References
- Aben, E. (2016, May 28). ASEAN to form cybersecurity group. Manila Bulletin.
- Abercrombie-Winstanley, G. (2010, June 28). U.S. Department of State, Counterterrorism: Terrorist use of the internet, Joint U.S. Embassy and Philippine Welcome. 2nd Tri-Border Conference. Washington: Federal Information & News Dispatch, LLC.
- ABS-CBN News. (2017, January 5). Comelec’s Bautista faces criminal raps over massive data leak. ABS-CBN News.com. Retrieved from https://news.abs-cbn.com/news/01/05/17/comelecs-bautista-faces-criminal-raps-over-massive-data-leak
- Abuza, Z. (2003). Militant Islam in Southeast Asia. Boulder CO: Lynne Rienner Publishers.
- Adamson, L. (2019). Let them roar: Small states as cyber norm entrepreneurs. European Foreign Affairs Review, 24(2), 217–234. doi:10.54648/EERR2019014
- Anderson, J. J. (2018). Rancor and resilience in the Atlantic Political Order: The Obama years. Journal of European Integration, 40(5), 621–636. doi:10.1080/07036337.2018.1488841
- Aquino, B. (2010). National Security Policy 2011-2016: Securing the Gains of Democracy. Official Gazette of the Philippine government. Retrieved 18 August, 2011, from https://www.officialgazette.gov.ph/2011/08/18/national-security-policy-2011-2016/
- Arts, S. (2018). Offense as the new defense: New life for NATO’s cyber policy. The German Marshall fund. Policy Brief, 39, 1–9.
- Asia Foundation & Rappler. (2018). Understanding violent extremism: Messaging and recruitment strategies on social media in the Philippines. Retrieved from https://asiafoundation.org/wp-content/uploads/2019/02/Understanding-Violent-Extremism-Messaging-and-Recruitment-on-Social-Media-in-the-Philippines.pdf
- Associated Press. (1996, October 21). U.S. wins support on tech trade. Washington Post.
- Associated Press. (2000, August 22). ‘Love Bug’ virus case dropped in Philippines. Washington Post.
- Bajo, A. F. (2020, October 13). AFP eyes partnership with Japan on developing cybersecurity. GMA News. Retrieved from https://www.gmanetwork.com/news/news/nation/759635/afp-eyes-partnership-with-japan-on-developing-cybersecurity/story/
- Banlaoi, R. C. (2002). The role of Philippine–American relations in the global campaign against terrorism. Contemporary Southeast Asia, 24(2), 294–312. doi:10.1355/CS24-2E
- G. (2020, March 3). PH Ranks 4th in world with highest number of online threats. Manila Bulletin.
- Bengali, S., & Pierson, D. (2019, June 10). Why a ban on Huawei is being ignored by some of the oldest U.S. allies in Asia. Los Angeles Times.
- Briscoe, C. H. (2004). Wanted dead or alive: Psychological operations during Balikatan 02-1. Special Warfare, 17, 26–29.
- Buchanan, B. (2020). The hacker and the state. Cambridge, MA: Harvard University Press.
- Bueza, M. (2017, March 28). What have we learned a year since ‘Comeleak’. Rappler.com. Retrieved from https://www.rappler.com/newsbreak/in-depth/lessons-learned-one-year-since-comelec-voters-data-leak
- Burton, J. (2015). NATO’s cyber defence: Strategic challenges and institutional adaptation. Defence Studies, 15(4), 297–319. doi:10.1080/14702436.2015.1108108
- Bush, G. (2003). The national strategy to secure cyberspace. Washington DC: The White House.
- Caliskan, M., & Liégeois, M. (2021). The concept of ‘hybrid warfare’ undermines NATO’s strategic thinking. Small Wars & Insurgencies, 32(2), 295–319. doi:10.1080/09592318.2020.1860374
- Check Point Research. (2020, May 7). Naikon APT: Cyber espionage reloaded. Retrieved from https://research.checkpoint.com/2020/naikon-apt-cyber-espionage-reloaded/
- Chernenko, E., Demidov, O., & Lukyanov, F. (2018). Increasing international cooperation in cybersecurity and adapting cyber norms. Council on Foreign Relations. https://www.cfr.org/report/increasing-international-cooperation-cybersecurity-and-adapting-cyber-norms
- Clinton, B. (1996). Asia trip/miscellaneous remarks. Clinton Digital Library. Retrieved from https://clinton.presidentiallibraries.us/items/show/9597
- Clinton, B. (1998). A national security strategy for a new century. Washington, DC: White House.
