References
- Andrew, Christopher M. and Vasili Mitrokhin, The Sword and the Shield: The Mitrokhin Archive and the Secret History of the KGB, 1st ed. (New York: Basic Books 1999).
- Andrew, Christopher M., The Mitrokhin Archive: The KGB in Europe and the West (London: Allen Lane 2000).
- Arquilla, John and David Ronfeldt. ‘Cyberwar is Coming!’, Comparative Strategy 12/2 (1 Apr. 1993), 141–65. doi:10.1080/01495939308402915.
- Bail, Christopher A., Brian Guay, Emily Maloney, Aidan D. Combs, Sunshine Hillygus, Friedolin Merhout, Deen Freelon, and Alexander Volfovsky, ‘Assessing the Russian Internet Research Agency’s Impact on the Political Attitudes and Behaviors of American Twitter Users in Late 2017’, Proceedings of the National Academy of Sciences 117/1 (7 Jan. 2020), 243–50. doi:10.1073/pnas.1906420116.
- Barron, John, KGB: The Secret Work of Soviet Secret Agents (London: Hodder and Stoughton 1975).
- Beilenson, Lawrence W., Power Through Subversion (Washington DC: Public Affairs Press 1972.
- Bittman, Ladislav, The KGB and Soviet Disinformation: An Insider’s View (Washington DC: Pergamon-Brassey’s 1985).
- Blackstock, Paul W., The Strategy of Subversion: Manipulating the Politics of Other Nations (Chicago: Quadrangle Books 1964).
- Brantly, Aaron Franklin, The Decision to Attack: Military and Intelligence Cyber Decision-Making, (Athens, GA: University of Georgia Press 2016. http://muse.jhu.edu/book/45365 .
- Brantly, Aaron F., N. Cal, and D. Winkelstein, ‘Defending the Borderland’, Report: Army Cyber Institute, 1 Dec. 2017. https://vtechworks.lib.vt.edu/handle/10919/81979 .
- Buchanan, Ben, The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics (Cambridge, MA: Harvard UP 2020).
- Callanan, James, Covert Action in the Cold War: US Policy, Intelligence and CIA Operations (New York: I.B.Tauris 2009).
- Carson, Austin, Secret Wars: Covert Conflict in International Politics (Princeton, NJ: Princeton UP, 2018).
- Denison, Benjamin C., Strategies of Domination: Uncertainty, Local Institutions, and the Politics of Foreign Rule (University of Notre Dame 2018). https://curate.nd.edu/show/j6731260871.
- DoD, ‘Strategy for Operating in Cyberspace’, 2011. https://csrc.nist.gov/CSRC/media/Projects/ISPAB/documents/DOD-Strategy-for-Operating-in-Cyberspace.pdf .
- Downes, Alexander B., Catastrophic Success: Why Foreign-Imposed Regime Change Goes Wrong (Ithaca, New York: Cornell UP 2021).
- Dullien, Thomas, ‘Weird Machines, Exploitability, and Provable Unexploitability’, IEEE Transactions on Emerging Topics in Computing 8/2 (Apr 2020), 391–403. doi:10.1109/TETC.2017.2785299.
- Dunn Cavelty, Myriam, ‘From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse’, International Studies Review 15/1 (2013), 105–22. doi:10.1111/misr.12023.
- Erickson, Jon, Hacking: The Art of Exploitation (San Francisco: No Starch Press 2003).
- Erik, Gartzke and Jon R. Lindsay, ‘Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace’, Security Studies 24/2 (3 Apr. 2015): 316–48. doi:10.1080/09636412.2015.1038188.
- ESET, ‘BlackEnergy Trojan Strikes Again: Attacks Ukrainian Electric Power Industry’, WeLiveSecurity (blog), 4 Jan. 2016. https://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industry/ .
- ESET, ‘Bad Rabbit: Not-Petya is Back with Improved Ransomware’, WeLiveSecurity (blog), 24 Oct. 2017. https://www.welivesecurity.com/2017/10/24/bad-rabbit-not-petya-back/ .
