Reference List
- Abbott, K. W., & Snidal, D. (2000). Hard and soft law in international governance. International Organization, 54, 421–456. doi: 10.1162/002081800551280
- Argaman, S., & Siboni, G. (2014). Commercial and industrial cyber espionage in Israel. Military and Strategic Affairs, 6, 43–58.
- Baker, C. D. (2003). Tolerance of international espionage: A functional approach. American University International Law Review, 19, 1091–1113.
- Ball, J., Borger, J., & Greenwald, G. (2013). Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian. Retrieved from https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
- Bencsáth, B. (2018). Territorial Dispute – NSA's perspective on APT landscape. Technical report with the analysis team of Ukatemi and CrySyS Lab. Retrieved from https://www.crysys.hu/files/tedi/ukatemicrysys_territorialdispute.pdf
- Bethlehem, D. (2012). The secret life of international Law. Cambridge Journal of International and Comparative Law, 1, 23–36. doi: 10.7574/cjicl.01.01.1
- Biddle, S. (2016). The NSA Leak Is Real, Snowden Documents Confirm. The Intercept. Retrieved from https://theintercept.com/2016/08/19/the-nsa-was-hacked-snowden-documents-confirm/
- Boeke, S., & Broeders, D. (2018). The demilitarisation of cyber conflict. Survival, 60, 73–90. doi: 10.1080/00396338.2018.1542804
- Broeders, D., Boeke, S., & Georgieva, I. (2019). Foreign intelligence in the digital age. Navigating a state of ‘unpeace’. The Hague Program For Cyber Norms Policy Brief. September 2019.
- Brown, G. D., & Metcalf, A. O. (2014). Easier said than done: Legal reviews of cyber Weapons. Journal of National Security Law and Policy, 7, 115–138.
- Buchan, R. (2015). Cyber espionage and international law. In N. Tsagourias, & R. Buchan (Eds.), Research handbook on international law and cyberspace (pp. 168–189). Cheltenham: Edward Elgar Publishing.
- Buchan, R. (2016). The international regulation of cyber espionage. In A.-M. Osula, & H. Rõigas (Eds.), International cyber norms: Legal, policy and industry perspectives (pp. 65–86). Tallinn: NATO CCD COE Publications.
- Buchan, R. (2018). Cyber espionage and international law. Oxford: Hart Publishing.
- CCDCOE. (2017). Tallinn Manual Process. Retrieved from https://ccdcoe.org/research/tallinn-manual/
- CFR - Council on Foreign Relations. (2019). Cyber Operations Tracker. Retrieved from https://www.cfr.org/interactive/cyber-operations
- Chesterman, S. (2006). The spy who came in from the cold war: Intelligence and international law. Michigan Journal of International Law, 27, 1071–1130. doi: 10.1093/jiplp/jpl178
- Committee on the Formation of Customary (General) International Law. (2000). Final Report of the Committee - Statement of Principles Applicable to the Formation of General Customary International Law. Retrieved from https://www.law.umich.edu/facultyhome/drwcasebook/Documents/Documents/ILAReportonFormationofCustomaryInternationalLaw.pdf
- Deeks, A. (2016). Confronting and adapting: Intelligence agencies and international law. Virginia Law Review, 102, 599–685.
- Demarest, G. B. (1995). Espionage in international law. Denver Journal of International Law and Policy, 24, 321–348.
- Engelkamp, S., & Glaab, K. (2015). Writing norms: Constructivist norm research and the politics of ambiguity. Alternatives: Global, Local, Political, 40, 201–218. doi: 10.1177/0304375415612270
- Erskine, T., & Carr, M. (2016). Beyond “quasi-norms”: The challenges and potential of engaging with norms in cyberspace. In H. Osula & A.-M. Rõigas (Eds.), International cyber norms: Legal, policy & industry perspective (pp. 87–109). Tallinn: NATO CCD COE Publications.
- Executive Office of the President of the United States. (2011). International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World. Retrieved from https://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
- Farrell, H. (2015). Promoting Norms for Cyberspace. Retrieved from https://www.cfr.org/sites/default/files/pdf/2015/03/Norms_CyberBrief.pdf.