- CNN Philippines. (2016, April 22). Searchable website with hacked data taken down – Comelec. CNN Philippines. Retrieved from https://cnnphilippines.com/news/2016/04/22/Comelec-hack-voters-data-wehaveyourdata.html
- CNN Philippines. (2019, December 1). Locsin wants cyberattacks to trigger Mutual Defense Treaty. CNN-Philippines. Retrieved from https://www.cnnphilippines.com/news/2019/12/1/Teddyboy-Locsin-Mutual-Defense-Treaty-cyberattacks.html?fbclid
- Cortes, C. (1998). Microsoft boss visits Philippines. New York NY: Associated Press.
- Davis, J. (2007). Hackers take down the most wired country in Europe. Wired Magazine, 15(9), 15–09.
- De Castro, R. C. (1994). US Grand Strategy in Post-Cold War Asia—Pacific. Contemporary Southeast Asia, 16(3), 342–353. doi:10.1355/CS16-3F
- De Castro, R. C. (2006). Twenty-first century Philippine–American security relations: Twenty-First Century Philippine–American Security Relations: Managing an Alliance in the War of the Third Kind. Asian security,2(2), 102–121.
- De Castro, R. C. (2016a). Facing up to China’s realpolitik approach in the South China Sea dispute. Journal of Asian Security and International Affairs, 3(2), 157–182. doi:10.1177/2347797016645452
- De Castro, R. C. (2016b). The Duterte administration’s foreign policy. Journal of Current Southeast Asian Affairs, 35(3), 139–159. doi:10.1177/186810341603500307
- De Castro, R. C. (2017). The Duterte administration’s appeasement policy on China and the crisis in the Philippine–US alliance. Philippine Political Science Journal, 38(3), 159–181.
- De Castro, R. C. (2020). Abstract of crisis in Philippine-US security relations: From an alliance to a security partnership. The Pacific Review, 35(3), 1–29.
- Department of Foreign Affairs. (2018, October 29). DFA hosts forum to strengthen cyber-security in local government. Retrieved from https://dfa.gov.ph/dfa-news/dfa-releasesupdate/18333-dfa-hosts-forum-to-strengthen-cyber-security-in-local-government
- Department of Information and Communication Technology (DICT). (2016). Mandate, powers, and functions. Retrieved from https://dict.gov.ph/about-us/our-mandate/
- Department of National Defense. ( 2012). Transforming the Department of National Defense to effectively meet the defense and security challenges of the 21st century. Retrieved July 2012, from https://www.files.ethz.ch/isn/167331/Philippines_ENG_2012.pdf
- Laude, J. (2018). Cyber Bayanihan launched to boost cybersecurity infra. Philippine Star. Retrieved from https://www.philstar.com/headlines/2018/11/11/1867572/cyber-bayanihan-launched-boost-cybersecurity-infra
- Department of National Defense. (2019, August 3). ADMM-plus conducts table-top exercise on Cybersecurity. Retrieved from https://www.dnd.gov.ph/Postings/Post/ADMM-Plus%20conducts%20Table-Top%20Exercise%20on%20Cyber%20Security/
- Domingo, F. C. (2015). The contexts of strategy as a guide for defense planning in the Philippines. Defense & Security Analysis, 31(2), 159–167. doi:10.1080/14751798.2015.1069109
- Dupont, A. (1996). Is there an ‘Asian way’? Survival, 38(2), 13–34. doi:10.1080/00396339608442844
- Duterte, R. (2017a). 2017-2022: National security policy for change and well-being of the Filipino people. Retrieved from https://nsc.gov.ph/attachments/article/NSP/NSP-2017-2022.pdf
- Duterte, R. (2017b). National cybersecurity plan 2022. Retrieved from https://dict.gov.ph/wp-content/uploads/2019/07/NCSP2022-rev01Jul2019.pdf
- Eng, P. (1997). The media and democratization in Southeast Asia. Current History, 96(614), 437.
- Fabe, A. P. H., & Zarcilla-Genecela, E. (2021). The Philippines’ cybersecurity strategy. Routledge Companion to Global Cyber-Security Strategy. New York: Routledge.
