Bibliography
- “2015 Global Threat Report.” CrowdStrike, January 22, 2016. https://web.archive.org/web/20160226104830/http://go.crowdstrike.com/rs/281-OBQ-266/images/15GlobalThreatReport.pdf.
- Aaltola, M. “Stages of Digitalized Regressive Meddling in Three Western Elections.” In Democratic Vulnerability and Autocratic Meddling: The “Thucydidean Brink” in Regressive Geopolitical Competition, edited by M. Aaltola, 131–147. Cham: Springer International Publishing, 2021. doi:10.1007/978-3-030-54602-1_6.
- “Affidavit In Support Of Application For Seizure Warrant.” U.S. Department of Justice. November 4, 2020. https://www.justice.gov/usao-ndca/press-release/file/1334571/download
- Al Alam. “قناة العالم تعلن عن استعادة حسابيها على ‘تويتر’ و”يوتيوب“.” April 14, 2015 [ Arabic]. https://web.archive.org/web/20230106221324/https://www.alalam.ir/news/1694801/%D9%82%D9%86%D8%A7%D8%A9-%D8%A7%D9%84%D8%B9%D8%A7%D9%84%D9%85-%D8%AA%D8%B9%D9%84%D9%86-%D8%B9%D9%86-%D8%A7%D8%B3%D8%AA%D8%B9%D8%A7%D8%AF%D8%A9-%D8%AD%D8%B3%D8%A7%D8%A8%D9%8A%D9%87%D8%A7-%D8%B9%D9%84%D9%89-%D8%AA%D9%88%D9%8A%D8%AA%D8%B1-%D9%88-%D9%8A%D9%88%D8%AA%D9%8A%D9%88%D8%A8.
- Al Alarabiya. “الحليمي: ظلموني بقناة العالم.” April 13, 2015 [ Arabic]. https://www.alarabiya.net/saudi-today/2015/04/13/%D8%A7%D9%84%D8%AD%D9%84%D9%8A%D9%85%D9%8A-%D8%B8%D9%84%D9%85%D9%88%D9%86%D9%8A-%D8%A8%D9%82%D9%86%D8%A7%D8%A9-%D8%A7%D9%84%D8%B9%D8%A7%D9%84%D9%85
- Al Arabiya. “Pan-Arab Newspaper Al-Hayat Hacked by Yemen ‘Cyber Army.” April 14, 2015. https://english.alarabiya.net/media/digital/2015/04/14/Pan-Arab-newspaper-al-Hayat-hacked-by-Yemen-Cyber-Army-
- Al Riyadh. “اختراق حساب وزارة العدل الرسمي في تويتر.” October 14, 2014. [ Arabic]. https://web.archive.org/web/20230106231355/https://www.alriyadh.com/984899
- Al-Jubeir, A. “Can Iran Change?” The New York Times. January 19, 2016. https://www.nytimes.com/2016/01/19/opinion/saudi-arabia-can-iran-change.html
- Al-Madina Online. “الآن تعرف على مطالبات مخترق حساب وزير التعليم على تويتر.” February 16, 2016. [ Arabic]. https://web.archive.org/web/20230106233113/https://www.al-madina.com/article/432056/%D8%A7%D9%84%D8%A2%D9%86-%D8%AA%D8%B9%D8%B1%D9%81-%D8%B9%D9%84%D9%89-%D9%85%D8%B7%D8%A7%D9%84%D8%A8%D8%A7%D8%AA-%D9%85%D8%AE%D8%AA%D8%B1%D9%82-%D8%AD%D8%B3%D8%A7%D8%A8-%D9%88%D8%B2%D9%8A%D8%B1-%D8%A7%D9%84%D8%AA%D8%B9%D9%84%D9%8A%D9%85-%D8%B9%D9%84%D9%89-%D8%AA%D9%88%D9%8A%D8%AA%D8%B1.
