Bibliography
- Achberger, Brita, and Max Smeets. “The Opportunities and Challenges of Military Cyber Excercises.” Council on Foreign Relations: Net Politics (2022). https://www.cfr.org/blog/opportunities-and-challenges-military-cyber-exercises.
- Adviesraad Internationale Vraagstukken. “Digitale Oorlogvoering.” December 16, 2011. https://www.adviesraadinternationalevraagstukken.nl/documenten/publicaties/2011/12/16/digitale-oorlogvoering.
- Alatalu, Siim. “One Year after Warsaw: The Growing Need for a NATO Cyber Command.” 2017 International Conference on Cyber Conflict (CyCon U.S.), November 2017. doi:10.1109/cyconus.2017.8167513.
- Alberts, Jaco, and Harry Lensink. “Te Land, Ter Zee En Op Het Web; Profiel van Ons Cyberleger.” Vrij Nederland. 2014.
- Anonymous, “All about access: Inzichten en implicaties van MIVD-cyberoperaties voor digitale slagkracht,” Militaire Spectator. September 19, 2022.https://www.militairespectator.nl/thema/operaties-inlichtingen/artikel/all-about-access
- Baader Meika, Sophia. “Froebel and the Rise of Educational Theory in the United States.” Studies in Philosophy and Education 23, no. 5–6 (September 2004): 427–444. doi:10.1007/s11217-004-4453-0.
- Bentinck, Marc. “Why the Dutch Military Punches below Its Weight.” Carnegie Europe (2018). https://carnegieeurope.eu/strategiceurope/75484.
- Betz, David J, Tim Stevens, and International Institute For Strategic Studies London. Cyberspace and the State : Toward a Strategy for Cyber-Power. Abingdon: Routledge, 2011.
- Blessing, Jason. “The Diffusion of Cyber Forces: Military Innovation and the Dynamic Implementation of Cyber Force Structure Dynamic Implementation of Cyber Force Structure,” 2020. https://surface.syr.edu/cgi/viewcontent.cgi?article=2191&context=etd.
- Boeke, Sergei. “First Responder or Last Resort? The Role of the Ministry of Defence in National Cyber Crisis Management in Four European Countries.” Handle.net. Universiteit Leiden, September 2016. https://hdl.handle.net/1887/46615.
- Boeke, Sergei. “Hackers, Wiz Kids, En Offensieve Cyberoperaties: Uitdagingen Voor Het Defensie Cyber Commando.” Atlantisch Perspectief 42, no. 5 (2018): 27–30. https://www.jstor.org/stable/48581451#metadata_info_tab_contents.
- Boere, Raymond. “Leger Zoekt 150 Whizzkids Voor Cyber Commando.” AD (2013). https://www.ad.nl/binnenland/leger-zoekt-150-whizzkids-voor-cyber-commando~a2e242d5/?referrer=https%3A%2F%2Fwww.google.com%2F.
- Buchanan, Ben. The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations. New York: Oxford University Press, 2016.
- CCDCOE. “Cyber Defence Exercise Locked Shields 2013. After Action Report.” Ccdcoe org (2013). https://ccdcoe.org/library/publications/cyber-defence-exercise-locked-shields-2013-after-action-report/
- CCDCOE. “Locked Shields 2014 after Action Report,” 2014. https://ccdcoe.org/uploads/2018/10/LS14_After_Action_Report_Executive_Summary.pdf.
- CCDCOE. “Locked Shields.” Ccdcoe org (2022). https://ccdcoe.org/exercises/locked-shields/
- Chesney, Robert, and Max Smeets, eds. Deter, Disrupt, or Deceive: Assessing Cyber Conflict as an Intelligence Contest. Washington DC: Georgetown University Press, 2023.
- Clingendael Institute. “Ambitieniveau Defensie Op Droevig Dieptepunt.” Clingendael (2013). https://www.clingendael.org/nl/publicatie/ambitieniveau-defensie-op-droevig-dieptepunt
- Collier, Jamie. “Cyber Reserves Are Not a Silver Bullet.” War on the Rocks, May 22, 2020. https://warontherocks.com/2020/05/cyber-reserves-are-not-a-silver-bullet/.
- De, Telegraaf. “Militair Moet Zelf Pang-Pang Roepen.” De Telegraaf (2015). https://www.telegraaf.nl/nieuws/549324/militair-moet-zelf-pang-pang-roepen.