- FireEye, ‘M-Trends’, 2020. https://content.fireeye.com/m-trends/rpt-m-trends-2020 .
- Fischerkeller, Michael P. and Richard J. Harknett, ‘Deterrence is Not a Credible Strategy for Cyberspace’, Orbis 61/3 (1 Jan. 2017), 381–93. doi:10.1016/j.orbis.2017.05.003.
- Fischerkeller, Michael P. and Richard J. Harknett, Persistent Engagement, Agreed Competition, and Cyberspace Interaction Dynamics and Escalation’, The Cyber Defense Review (2019), 267–87. doi:10.2307/26846132.
- Fischerkeller, Michael, The Structural and Strategic Imperative: The Need for Persistent Engagement (IDA n.d.). https://www.ida.org/research-and-publications/-/media/2e11bf09b5a44cb49e59571704171218.ashx .
- Gartzke, Erik, ‘The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth’, International Security 38/2 (2013), 41–73. doi:10.1162/ISEC_a_00136.
- Gartzke, Erik and Jon R. Lindsay, ‘Thermonuclear Cyberwar’, Journal of Cybersecurity 3/1 (2017), 37–48. doi:10.1093/cybsec/tyw017.
- Goodman, Will, ‘Cyber Deterrence: Tougher in Theory Than in Practice?’, Strategic Studies Quarterly 4/3 ( Fall 2010), 102–35.
- Gorwa, Robert and Max Smeets, ‘Cyber Conflict in Political Science: A Review of Methods and Literature’, Preprint. SocArXiv, 25 July 2019. doi:10.31235/osf.io/fc6sg.
- Greenberg, Andy, ‘The Untold Story of NotPetya, the Most Devastating Cyberattack in History’, Wired, 22 Aug. 2018. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ .
- Grey, Stephen, The New Spymasters: Inside the Modern World of Espionage from the Cold War to Global Terror (New York: St. Martin’s Press 2015).
- Harknett, Richard J. and Max Smeets, ’Cyber Campaigns and Strategic Outcomes’, Journal of Strategic Studies (4 Mar. 2020), 1–34. doi:10.1080/01402390.2020.1732354.
- Healey, Jason and Karl Grindal (eds.), A Fierce Domain: Conflict in Cyberspace, 1986 to 2012 (Vienna, VA: Cyber Conflict Studies Association 2013).
- Hosaka, Sanshiro, ‘The Kremlin’s ‘Active Measures’ Failed in 2013: That ’s When Russia Remembered Its Last Resort-Crimea’, Demokratizatsiya; Washington 26/3 ( Summer 2018), 321–64.
- Jamieson, Kathleen Hall, Cyberwar: How Russian Hackers and Trolls Helped Elect a President What We Don’t, Can’t, and Do Know (New York, NY: Oxford UP 2018).
- Johnson, Loch K., ‘On Drawing a Bright Line for Covert Operations’, The American Journal of International Law 86/2 (1992), 284–309. doi:10.2307/2203235.
- Johnson, Loch K. (ed.) Strategic Intelligence, Volume 4: Strategic Intelligence: Counterintelligence and Counterterrorism. Vol. 4. (Westport, Conn: Praeger Security International 2007).
- Johnson, Loch K., The Third Option: Covert Action and American Foreign Policy (Oxford: Oxford UP 2022).
- Kello, Lucas, The Virtual Weapon and International Order (Yale: Yale UP 2017).
- Kitson, Frank, Low Intensity Operations: Subversion, Insurgency, Peacekeeping. (London: Faber 1971).
- Kostyuk, Nadiya and Yuri Zhukov, ‘Invisible Digital Front: Can Cyber Attacks Shape Battlefield Events?’, The Journal of Conflict Resolution 63/2 (2017), 317–47. doi:10.1177/0022002717737138.
- Kugler, Richard L., ‘Deterrence of Cyber Attacks’, in Kramer, Franklin D., Starr, Stuart H. & Wentz, Larry K. (eds.), From Cyberspace to Cyberpower: Defining the Problem (Washington DC: Potomac Books 2009), 309–42.