- Farrell, H., & Glaser, C. L. (2017). The role of effects, saliencies and norms in US Cyberwar doctrine. Journal of Cybersecurity, 3, 7–17. doi: 10.1093/cybsec/tyw015
- Finnemore, M. (1996). Defining state interests. In National interests in international society (pp. 1–33). Ithaca, NY: Cornell University Press.
- Finnemore, M., & Hollis, D. B. (2016). Constructing norms for global cybersecurity. American Journal of International Law, 110, 425–479. doi:10.5305/amerjintelaw.110.3.0425 doi: 10.1017/S0002930000016894
- Finnemore, M., & Hollis, D. B. (2019). Beyond naming and shaming: Accusation and International Law in Cybersecurity (Temple University Legal Studies Research Paper No. 2019-14). doi:10.2139/ssrn.3347958
- Finnemore, M., & Sikkink, K. (1998). International norm dynamics and political change. International Organization, 52, 887–917. doi: 10.1162/002081898550789
- Forcese, C. (2011). Spies without borders : International law and intelligence collection. Journal of National Security Law & Policy, 5, 179–210.
- Forcese, C. (2016). Pragmatism and principle: Intelligence agencies and international Law. Virginia Law Review Online, 102, 67–84.
- Foreign & Commonwealth Office and The Rt Hon William Hague. (2011). London Conference on Cyberspace: Chair’s statement - GOV.UK. Retrieved from https://www.gov.uk/government/news/london-conference-on-cyberspace-chairs-statement
- GCSC. (2016). Global Commission on the Stability of Cyberspace. Retrieved from https://cyberstability.org/
- Greenberg, A. (2018a). Spy v. Spy: An NSA leak reveals the agency’s list of enemy hackers. Wired. Retrieved from https://www.wired.com/story/nsa-leak-reveals-agency-list-enemy-hackers/
- Greenberg, A. (2018b). The Untold Story of NotPetya, the Most Devastating Cyberattack in History. Wired. Retrieved from https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
- Grigsby, A. (2017). The end of cyber norms. Survival, 59, 109–122. doi: 10.1080/00396338.2017.1399730
- Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School. International Studies Quarterly, 53, 1155–1175. doi: 10.1111/j.1468-2478.2009.00572.x
- Hayden, M. V. (2017). Playing to the edge: American intelligence in the age of terror. London: Penguin.
- Henriksen, A. (2019). The end of the road for the UN GGE process: The future regulation of cyberspace. Journal of Cybersecurity, 5, 1–9. doi: 10.1093/cybsec/tyy009
- Hollis, D. B. (2017). China and the U.S. Strategic Construction of Cybernorms: The Process is the Product. Aegis Paper Series No. 1704, 1–24. Retrieved from https://www.hoover.org/research/china-and-us-strategic-construction-cybernorms-process-product
- HPCN. (2018). The Hague program for Cyber Norms. Retrieved from https://www.thehaguecybernorms.nl
- Hurwitz, R. (2014). The play of states: Norms and security in cyberspace. American Foreign Policy Interests, 36, 322–331. doi: 10.1080/10803920.2014.969180
- Kaspersky Lab. (2019). BlackEnergy APT Attacks | What is BlackEnergy? Kaspersky Lab. Retrieved from https://www.kaspersky.com/resource-center/threats/blackenergy
- Katzenstein, P. J. (1996). Introduction: Alternative perspectives on national security. In P. J. Katzenstein (Ed.), The culture of national security: Norms and identity in world politics (pp. 1–32). New York: Columbia University Press.
- Kittichaisaree, K. (2017). Cyber espionage. In Public international Law of cyberspace (pp. 233–262). Cham: Springer.
- Kooiman, J. (1993). Social-political governance: Introduction. In J. Kooiman (Ed.), Modern governance: New government-society interactions (pp. 1–6). London: SAGE Publications.
- Kooiman, J. (1999). Social-political governance. Public Management Review, 1, 67–92. doi: 10.1080/14719037800000005
- Kooiman, J. (2003). Governing as governance. London: Sage.