- Albright, D., and A. Sticker. “Stuxnet Worm Targets Automated Systems for Frequency Converters: Are Iranian Centrifuges the Target?” Institute for Science and International Security, November 17, 2010. https://isis-online.org/isis-reports/detail/stuxnet-worm-targets-automated-systems-for-frequency-converters-is-irans-ce/8.
- “Anatomy of Russia’s 2016 Influence Operations.” Mandiant/FireEye Intelligence, October 2017. https://archive.org/details/2017-10-fireeye-anatomy.
- Andrew, C., and V. Mitrokhin. The Mitrokhin Archive: The KGB in Europe and the West. United Kingdom: Penguin, 2000.
- “APT1: Exposing One of China’s Cyber Espionage Units.” Mandiant, 2013. https://web.archive.org/web/20130222161601/http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf.
- Banks, W. “Cyber Attribution and State Responsibility.” International Law Studies 97 (2021): 1038–1072.
- Bartholomew, B., and J. A. Guerrero-Saade. “Wave Your False Flags! Deception Tactics Muddying Attribution in Targeted Attacks.” Virus Bulletin Conference, 2016. https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2017/10/20114955/Bartholomew-GuerreroSaade-VB2016.pdf
- Black, I. “Saudi Arabia Tells Citizens to Ignore Latest WikiLeaks Release.” The Guardian, June 21, 2015. https://www.theguardian.com/world/2015/jun/21/saudi-arabia-ignore-wikileaks-release.
- Bowcott, O. “UK and Saudi Arabia ‘In Secret Deal’ Over Human Rights Council Place.” The Guardian, September 25, 2015. https://www.theguardian.com/uk-news/2015/sep/29/uk-and-saudi-arabia-in-secret-deal-over-human-rights-council-place.
- Cherney, M. “Pro-Russian Hackers Took Down Three NATO Websites.” Vice, March 16, 2014. https://www.vice.com/en/article/jp5mxd/pro-russia-ukranians-hack-nato-websites.
- Chesney, R., and M. Smeets. Deter, Disrupt, or Deceive: Assessing Cyber Conflict as an Intelligence Contest. Washington, D.C: Georgetown University Press, 2023.
- CHRIS. “Anti-Israel Hackers Parastoo Prepare for OpIsrael Anniversary.” Recorded Future, February 4, 2014. https://web.archive.org/web/20210916135028/https://www.recordedfuture.com/parastoo-opisrael-birthday/.
- CHRIS. “Cyber Attacks in the Spin Cycle: Saudi Aramco and Shamoon.” Recorded Future (Blog), November 1, 2012. https://www.recordedfuture.com/narrative-of-a-cyber-attack-saudi-aramco-and-shamoon.
- CHRIS. “‘Islamic Cyber Resistance’ Breaks Iranian Hacker Silence, Exposes Links to SEA.” Recorded Future (Blog), December 24, 2013. https://web.archive.org/web/20221129021308/https://www.recordedfuture.com/islamic-cyber-resistance-activity.
- Corera, G. “How France’s TV5 Was Almost Destroyed by ‘Russian Hackers’.” BBC News, October 10, 2016. https://www.bbc.com/news/technology-37590375.
- Cormac, R., and R. J. Aldrich. “Grey is the New Black: Covert Action and Implausible Deniability.” International Affairs 94, no. 3, May 1 (2018): 477–494. doi:10.1093/ia/iiy067.
- The Daily Mail. “Britam Defence, David Goulding and Philip Doughty.” April 18, 2013. https://web.archive.org/web/20130419012041/http://www.dailymail.co.uk/home/article-2311199/Britam-Defence-David-Goulding-Philip-Doughty.html.
- Deeks, A. “Defend Forward and Cyber Countermeasures.” Hoover Working Group on National Security, Technology, and Law, Paper No. 2004, 2020.
- “Defending Ukraine.” Microsoft, June 22, 2022. https://web.archive.org/web/20220622153437/https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE50KOK.
- Egloff, F. J. “Contested Public Attributions of Cyber Incidents and the Role of Academia.” Contemporary Security Policy 41, no. 1, (January 2, 2020): 55–81. doi:10.1080/13523260.2019.1677324.
