References list
- Allen, F. J. (2001). CN(Eh?) - A recommendation for the CF to adopt computer network exploitation and attack capabilities (Thesis). Canadian Forces College, Toronto.
- Barrett, T. E. (2013). Warfare in a new domain: The ethics of military cyber-operations. Journal of Military Ethics, 12, 4–17. doi: 10.1080/15027570.2013.782633
- Belk, R., & Noyes, M. (2012). On the use of offensive cyber capabilities: A policy analysis on offensive US cyber policy. Boston: Harvard Kennedy School of Government.
- Bendiek, A., & Metzger, T. (2015). Deterrence theory in the cyber-century lessons from a state-of-the-art literature review (Working Paper). Berlin: German Institute for International and Security Affairs.
- Bernier, M., & Treurniet, J. (2010). Understanding cyber operations in a Canadian strategic context: More than C4ISR, more than CNO. Paper presented at the Conference on Cyber Conflict, Tallinn, Estonia.
- Brenner, J. F. (2013). Eyes wide shut: The growing threat of cyber attacks on industrial control systems. Bulletin of the Atomic Scientists, 69(5), 15–20. doi: 10.1177/0096340213501372
- Buchanan, B. (2017). The cyber security dilemma: Hacking, trust and fear between nations. Oxford: Oxford University Press.
- Cattaruzza, A., & Danet, D. (2014). La Cyberdéfense. Quel territoire, quel droit? Paris: Economica.
- Cattaruzza, A., Daniet, D., & Taillat, S. (2018). La Cyberdéfense. Politique de l’espace numérique. Paris: Armand Collin.
- Claver, A. (2018). Governance of cyber warfare in the Netherlands: An exploratory investigation. The International Journal of Intelligence, Security and Public Affairs, 20, 155–180. doi: 10.1080/23800992.2018.1484235
- Connell, M., & Vogler, S. (2017). Russia’s approach to cyber warfare. Retrieved from http://www.dtic.mil/dtic/tr/fulltext/u2/1019062.pdf
- Corera, G. (2017). GCHQ cyber-spies ‘over-achieved’ say MPs. BBC. Retrieved from https://www.bbc.com/news/technology-42425960
- Council of Europe. (2001). Convention on cybercrime. Retrieved from https://rm.coe.int/CoERMPublicCommonSearchServices/DisplayDCTMContent?documentId=0900001680081561
- Council of Europe. (2018). Chart of signatures and ratifications of treaty 185. Retrieved from https://www.coe.int/en/web/conventions/full-list//conventions/treaty/185/signatures?p_auth=vFhr6vmR
- Coyle, J. (2015). Russia has complete information dominance in Ukraine. Atlantic Council. Retrieved from http://www.atlanticcouncil.org/blogs/ukrainealert/russia-has-complete-informational-dominance-in-ukraine
- Deibert, R. (2013). Canada and the challenge of cyberspace governance and security. Calgary: University of Calgary School of Public Policy.
- Department of Defense. (2013). Joint publication 3-12: Cyberspace operations. Retrieved from https://fas.org/irp/doddir/dod/jp3_12r.pdf
- Department of Defense. (2015). The DoD cyber strategy. Retrieved from http://archive.defense.gov/home/features/2015/0415_cyber-strategy/final_2015_dod_cyber_strategy_for_web.pdf
- Department of Defense. (2016). Joint publication 1-02: Department of defense dictionary of military and associated terms. Retrieved from https://fas.org/irp/doddir/dod/jp1_02.pdf
- Dittrich, D. (2008). On the development of computer network attack capabilities. Washington, DC: National Research Council.
- Edelman, E., et al. (2018). Providing for the common defence: The assessment and recommendations of the national defence strategy commission. Washington, DC: United States Institute of Peace.
- Fasana, K. G. (2018). Another manifestation of cyber conflict: Attaining military objectives through cyber avenues of approach. Defence Studies, 18, 167–187. doi: 10.1080/14702436.2018.1462661
- Fireeye iSight Intelligence. (2017). APT28: At the centre of the storm: Russia strategically evolves its cyber operations. Retrieved from https://www.fireeye.com/blog/threat-research/2017/01/apt28_at_the_center.html
- Gavin, F. (2017). Crisis instability and preemption: The 1914 railroad analogy. In G. Perkovich, & A. E. Levite (Eds.), Understanding cyber conflict: Fourteen analogies (pp. 111–122). Washington, DC: Georgetown University Press.
