References
- Acton, J., 2012. Bombs away? Being realistic about deep nuclear reductions. The Washington quarterly, 35 (2), 37–53. doi: 10.1080/0163660X.2012.665786
- Andres, J. and Winterfield, S., 2011. Cyber warfare: techniques, tactics and tools for security practitioners. Waltham MA: Syngress.
- Arbatov, A., 16 June 2015. An unnoticed crisis: the end of history for nuclear arms control? [online]. Carnegie Moscow Center. Available from: http://carnegie.ru/2015/06/16/unnoticed-crisis-end-of-history-for-nuclear-arms-control/ians [Accessed 1 Aug 2015].
- Austin, G., 6 Aug 2015. Cost of American cyber-superiority. ChinaUSFocus [online]. Available from: http://www.chinausfocus.com/peace-security/costs-of-american-cyber-superiority/ [Accessed 10 Aug 2015].
- Bender, B., 2015. Russia ends nuclear security alliance. Boston Globe, 19 Jan. Available from: https://www.bostonglobe.com/news/nation/2015/01/19/after-two-decades-russia-nuclear-security-cooperation-becomes-casualty-deteriorating-relations/5nh8NbtjitUE8UqVWFIooL/story.html [Accessed 14 Oct 2015].
- Berls, B. and Ratz, L., 2015. RisiNuclear dangers: assessing the risk of nuclear use in the Euro-Atlantic region [online]. Nuclear Threat Initiative. Available from: http://www.nti.org/media/pdfs/NTI_Rising_Nuclear_Dangers_Paper_FINAL.pdf?_=1443443566 [Accessed 16 Oct 2015].
- Blair B., 2010. Could terrorists launch America's nuclear missiles? TIME, 11 Nov. Available from: http://content.time.com/time/nation/article/0,8599,2030685,00.html [Accessed 25 May 2015].
- Blair, B., 2014. Lowering the nuclear threshold: the dangerous evolution of world nuclear arsenals toward far-flung dispersal, hair-trigger launch readiness, and first use doctrines. Remarks given at the Vienna conference on the Humanitarian Impact of Nuclear Weapons, 8–9 December, Vienna, Austria. Available from: http://www.thesimonsfoundation.ca/sites/all/files/Presentation%20by%20Bruce%20Blair%20at%20the%20Vienna%20Conference%20on%20the%20Humanitarian%20Impact%20of%20Nuclear%20Weapons,%20Dec%208,%202014.pdf [Accessed 8 May 2015].
- Blakely, R. and Coghlan, T., 2015. US considers sending missiles to Europe. The Times, 6 June. Available from: http://www.thetimes.co.uk/tto/news/world/europe/article4461950.ece [Accessed 20 June 2015].
- Burns, R., 2015. Former US commander: take nuclear missiles off high alert. Associated Press, 29 Apr. Available from: http://hosted2.ap.org/APDEFAULT/89ae8247abe8493fae24405546e9a1aa/Article_2015-04-29-US-Nuclear-Weapons-Cyber/id-83b7c14d6f504aa2ad2f88b00f7ad5b6 [Accessed 2 May 2015].
- Charles, D., 2013. US homeland chief: cyber 9/11 could happen ‘imminently’. Reuters, 24 Jan. Available from: http://www.reuters.com/article/2013/01/24/us-usa-cyber-threat-idUSBRE90N1A320130124 [Accessed 15 Oct 2015].
- China, the Russian Federation, Tajikistan and Uzbekistan, 2011. Developments in the field of information and telecommunications in the context of international security. Letter dated 12 September from the Permanent Representatives of China, the Russian Federation, Tajikistan and Uzbekistan to the United Nations addressed to the Secretary General, A/66/359. Available from: https://ccdcoe.org/sites/default/files/documents/UN-110912-CodeOfConduct_0.pdf [Accessed 18 May 2015].