- Egloff, F. J., and M. Smeets. “Publicly Attributing Cyber Attacks: A Framework.” Journal of Strategic Studies 46, no. 3 (2021): 502–533. doi:10.1080/01402390.2021.1895117.
- Faal, S. “Obama Plan for World War III Stuns Russia.” Whatdoesitmean.Com (Blog). January 28, 2013. https://web.archive.org/web/20130131132019/http://www.whatdoesitmean.com/index1652.htm.
- Falliere, N., L. O. Murchu, and E. Chien. “W32.Stuxnet Dossier Version 1.4.” Wired, February 2011. https://www.wired.com/images_blogs/threatlevel/2011/02/Symantec-Stuxnet-Update-Feb-2011.pdf.
- Fars News Agency. “EXCLUSIVE: Hackers Take Down Alhayat Pro Saudi News Website.” April 14, 2015. https://web.archive.org/web/20150721101215/http://english.farsnews.com/newstext.aspx?nn=13940125000056
- Fars News Agency. “Putin Orders Massive Strike Against Saudi Arabia If West Attacks Syria.” August 28, 2013. https://web.archive.org/web/20130830194757/http://english.farsnews.com/newstext.aspx?nn=13920606001493.
- Fars News Agency. “Saudileaks 1: Yemeni Group Hacks Saudi Gov’t, Releases Thousands of Top Secret Documents.” May 21, 2015a. https://web.archive.org/web/20151016125646/http://english.farsnews.com/newstext.aspx?nn=13940231000544
- Fars News Agency. “Saudileaks 2: Yemen Cyber Army Releases Hacked Contents.” May 21, 2015b. https://web.archive.org/web/20150707030150/http://english.farsnews.com/newstext.aspx?nn=13940231001097.
- Fischerkeller, M., E. O. Goldman, and R. J. Harknett. Cyber Persistence Theory: Redefining National Security in Cyberspace. Oxford: Oxford University Press, 2022.
- “Fog of War: How the Ukraine Conflict Transformed the Cyber Threat Landscape.” Google’s Threat Analysis Group (TAG). February 16, 2023. https://web.archive.org/web/20230216105323/https://services.google.com/fh/files/blogs/google_fog_of_war_research_report.pdf.
- Fraihat, I. “Will Saudi Arabia’s ‘Operation Decisive Storm’ Restore Order in Yemen?” Brookings Institute (Blog). March 28, 2015. https://www.brookings.edu/opinions/will-saudi-arabias-operation-decisive-storm-restore-order-in-yemen/.
- Franceschi-Bicchierai, L. “There’s Evidence the ‘Yemen Cyber Army’ is Actually Iranian.” Vice, June 26, 2015. https://www.vice.com/en/article/wnj9gq/theres-evidence-the-yemen-cyber-army-is-actually-iranian.
- Frenkel, S. “Meet the Mysterious New Hacker Army Freaking Out the Middle East.” BuzzFeed News. June 24, 2015. https://www.buzzfeednews.com/article/sheerafrenkel/who-is-the-yemen-cyber-army.
- Gadher, D. “Iran ‘Faked British Chemical Weapons Plot.’” The Sunday Times. February 3, 2013. https://www.thetimes.co.uk/article/iran-faked-british-chemical-weapons-plot-d3d2zskjwcm.
- Gartzke, E., and J. R. Lindsay. “Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace.” Security Studies 24, no. 2: 316–348. ((April 3, 2015)). doi:10.1080/09636412.2015.1038188.
- Ghattas, A. “Which Lebanese and Arab Media Covered #saudicables and Which Ones Didn’t?” Global Voices (Blog). July 2, 2015. https://globalvoices.org/2015/07/02/which-lebanese-and-arab-media-covered-saudicables-and-which-ones-didnt/.
- Ghattas, K. “The Saudi Cold War with Iran Heats Up.” Foreign Policy. September 15, 2015. https://foreignpolicy.com/2015/07/15/the-saudi-cold-war-with-iran-heats-up/.