- Defensie, Ministerie van. “Defensie Cyber Strategie 2018 - Investeren in Digitale Slagkracht Nederland - Publicatie - Defensie.nl.” November 12, 2018. https://www.defensie.nl/downloads/publicaties/2018/11/12/defensie-cyber-strategie-2018.
- De Graaf, Patrick, and Jurjen Harskamp. “Reservisten En Cyberoperations: Schaarse Expertise Veiligstellen Voor Calamiteiten En Militaire Operaties.” March 6, 2012. https://www.militairespectator.nl/thema/cyberoperations/artikel/reservisten-en-cyberoperations.
- Ducheine, Paul. A. L., and K. Arnold. “Besluitvorming Bij Cyberoperaties.” Militaire Spectator 184 (2015). https://hdl.handle.net/11245/1.502386.
- Ducheine, Paul. and Kraesten Arnold. “Besluitvorming Bij Cyberoperaties.” February 20, 2015. https://www.militairespectator.nl/thema/recht-cyberoperations/artikel/besluitvorming-bij-cyberoperaties.
- Ducheine, Paul., Arnold, Kraesten, and B. M. J. Pijpers. Peter. “Decision-Making and Parliamentary Control for International Military (Cyber) Operations by the Netherlands Armed Forces.” Military Operations and the Notion of Control under International Law: 59–81. September 5, 2020. doi:10.1007/978-94-6265-395-5_5.
- Ducheine, Paul., B. M. J. Pijpers Peter, and Eric Pouw. “Information Manoeuvre and the Netherlands Armed Forces: Legal Challenges Ahead.” Papers.ssrn.com. Rochester, NY, May 18, 2022. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4113046.
- Egloff, Florian, and Max Smeets. “Publicly attributing cyber attacks: a framework.” Journal of Strategic Studies 46, no. 3 (2021): 502–533. doi:https://doi.org/10.1080/01402390.2021.1895117.
- Fischerkeller, Michael P., and Richard J. Harknett. “Persistent Engagement and Tacit Bargaining: A Path toward Constructing Norms in Cyberspace.” Lawfare, November 9, 2018. https://www.lawfareblog.com/persistent-engagement-and-tacit-bargaining-path-toward-constructing-norms-cyberspace.
- Fischerkeller, Michael P., and Richard J. Harknett. “Deterrence Is Not a Credible Strategy for Cyberspace.” Orbis 61, no. 3 (2017): 381–393. doi:10.1016/j.orbis.2017.05.003.
- Fogarty, Stephen G., and Jamie O. Nasi. “Special Operations Forces Truths — Cyber Truths.” The Cyber Defense Review 1, no. 2 (2016): 19–28. https://www.jstor.org/stable/26267355.
- Goldman, Emily O. “From Reaction to Action: Adopting a Competitive Posture in Cyber Diplomacy (Fall 2020).” Texas National Security Review (2020). doi:10.26153/tsw/10950.
- Harknett, Richard J. “United States Cyber Command’s New Vision: What It Entails and Why It Matters.” Lawfare, March 23, 2018. https://www.lawfareblog.com/united-states-cyber-commands-new-vision-what-it-entails-and-why-it-matters.
- Harknett, Richard J., and Michael P. Fischerkeller. “A Response on Persistent Engagement and Agreed Competition.” Lawfare, June 27, 2019. https://www.lawfareblog.com/response-persistent-engagement-and-agreed-competition.
- Harknett, Richard J., and Max Smeets. “Cyber Campaigns and Strategic Outcomes.” Journal of Strategic Studies 45, no. 4 (March 4, 2020): 534–567. doi:10.1080/01402390.2020.1732354.
- Healey, Jason. “The Implications of Persistent (and Permanent) Engagement in Cyberspace.” Journal of Cybersecurity, 5, no.1, January 1, 2019. 10.1093/cybsec/tyz008
- Jacobsen, Jeppe T. “Cyber Offense in NATO: Challenges and Opportunities.” International Affairs 97, no. 3 (March 31, 2021): 703–720. doi:10.1093/ia/iiab010.
- Jinghua, Lyu. “A Chinese Perspective on the Pentagon’s Cyber Strategy: From ‘Active Cyber Defense’ to ‘Defending Forward.’.” Carnegie Endowment for International Peace (2018). https://carnegieendowment.org/2018/10/19/chinese-perspective-on-pentagon-s-cyber-strategy-from-active-cyber-defense-to-defending-forward-pub-77540.