- Cimbala, S. and McDermott, R., 2015. A new Cold War? Missile defenses, nuclear arms reductions and cyber war. Comparative strategy, 34 (1), 95–111. doi: 10.1080/01495933.2015.994405
- Clinton, B. and Yeltsin, B., 14 Jan 1994. Clinton, Yeltsin reaffirm importance of joint cooperation [online]. Federation of American Scientists. Available from: http://fas.org/nuke/control/detarget/docs/940114-321186.htm [Accessed 15 May 2015].
- Cornwall, H., 1986. Hackers handbook. New York: Arthur Brown Company.
- Danzig, R., 2014. Surviving on a diet on poisoned fruit: reducing the national security risks of America's cyber dependencies [online]. Center for a New American Century. Available from: http://www.cnas.org/sites/default/files/publicationspdf/CNAS_PoisonedFruit_Danzig_0.pdf [Accessed 2 May 2015].
- Deep Cuts Commission, 2015. Strengthening stability in turbulent times [online]. Second Report of the Deep Cuts Commission. Available from: http://deepcuts.org/images/PDF/Second_Report_of_the_Deep_Cuts_Commission_English.pdf [Accessed 15 June 2015].
- Ewing, P., 2015a. Ash Carter warns Russia on nukes. Politico, 23 Feb. Available from: http://www.politico.com/story/2015/02/ash-carter-russia-vladimir-putin-defense115421.html [Accessed 25 May 2015].
- Ewing, P., 2015b. The Pentagon's new cyber attack plan: ‘blunt force trauma’. Politico, 18 Apr. Available from: http://www.politico.com/story/2015/04/dod-hopes-cyber-can-create-blunt-force-trauma-117095.html [Accessed 10 May 2015].
- Farnsworth, T., 2013. Study sees cyber risk for US arsenal. Arms Control Today, Apr. Available from: https://www.armscontrol.org/act/2013_04/Study-Sees-Cyber-Risk-for-US-Arsenal [Accessed 16 Apr 2015].
- Fidler, D., 26 Mar 2015. The relationship between the biological weapons convention and cybersecurity [online]. Council on Foreign Relations Net Politics Blog. Available from: http://blogs.cfr.org/cyber/2015/03/26/the-relationship-between-the-biological-weapons-convention-and-cybersecurity/ [Accessed 2 Aug 2015].
- Ford, C.A., 2010. The trouble with cyber arms control. The new Atlantis, 29 (Fall), 52–67. Available from: http://www.thenewatlantis.com/docLib/20110301_TNA29Ford.pdf [Accessed 4 July 2015].
- Fritz, J., 2009. Hacking nuclear command and control [online]. International Commission on Nuclear Non-proliferation and disarmament. Available from: www.icnnd.org/Documents/Jason_Fritz_Hacking_NC2.doc [Accessed 5 Jan 2015].
- Fulghum, D., 12 Nov 2013. Why Syria's air defenses failed to detect Israeli's [online]. Aviation Week & Space Technology. Available from: http://www.imra.org.il/story.php3?id=36291 [Accessed 20 May 2015].
- Futter, A.J., 2015a. Hacking the bomb: nuclear weapons in the cyber age. Paper presented at the International Studies Annual Conference, 23–27 February, New Orleans. Available from: https://www2.le.ac.uk/departments/politics/people/afutter/copy_of_AFutterHackingtheBombISAPaper2015.pdf [Accessed 5 May 2015].
- Futter, A.J., 15 June 2015b. Cyber threats and the challenges of de-alerting US and Russian nuclear forces [online]. Nautilus Institute NAPSNet Policy Forum. http://nautilus.org/napsnet/napsnet-policy-forum/cyber-threats-and-the-challenge-of-de-alerting-us-and-russian-nuclear-forces/ [Accessed 15 June 2015 ].
- Futter, A.J. and Williams, H.W., forthcoming. Questioning the Holy Trinity: why the US nuclear triad still makes sense. Comparative Strategy.