- Gioe, D. V., M. S. Goodman, and T. Stevens. “Intelligence in the Cyber Era: Evolution or Revolution?” Political Science Quarterly 135, no. 2, June 1 (2020): 191–224. doi:10.1002/polq.13031.
- “Global Iranian Disinformation Operation.” ClearSky. November 2018. https://web.archive.org/web/20190516045419/https://www.clearskysec.com/wp-content/uploads/2018/11/Global-Iranian-Disinformation-Operation-Clearsky-Cyber-Security.pdf.
- Greenberg, A. “Hackers Claim to Auction Data They Stole from NSA-Linked Spies.” Wired. August 15, 2016. https://www.wired.com/2016/08/hackers-claim-auction-data-stolen-nsa-linked-spies/.
- Greenberg, A. “New Clues Show How Russia’s Grid Hackers Aimed for Physical Destruction.” Wired. September 12, 2019. https://www.wired.com/story/russia-ukraine-cyberattack-power-grid-blackout-destruction/#:~:text=For%20nearly%20three%20years%2C%20the,Ukraine’s%20national%20grid%20operator%2C%20Ukrenergo
- Greenberg, A. “The Untold Story of NotPetya, the Most Devastating Cyberattack in History.” News. Wired. August 22, 2018. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/.
- “A Guide to Cyber Attribution.” Office of the Director of National Intelligence. September 14, 2018. https://web.archive.org/web/20220111104815/https://www.dni.gov/files/CTIIC/documents/ODNI_A_Guide_to_Cyber_Attribution.pdf.
- Healey, J., and S. Caudill. “Success of Persistent Engagement in Cyberspace.” Strategic Studies Quarterly 14, no. 1 (2020): 9–15. https://www.jstor.org/stable/26891881.
- Herpig, S., and T. Reinhold. “Spotting the Bear: Credible Attribution and Russian Operations in Cyberspace.” In Hacks, Leaks, and Disruption: Russian Cyber Strategies, edited by Nicu Popescu and Stanislav Secrieru, 33–42. European Union Institute for Security Studies (EUISS), 2018. http://www.jstor.org/stable/resrep21140.
- “HRC-HRC/Russia/No.675.” WikiLeaks. September 29, 2011. https://web.archive.org/web/20230317220309/https://wikileaks.org/saudi-cables/pics/5a32708e-fb62-e211-bb8c-002219c0fbbe.jpg
- Kamali Dehghan, S. “Iran Uses Fabricated WikiLeaks Cable to Smear UN Rights Rapporteur.” The Guardian. August 2, 2015. https://www.theguardian.com/world/2015/aug/02/iran-fabricated-wikileaks-cable-smear-un-rights-rapporteur
- Khatchadourian, R. “The Case of Agent 15: Did Syria Use a Nerve Agent?” The New Yorker, January 16, 2013. https://www.newyorker.com/news/news-desk/the-case-of-agent-15-did-syria-use-a-nerve-agent.
- Kreps, S. “Social Media and International Relations.” In Elements in International Relations. Cambridge: Cambridge University Press, 2020. doi:10.1017/9781108920377.
- Landler, M. “Obama Threatens Force Against Syria.” The New York Times, August 20, 2012. https://www.nytimes.com/2012/08/21/world/middleeast/obama-threatens-force-against-syria.html.
- Lee, J. “Britam Defence Hacked, Confidential Documents Leaked, Site Offline.” Cyber War News (Blog). January 24, 2013. https://web.archive.org/web/20130201181112/http://www.cyberwarnews.info/2013/01/24/britam-defence-hacked-confidential-documents-leaked-site-offline/.
- Lin, H. “Attribution of Malicious Cyber Incidents.” Hoover Institution, Aegis Paper Series No. 1607. 2017. https://www.hoover.org/sites/default/files/research/docs/lin_webready.pdf.
