References
- Alexander, D. “U.S. reserves right to meet cyber attack with force”. Reuters, 16 Nov 2011. http://www.reuters.com/article/us-usa-defense-cybersecurity-idUSTRE7AF02Y20111116.
- Buchanan, B. The Cybersecurity Dilemma: Hacking, Trust and Fear between Nations. Oxford: OUP, 2016.
- Cleaver, H. “The Zapatista effect: the Internet and the rise of an alternative political fabric”. Journal of International Affairs 51, no. 2 (1998). https://www.researchgate.net/publication/265656838_The_Zapatista_Effect_The_Internet_and_the_Rise_of_an_Alternative_Political_Fabric.
- Czosseck, C., R. Ottis and K. Ziolkowski, eds. 2012 4th International Conference on Cyber Conflict. Proceedings. NATO CCD COE Publications, 2012.
- Falliere, N., L. O. Murchu and E. Chien. W32.Stuxnet Dossier. Cupertino, Cal: Symantec, 2011. https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf, 2011.
- Greenberg, A. “Hackers claim to auction data they stole from NSA-linked spies”. Wired, 15 August 2016. https://www.wired.com/2016/08/hackers-claim-auction-data-stolen-nsa-linked-spies.
- Halpin, E., P. Trevorrow, D. Webb, and S. Wright, eds. Cyberwar, Netwar and the Revolution in Military Affairs. NewYork: Palgrave Macmillan, 2006.
- Harris, S. @ War. The Rise of the Military-Internet Complex. Boston, New York: Houghton, Mifflin Harcourt, 2015.
- Kempf, O. Introduction à la Cyberstratégie, 2nd edition. Paris: Economica, 2015.
- Kaspersky Lab. Equation Group: questions and answers. February 2015. https://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf.
- Korstanje, M. E. Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities. ICI Global, November 2016.
- Kramer, F., S. Starr, and L. Wentz, eds. Cyberpower and National Security. Washington DC: National Defense University Press and Potomac Books, 2009.
- Magnuson, S., “Roles, Responsibilities of Cyber Command Debated”. National Defense Magazine, 8 February 2017.
- NATO Cooperative Cyber Defence Centre of Excellence. CyCon Proceedings. International Conference on Cyber Conflict. Tallinn, 30 May 2017. https://ccdcoe.org/cycon/past-cycon-conferences.html
- NATO Cooperative Cyber Defence Centre of Excellence. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press, 2013.
- Van Niekerk, B. “Convergence of functional areas in information operations”. South African Journal of Information Management 17, no. 1 (2015).
- Nye, J.S. Jr. Cyber Power. Cambridge, Mass: Belfer Center for Science and International Affairs, 2010.
- Pagliery, J. “Hacker claims to be selling stolen NSA spy tools”. CNN, 15 August 2015. http://money.cnn.com/2016/08/15/technology/nsa-spy-tools-stolen .
- Quinn, B. “Revealed: the MoD’s secret cyberwarfare programme”. The Guardian, 6 March 2014. https://www.theguardian.com/uk-news/2014/mar/16/mod-secret-cyberwarfare-programme.
- Richet, J. L. Cybersecurity Policies and Strategies for Cyberwarfare Prevention. Information Science Reference, 2015.
- Rollins, J.W. “U.S.–China Cyber Agreement”. CRS Insight, 16 October 2015.
- Sanger, D.E. “Biden Hints at U.S. Response to Russia for Cyberattacks”. New York Times, 15 Oct. 2016. http://www.nytimes.com/2016/10/16/us/politics/biden-hints-at-us-response-to-cyberattacks-blamed-on-russia.html?_r=0, 2016.
- Der Spiegel. “Documents Reveal Top NSA Hacking Unit”. 29 December 2013. http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html.
- UN. Proposed International Code of Conduct for Information Security. United Nations General Assembly A/69/723. New York, 2015. https://ccdcoe.org/sites/default/files/documents/UN-150113-CodeOfConduct.pdf.
- UN. Developments in the field of information and telecommunications in the context of international security. United Nations General Assembly, annual reports by UN Secretary-General. https://www.un.org/disarmament/topics/informationsecurity/, 2010 and following years.
- UN. Developments in the field of information and telecommunications in the context of international security. United Nations General Assembly Resolution A/RES/53/70. New York, 1999. https://ccdcoe.org/sites/default/files/documents/UN-981204-ITIS.pdf.
- UNIDIR. The Cyber Index: International Security Trends and Realities. United Nations Institute for Disarmament Research Geneva: UNIDIR, 2013. http://www.unidir.org/files/publications/pdfs/cyber-index-2013-en-463.pdf.
- US Department of Defense. DoD Cyber Strategy. Washington DC, April 2015. http://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf.
- US White House. Critical Foundations: Protecting America’s Infrastructures. US President’s Commission on Critical Infrastructure Protection. Washington DC, Oct 1997. https://www.fas.org/sgp/library/pccip.pdf.
- US White House. US-Russian Cooperation on Information and Communications Technology Security. The White House, Office of the Press Secretary, 17 June 2013. https://www.whitehouse.gov/the-press-office/2013/06/17/fact-sheet-us-russian-cooperation-information-and-communications-technol.
- Ventre, D., ed. Cyberwar and Information Warfare. Hoboken, NJ: ISTE Ltd and Wiley, 2011.
- WikiLeaks. Afghan War Diary. https://wikileaks.org/afg/, 2010.
- WikiLeaks. Iraq War Logs. https://wikileaks.org/irq/, 2010.