REFERENCES
- Ackerman, Spencer (2011a) ‘Army seeks social media gurus to save Afghan War’, Danger Room, 8 June, < http://www.wired.com/dangerroom/2011/06/army-seeks-social-media-gurus-to-save-the-afghan-war>, accessed 13 August 2012.
- Ackerman, Spencer (2011b) ‘This is the end of counterinsurgency in Afghanistan’, Danger Room, 28 June, < http://www.wired.com/dangerroom/2011/06/this-is-the-end-of-counterinsurgency-in-afghanistan/>, accessed 13 August 2012.
- Alberts, David S and Richard EHayes (2003) Power to the edge: command. control. in the information age (Washington: DOD Command and Control Research Project)
- Andi (2007) ‘Army issues new OPSEC guidelines’, Andi's World, 2 May, < http://andisworld.typepad.com/welcome_to_andis_world/2007/05/index.html">http://web.archive.org/web/20070919192001/http://andisworld.typepad.com/welcome_to_andis_world/2007/05/index.html>, accessed 13 August 2012.
- Andress, Jason and SteveWinterfeld (2011) Cyber warfare: techniques, tactics and tools for security practitioners (Waltham, Massachusetts: Syngress)
- Arquilla, John (2010) ‘The new rules of war’, Foreign Policy, March/April, < http://www.foreignpolicy.com/articles/2010/02/22/the_new_rules_of_war>.
- Arquilla, John and DavidRonfeldt (2001) Networks and netwars: the future of terror, crime, and militancy (Santa Monica, California: RAND)
- Axe, David (2009) ‘The U.S. military's fight over social networking’, Offiziere.ch, 31 July, < http://www.offiziere.ch/?p = 1790>, accessed 13 August 2012.
- Bacevich, Andrew J (2011) ‘U.S. foreign policy: war fever subsides’, Los Angeles Times, 28 June, < http://www.latimes.com/news/opinion/commentary/la-oe-bacevich-war-20110628,0,2711225.story>, accessed 13 August 2012.
- Barnes, Julian (2009a) ‘Pentagon's Facebook: do ask, don't tell’, The Swamp (Chicago Tribune), 4 August, < http://www.swamppolitics.com/news/politics/blog/2009/08/pentagons_facebook_do_ask_dont.html>, accessed 13 August 2012.
- Barnes, Julian (2009b) ‘Can the military coexist with social networking sites?’, Los Angeles Times, 5 August, < http://articles.latimes.com/print/2009/aug/05/nation/na-pentagon-facebook5>, accessed 13 August 2012.
- Biddle, Tami D (2002) Rhetoric and reality in air warfare: the evolution of British and American ideas about strategic bombing, 1914–1945 (Princeton, New Jersey: Princeton University Press)
- Blackfive (2007a) ‘The end of military blogging’, Blackfive, 2 May, < http://www.blackfive.net/main/2007/05/new_opsec_regul.html>, accessed 13 August 2012.
- Blackfive (2007b) ‘The 2007 milblog conference-flash report’, Blackfive, 7 May, < http://www.blackfive.net/main/2007/05/the_2007_milblo.html>, accessed 13 August 2012.
- Blackfive (2007c) ‘Military ban on YouTube and MySpace’, Blackfive, 15 May, < http://www.blackfive.net/main/2007/05/military_ban_on.html>, accessed 13 August 2012.
- Blank, Stephen (2008) ‘Web War I: is Europe's first information war a new kind of war?’, Comparative Strategy, 27:3, 227–247.
- Bousquet, Antoine (2009) The scientific way of warfare: order and chaos on the battlefields of modernity (New York: Columbia University Press)
- Brunner, Elgin and Myriam DunnCavelty (2009) ‘The formation of information by the US military: articulation and enactment of informatic threat imaginaries on the immaterial battlefield of perception’, Cambridge Review of International Affairs, 22:4, 629–646.
- Burden, Matthew C (2006) The blog of war: front-line dispatches from soldiers in Iraq and Afghanistan (New York: Simon & Schuster)
- Caldwell, Bill (2008) ‘Changing the organizational culture’, Frontier 6, Small Wars Journal, 3 February, < http://smallwarsjournal.com/blog/2008/02/changing-the-organizational-cu-1/>, accessed 13 August 2012.