- MacFarquhar, N., and E. Schmitt. “Syria Threatens Chemical Attack on Foreign Force.” The New York Times, July 23, 2012. https://www.nytimes.com/2012/07/24/world/middleeast/chemical-weapons-wont-be-used-in-rebellion-syria-says.html.
- Markson, S. “Cables Expose UK Agreement to Back Saudi Arabia for Top UN Rights Body.” The Australian, September 29, 2015.
- Maschmeyer, L. “Subversion, Cyber Operations, and Reverse Structural Power in World Politics.” European Journal of International Relations 29, no. 1, March 1 (2023): 79–103. doi:10.1177/13540661221117051.
- McCombie, S., A. J. Uhlmann, and S. Morrison. “The US 2016 Presidential Election & Russia’s Troll Farms.” Journal of Intelligence and National Security 35, no. 1 (2020): 95–114. doi:10.1080/02684527.2019.1673940.
- Mehr News Agency. “جزئیات حمله شیمیایی سوریه چطور لو رفت؟.” August 28, 2013 [Persian]. https://web.archive.org/web/20230317172822/https://www.mehrnews.com/news/2403543/%D8%AC%D8%B2%D8%A6%DB%8C%D8%A7%D8%AA-%D8%AD%D9%85%D9%84%D9%87-%D8%B4%DB%8C%D9%85%DB%8C%D8%A7%DB%8C%DB%8C-%D8%B3%D9%88%D8%B1%DB%8C%D9%87-%DA%86%D8%B7%D9%88%D8%B1-%D9%84%D9%88-%D8%B1%D9%81%D8%AA.
- Mubasher. “‘هاكر’ يعبث بحساب ‘المالية’ على ‘تويتر’ منذ أكثر من ساعة.” November 18, 2014 [Arabic]. https://bit.ly/2LvCjxB.
- Nakashima, E., A. Gardner, and A. C. Davis. “FBI Links Iran to Online Hit List Targeting Top Officials Who’ve Refuted Trump’s Election Fraud Claims.” The Washington Post, December 22, 2020. https://www.washingtonpost.com/national-security/iran-election-fraud-violence/2020/12/22/4a28e9ba-44a8-11eb-a277-49a6d1f9dff1_story.html.
- National Cyber Security Centre. “Russian Military ‘Almost Certainly’ Responsible for Destructive 2017 Cyber Attack.” February 14, 2018. https://www.ncsc.gov.uk/news/russian-military-almost-certainly-responsible-destructive-2017-cyber-attack.
- O’Neill, P. H. “Russia Hacked an American Satellite Company One Hour Before the Ukraine Invasion.” MIT Technology Review, May 10, 2022. https://www.technologyreview.com/2022/05/10/1051973/russia-hack-viasat-satellite-ukraine-invasion/.
- “Operation Cleaver.” Cylance. December 2, 2014. https://scadahacker.com/library/Documents/Cyber_Events/Cylance%20-%20Operation%20Cleaver%20Report.pdf.
- Ostovar, A. “Sectarian Dilemmas in Iranian Foreign Policy: When Strategy and Identity Politics Collide.” Carnegie Endowment for Peace and Democracy. November 30, 2016. https://carnegieendowment.org/2016/11/30/sectarian-dilemmas-in-iranian-foreign-policy-when-strategy-and-identity-politics-collide-pub-66288.
- Perlroth, N. “In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back.” The New York Times. October 23, 2012. https://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html.
- Pernet, C., and L. Kenney. “Operation Woolen-Goldfish.” 2015 Trend Micro Incorporated. March 19, 2015. https://web.archive.org/web/20150513092013/http://www.trendmicro.com:80/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-woolen-goldfish.pdf.
