Bear and Cozy Bear, Russian Groups Blamed for DNC Hack’, Christian Science Monitor, 15 Jun. 2016.
  • Threat Intelligence, APT28: A Window into Russia’s Cyber Espionage Operations (FireEye 27 Oct. 2014).
  • Tucker, Patrick, ‘The Same Culprits That Targeted US Election Boards Might Have Also Targeted Ukraine’, Defense One, 3 Sept. 2016.
  • Valeriano, Brandon, Ben Jensen, and Ryan Maness, Cyber Strategy: The Changing Character of Cyber Power and Coercion (New York: Oxford University Press 2018).
  • Waddell, Kaveh, ‘Why Didn’t Obama Reveal Intel about Russia’s Influence on the Election?’, The Atlantic, 11 Dec. 2016.
  • Waterman, Shaun, ‘Russia Seeks to Discredit, Not Hack Election Results’, Cyberscoop, 7 Nov. 2016.
  • Zetter, Kim, ‘Russian Sandworm Hack Has Been Spying on Foreign Governments for Years’, Wired, 14 Oct. 2012.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.