- Fernando, J. A. (2020, December 16). China’s belt and road initiative in the Philippines (Asia Pacific Bulletin Number 542). Honolulu HI: East-West Center.
- Filca, N. (2021, April 19). U.S. and Philippine Marines tackle the cyber domain. Defense Visual Information Distribution Service. Retrieved from https://www.dvidshub.net/news/394412/us-and-philippine-marines-tackle-cyber-domain
- Fischerkeller, M. P., Goldman, E. O., & Harknett, R. J. (2022). Cyber persistence theory: Redefining national security in cyberspace. Oxford UK: Oxford University Press.
- Gerdes, L. M., Ringler, K., & Autin, B. (2014). Assessing the Abu Sayyaf group’s strategic and learning capacities. Studies in Conflict & Terrorism, 37(3), 267–293. doi:10.1080/1057610X.2014.872021
- Gomez, J. (2021, July 30). Philippine leader retains pact allowing US war exercises. Associated Press. Retrieved from https://apnews.com/article/philippines-8b619ba37df6817c75ad6e41e262d369
- Gomez, J., & Favila, A. (2022, March 28). U.S. and Philippine forces stage large war exercises likely to rankle China. Los Angeles Times.
- Gomez, M. A. (2012, December 14). Establishing a Philippine cyber command: Points to consider. EastAsiaForum. Retrieved from https://www.eastasiaforum.org/2012/12/14/establishing-a-philippine-cyber-command-points-to-consider/
- Gomez, M. A. (2013). Awaken the cyber dragon: China’s cyber strategy and its impact on ASEAN. Journal of Communication and Computer, 10, 796–805.
- Gomez, M. A. (2017). Frustrated with the Philippines, Vietnam resorts to cyber espionage. Council on Foreign Relations. Retrieved from https://www.cfr.org/blog/frustrated-philippines-vietnam-resorts-cyber-espionage
- Gomez, M. A. (2022). Tracing strategic preferences in cyberspace: The role of regional and domestic strategic culture. Comparative Strategy.
- Gordon, J. (1996, September 27). Cyber-censorship grows in East Asia. Los Angeles Times.
- Gotinga, J., & Tan, L. (2016, August 5). Suspected Chinese malware used to spy on PH gov’t – security firm. CNN-Philippines. Retrieved from https://cnnphilippines.com/news/2016/08/05/South-China-Sea-RAT-cyber-attack-Philippines.html
- Green, M., Hicks, K., Cooper, Z., Schaus, J., & Douglas, J. (2017). Counter-coercion SERIES: Scarborough Shoal Standoff. Asia Maritime Transparency Initiative. https://amti.csis.org/counter-co-scarborough-standoff/
- Griffiths, J. (2019, November 26). China can shut off the Philippines’ power grid at any time. CNN.com. Retrieved from https://edition.cnn.com/2019/11/25/asia/philippines-china-power-grid-intl-hnk/index.html
- Griffiths, J. (2020, May 3). ‘I love you’: How a badly-coded computer virus caused billions in damage and exposed vulnerabilities which remain 20 years on. CNN.com. Retrieved from https://www.cnn.com/2020/05/01/tech/iloveyou-virus-computer-security-intl-hnk/index.html
- Guiang, G. (2018, January 11). ASEAN and India: Terrorism, cyber, and maritime security cooperation. Asia Pacific Pathways to Progress Foundation Inc. Retrieved from https://appfi.ph/resources/commentaries/1809-asean-and-india-terrorism-cyber-and-maritime-security-cooperation?highlight=WyJjeWJlciJd
- Harknett, R. J., & Smeets, M. (2020). Cyber campaigns and strategic outcomes. Journal of Strategic Studies, 45(4), 534–567.
- Healey, J. (2019). The implications of persistent (and permanent) engagement in cyberspace. Journal of Cybersecurity, 5(1), 1–15. doi:10.1093/cybsec/tyz008
- Healey, J., & Jordan, K. T. (2014). NATO’s cyber capabilities: Yesterday, today, and tomorrow. Atlantic Council. Retrived from https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/natos-cyber-capabilities-yesterday-today-and-tomorrow/
- Helm, L. (1996, February 3). Asia is still wary of being wired. Los Angeles Times.