- Joyce, Rob. “Disrupting Nation State Hackers.” USENIX Enigma (2016). https://www.usenix.org/sites/default/files/conference/protected-files/engima2016_transcript_joyce_v2.pdf.
- Koninkrijksrelaties, Ministerie van Binnenlandse Zaken en. “Joint Sigint Cyber Unit AIVD En MIVD van Start - Nieuwsbericht - AIVD.” July 3, 2014. https://www.aivd.nl/actueel/nieuws/2014/07/03/joint-sigint-cyber-unit-aivd-en-mivd-van-start.
- Koninkrijksrelaties, Ministerie van Binnenlandse Zaken en. “Wet Op de Inlichtingen- En Veiligheidsdiensten 2017.” Wetten overheid nl (2017). https://wetten.overheid.nl/BWBR0039896/2022-05-01
- Koninkrijksrelaties, Ministerie van Binnenlandse Zaken en. “Uitvoeringswet Algemene Verordening Gegevensbescherming.” Wetten overheid nl (2018). https://wetten.overheid.nl/BWBR0040940/2018-05-25
- Libicki, Martin C., David Senty, Julia Pollak, and Rand Corporation. “H4cker5 Wanted: An Examination of the Cybersecurity Labor Market.” Library Catalog (Blacklight). Santa Monica, California: RAND Corporation, 2014. https://searchworks.stanford.edu/view/12974884
- Liebschner, Joachim. A Child’s Work : Freedom and Play in Froebel’s Educational Theory and Practice/Monograph. Cambridge, England: Lutterworth Press, 2006.
- Liff, Adam P. “Cyberwar: A New ‘Absolute Weapon’? The Proliferation of Cyberwarfare Capabilities and Interstate War.” Journal of Strategic Studies 35, no. 3 (June 2012): 401–428. doi:10.1080/01402390.2012.663252.
- Maarten. “Geloofwaardige Afschrikking in Het Cyberdomein?” January 19, 2021. https://www.militairespectator.nl/thema/cyberoperations-strategie/artikel/geloofwaardige-afschrikking-het-cyberdomein.
- Mills, Albert J., Gabrielle Durepos, and Elden Wiebe, eds. Exploratory Case Study - SAGE Research Methods. Methods sagepub.com, n.d. https://methods.sagepub.com/reference/encyc-of-case-study-research/n139.xml#:~:text=The%20exploratory%20case%20study%20investigates.
- Ministerie van Algemene Zaken. “Besluit van 6 Juli 2018 Als Bedoeld in Artikel 6, Eerste Lid, van de Wet Op de Inlichtingen- En Veiligheidsdiensten 2017 (Geïntegreerde Aanwijzing Inlichtingen En Veiligheid 2018–2022).” Zoek officielebekendmakingen nl (2018). https://zoek.officielebekendmakingen.nl/stcrt-2018-39232.html
- Ministerie van Defensie. “Defensie Cyber Strategie 2018 - Investeren in Digitale Slagkracht Nederland - Publicatie - Defensie.nl.” November 12, 2018. https://www.defensie.nl/downloads/publicaties/2018/11/12/defensie-cyber-strategie-2018#:~:text=Defensie.nl%20Downloads-.
- The Ministry of Defence. “The Defence Cyber Strategy,” 2012. https://www.itu.int/en/ITU-D/Cybersecurity/Documents/National_Strategies_Repository/Netherlands_2012_NDL-Cyber_StrategyEng.pdf.
- Ministry of Defense. “Opnieuw Extra Geld Voor Defensie in 2016 - 01 - Defensiekrant.” Magazines.defensie.nl, 2015. https://magazines.defensie.nl/defensiekrant/2015/18/01-prinsjesdag.
- Modderkolk, Huib. “Hackers AIVD Leverden Cruciaal Bewijs over Russische Inmenging in Amerikaanse Verkiezingen.” De Volkskrant, January 26, 2018. https://www.volkskrant.nl/nieuws-achtergrond/hackers-aivd-leverden-cruciaal-bewijs-over-russische-inmenging-in-amerikaanse-verkiezingen~b32c6077/.
- Nakasone, Paul. “A Cyber Force for Persistent Operations,” 2019. https://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-92/jfq-92_10-14_Nakasone.pdf.