- Kun, Miklós, Prague Spring, Prague Fall: Blank Spots of 1968 (Budapest: Akadémiai Kiadó 1999).
- Langner, Ralph, ‘To Kill a Centrifuge’, Nov. 2013. https://www.langner.com/wp-content/uploads/2017/03/to-kill-a-centrifuge.pdf .
- Leber, Andrew and Alexei Abrahams, ‘A Storm of Tweets: Social Media Manipulation During the Gulf Crisis’, Review of Middle East Studies 53/2 (Dec. 2019), 241–58. doi:10.1017/rms.2019.45.
- Lee, Melissa M., Crippling Leviathan: How Foreign Subversion Weakens the State. (Ithaca, New York: Cornell UP 2020).
- Levin, Dov H., Meddling in the Ballot Box: The Causes and Effects of Partisan Electoral Interventions (New York: Oxford UP 2020).
- Libicki, Martin C., Cyberdeterrence and Cyberwar (Santa Monica, CA: RAND 2009).
- Lindsay, Jon R., ‘Stuxnet and the Limits of Cyber Warfare’, Security Studies 22/3 (2013), 365–404. doi:10.1080/09636412.2013.816122.
- Lindsay, Jon R., ‘Restrained by Design: The Political Economy of Cybersecurity’, Digital Policy, Regulation and Governance 19/6 (26 July 2017), 493–514. doi:10.1108/DPRG-05-2017-0023.
- Lindsay, Jon R. and Erik Gartzke, ‘Coercion Through Cyberspace: The Stability-Instability Paradox Revisited’, in Peter Krause (ed.), The Power to Hurt: Coercion in Theory and in Practice (New York: Oxford UP 2018), 179–203.
- Lynn, William J., III, ‘Defending a New Domain’, Foreign Affairs (2010). https://www.foreignaffairs.com/articles/united-states/2010-09-01/defending-new-domain .
- Maschmeyer, Lennart, ‘Slow Burn: Subversion and Escalation in Cyber Conflict and Covert Action’, doctoral dissertation, University of Toronto, 2020.
- Maschmeyer, Lennart, ‘Persistent Engagement Neglects Secrecy at Its Peril’, Lawfare (blog), 4 Mar. 2020. https://www.lawfareblog.com/persistent-engagement-neglects-secrecy-its-peril .
- Maschmeyer, Lennart, ‘Digital Disinformation: Evidence from Ukraine’, CSS Analysis No. 278, Feb. 2021. https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/CSSAnalyse278-EN.pdf .
- Maschmeyer, Lennart, ‘The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations’, International Security 46/2 (Oct. 2021), 51–90. doi:10.1162/isec_a_00418.
- Maschmeyer, Lennart and Nadiya Kostyuk, ‘There is No Cyber ‘Shock and Awe’: Plausible Threats in the Ukrainian Conflict’, War on the Rocks (blog), 8 Feb. 2022. https://warontherocks.com/2022/02/there-is-no-cyber-shock-and-awe-plausible-threats-in-the-ukrainian-conflict/ .
- McGraw, Gary, ‘Cyber War is Inevitable (Unless We Build Security In)’, Journal of Strategic Studies 36/1 (Feb. 2013), 109–19. doi:10.1080/01402390.2012.742013.
- Michael, Fischerkeller and Richard J. Harknett, ‘Cyber Persistence Theory, Intelligence Contests and Strategic Competition’, Institute for Defense Analysis, June 2020. https://apps.dtic.mil/sti/pdfs/AD1118679.pdf .
- Michels, Eckard, Guillaume, Der Spion: Eine Deutsch-Deutsche Karriere (Berlin: Ch. Links Verlag 2013).
- Nakasone, Paul M. and Michael Sulmeyer, ‘How to Compete in Cyberspace’, 17 Mar. 2021. https://www.foreignaffairs.com/articles/united-states/2020-08-25/cybersecurity .
- Nye, Joseph S., ‘Nuclear Lessons for Cyber Security?’, Strategic Studies Quarterly 5/4 ( Winter 2011), 18–38.
- O’-Rourke, Lindsey A., Covert Regime Change: America’s Secret Cold War. (Ithaca, NY: Cornell UP 2018).