- Futter, A.J. and Zala, B.P., 2013. Advanced US conventional weapons and nuclear abolition: why the Obama plan wont work. The nonproliferation review, 20 (1), 107–122. doi: 10.1080/10736700.2012.761790
- Gady, F-S., 2015. Could cyber attacks lead to nuclear war? The Diplomat, 4 May. Available from: http://thediplomat.com/2015/05/could-cyber-attacks-lead-to-nuclear-war/ [Accessed 10 May 2015].
- Geers, K., 2010. Cyber weapons convention. Computer law & security review, 26 (5), 547–551. doi: 10.1016/j.clsr.2010.07.005
- Global Zero Commission on Nuclear Risk Reduction, 2015. De-alerting and stabilizing the world's nuclear force postures. Available from: http://www.globalzero.org/files/global_zero_commission_on_nuclear_risk_reduction_report_0.pdf [Accessed 4 May 2015].
- Goldsmith, J., 2011. Cybersecurity treaties: a skeptical view [online]. Koret-taube task force on national security and law, Hoover Institution, Stanford University. Available from: http://www.hoover.org/sites/default/files/research/docs/futurechallenges_goldsmith.pdf [Accessed 13 June 2015].
- Gompert, D. and Libicki, M., 2014. Cyber warfare and Sino-American crisis instability. Survival, 56 (4), 7–22. doi: 10.1080/00396338.2014.941543
- Hayes, P., 17 Feb 2015. Nuclear command-and-control in the Millenials era [online]. Nautilus Institute NAPSNet Special Reports. Available from: http://nautilus.org/napsnet/napsnet-special-reports/nuclear-command-and-control-in-the-millenials-era/ [Accessed 12 Apr 2015].
- Huessy, P., 2015. Want stability? Fund nuke triad modernization. Breaking Defense, 23 Feb. Available from: http://breakingdefense.com/2015/02/want-stability-fund-nuke-triad-modernization/ [Accessed 8 Apr 2015].
- Keck, Z., 2014. S. Korea seeks cyber weapons to target North Korea's nukes. The Diplomat, 21 Feb. Available from: http://thediplomat.com/2014/02/s-korea-seeks-cyber-weapons-to-target-north-koreas-nukes/ [Accessed 10 June 2015].
- Koebler, J., 2012. US nukes face up to 10 million cyber attacks daily. USNews, 20 Mar. Available at: http://www.usnews.com/news/articles/2012/03/20/us-nukes-face-up-to-10-million-cyber-attacks-daily [Accessed 15 Oct 2015].
- Krickovic, A. and Weber, Y., 30 Sept 2015. Why a new Cold War with Russia is inevitable [online]. Brookings Institution. Available from: http://www.brookings.edu/blogs/order-from-chaos/posts/2015/09/30-new-cold-war-with-russia-krickovic-weber [Accessed 16 Oct 2015].
- Kristensen, H. and McKinzie, M., 2012. Reducing alert rates of nuclear weapons [online]. United Nations Institute for Disarmament Research, Geneva. Available from: http://www.unidir.org/files/publications/pdfs/reducing-alert-rates-of-nuclear-weapons-400.pdf [Accessed 15 July 2015].
- Kulikova, A., 2015. Is a cyber arms race between the US and Russia possible? Russia Direct, 28 Jan. Available from: http://www.russia-direct.org/analysis/cyber-arms-race-between-us-and-russia-possible [Accessed 5 July 2015].
- Lamothe, D., 2014. Air Force swears: our nuke launch code was never ‘00000000’. Foreign Policy, 21 Jan. Available from: http://foreignpolicy.com/2014/01/21/air-force-swears-our-nuke-launch-code-was-never-00000000/ [Accessed 28 May 2015].
- Lewis, P., et al., 28 Apr 2014. Too close for comfort: cases of near nuclear use and options for policy. Chatham House Report. Available at: https://www.chathamhouse.org/publications/papers/view/199200 [Accessed 14 Oct 2014].
- Libicki, M., 2007. Conquest in cyberspace: national security and information war. New York: Cambridge University Press.