- NATO. “Allied Joint Doctrine for Cyberspace Operations,” 2020. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/899678/doctrine_nato_cyberspace_operations_ajp_3_20_1_.pdf.
- NATO. “Brussels Summit Communiqué.” 2021. https://www.nato.int/cps/en/natohq/news_185000.htm
- Nederlandse Grondwet, De. “Artikel 97: Krijgsmacht - Nederlandse Grondwet.” Accessed September 21, 2022. https://www.denederlandsegrondwet.nl/id/via0fzbuo6zv/artikel_97_krijgsmacht.
- NOS. “Te Weinig Mensen Willen Hacken Voor Het Vaderland.” Nos.nl, December 1, 2016. https://nos.nl/artikel/2146002-te-weinig-mensen-willen-hacken-voor-het-vaderland.
- Odell, Mark. “How Dutch Security Service Caught Alleged Russian Spies.” Financial Times, October 4, 2018. https://www.ft.com/content/b1fb5240-c7db-11e8-ba8f-ee390057b8c9.
- Pattison, James. “From Defence to Offence: The Ethics of Private Cybersecurity.” European Journal of International Security 5, no. 2: 233–254. (May 19, 2020). doi:10.1017/eis.2020.6.
- Pijpers, Peter, and Michael Smits. “Persistent Engagement: De Nieuwe Cyberstrategie Voor Nederland?” February 17, 2022. https://www.militairespectator.nl/thema/cyberoperations/artikel/persistent-engagement.
- Rid, Thomas. “Cyber War Will Not Take Place.” Journal of Strategic Studies 35, no. 1 (February 2012): 5–32. doi:10.1080/01402390.2011.608939.
- Rosen, Stephen Peter. Winning the next War. Ithaca: Cornell University Press, 1991.
- Rovner, Joshua. “Warfighting in Cyberspace.” War on the Rocks. March 17, 2021.https://warontherocks.com/2021/03/warfighting-in-cyberspace/
- RTL Nieuws. “Hennis: Grappen over ‘Pang Pang’ Vernietigend,” August 14, 2015. https://www.rtlnieuws.nl/nieuws/nederland/artikel/1022381/hennis-grappen-over-pang-pang-vernietigend.
- Schramade, Krijn. “Defensiebudget Historisch Laag.” Follow the Money - Platform Voor Onderzoeksjournalistiek, September 30, 2013. https://www.ftm.nl/artikelen/defensiebudget-historisch-laag.
- SIPRI. “SIPRI Military Expenditure Database.” Sipri org (2018). https://www.sipri.org/databases/milex
- Smeets, Max. “Building a Cyber Force Is Even Harder than You Thought.” War on the Rocks, May 12, 2022. https://warontherocks.com/2022/05/building-a-cyber-force-is-even-harder-than-you-thought/.
- Smeets, Max. “Cyber Arms Transfer: Meaning, Limits, and Implications.” Security Studies 31, no. 1 (February 23, 2022): 65–91. doi:10.1080/09636412.2022.2041081.
- Smeets, Max. No Shortcuts: Why States Struggle to Develop a Military Cyber-Force. New York: Oxford University Press, 2022.
- Smeets, Max. The Role of Military Cyber Exercises: A Case Study of Locked Shields. 2022 14th International Conference on Cyber Conflict. Tallinn, Estonia.
- Striek, Peter. “Meer Geld? Defensie Krijgt Juist Nog Veel Minder Geld.” De Volkskrant, 2014. http://www.volkskrant.nl/binnenland/-meer-geld-defensie-krijgt-juist-nog-veel-minder-geld~a3755100/.
- Thales. “Thales to Build ‘Cyber Range’, a Cybersecurity Training and Testing Facility for the Dutch Defence Cyber Command.” Thales Group (2016). https://www.thalesgroup.com/en/worldwide/press-release/thales-build-cyber-range-cybersecurity-training-and-testing-facility-dutch
- Turgenev, Ivan Sergeevich. Virgin Soil. New York: New York Review Books, 2000. Translated by Constance Garnett.