- Poulsen, K. “Moscow Server Hosted WikiLeaks and Iran’s Hackers Weeks Apart.” The Daily Beast, April 16, 2019. https://www.thedailybeast.com/moscow-server-hosted-wikileaks-and-irans-hackers-weeks-apart
- Press TV. “UK-Qatari Plot against Syria Revealed.” January 30, 2013. https://web.archive.org/web/20130130224622/http://presstv.com/detail/2013/01/30/286331/ukqatari-plot-against-syria-revealed/
- Radio Free Europe/Radio Liberty. “Iran TV Channel Hacked.” April 12, 2015. https://www.rferl.org/a/iran-tv-channel-hacked/26951598.html
- Reporters Without Borders. “How Saudi Arabia Manipulates Foreign Media Outlets.” July 9, 2015. https://rsf.org/en/how-saudi-arabia-manipulates-foreign-media-outlets
- Rid, T. Active Measures: The Secret History of Disinformation and Political Warfare. New York: Farras, Straus and Giroux, 2020.
- Rid, T., and B. Buchanan. “Attributing Cyber Attacks.” Journal of Strategic Studies 38, no. 1–2 (2015): 4–37. doi:10.1080/01402390.2014.977382.
- Rogin, J. “Exclusive: Secret State Department Cable: Chemical Weapons Used in Syria.” Foreign Policy, January 15, 2013. https://foreignpolicy.com/2013/01/15/exclusive-secret-state-department-cable-chemical-weapons-used-in-syria/.
- Romanosky, S., and B. Boudreaux. “Private-Sector Attribution of Cyber Incidents: Benefits and Risks to the U.S. Government.” International Journal of Intelligence & CounterIntelligence 34, no. 3 (2021): 463–493. doi:10.1080/08850607.2020.1783877.
- Rovner, J. “What is an Intelligence Contest?” Texas National Security Review 3, no. 4 Fall, (2020): 114–120.
- Russia. Intelligence and Security Committee of Parliament. July 21, 2020. https://web.archive.org/web/20230316075711/https://isc.independent.gov.uk/wp-content/uploads/2021/03/CCS207_CCS0221966010-001_Russia-Report-v02-Web_Accessible.pdf.
- “Russia Military Power.” Defense Intelligence Agency. 2017. https://web.archive.org/web/20211024223507/https://www.dia.mil/Portals/27/Documents/News/Military%20Power%20Publications/Russia%20Military%20Power%20Report%202017.pdf.
- “Russian Active Measures Campaigns And Interference In the 2016 U.S. Election (Volumes I-V).” 116–2. United States Senate Select Committee on Intelligence, November 10, 2020. https://www.intelligence.senate.gov/publications/report-select-committee-intelligence-united-states-senate-russian-active-measures.
- Satter, R., and M. Michael. “Private Lives Are Exposed as WikiLeaks Spills Its Secrets.” Associated Press. August 23, 2016. https://web.archive.org/web/20230106210636/https://apnews.com/article/ap-top-news-international-news-technology-wikileaks-africa-b70da83fd111496dbdf015acbb7987fb.
- Saudi Press Agency. “عام/رئيس الإدارة الإعلامية بوزارة الخارجية : تعرض الحاسب الآلي لوزارة الخارجية لهجمة إلكترونية محدودة.” May 22, 2015 [Arabic]. https://web.archive.org/web/20230313185818/https://www.spa.gov.sa/viewstory.php?newsid=1364187.
- Shackelford, S. J., B. Schneier, M. Sulmeyer, A. Boustead, B. Buchanan, A. N. Craig Deckard, T. Herr, and J. Malekos Smith. “Making Democracy Harder to Hack.” University of Michigan Journal of Law Reform 50, no. 3 (2017): 629–668. doi:10.36646/mjlr.50.3.making.
- Shires, J. “Hack-And-Leak Operations: Intrusion and Influence in the Gulf.” Journal of Cyber Policy 4, no. 2 (2019): 235–256. doi:10.1080/23738871.2019.1636108.
- Shires, J. “The Simulation of Scandal: Hack-And-Leak Operations, the Gulf States, and U.S. Politics.” Texas National Security Review 4, no. 2 (2020): 235–256. doi:10.1080/23738871.2019.1636108. Fall.