- Libicki, M., 2012. Crisis and escalation in cyberspace. Santa Monica CA: The RAND Corporation.
- Mearsheimer, J., 2014. Why the Ukraine crisis is the west's fault. Foreign affairs, 93 (5), 77–89.
- Mecklin, J., 2015. Disarm and modernize. Foreign Policy, 24 Mar. Available from: http://foreignpolicy.com/2015/03/24/disarm-and-modernize-nuclear-weapons-warheads/ [Accessed 27 Apr 2015].
- Nakashima, E., 2011. Cyber-intruder sparks response debate. The Washington Post, 8 Dec. Available from: http://www.washingtonpost.com/national/national-security/cyber-intruder-sparks-response-debate/2011/12/06/gIQAxLuFgO_story.html [Accessed 10 May 2015].
- Nakashima, E., 2013. US and Russia sign pact to create communication link on cyber security. The Washington Post, 17 June. Available from: https://www.washingtonpost.com/world/national-security/us-and-russia-sign-pact-to-create-communication-link-on-cyber-security/2013/06/17/ca57ea04-d788-11e2-9df4-895344c13c30_story.html [Accessed 9 June 2015].
- Obama, B., 2008. Q and A with President-elect Barack Obama. Arms Control Today, Dec. Available from: http://legacy.armscontrol.org/2008election [Accessed 10 June 2015].
- Osborn, K., 2015. Russia's satellite nuclear warning system down until November. Defense Tech, 20 June. Available from: http://defensetech.org/2015/06/30/russias-satellite-nuclear-warning-system-down-until-november/. [Accessed 5 Aug 2015].
- Panetta, L., 11 Oct 2012. Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security. New York City. Available at: http://archive.defense.gov/transcripts/transcript.aspx?transcriptid=5136. [Accessed 15 Oct 2015].
- Peczeli, A., 2014. Negotiated cuts: a new nuclear weapons treaty is not the only option. Bulletin of the Atomic Scientists, 27 Jan. Available from: http://thebulletin.org/negotiated-cuts-new-nuclear-weapons-treaty-not-only-option. [Accessed 3 June 2015].
- Ploughshares Fund, 23 June 2015. World nuclear weapon stockpile. Available from: http://www.ploughshares.org/world-nuclear-stockpile-report [Accessed 1 Aug 2015].
- Reed, J., 2012. Keeping our nukes safe from cyber attack. Foreign Policy, 25 Sept. Available from: http://foreignpolicy.com/2012/09/25/keeping-nukes-safe-from-cyber-attack/ [Accessed 15 Apr 2015].
- Remnick, D., 2014. Watching the eclipse. The New Yorker, 11 Aug. Available from: http://www.newyorker.com/magazine/2014/08/11/watching-eclipse [Accessed 23 May 2015].
- Rodriguez, S., 2015. US tried, failed to sabotage North Korea nuclear weapons program with Stuxnet-style cyber attack. International Business Times, 29 May. Available from: http://www.ibtimes.com/us-tried-failed-sabotage-north-korea-nuclear-weapons-program-stuxnet-style-cyber-1945012 [Accessed 3 July 2015].
- Rose, F., 5 Feb 2015. Four years in, the New START Treaty still works [online]. DipNote, the US Department of State Official Blog. Available from: https://blogs.state.gov/stories/2015/02/05/four-years-new-start-treaty-still-works. [Accessed 20 July 2015].
- Russia Today, 2013. US nuclear weapons researchers targeted with Internet Explorer virus. Russia Today, 7 May. Available from: http://rt.com/usa/attack-department-nuclear-internet-955/ [Accessed 12 May 2015].
- Russia Today, 2014. Cyber security units to protect Russia's nuclear weapons stockpiles. Russia Today, 17 Oct. Available from: http://rt.com/news/196720-russia-missile-forces-cybersecurity/ [Accessed 4 June 2015].
- Schlosser, E., 2013a. Command and control. London: Allen Lane.