- Gompert, D., & Libicki, M. (2015). Cyber warfare and sino-American crisis instability. Survival, 56(4), 7–22. doi: 10.1080/00396338.2014.941543
- Greenberg, A. (2017). Hackers gain direct access to US power grid controls. Wired. Retrieved from https://www.wired.com/story/hackers-gain-switch-flipping-access-to-us-power-systems /
- Greenberg, A. (2018a). The untold story of notPetya, the most devastating cyberattack in history. Wired. Retrieved from https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world /
- Greenberg, A. (2018b). The white house blames Russia for notPetya, the “most costly cyberattack in history”. Wired. Retrieved from https://www.wired.com/story/white-house-russia-notpetya-attribution /
- Hanson, F., & Uren, T. (2018). Policy brief: Australia’s offensive cyber capability. Retrieved from https://www.aspi.org.au/report/australias-offensive-cyber-capability
- Hare, F. (2018). Precision cyber weapon systems: An important component of a responsible national security strategy? Contemporary Security Policy.
- Intelligence and Security Committee of Parliament. (2017). Annual report 2016–2017. London. Retrieved from http://isc.independent.gov.uk/committee-reports/annual-reports
- Kaplan, F. (2017). Dark territory: The secret history of cyber war. New York: Simon & Schuster.
- Kello, L. (2013). The meaning of the cyber revolution: Perils to theory and statecraft. International Security, 38, 7–40. doi: 10.1162/ISEC_a_00138
- Kello, L. (2017). The virtual weapon and international order. New Haven, CT: Yale University Press.
- Kostyuk, N., & Zhukov, Y. M. (2019). Invisible digital front: Can cyber attacks shape battlefield events? Journal of Conflict Resolution, 63(2), 317–347. doi: 10.1177/0022002717737138
- Kugler, R. (2009). Deterrence of cyber attacks. In F. D. Kramer et al (Ed.), Cyberpower and national security. Dulles: National Defense University Press and Potomac Books, Inc. chapter 13. https://ndupress.ndu.edu/Portals/68/Documents/Books/CTBSP-Exports/Cyberpower/Cyberpower-I-Chap-13.pdf?ver=2017-06-16-115053-773
- Levin, A. (2013). Securing cyberspace: A comparative review of strategies worldwide. Toronto, ON: Privacy and Cyber Crime Institute, Ryerson University.
- Lewis, A. J. (2015). The Tallinn papers: The role of offensive cyber operations in NATO’s collective defence. Retrieved from https://ccdcoe.org/multimedia/role-offensive-cyber-operations-natos-collective-defence.html
- Lewis, A. J., & Katrina, T. (2011). Cybersecurity and cyberwarfare: Preliminary assessment of national doctrine and organisation. Washington, DC: Centre for Strategic and International Studies.
- Libicki, M. (2009). Cyberdeterrence and cyberwar. RAND Corporation. Washington, DC. Retrieved from http://www.rand.org/pubs/monographs/MG877.html
- Liff, A. (2012). Cyberwar: A new “absolute weapons”? The proliferation of cyberwarfare capabilities and interstate war. Journal of Strategic Studies, 35, 401–428. doi: 10.1080/01402390.2012.663252
- Lindsay, J. (2015). Tipping the scales: The attribution problem and the feasibility of deterrence against cyberattack. Journal of Cybersecurity, 1(1), 53–67.
- Long, A. (2016). A cyber SIOP? Operational considerations for strategic offensive cyber planning. Journal of Cyber Security, 3(1), 19–28. doi: 10.1093/cybsec/tyw016
- Lonsdale, D. J. (2016). Britain’s emerging cyber-strategy. The RUSI Journal, 161, 52–62. doi: 10.1080/03071847.2016.1232880
- Maley, P. (2018). Australia’s world-class cyber warriors take the fight to Islamic state. The Australian. Retrieved from https://www.theaustralian.com.au/national-affairs/defence/australias-worldclass-cyber-warriors-take-the-fight-to-islamic-state/news-story/1c4d7c17c3cbc7435ad316077974ec59
- Maurer, T. (2011). Cyber norm emergence at the United Nations: An analysis of the activities at the UN regarding cyber-security. Boston, MA: The Belfer Center for Science and International Affairs.
- Mazzetti, M., & Benner, K. (2018). 12 Russian agents indicted in mueller investigation. New York Times. Retrieved from https://www.nytimes.com/2018/07/13/us/politics/mueller-indictment-russian-intelligence-hacking.html
- Modderkolk, H. (2018). Hackers AIVD leverden cruciaal bewijs over Russische inmenging in Amerikaanse Verkiezingen. De Volkskrant. Retrieved from https://www.volkskrant.nl/nieuws-achtergrond/hackers-aivd-leverden-cruciaal-bewijs-over-russische-inmenging-in-amerikaanse-verkiezingen~b32c6077/
- Nakasone, P. M. (2019). A cyber force for persistent operations. Joint Forces Quarterly, 92, 10–14.