- Caldwell IV, Lt Gen William B, Dennis Murphy and Anton Menning (2009) ‘Learning to leverage new media: the Israeli Defense Forces in recent conflicts’, Military Review, May/June, 2–10.
- Cebrowski, Arthur K and Thomas PMBarnett (2003) ‘The American way of war’, Proceedings of the US Naval Institute, 129:1, 42–43.
- Cebrowski, Arthur K and John JGarstka (1998) ‘Network-centric warfare: its origin and future’, Proceedings of the US Naval Institute, 124:1, 28–35.
- Chairman of the Joint Chiefs of Staff (2010) Department of Defense Dictionary of Military and Associated Terms (Washington)
- Clarke, Richard (2011) ‘China's cyberassault on America’, Wall Street Journal, 15 June, < http://online.wsj.com/article/SB10001424052702304259304576373391101828876.html>, accessed 13 August 2012.
- Cohen, Eliot A (1996) ‘A revolution in warfare’, Foreign Affairs, 75:2, 37–54.
- Collings, Deidre and RafalRohozinski (2009) Bullets and blogs: new media and the warfigher (Carlisle Barracks, Pennsylvania: US Army War College)
- Conway, Maura (2006a) ‘Terrorism and the internet: new media–new threat?’, Parliamentary Affairs, 59:2, 283–298.
- Conway, Maura (2006b) ‘Terrorist “use” of the internet and fighting back’, Information and Security, 19, 9–30.
- Coram, Robert (2002) Boyd: the fighter pilot who changed the art of war (Boston: Little, Brown)
- DeCaro, Charles J (1998) ‘Operationalizing softwar’ in Alan DCampen and Douglas HDearth (eds) Cyberwar 2.0: myths, mysteries, and reality (Fairfax, Virginia: AFCEA International Press), 199–204.
- Defense News (2011) ‘China's PLA bans soldiers from social media’, 1 June, < http://www.defensenews.com/story.php?i = 6683857&c = ASI>, accessed 13 August 2012.
- Deibert, Ronald J and RafalRohozinski (2010) ‘Risking security: policies and paradoxes of cyberspace security’, International Political Sociology, 4, 15–32.
- DeLuca, Kevin (1999) ‘Articulation theory: a discursive grounding for rhetorical practice’, Philosophy & Rhetoric, 32:4, 334–348.
- Department of the Army (2007) Army Regulation 530-1: Operations Security (OPSEC) (Washington: Headquarters)
- Dickover, Noel (2010) ‘Why did DOD call it “internet-based capabilities”?’, GovLoop, 1 March, < http://www.govloop.com/profiles/blogs/why-did-dod-call-it>, accessed 13 August 2012.
- Dickover, Noel (2011) ‘DOD social media policy expires March 1 with no follow-up. What's the impact?’, GovLoop, 12 January, < http://www.govloop.com/profiles/blogs/dod-social-media-policy-1>, accessed 13 August 2012.
- Dilegge, Dave (2007) ‘Everything you always wanted to know about losing the information war …’, Small Wars Journal, 2 May, < http://smallwarsjournal.com/blog/everything-you-always-wanted-to-know-about-losing-the-information-war>, accessed 13 August 2012.
- Drapeau, Mark and Wells, Linton, II (2009) Social software and national security: an initial net assessment (Washington: National Defense University)
- Dunlap Jr, Charles J (1996) ‘How we lost the hi-tech war of 2007’, Weekly Standard, < http://www.weeklystandard.com/Content/Public/Articles/000/000/001/569nzbrd.asp>, accessed 13 August 2012.
- Edwards, Paul N (1996) The closed world: computers and the politics of discourse in Cold War America (Cambridge, Massachusetts: MIT Press)
- Field, Steve (2007) ‘DOD defends decision to block MySpace, YouTube’, The D-Ring, 18 May, < http://dring.wordpress.com/2007/05/18/dod-defends-decision-to-block-myspace-youtube/>, accessed 13 August 2012.