- Herzog, S. (2011). Revisiting the Estonian cyber attacks: Digital threats and multinational responses. Journal of Strategic Security, 4(2), 49–60. doi:10.5038/1944-0472.4.2.3
- Heydarian, R. J. (2017). Tragedy of small power politics. Asian Security, 13(3), 220–236. doi:10.1080/14799855.2017.1354569
- Holmes, J. R., & Yoshihara, T. (2017). Deterring China in the “gray zone”: Lessons of the South China Sea for US alliances. Orbis, 61(3), 322–339. doi:10.1016/j.orbis.2017.05.002
- Hurst, D. (2019, April 26). Japan, US beef up their cyber alliance. The Diplomat.
- Hurwitz, R. (2012). Depleted trust in the cyber commons. Strategic Studies Quarterly, 6(3), 20–45.
- Information Today. (1997). Philippines names Ei to help create knowledge base. Information Today, 14(5), 31–32.
- Inkster, N. (2016). Information warfare and the US presidential election. Survival, 58(5), 23–32. doi:10.1080/00396338.2016.1231527
- Jacobsen, J. T. (2021). Cyber offense in NATO. International Affairs, 97(3), 703–720. doi:10.1093/ia/iiab010
- Kello, L. (2013). The meaning of the cyber revolution. International Security, 38(2), 7–40. doi:10.1162/ISEC_a_00138
- Kim, D. Y. (2002). The politics of market liberalization. Contemporary Southeast Asia, 24(2), 337–370. doi:10.1355/CS24-2G
- Kim, S. S. (1999). East Asia and globalization. Lanham, MD: Rowman & Littlefield Publishers.
- La Porta, A. (2004, February 11). Oral history interview with Ambassador Alphonse F. La Porta. Association for Diplomatic Studies and Training (ADST).
- Landler, M. (2000, October 21). A Filipino linked to ‘love bug’ talks about his license to hack. The New York Times.
- Libicki, M. C. (2007). Conquest in cyberspace. Cambridge, UK: Cambridge University Press.
- Lilli, E. (2020). President Obama and US cyber security policy. Journal of Cyber Policy, 5(2), 265–284. doi:10.1080/23738871.2020.1778759
- Lindsay, J. R., Cheung, T. M., & Reveron, D. S. (eds.). (2015). China and cybersecurity. Oxford, UK: Oxford University Press.
- Lord, W. (1994, November 21). Memo to the Secretary of State, “Reflections on the pacific trips”. Accessed via the Digital National Security Archives.
- Lorenzana, D. (2021, September 8). The U.S.-Philippines mutual defense treaty at 70. Center for Strategic and International Studies. Retrieved from https://www.csis.org/events/us-philippines-mutual-defense-treaty-70
- Macapagal-Arroyo, G. (2004, August 8). National cyber security plan. Manila, PH: Office of the President, Task Force for Security of Critical Infrastructure.
- Magdirila, P. (2019, August 29). Philippines prioritizing cybersecurity in defense policy, officials say. S&P Global Market Intelligence. Retrieved from https://www.spglobal.com/marketintelligence/en/news-insights/trending/by7iqqevsk488mgzw7nkua2
- Malig, J. (2012, May 4). Pentagon to help Philippines vs Hackers. ABS-CBN News. Retrieved from https://news.abs-cbn.com/-depth/05/03/12/pentagon-help-philippines-vs-hacker
- Manantan, M. (2019). Cyber dimension of the South China Sea clashes. The Diplomat.
- Manantan, M. (2020a). The People’s Republic of China’s Cyber Coercion: Taiwan, Hong Kong, and the South China Sea. Issues & Studies, 56(03), 2040013. doi:10.1142/S1013251120400135
- Manantan, M. (2020b, October 21). The promise of public-private cybersecurity partnerships in the Philippines. EastAsiaForum. Retrieved from https://www.eastasiaforum.org/2020/10/21/the-promise-of-public-private-cybersecurity-partnerships-in-the-philippines/
- Manantan, M. (2021). Advancing cyber diplomacy in the Asia Pacific: Japan and Australia. Australian Journal of International Affairs, 75(4), 432–459. doi:10.1080/10357718.2021.1926423
- Mandhana, N. (2019, July 15). In global tech battle, a Balky U.S. Ally Chooses China. Wall Street Journal. https://www.wsj.com/articles/in-global-tech-battle-the-philippines-has-chosen-sides-not-the-u-s-11563205891
- Markoff, J. (2000a, May 6). Law officials seek origins of the virus. The New York Times.