- Smeets, M. “U.S. Cyber Strategy of Persistent Engagement & Defend Forward: Implications for the Alliance and Intelligence Collection.” Journal of Intelligence and National Security 35, no. 3 (n.d.): 444–453. doi:10.1080/02684527.2020.1729316.
- Special Counsel Mueller, and Robert, S. “Report on the Investigation into Russian Interference in the 2016 Presidential Election, Volume I of II.” Washington, D.C.: U.S. Department of Justice, March 2019. https://www.justice.gov/archives/sco/file/1373816/download.
- St. James, E., and T. B. Lee. “The 2014 Sony Hacks, Explained.” Vox, June 3, 2015. https://www.vox.com/2015/1/20/18089084/sony-hack-north-korea.
- Steffens, T. Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage. Germany: Springer, 2020.
- Stout, M. “Covert Action in the Age of Social Media.” Georgetown Journal of International Affairs 18, no. 2 (2017): 94–103. doi:10.1353/gia.2017.0024.
- “Suspected Iranian Influence Operation Leverages Network of Inauthentic News Sites & Social Media Targeting Audiences in U.S., UK, Latin America, Middle East.” FireEye, August 21, 2018. https://www.mandiant.com/resources/blog/suspected-iranian-influence-operation.
- Tasnim News Agency. “وثيقة تكشف : السعودية ترشي أحمد شهيد بمليون دولار للضغط على ايران.” July 27, 2015 [ Arabic]. https://www.tasnimnews.com/ar/news/2015/07/27/811690/%D9%88%D8%AB%DB%8C%D9%82%D8%A9-%D8%AA%DA%A9%D8%B4%D9%81-%D8%A7%D9%84%D8%B3%D8%B9%D9%88%D8%AF%DB%8C%D8%A9-%D8%AA%D8%B1%D8%B4%DB%8C-%D8%A3%D8%AD%D9%85%D8%AF-%D8%B4%D9%87%DB%8C%D8%AF-%D8%A8%D9%85%D9%84%DB%8C%D9%88%D9%86-%D8%AF%D9%88%D9%84%D8%A7%D8%B1-%D9%84%D9%84%D8%B6%D8%BA%D8%B7-%D8%B9%D9%84%D9%89-%D8%A7%DB%8C%D8%B1%D8%A7%D9%86.
- “Thamar Reservoir – An Iranian Cyber-Attack Campaign against Targets in the Middle East.” ClearSky, June 3, 2015. https://web.archive.org/web/20150906030952/http://www.clearskysec.com/wp-content/uploads/2015/06/Thamar-Reservoir-public1.pdf.
- “Turla Hiding in the Sky: Russian Speaking Cyberespionage Group Exploits Satellites to Reach the Ultimate Level of Anonymity.” Kaspersky, September 9, 2015. https://www.kaspersky.com/about/press-releases/2015_turla-hiding-in-the-sky-russian-speaking-cyberespionage-group-exploits-satellites-to-reach-the-ultimate-level-of-anonymity.
- Turovsky, D. “Шалтай-Болтай — Побочный Продукт Других Игр.” Meduza, January 13, 2015 [ Russian]. https://web.archive.org/web/20150131005658/https://meduza.io/feature/2015/01/13/shaltay-boltay-pobochnyy-produkt-drugih-igr.
- The U.S. Department of Justice. “North Korean Regime-Backed Programmer Charged with Conspiracy to Conduct Multiple Cyber Attacks and Intrusions.” Government, September 6, 2018. https://www.justice.gov/opa/pr/north-korean-regime-backed-programmer-charged-conspiracy-conduct-multiple-cyber-attacks-and.
- The U.S. Department of Justice. “United States Seizes 27 Additional Domain Names Used by Iran’s Islamic Revolutionary Guard Corps to Further a Global, Covert Influence Campaign.” November 4, 2020. https://web.archive.org/web/20201104232631/https://www.justice.gov/opa/pr/united-states-seizes-27-additional-domain-names-used-iran-s-islamic-revolutionary-guard-corps.