- Floyd, Price (2011) ‘In defense of social media’, Washington Times, 21 March, < http://www.washingtontimes.com/news/2011/mar/21/in-defense-of-social-media/>, accessed 13 August 2012.
- Gates, Robert M (2009), Memorandum for Secretaries of the Military Departments, Subject: Establishment of a Subordinate Unified US Cyber Command under US Strategic Command for Military Cyberspace Operations.
- Gray, Chris H (1997) Postmodern war: the new politics of conflict (New York: Guilford Press)
- Gray, Chris H (1998) ‘The crisis of infowar’ in GStocker and CSchopf (eds) Infowar (New York: Ars Electronica)
- Hacker, Barton C (1968) The military and the machine: an analysis of the controversy over mechanization in the British Army, 1919–1939 (Chicago: University of Chicago)
- Hacker, Barton C (1994) ‘Military institutions, weapons, and social change: toward a new history of military technology’, Technology and Culture, 35:4, 768–834.
- Hammond, Grant T (2001) The mind of war: John Boyd and American security (Washington: Smithsonian Institution Press)
- Hanczor, Robert S (1997) ‘Articulation theory and public controversy: taking sides over “NYPD Blue”’, Critical Studies in Mass Communication, 14:1, 1–30.
- John (2007) ‘Aw, hell’, OPFOR, 2 May, < http://web.archive.org/web/20101017103343/http://op-for.com/2007/05/aw_hell.html>, accessed 13 August 2012.
- Kietzmann, Jan H, KristopherHermkens, Ian PMcCarthy and Bruno SSilvestre (2011) ‘Social media? Get serious! Understanding the functional building blocks of social media’, Business Horizons, 54:3, 241–251.
- Krepinevich, Jr and Andrew, F (1992) The military-technical revolution: a preliminary assessment (Washington: Office of Net Assessment, Department of Defense)
- Krulak, Gen Charles C (1999) ‘The strategic corporal: leadership in the three block war’, Marines Magazine, January, < http://www.au.af.mil/au/awc/awcgate/usmc/strategic_corporal.htm>, accessed 13 August 2012.
- Kruzel, John J (2009a) ‘Pentagon weights social networking benefits, risks’, Armed Forces Press Service, 4 August, < http://www.defense.gov/news/newsarticle.aspx?id = 55363>, accessed 13 August 2012.
- Kruzel, John J (2009b) ‘Officials look to solve social network risks without ban’, Office of the Secretary of Defense Public Affairs, 6 August, < http://www.dvidshub.net/news/37219/ officials-look-solve-social-network-risks-without-ban>, accessed 13 August 2012.
- Laclau, Ernesto and ChantalMouffe (1985) Hegemony and socialist strategy: towards a radical democratic politics (London: Verso)
- Laughing_Wolf (2007) ‘Milblogging, revamping, and a new approach’, Blackfive, 3 May, < http://www.blackfive.net/main/2007/05/milblogging_rev.html>, accessed 13 August 2012.
- Lawhorn, Michael (2007) ‘“Milblogs” present Iraq War from military point of view’, FOXNews.com, 24 May, < http://www.foxnews.com/story/0,2933,196519,00.html>.
- Lawson, Sean (2011a) ‘Articulation, antagonism, and intercalation in Western military imaginaries’, Security Dialogue, 42:1, 39–56.
- Lawson, Sean (2011b) ‘Cold War military systems science and the emergence of a nonlinear view of war in the US military’, Cold War History, 11:3, 421–440.
- Liddy, Maj Lynda (2005) ‘The strategic corporal: some requirements in training and education’, Australian Army Journal, 2:2, 139–148.
- Lind, William S (2001) ‘Fourth-generation warfare's first blow: a quick look’, Marine Corps Gazette, 85:11, 72.
- Lind, William S, Col Keith Nightengale, Capt John F Schmitt, Col Joseph W Sutton and Lt Col Gary I Wilson (1989) ‘The changing face of war: into the fourth generation’, Marine Corps Gazette, October, 22–26.