- Markoff, J. (2000b, June 4). Even a worm needs love. New York Times.
- Mateo, J. (2016, July 16). 68 Government Websites Attacked. The Philippine Star.
- Mateo, J. (2017, January 6). Year of hackers: Bangladesh bank heist, Comeleak. Philippine Star.
- Medilo, L. R. (2019, March 29). Celebrating 25 years of internet in the Philippines. Tech Pilipinas. Retrieved from https://techpilipinas.com/celebrating-25-years-internet-philippines/
- Menes, E. (2000, July 26). Testimony before U.S. House of Representatives Subcommittee on Government Management, Information, and Technology. Security: Cyber Attacks -- War without Borders. Retrieved 26 July, 2000, from, https://www.govinfo.gov/content/pkg/CHRG-106hhrg74152/html/CHRG-106hhrg74152.htm
- Mercene, R. (2020, July 23). China connects to PHL via BRI, digital ‘Silk Road’. Business Mirror. Retrieved from https://businessmirror.com.ph/2020/07/23/china-connects-to-phl-via-bri-digital-silk-road/
- Messmer, E. (1999, May 12). Kosovo cyber-war intensifies. CNN.com. Retrieved from http://edition.cnn.com/TECH/computing/9905/12/cyberwar.idg/
- Morris, L. J., Mazarr, M. J., Hornung, J. W., Pezard, S., Binnendijk, A., & Kepe, M. (2019). Gaining competitive advantage in the gray zone: Response options for coercive aggression below the threshold of major war. Santa Monica: RAND National Defense Research Institute.
- Nakasone, P. M. (2019). A cyber force for persistent operations. Joint Force Quarterly, 92(1), 10–14.
- Nevers, R. D. (2007). NATO’s international security role in the terrorist era. International Security, 31(4), 34–66. doi:10.1162/isec.2007.31.4.34
- North Atlantic Treaty Organization (NATO). (2021, July 2). Cyber defence. NATO.int. Retrieved from https://www.nato.int/cps/en/natohq/topics_78170.htm
- Obama, B. (2011). International strategy for cyberspace. Washington DC: White House.
- Office of Cybercrime (OoC). (2015, March 15). Cybercrime report: The rule of law in cyberspace. Department of Justice. Retrieved from https://www.doj.gov.ph/files/cybercrime_office/2014-2015_Annual_Cybercrime_Report.pdf
- Olerio, A. R. (1999). Current situation of transnational organized crime in the Philippines. Asian and Far Eastern Institute for the Prevention of Crime and the Treatment of Offenders Resource Materials Series. Office of Justice Programs, U.S. Department of Justice. https://www.ojp.gov/ncjrs/virtual-library/abstracts/current-situation-transnational-organized-crime-philippines-unafei
- Nepomuceno, P. (2021, October 15). EDCA activities to push through as VFA remains in effect: AFP. Philippine News Agency. Retrieved from https://www.pna.gov.ph/articles/1156735
- Parameswaran, P. (2019a, January 23). What’s in the Philippines’ New Cyber Platform? The Diplomat. Retrieved from https://thediplomat.com/2019/01/whats-in-the-philippines-new-cyber-platform/
- Parameswaran, P. (2019b, October 4). What’s behind the new US-ASEAN cyber dialogue? The Diplomat. Retrieved from https://thediplomat.com/2019/10/whats-behind-the-new-us-asean-cyber-dialogue/
- Passeri, P. (2012, May 1). Philippines and China, on the edge of a new cyber conflict. Hackmageddon. Retrieved from https://www.hackmageddon.com/2012/05/01/philippines-and-china-on-the-edge-of-a-new-cyber-conflict/
- Patalano, A. (2018). When strategy is ‘hybrid’ and not ‘grey’. The Pacific Review, 31(6), 811–839. doi:10.1080/09512748.2018.1513546
- Patena, A. J. (2018, October 31). DICT partners with Kaspersky to boost cybersecurity in gov’t. Philippine News Agency. Retrieved from https://www.pna.gov.ph/articles/1052601
- Perez-Rubio, B. (2020, September 11). AFP on Dito cell sites in military camps: ‘Very low’ risk of spying. Philippine Star. Retrieved from https://www.philstar.com/headlines/2020/09/11/2041699/afp-dito-cell-sites-military-camps-very-low-risk-spying
- Pettis, C. (2017, May 18). Armed forces of the Philippines, U.S. military host cyber exchange, U.S. Indo-Pacific command. Retrieved from https://www.pacom.mil/Media/News/News-Article-View/Article/1186625/armed-forces-of-the-philippines-us-military-host-cyber-exchange/
- Poling, G. (2022). On dangerous ground. Oxford: Oxford University Press.