- U.S. National Security Agency, and United Kingdom National Cyber Security Centre. “Joint Cybersecurity Advisory: Turla Group Exploits Iranian APT to Expand Coverage of Victims.” October 21, 2019. https://media.defense.gov/2019/Oct/18/2002197242/-1/-1/0/NSA_CSA_TURLA_20191021%20VER%203%20-%20COPY.PDF.
- Villeneuve, N., N. Moran, T. Haq, and M. Scott. “Operation Saffron Rose.” FireEye, May 13, 2014. https://web.archive.org/web/20140814065135/http://www.fireeye.com/resources/pdfs/fireeye-operation-saffron-rose.pdf.
- Warner, M. “Reflections on Technology and Intelligence Systems.” Journal of Intelligence and National Security 27, no. 1 (2012): 133–153. doi:10.1080/02684527.2012.621604.
- Warner, M. “Intelligence in Cyber—and Cyber in Intelligence.” In Understanding Cyber Conflict; 14 Analogies. Washington, D.C: Georgetown University Press, 2017.
- “Waterbug: Espionage Group Rolls Out Brand-New Toolset in Attacks Against Governments.” Symantec, June 20, 2019. https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/waterbug-espionage-governments.
- Watson, P. J. “Hacked Emails Reveal ‘Washington-Approved’ Plan to Stage Chemical Weapons Attack in Syria.” Infowars.Com (Blog). January 28, 2013. https://web.archive.org/web/20130223154355/http://www.infowars.com/hack-reveals-washington-approved-plan-to-stage-chemical-weapons-attack-in-syria/.
- Work, J. D. “Evaluating Commercial Cyber Intelligence Activity.” International Journal of Intelligence & CounterIntelligence 33, no. 2, April 2 (2020): 278–308. doi:10.1080/08850607.2019.1690877.
- Yazdan Panah, H. “Iran’s Attempts to Blame UN for Its Own Human Rights Abuses.”Iran Focus (blog), August 7, 2015. https://iranfocus.com/blog/30220-iran-s-attempts-to-blame-un-for-its-own-human-rights-abuses/.
- Zegart, A. Spies, Lies, and Algorithms; the History and Future of American Intelligence. Princeton: Princeton University Press, 2022.
- Zetter, K. “Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid.” Wired. March 3, 2016. https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/.
- Zetter, K. “Qatari Gas Company Hit with Virus in Wave of Attacks on Energy Companies.” Wired. August 30, 2012. https://www.wired.com/2012/08/hack-attack-strikes-rasgas/.
- Zetter, K. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. New York: Crown Publishers, 2014.
- Справка Относно Разговорите, Водени в Служба АМ При ПГУ – КГБ в Москва От 25 До 28 Октомври 1988 г. По Въпроси На Сътрудничеството с Отдел 08 ПГУ/ДС, 28 Ноември 1988 г. (ф. НРС, п.ф. 9, Оп. 4., а.е. 681, л. 104 – 143). COMDOS Archive, p. 5. [ Bulgarian].
- “Это Только Начало … It’s Only a Beginning ….” October 26, 2015 [ Russian]. https://web.archive.org/web/20200325083125/https://mediamvd.wordpress.com/author/turokmvd/.
- باشگاه خبرنگاران جوان. “رشوه سعودی ها به احمد شهید برای گزارش علیه ایران + سند.” July 27, 2015 [Persian]. https://www.yjc.ir/fa/news/5273393/%D8%B1%D8%B4%D9%88%D9%87-%D8%B3%D8%B9%D9%88%D8%AF%DB%8C-%D9%87%D8%A7-%D8%A8%D9%87-%D8%A7%D8%AD%D9%85%D8%AF-%D8%B4%D9%87%DB%8C%D8%AF-%D8%A8%D8%B1%D8%A7%DB%8C-%DA%AF%D8%B2%D8%A7%D8%B1%D8%B4-%D8%B9%D9%84%DB%8C%D9%87-%D8%A7%DB%8C%D8%B1%D8%A7%D9%86-%D8%B3%D9%86%D8%AF.