- Lord, Kristin M and Travis Sharp (2011) ‘Cyber sanity’, The Hill, 25 February, < http://thehill.com/blogs/congress-blog/economy-a-budget/146189-cyber-sanity>, accessed 13 August 2012.
- LynnIII, William J, (2010) Directive-type memorandum (DTM) 09-026—responsible and effective use of internet-based capabilities (Washington: DOD)
- Mackenzie, Donald A (1990) Inventing accuracy: an historical sociology of nuclear missile guidance (Cambridge, Massachusetts: MIT Press)
- MAJ C (2009) ‘Twitter, Facebook, blogging and the military’, A Major's Perspective, 30 July, < http://majorsperspective.blogspot.com/2009/07/twitter-facebook-blogging-and-military.html>, accessed 13 August 2012.
- Makus, Anne (1990) ‘Stuart Hall's theory of ideology: a frame for rhetorical criticism’, Western Journal of Communication, 54:4, 495–514.
- Markoff, John (2008) ‘In a first, cyberwar and real war collide in Georgia’, International Herald Tribune, 14 August, 4.
- McCloskey, Megan (2009) ‘When it comes to social media, military is anything but uniform’, Stars and Stripes, 6 August, < http://www.stripes.com/news/when-it-comes-to-social-media-military-is-anything-but-uniform-1.93810>, accessed 13 August 2012.
- McCormack, Sean (2011) ‘The changing landscape of security in the social media age’, presentation to DoDIIS Worldwide Conference, Detroit, 4 May.
- McQ (2007) ‘Army backs down on milblogs’, Q and O Blog, 3 May, < http://www.qando.net/details.aspx?entry = 5917>, accessed 13 August 2012.
- Mindell, David A (2000) ‘Automation's finest hour: radar and system integration in World War II’ in Agatha CHughes and Thomas PHughes (eds) Systems, experts, and computers: the systems approach in management and engineering, World War II and after (Cambridge, Massachusetts: MIT Press), 27–56.
- Mindell, David A (2002) Between human and machine: feedback, control, and computing before cybernetics (Baltimore: Johns Hopkins University Press)
- Nuding, Jeff (2007) ‘The end of milblogs?’, Dadmanly, 2 May, < http://dadmanly.blogspot.com/2007/05/end-of-milblogs.html>, accessed 13 August 2012.
- Osinga, Frans (2007) Science, strategy, and war: the strategic theory of John Boyd (New York: Routledge)
- Porphyrogenitus (2005) ‘One complaint’, Porphyrogenitus, 18 December, < http://www.porphyrogenitus.net/archives/week_2005_12_18.html">http://web.archive.org/web/20080820095124/http://www.porphyrogenitus.net/archives/week_2005_12_18.html>, accessed 13 August 2012.
- Pretorius, Joelien (2008) ‘The security imaginary: explaining military isomorphism’, Security Dialogue, 39:1, 99–120.
- Robbins, Eizabeth L (2007) ‘Muddy boots IO: the rise of soldier blogs’, Military Review, 87:5, 109–118.
- Roland, Alex (1995) ‘Science, technology, and war’, Technology and Culture, 36:2, S83–S100.
- Ronfeldt, David and JohnArquilla (2001) ‘Networks, netwars, and the fight for the future’, First Monday, 6:10, < http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/889/798>
- Roughead, Adm Gary (2011), Presentation to Institute for Public Relations Strategic Communications Summit, 6 JuneWashington, DC.
- Shachtman, Noah (2007a) ‘Army squeezes soldier blogs, maybe to death’, Danger Room, 2 May, < http://www.wired.com/politics/onlinerights/news/2007/05/army_bloggers>, accessed 13 August 2012.
- Shachtman, Noah (2007b) ‘New Army rules could kill G.I. blogs (maybe e-mail, too)’, Danger Room, 2 May, < http://www.wired.com/dangerroom/2007/05/new_army_rules_/>, accessed 13 August 2012.
- Shachtman, Noah (2007c) ‘Army to bloggers: we won't bust you. Promise’, Danger Room, 3 May, < http://www.wired.com/dangerroom/2007/05/army_to_blogger/>, accessed 13 August 2012.