- Poling, G., & Sayers, E. (2019, January 21). Time to make good on the US-Philippine Alliance. War on the Rocks.
- Ramos, F. (1997, February 20). Speech of President Ramos at the First Congress on Information Technology and Telecommunications Education. Official Gazette of the Philippine Government. Retrieved from https://www.officialgazette.gov.ph/1997/02/20/speech-of-president-ramos-at-the-first-congress-on-information-technology-and-telecommunications-education/
- Rappler. (2015, September 23). To fight cyberattacks, Aquino creates cybersecurity committee. Rappler.com. Retrieved from https://www.rappler.com/technology/aquino-creates-cybersecurity-committee-to-fight-cyberattacks
- Rappler. (2022, March 22). US troops arrive in Philippines for ‘largest-ever’ Balikatan exercise. Rappler.com. Retrieved from https://www.rappler.com/nation/us-troops-arrive-philippines-largest-ever-balikatan-exercise-2022/
- Reardon, M. (2019, March 1). US warns Philippines against using Huawei 5G gear. CNET.com. Retrieved from https://www.cnet.com/tech/mobile/pompeo-warns-philippines-against-using-huawei-5g-gear/
- Recuenco, A. (2021, October 14). US, PH renew commitment to ensure security, defense cooperation. Manila Bulletin.
- Rhoades, A. L., & Helmus, T. C. (2020). Countering violent extremism in the Philippines. Santa Monica, CA: Rand Corporation.
- Ricciuti, M. (1997, November 21). Philippines’ Ramos to visit MS. CNet.com. Retrieved from https://www.cnet.com/news/philippines-ramos-to-visit-ms/
- Robinson, L., Johnston, P. B., & Oak, G. S. (2016). US special operations forces in the Philippines, 2001–2014. New York, NY: Rand Corporation.
- Saga, K. (1999). APEC: Steps to harmonising regional telecom policy. Telecommunications Policy, 23(3–4), 335–344. doi:10.1016/S0308-5961(99)00016-6
- Sandongdong, M. (2020, March 28). Soldiers train on cyber defense. Manila Bulletin. Retrieved from https://mb.com.ph/2020/11/28/soldiers-train-on-cyber-defense/
- Sanger, D. (2019). The perfect weapon. New York, NY: Broadway Books.
- Santos, E. P. (2018, December 28). Scrapping mutual defense treaty with US an option—Lorenzana. CNN Philippines. Retrieved from http://cnnphilippines.com/news/2018/12/28/Mutual-Defense-Treaty-with-US-review.html
- Sari, A. (2020). Legal resilience in an era of grey zone conflicts and hybrid threats. Cambridge Review of International Affairs, 33(6), 846–867. doi:10.1080/09557571.2020.1752147
- Shea, J. (2017). How is NATO meeting the challenge of cyberspace. Prism, 7(2), 18–29.