- OSS, ‘Simple Sabotage Field Manual’, 1944.
- Rid, Thomas, ‘Cyber War Will Not Take Place’, Journal of Strategic Studies 35/1 (Feb. 2012), 5–32. doi:10.1080/01402390.2011.608939.
- Rid, Thomas, Active Measures: The Secret History of Disinformation and Political Warfare (New York: Farrar, Straus and Giroux 2020).
- Rovner, Joshua and Tyler Moore, ‘Does the Internet Need a Hegemon?’, Journal of Global Security Studies 2/3 (1 July 2017), 184–203. doi:10.1093/jogss/ogx008.
- Rovner, Joshua, Cyber War as an Intelligence Contest, War on the Rocks, 16 Sept. 2019. https://warontherocks.com/2019/09/cyber-war-as-an-intelligence-contest/ .
- Ruck, Damian J., Natalie M. Rice, Joshua Borycz, and R. Alexander Bentley, ‘Internet Research Agency Twitter Activity Predicted 2016 U.S. Election Polls’, First Monday 24/7 (30 June 2019). doi:10.5210/fm.v24i7.10107.
- Schneider, Jacquelyn, Cyber and Crisis Escalation: Insights from Wargaming (U.S. Naval War College 12 2017). https://pacs.einaudi.cornell.edu/sites/pacs/files/Schneider.Cyber%20and%20Crisis%20Escalation%20Insights%20from%20Wargaming%20Schneider%20for%20Cornell.10-12-17.pdf .
- Shultz, Richard H. and Roy Godson, Dezinformatsia: Active Measures in Soviet Strategy (Washington DC: Pergamon-Brassey’s 1984).
- Slayton, Rebecca, ‘What is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment’, International Security 41/3 (Jan. 2017), 72–109. doi:10.1162/ISEC_a_00267.
- Smeets, Max, ‘The Strategic Promise of Offensive Cyber Operations’, Strategic Studies Quarterly 12/3 ( Fall 2018).
- Specops, ‘The Countries Experiencing the Most ‘Significant’ Cyber-Attacks’ Specops Software’,9 July 2020. https://specopssoft.com/blog/countries-experiencing-significant-cyber-attacks/ .
- Stone, John, ‘Cyber War Will Take Place!’, Journal of Strategic Studies 36/1 (2013), 101–08. doi:10.1080/01402390.2012.730485.
- US CYBERCOM, ‘Achieve and Maintain Cyberspace Superiority - Command Vision for US Cyber Command’, Apr. 2018. https://www.cybercom.mil/Portals/56/Documents/USCYBERCOM%20Vision%20April%202018.pdf?ver=2018-06-14-152556-010 .
- US Treasury, Treasury Sanctions Russian Cyber Actors for Interference with the 2016 U.S. Elections and Malicious Cyber-Attacks | U.S. Department of the Treasury’, 15 Mar. 2018. https://home.treasury.gov/news/press-releases/sm0312 .
- Waldman, Arielle, ‘FBI: Ransomware Hit 649 Critical Infrastructure Entities in 2021’, Search Security, 24 Mar. 2022. https://www.techtarget.com/searchsecurity/news/252515076/FBI-Ransomware-hit-649-critical-infrastructure-entities-in-2021 .
- The White House, ‘International Strategy for Cyberspace’, 2011. https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf .
- Williams, Brad D., ‘Nakasone: Cold War-Style Deterrence ”does Not Comport to Cyberspace”’, Breaking Defense (blog), 4 Nov. 2021. https://breakingdefense.sites.breakingmedia.com/2021/11/nakasone-cold-war-style-deterrence-does-not-comport-to-cyberspace/ .
- Wirtz, James J., ‘The Cyber Pearl Harbor’, in Goldman, Emily O. and Arquilla, John (eds.), Cyber Analogies (Monterey, CA: Naval Postgraduate School 2014), 7–14.
- Wohlforth, William C., ‘Realism and Great Power Subversion’, International Relations 34/4 (1 Dec. 2020), 459–81. doi:10.1177/0047117820968858.