- Shachtman, Noah (2007d) ‘Military hypes, bans YouTube (updated)’, Danger Room, 15 May, < http://www.wired.com/dangerroom/2007/05/iraqslogger_one/>, accessed 13 August 2012.
- Shachtman, Noah (2007e) ‘Military defends MySpace ban (updated yet again)’, Danger Room, 18 May, < http://www.wired.com/dangerroom/2007/05/military_defend/>, accessed 13 August 2012.
- Shachtman, Noah (2009) ‘Military may ban Twitter, Facebook as security “headaches”’, Danger Room, 30 July, < http://www.wired.com/dangerroom/2009/07/military-may-ban-twitter-facebook-as-security-headaches/>, accessed 13 August 2012.
- Shane III, Leo (2009) ‘Military considers ban on Twitter, Facebook’, Stars and Stripes, 31 July, < http://www.stripes.com/news/military-considers-ban-on-twitter-facebook-1.93709>, accessed 13 August 2012.
- Shane III, Leo and TD Flack (2007) ‘DOD blocking YouTube, others’, Stars and Stripes, 13 May, < http://www.stripes.com/news/dod-blocking-youtube-others-1.63948>, accessed 13 August 2012.
- Sikka, Tinna (2008) ‘Ballistic missile defense and articulation theory: an analysis of technology using a cultural studies approach’, Journal of Language and Politics, 7:1, 119–135.
- Slack, Jennifer D (2006) ‘Communication as articulation’ in JeffreySt John, Gregory JShepherd and TedStriphas (eds) Communication as…: perspectives on theory (Thousand Oaks, California: Sage), 221–223.
- Stiennon, Richard (2011) ‘Goodbye Facebook, I am going to miss you’, Forbes.com, 5 May, < http://blogs.forbes.com/richardstiennon/2011/05/05/goodbye-facebook-i-am-going-to-miss-you/>, accessed 13 August 2012.
- Symantec Enterprise Security (2011) Symantec internet security report: trends for 2010 (Mountain View, California: Symantec Enterprise Security)
- Szafranski, Richard (1997) ‘Neocortical warfare? The acme of skill’ in JohnArquilla and DavidRonfeldt (eds) In Athena's camp: preparing for conflict in the information age (Santa Monica, California: RAND), 395–416.
- Taylor, Charles (2004) Modern social imaginaries (Raleigh: Duke University Press)
- Tomes, Robert R (2007) U.S. defense strategy from Vietnam to Operation Iraqi Freedom: military innovation and the new American way of war, 1973–2003 (London: Routledge)
- US Army Public Affairs Fact Sheet (2007) ‘Army Operations security: soldier blogging unchanged’, 2 May, < http://www.fas.org/irp/agency/army/blog050207.pdf>, accessed 13 August 2012.
- US Marine Corps (2009) ‘Immediate ban of internet social networking sites (SNS) on Marine Corps Enterprise Network (MCEN) Niprnet’, 3 August, < http://www.marines.mil/news/messages/Pages/MARADMIN0458-09.aspx>, accessed 13 August 2012.
- US Marine Corps (2010) ‘Responsible and effective use of internet-based capabilities’, 29 March, < http://www.marines.mil/News/Messages/MessagesDisplay/tabid/13286/Article/128289/responsible-and-effective-use-of-internet-based-capabilities.aspx>.
- Weimann, Gabriel (2005) ‘How modern terrorism uses the internet’, Journal of International Security Affairs, Spring, < http://www.securityaffairs.org/issues/2005/08/weimann.php>
- Weinberger, Sharon (2007) ‘No more YouTube, MySpace for U.S. troops’, Danger Room, 13 May, < http://www.wired.com/dangerroom/2007/05/no_youtube_mysp/>, accessed 13 August 2012.
- Weldes, Jutta (1996) ‘Constructing national interests’, European Journal of International Relations, 2:3, 275–318.
- White House (2009) Cyberspace policy review: assuring a resilient information and communications infrastructure (Washington)