- Sosa, G. C. (2009). Country report on cybercrime: The Philippines. The Criminal Justice Response to Cybercrime Course. https://unafei.or.jp/publications/pdf/RS_No79/No79_12PA_Sosa.pdf
- State Department. (2011, November 16). Signing of the Manila Declaration. Retrieved from https://2009-2017.state.gov/r/pa/prs/ps/2011/11/177226.htm
- State Department. (2012, April 30). Joint statement of the United-States-Philippines ministerial dialogue. Retrieved from https://2009-2017.state.gov/r/pa/prs/ps/2012/04/188977.htm
- State Department. (2016). Country reports on terrorism 2016: Philippines. Retrieved from https://www.state.gov/reports/country-reports-on-terrorism-2016/
- State Department. (2021, November 16). Joint Vision for a 21st century United States-Philippines partnership. Retrieved from https://www.state.gov/joint-vision-for-a-21st-century-united-states-philippines-partnership/
- Temperton, J. (2016, April 14). The Philippines election hack is ‘freaking huge’. Wired. Retrieved from https://www.wired.co.uk/article/philippines-data-breach-fingerprint-data
- Tordecilla, K. (2016, May 23). Aquino signs law creating information, communications technology department. CNN Philippines. Retrieved from https://cnnphilippines.com/news/2016/05/23/Benigno-Aquino-III-DICT-Department-of-Information-and-Communications-Technology.html
- Tran Dai, C., & Gomez, M. A. (2018). Challenges and opportunities for cyber norms in ASEAN. Journal of Cyber Policy, 3(2), 217–235. doi:10.1080/23738871.2018.1487987
- Trend Micro. (2016, April 7). Data protection mishap leaves 55M voters data at risk. TrendMicro.com. Retrieved from https://www.trendmicro.com/en_us/research/16/d/55m-registered-voters-risk-philippine-commission-elections-hacked.html
- U.S. Army Forces Command FORSCOM. (2000). ILoveYou virus lessons learned report. Accessed via the Homeland Security Digital Library. Retrieved from https://www.hsdl.org/?abstract&did=2451
- U.S. Embassy in the Philippines. (2014, March 7). Note on the Fourth Philippines-United States bilateral strategic dialogue. Retrieved from https://ph.usembassy.gov/media-note-fourth-philippines-united-states-bilateral-strategic-dialogue/
- U.S. Embassy in the Philippines. (2018, August 31). U.S. embassy partners with the Philippines to train prosecutors & investigators on counterterrorism. Retrieved from https://ph.usembassy.gov/us-embassy-partners-with-the-philippines-to-train-prosecutors-and-investigators-on-counterterrorism/
- U.S. Embassy in the Philippines. (2019a, September 13). U.S. and Philippines reaffirm alliance at mutual defense board and security engagement board. Retrieved from https://ph.usembassy.gov/us-and-philippines-reaffirm-alliance-at-mutual-defense-board-and-security-engagement-board/
- U.S. Embassy in the Philippines (2019b, April 2)., U.S. trains Philippine supreme court and court of appeals justices on cybercrime. Retrieved from https://ph.usembassy.gov/us-trains-philippine-supreme-court-and-court-of-appeals-justices-on-cybercrime/
- U.S.-Philippine Society. (2018, March 1). U.S.-Philippines joint cyber security working group briefing. Retrieved from https://www.usphsociety.org/2018/03/01/u-s-philippines-joint-cyber-security-working-group-briefing/
- Valeriano, B., Jensen, B. M., & Maness, R. C. (2018). Cyber strategy: The evolving character of power and coercion. Oxford, UK: Oxford University Press.
- Valeriano, B., & Maness, R. C. (2015). Cyber war versus cyber realities: Cyber conflict in the international system. Oxford, UK: Oxford University Press.
- White, G. (2020, September 12). The 20-year hunt for the man behind the love bug virus. Wired.com. Retrieved from https://www.wired.com/story/the-20-year-hunt-for-the-man-behind-the-love-bug-virus/
- White House. (2015, November 17). Remarks by President Obama and President Aquino of the Republic of the Philippines after bilateral meeting. Retrieved from https://obamawhitehouse.archives.gov/the-press-office/2015/11/17/remarks-president-obama-and-president-aquino-republic-philippines-after
- Winger, G. H. (2020, October 6). China’s disinformation campaign in the Philippines.
- Winger, G. H. (2021). Alliance Embeddedness: Rodrigo Duterte and the Resilience of the US–Philippine Alliance. Foreign Policy Analysis, 17(3), 1–20. doi:10.1093/fpa/orab013
- Winger, G. H. (2022). Reassurance and Revival the US–Philippine Alliance. The International History Review, 44(2), 393–417. doi:10.1080/07075332.2021.1927799
- Wired. (2000a, May 4). Love bug virus running Amok. Wired.com.
- Wired. (2000b, August 21). Love bug case dead in Manila. Wired.com.
- Wirtz, J. J. (2017). Life in the “Gray Zone”: Observations for contemporary strategists. Defense & Security Analysis, 33(2), 106–114. doi:10.1080/14751798.2017.1310702
- Yangyue, L. (2014). Transgressiveness, civil society and Internet control in Southeast Asia. The Pacific Review, 27(3), 383–407. doi:10.1080/09512748.2014.909520