- Tweede Kamer der Staten Generaal. “Vaststelling Begroting van Het Ministerie van Defensie (X) Voor 2000; Verslag Houdende Een Lijst van Vragen En Antwoorden.” NDFR (2000). https://www.ndfr.nl/content/kst-26800-X-12
- Tweede Kamer der Staten-Generaal. “Brief Regering; Nadere Toelichting Op de Inzetgereedheidsnorm van de Nationale Reserve (Natres) En Voortgang Aanstelling Cyberreservisten - Vaststelling van de Begrotingsstaten van Het Ministerie van Defensie (X) Voor Het Jaar 2016 - Parlementaire Monitor.” (2016). https://www.parlementairemonitor.nl/9353000/1/j9vvij5epmj1ey0/vk5hbdtr32ye
- Tweede Kamer der Staten-Generaal. “Initiatiefnota van Het Lid van Den Bosch over Een Ambitieus Reservistenbeleid.” (2019). https://www.tweedekamer.nl/kamerstukken/brieven_regering/detail?id=2019D02204&did=2019D02204
- Tweede Kamer der Staten-Generaal “Pilot Cyberreservisten.” 2019. https://www.tweedekamer.nl/kamerstukken/brieven_regering/detail?id=2019Z20386&did=2019D42637.
- U.S. Cyber Command. “Achieve and Maintain Cyberspace Superiority: Command Vision for US Cyber Command,” 2018. https://s3.documentcloud.org/documents/4419681/Command-Vision-for-USCYBERCOM-23-Mar-18.pdf.
- U.S. Cyber Command. “Hunt Forward.” 2022. https://www.cybercom.mil/Media/News/Tag/182880/hunt-forward/
- U.S. Government. “The F-35 Lightning II,” http://www.jsf.mil/;.
- Van Hooren, Jonas. “The Imperative Symbiotic Relationship Between SOF and Cyber: How Dutch Special operation Forces Can Support Cyber Operations.” 2019. https://upload.wikimedia.org/wikipedia/commons/0/06/THE_IMPERATIVE_SYMBIOTIC_RELATIONSHIP_BETWEEN_SOF_AND_CYBER-_HOW_DUTCH_SPECIAL_OPERATION_FORCES_CAN_SUPPORT_CYBER_OPERATIONS_%28IA_theimperativesym1094564086%29.pdf.
- van Lonkhuyzen, Liza, and Kees Versteegh. “‘Cyberleger’ Moet Inbrekers Afschrikken.” NRC (2018). https://www.nrc.nl/nieuws/2018/11/13/cyberleger-moet-inbrekers-afschrikken-a2754956.
- van Rosenthal, Eelco Bosch. “Dutch Intelligence First to Alert U.S. About Russian Hack of Democratic Party.” Nos.nl, January 25, 2018. https://nos.nl/nieuwsuur/artikel/2213767-dutch-intelligence-first-to-alert-u-s-about-russian-hack-of-democratic-party.
- Wiltjer, Davidson. “Cyber Commando Voor Het Eerst Op Missie.” Algemeen Nederlands Persbureau (2017).
- Yin, Robert K. “Case Study Evaluations: A Decade of Progress?” New Directions for Evaluation.” New Directions for Evaluation 1997, no. 76 (1997): 69–78. September 1997. doi:10.1002/ev.1088.
- Yin, Robert K. Applications of Case Study Research. 3rd ed. Los Angeles: Sage, 2011.
- Zaken, Ministerie van Algemene. “Antwoord Op Kamervragen over de Vaststelling van de Begrotingsstaten van Het Ministerie van Defensie (X) Voor Het Jaar 2022 - Kamerstuk - Rijksoverheid.nl.” October 22, 2021. https://www.rijksoverheid.nl/documenten/kamerstukken/2021/10/22/beantwoording-feitelijke-vragen-over-de-vaststelling-van-de-begrotingsstaten-van-het-ministerie-van-defensie-x-voor-het-jaar-2022.
- Zetter, Kim, and Huib Modderkolk. “Revealed: How a Secret Dutch Mole Aided the U.S.-Israeli Stuxnet Cyberattack on Iran.” Yahoo! News (2019). https://news.yahoo.com/revealed-how-a-secret-dutch-mole-aided-the-us-israeli-stuxnet-cyber-attack-on-iran-160026018.html?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAAB9FYBRbzUyjZPF6_6WWXIqu-Kc2FgxENlkBD8dk67Js7Ki-2rQcYTmtXWbHENQ_fGWkmPPwP84ffcl4VwiGCzN3yssvjeIwawlVNyNATcbhqCMkl4IyLdyN-0eft0UPIDu1d4Jz8EEni60MQVAVRpAJkbBNoiuZ1KgNZfaRH1ul.