- Osawa, J. (2017). The escalation of state sponsored cyberattack and cyber security affairs: Is strategic cyber deterrence the key to solving the problem? Asia-Pacific Review, 24, 113–131. doi: 10.1080/13439006.2017.1406703
- Owens, W. A., Dam, K. W., & Lin, H. S. (2009). Technology, policy, law, and ethics regarding U.S. Acquisition and use of cyberattack capabilities. Retrieved from http://sites.nationalacademies.org/cs/groups/cstbsite/documents/webpage/cstb_050541.pdf
- Perlroth, N., & Sanger, E. (2014). North Korea loses its link to the internet. New York Times. Retrieved from https://www.nytimes.com/2014/12/23/world/asia/attack-is-suspected-as-north-korean-internet-collapses.html
- Rid, T. (2011). Cyber war will not take place. Journal of Strategic Studies, 35(1), 5–32. doi: 10.1080/01402390.2011.608939
- Rid, T., & Buchanan, B. (2015). Attributing cyber attacks. Journal of Strategic Studies, 38, 4–37. doi: 10.1080/01402390.2014.977382
- Rublee, R. M., & Cohen, A. (2018). Nuclear norms in global governance: A progressive research agenda. Contemporary Security Policy, 39, 317–340. doi: 10.1080/13523260.2018.1451428
- Schelling, T. C. (1960). The strategy of conflict. Cambridge, MA: Harvard University Press.
- Seals, T. (2018). UK launches offensive cyber-weapons against Islamic state. Infosecurity Magazine. Retrieved from https://www.infosecurity-magazine.com/news/uk-launches-offensive-cyberweapons/
- Segal, A. (2011). Ideas about China’s cyber command. Council on Foreign Relations. Retrieved from https://www.cfr.org/blog/ideas-about-chinas-cyber-command
- Segal, A. (2013). The code not taken: China, the United States, and the future of cyber espionage. Bulletin of the Atomic Scientists, 69, 38–45. doi: 10.1177/0096340213501344
- Segal, A. (2017). Europe is developing offensive cyber capabilities. The United States should pay attention. Council on Foreign Relations. Retrieved from https://www.cfr.org/blog/europe-developing-offensive-cyber-capabilities-united-states-should-pay-attention
- Singer, P. W., & Friedman, A. (2013). Cybersecurity and cyberwar: What everyone needs to know. New York: Oxford University Press.
- Skillicorn, D. B., Leuprecht, C., & Tait, V. (2016). Beyond the castle model of cybersecurity. Government Information Quarterly, 33, 250–257. doi: 10.1016/j.giq.2016.01.012
- Smeets, M. (2018). Integrating offensive cyber capabilities: Meaning, dilemmas, and assessment. Defence Studies, 18(4), 395–410. doi: 10.1080/14702436.2018.1508349
- Sterner, E. (2011). Retaliatory deterrence in cyberspace. Strategic Studies Quarterly, 5, 62–80.
- Stilgherrian. (2018). Cyber dam busters could give Australia’s military an asymmetric edge. ZDNet. Retrieved from https://www.zdnet.com/article/cyber-dam-busters-could-give-australias-military-an-asymmetric-edge/
- Stone, J. (2012). Cyber war will take place!. Journal of Strategic Studies, 36(1), 101–108. doi: 10.1080/01402390.2012.730485
- Swaine, J., & Roth, A. (2018). US indicts 12 Russians for hacking DNC emails during the 2016 election. The Guardian. Retrieved from https://www.theguardian.com/us-news/2018/jul/13/russia-indictments-latest-news-hacking-dnc-charges-trump-department-justice-rod-rosenstein
- Tannenwald, N. (1999). The nuclear taboo: The United States and the normative basis of nuclear non-use. International Organization, 53, 433–468. Retrieved from http://www.jstor.org/stable/2601286 doi: 10.1162/002081899550959
- Tor, U. (2017). ‘Cumulative deterrence’ as a new paradigm for cyber deterrence. Journal of Strategic Studies, 40(1–2), 92–117. doi: 10.1080/01402390.2015.1115975
- UN General Assembly. (1948). Universal Declaration of Human Rights. 217 A (III). Retrieved March 5, 2019, from https://www.refworld.org/docid/3ae6b3712c.html
- Uren, T., Hogeveen, B., & Hanson, F. (2018). Defining offensive cyber capabilities. Retrieved from https://www.aspi.org.au/report/defining-offensive-cyber-capabilities
- Van den Berg, J., van Zoggel, J., Snels, M., van Leeuwen, M., Boeke, S., van de Koppen, L., … de Bos, T. (2014). On (the emergence of) cyber security science and its challenges for cyber security education. Retrieved from https://www.csacademy.nl/images/MP-IST-122-12-paper-published.pdf
- Woodward, R. (2018). Fear: Trump in the White House. New York, NY: Simon & Schuster.