References
- Barbieri, C., Darnis, J. P., and Polito, C. 2018. Non-proliferation Regime for Cyber Weapons. A Tentative Study. Documenti IAI 18/03. Rome: IAI, March https://www.iai.it/en/pubblicazioni/non-proliferation-regime-cyber-weapons.
- Borghard, E., and Lonergan, S. 2018. Why Are There No Cyber Arms Control Agreements? Council on Foreign Relations, 16 January. https://www.cfr.org/blog/why-are-there-no-cyber-arms-control-agreements.
- Bronk, C., and Wallach, D. 2013. Cyber Arms Control? Forget About It. CNN, 26 March. https://www.cnn.com/2013/03/26/opinion/bronk-wallach-cyberwar/index.html.
- Buchanan, B. 2017. The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations. Oxford: Oxford University Press.
- Council of the EU (European Union). 2017. Draft Council Conclusions on a Framework for a Joint EU Diplomatic Response to Malicious Cyber Activities (“Cyber Diplomacy Toolbox”). 7 June. http://data.consilium.europa.eu/doc/document/ST-9916-2017-INIT/en/pdf.
- Council of the EU. 2020. EU Imposes the First Ever Sanctions Against Cyber-attacks. Press releases, 30 July. https://www.consilium.europa.eu/en/press/press-releases/2020/07/30/eu-imposes-the-first-ever-sanctions-against-cyber-attacks/#.
- Daniel, M. 2014. Heartbleed: Understanding When We Disclose Cyber Vulnerabilities. The White House Blog, 28 April. https://obamawhitehouse.archives.gov/blog/2014/04/28/heartbleed-understanding-when-we-disclose-cyber-vulnerabilities.
- Delcheva, T., and Soesanto, S. 2018. Time to Talk: Europe and the Vulnerability Equity Process. European Council on Foreign Relations, 21 March. https://www.ecfr.eu/article/commentary_time_to_talk_europe_and_the_vulnerability_equities_process.
- Denning, D. 2001. Obstacles and Options for Cyber Arms Controls. Presented at Arms Control in Cyberspace, Heinrich Böll Foundation, Berlin, 29–30 June. https://faculty.nps.edu/dedennin/publications/Berlin.pdf.
- ENISA. 2015. Good Practice Guide on Vulnerability Disclosure: From Challenges to Recommendations. November. https://www.enisa.europa.eu/publications/vulnerability-disclosure.
- European Commission. 2017. Joint Communication to the European Parliament and the Council: Resilience, Deterrence and Defence: Building Strong Cybersecurity for the EU. 13 September. https://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX%3A52017JC0450.
- Europol. 2020. Covid-19 Sparks Upward Trend in Cybercrime. Press release, 5 October. https://www.europol.europa.eu/newsroom/news/covid-19-sparks-upward-trend-in-cybercrime.
- Ford, C. 2010. The Trouble with Cyber Arms Control. The New Atlantis 29: 52–67
- Goldman, A., Barnes J., Haberman, M., and Fandos N. 2020. Lawmakers Are Warned that Russia Is Meddling to Re-elect Trump. The New York Times, 20 February. https://www.nytimes.com/2020/02/20/us/politics/russian-interference-trump-democrats.html
- Hakmeh, J., and Peters, A. 2020. A New UN Cybercrime Treaty? The Way Forward for Supporters of an Open, Free, and Secure Internet. Council on Foreign Relations, 13 January. https://www.cfr.org/blog/new-un-cybercrime-treaty-way-forward-supporters-open-free-and-secure-internet.
- Healey, J. 2013. A Fierce Domain: Conflict in Cyberspace, 1986 to 2012. Cyber Conflict Studies Association.
- Healey, J. 2016. The U.S. Government and Zero-Day Vulnerabilities: From Pre-Heartbleed to Shadow Brokers. Journal of International Affairs, 1 November. https://jia.sipa.columbia.edu/online-articles/healey_vulnerability_equities_process.
- Henriksen, A. 2019. The End of the Road for the UN GGE Process: The Future Regulation of Cyberspace. Journal of Cybersecurity 5 (1). https://doi.org/10.1093/cybsec/tyy009.
- Herr, T. 2014. PrEP: A Framework for Malware & Cyber Weapons. The Journal of Information Warfare 13 (1): 87–106.
- Hitchens, T. 2019. Can NSA Stop China Copying Its Cyber Weapons? Breaking Defense, 8 May. https://breakingdefense.com/2019/05/this-code-wont-self-destruct-can-nsa-stop-china-copying-its-cyber-weapons/.
- Kennedy, M. 2019. New Russian Law Gives Government Sweeping Power over Internet. NPR, 1 November. https://www.npr.org/2019/11/01/775366588/russian-law-takes-effect-that-gives-government-sweeping-power-over-internet.
- Libicki, M. 2009. Cyberdeterrence and Cyberwar. RAND Corporation, 2009.
- Marietjeschaake.eu. 2018. EU Needs One Set of Vulnerability Disclosure Rules, Says Expert Task Force. 14 March. https://marietjeschaake.eu/nl/eu-needs-one-set-of-vulnerability-disclosure-rules-says-expert-task-force.
- Markoff, J. 2008. Before the Gunfire, Cyberattacks. The New York Times, 12 August. https://www.nytimes.com/2008/08/13/technology/13cyber.html.