- Schlosser, E., 2013b. Neglecting our nukes. Politico, 16 Sept. Available from: http://www.politico.com/story/2013/09/neglecting-our-nukes-96854.html [Accessed 14 May 2015].
- Shapiro, J.S., 2015. Russian bomber flights buzzing US airspace doubled last year. The Washington Times, 8 June. Available from: http://www.washingtontimes.com/news/2015/jun/7/russian-bomber-flights-buzzing-us-airspace-doubled/?page=all [Accessed 23 May 2015].
- Sheridan, M.B., 2010. START expiration ends US inspection of Russian nuclear bases. The Washington Post, 17 Aug. Available from: http://www.washingtonpost.com/wp-dyn/content/article/2010/08/16/AR2010081605422.html [Accessed 28 May 2015].
- Shultz, S. and Drell, S., eds., 2012. The nuclear enterprise: high consequence accidents: how to enhance safety and minimize risks in nuclear weapons and reactors. Stanford CA: Hoover Institution Press.
- Simes, D., 2007. Losing Russia: the costs of renewed confrontation. Foreign affairs, 86 (2), 36–52.
- Singer, P. and Friedman, A., 2014. Cybersecurity and cyberwar: what everyone needs to know. Oxford: Oxford University Press.
- Sokov, S. and Pomper, M., 2014. Is Russia violating the INF Treaty? The National Interest, 11 Feb. Available from: http://nationalinterest.org/commentary/russia-violating-the-inf-treaty-9859 [Accessed 3 June 2015].
- Sputnik News, 19 Aug 2015. Revealed: Russia's new ambitious new ICBM early warning system. Available from: http://sputniknews.com/russia/20150819/1025927540/russia-nuclear-early-warning-system-development.html#ixzz3jGfJCHj3 [Accessed 14 Oct 2015].
- Ullman, G., 2015. Cybersecurity a rising concern in protecting nuclear stockpile. Fedscoop, 10 June. Available from: http://fedscoop.com/cybersecurity-a-mounting-concern-in-protecting-u-s-nuclear-stockpile [Accessed 15 June 2015].
- United States Department of Defense, 2013. Task force report: resilient military systems and the advanced cyber threat [online]. US Defense Science Board. Available from: http://www.acq.osd.mil/dsb/reports/ResilientMilitarySystems.CyberThreat.pdf [Accessed 10 Jan 2015].
- Weitz, R., 2015. New technologies complicate US-Russia-China arms control. World Politics Review, 28 Apr. Available at: http://www.worldpoliticsreview.com/articles/15635/new-technologies-complicate-u-s-russia-china-arms-control [Accessed 6 June 2015].
- Withnall, A., 2015. Vladimir Putin says Russia was preparing to use nuclear weapons ‘if necessary’ and blames US for Ukraine crisis. The Independent, 15 Mar. Available from: http://www.independent.co.uk/news/world/europe/vladimir-putin-says-russia-was-preparing-to-use-nuclear-weapons-if-necessary-and-blames-us-for-ukraine-crisis-in-crimea-documentary-10109615.html [Accessed 5 Apr 2015].
- Wolfsthal, J.B., Lewis, J., and Quint, M., 2014. The trillion dollar nuclear triad [online]. James Martin Center for Nonproliferation Studies, Monterey, California. Available from: http://cns.miis.edu/opapers/pdfs/140107_trillion_dollar_nuclear_triad.pdf [Accessed 23 Feb 2015].
- Yadron, D. and Valentino-Devries, J., 2015. This article was written with the help of a ‘cyber’ machine: overuse of prefix sparks backlash, but alternatives are few; ‘computery’. The Wall Street Journal, 4 Mar. Available from: http://www.wsj.com/articles/is-the-prefix-cyber-overused-1425427767 [Accessed 6 May 2015].
- Zetter, K., 2014. Countdown to zero day: Stuxnet and the launch of the world's first digital weapon. New York: Crown Publishers.