- Mazarr, M. 2018. Understanding Deterrence. PE-295-RC. RAND Corporation. https://www.rand.org/pubs/perspectives/PE295.html.
- Morgus, R., Costello, J., Garzoni, C., and Garcia, M. 2020. Deterrence by Denial: The Missing Element of U.S. Cyber Strategy. Lawfare, 11 March. https://www.lawfareblog.com/deterrence-denial-missing-element-us-cyber-strategy.
- Mueller, M. 2017. A Global Cyber-Attribution Organization – Thinking It Through. Internet Governance Project, 4 June. https://www.internetgovernance.org/2017/06/04/a-global-cyber-attribution-org/.
- New York Times, The 2015. Arms Control for a Cyberage. 26 February. https://www.nytimes.com/2015/02/26/opinion/arms-control-for-a-cyberage.html.
- Nicholas, P. 2018. The Role that Regions Can and Should Play in Critical Infrastructure Protection. Microsoft, 5 March. https://www.microsoft.com/security/blog/2018/03/05/the-role-that-regions-can-and-should-play-in-critical-infrastructure-protection/.
- Nye, J. 2015. The World Needs an Arms-control Treaty for Cybersecurity. The Washington Post, 1 October. https://www.belfercenter.org/publication/world-needs-arms-control-treaty-cybersecurity.
- Nye, J. 2016/17. Deterrence and Dissuasion in Cyberspace. International Security 41 (3): 44–71.
- Nye, J. 2019. Deterrence in Cyberspace. China-US Focus, 10 June. https://www.chinausfocus.com/peace-security/deterrence-in-cyberspace.
- Perkovich, G., and Levite, A. 2017. Introduction to Understanding Cyber Conflict: 14 Analogies. Carnegie Endowment for International Peace, 16 October. https://carnegieendowment.org/2017/10/16/introduction-to-understanding-cyber-conflict-14-analogies-pub–73392.
- Pupillo, L., Ferreira, A., and Varisco, G. 2018. Software Vulnerability Disclosure in Europe: Technology, Policies, and Legal Challenges. Center for European Policy Studies, 28 June. https://www.ceps.eu/ceps-publications/software-vulnerability-disclosure-europe-technology-policies-and-legal-challenges/.
- Purnell, N., and Xiao, E. 2020. Facebook, Twitter, Google Face Free-Speech Test in Hong Kong. The Wall Street Journal, 3 July. https://www.wsj.com/articles/facebook-twitter-google-face-free-speech-test-in-hong-kong–11593790205.
- Ranger, S. 2017. US Intelligence: 30 Countries Building Cyber Attack Capabilities. ZDNet, 5 January. https://www.zdnet.com/article/us-intelligence-30-countries-building-cyber-attack-capabilities/.
- Riley, M. 2014. NSA Said to Have Used Heartbleed Bug, Exposing Consumers. Bloomberg News, 12 April. https://www.bloomberg.com/news/articles/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.
- Schmitt, M. 2020. Norm-skepticism in Cyberspace? Counter-factual and Counterproductive. Just Security, 28 February. https://www.justsecurity.org/68892/norm-skepticism-in-cyberspace-counter-factual-and-counterproductive/.
- Schneier, B. 2014. Should U.S. Hackers Fix Cybersecurity Holes or Exploit Them? The Atlantic, 19 May. https://www.theatlantic.com/technology/archive/2014/05/should-hackers-fix-cybersecurity-holes-or-exploit-them/371197/.
- Schulze, M. 2020. The State of Cyber Arms Control. An International Vulnerabilities Equities Process as the Way to Go Forward? S&F Sicherheit und Frieden 38 (1): 17–21.
- Schwartz, A., and Knake, R. 2016. Government’s Role in Vulnerability Disclosure: Creating a Permanent and Accountable Vulnerability Equities Process. Discussion Paper 2016–04. Cyber Security Project, Belfer Center, June. https://www.belfercenter.org/publication/governments-role-vulnerability-disclosure-creating-permanent-and-accountable.
- Smeets, M. 2019. Organizational Path Towards Conducting Offensive Cyber Operations: A Framework for Analysis. 11th International Conference on Cyber Conflict. Tallinn: NATO CCD COE. https://ccdcoe.org/uploads/2019/06/Art_09_NATO-Members-Organizational-Path.pdf.
- Smeets, M., and Soesanto, S. 2020. Cyber Deterrence is Dead. Long Live Cyber Deterrence! Council on Foreign Relations, 18 February. https://www.cfr.org/blog/cyber-deterrence-dead-long-live-cyber-deterrence.
- Stockton, P., and Golabek-Goldman, M. 2013. Curbing the Market for Cyber Weapons. Yale Law & Policy Review 32 (1): 239–66.
- United Nations General Assembly. 2015. Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. 22 July. https://www.un.org/ga/search/view_doc.asp?symbol=A/70/174.
- US Department of State. 2020. U.S. Relations with Russia. 22 July. https://www.state.gov/u-s-relations-with-russia/.
- Wong, E., and Myers, S. L. 2020. Officials Push U.S.-China Relations Toward Point of No Return. The New York Times, 31 July. https://www.nytimes.com/2020/07/25/world/asia/us-china-trump-xi.html?referringSource=articleShare.
- World Economic Forum. 2020. The Global Risks Report 2020: 15th Edition. http://www3.weforum.org/docs/WEF_Global_Risk_Report_2020.pdf.