- Krook, M. L., & True, J. (2012). Rethinking the life cycles of international norms: The United Nations and the global promotion of gender equality. European Journal of International Relations, 18, 103–127. doi: 10.1177/1354066110380963
- Langevin, J. R., Mccaul, M. T., Charney, S., & Lewis, J. A. (2008). Securing cyberspace for the 44th Presidency: A report of the CSIS Commission on cybersecurity for the 44th Presidency. Washington: Center for Strategic and International Studies.
- Loleski, S. (2019). From cold to cyber warriors: The origins and expansion of NSA’s tailored Access operations (TAO) to shadow brokers. Intelligence and National Security, 34, 112–128. doi: 10.1080/02684527.2018.1532627
- Lubin, A. (2016). Espionage as a Sovereign right under international law and its Limits. ILSA Quarterly, 24, 22–28.
- Macák, K. (2017). From cyber norms to cyber rules: Re-engaging states as law-makers. Leiden Journal of International Law, 30, 877–899. doi: 10.1017/s0922156517000358
- McKay, A., Neutze, J., Nicholas, P., & Sullivan, K. (2014). International cybersecurity norms: Reducing conflict in an Internet-dependent world. Microsoft. Retrieved from https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/REVroA
- Microsoft. (2016). International Cybersecurity Norms. Retrieved from https://blogs.microsoft.com/cybertrust/2014/12/03/proposed-cybersecurity-norms/
- Nakashima, E., & Timberg, C. (2017). NSA officials worried about the day its potent hacking tool would get loose. Then it did. The Washington Post. Retrieved from https://cyber-peace.org/wp-content/uploads/2017/05/NSA-officials-worried-about-the-day-its-potent-hacking-tool-would-get-loose.-Then-it-did.pdf
- National Security Agency/Central Security Service. (2000). Transition 2001. Retrieved from https://nsarchive2.gwu.edu//NSAEBB/NSAEBB24/nsa25.pdf
- Paganini, P. (2014). RAMPART-A allows NSA to tap into fiber optic cables worldwide. Security Affairs. Retrieved from https://securityaffairs.co/wordpress/25962/intelligence/rampart-nsa-program.html
- Parks, H. W. (1990). The international law of intelligence collection. In J. N. Moore, & R. F. Turner (Eds.), National security Law (pp. 433–434). Durham, North Carolina: Carolina Academic Press.
- Perina, A. H. (2015). Black holes and open secrets: The impact of covert action on international law. Columbia Journal of Transnational Law, 53, 507–583.
- Peterson, A. (2014). The Sony Pictures hack, explained. The Washington Post. Retrieved from https://www.washingtonpost.com/news/the-switch/wp/2014/12/18/the-sony-pictures-hack-explained/
- Rhodes, R. A. W. (2007). Understanding governance: Ten years on. Organization Studies, 28, 1243–1264. doi: 10.1177/0170840607076586
- Sanger, D. E. (2016). ‘Shadow Brokers’ Leak Raises Alarming Question: Was the N.S.A. Hacked? The New York Times. Retrieved from https://www.nytimes.com/2016/08/17/us/shadow-brokers-leak-raises-alarming-question-was-the-nsa-hacked.html
- Shane, S., Perlroth, N., & Sanger, D. E. (2017). Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core. The New York Times. Retrieved from https://www.nytimes.com/2017/11/12/us/nsa-shadow-brokers.html
- Shaw, M. N. (2014). International law (7th ed.). Cambridge: Cambridge University Press.
- Siemens, Airbus, IBM, Allianz, Conference, M. S., SGS, … T-Mobile. (2018). Charter of Trust: For a secure digital world. Retrieved from https://assets.new.siemens.com/siemens/assets/public.1560760957.55badda4-4340-46d3-b359-f570e7d1f4c2.charter-of-trust-presentation-en.pdf
- Smith, B. (2017). Transcript of Keynote Address at the RSA Conference 2017 - The Need for a Digital Geneva Convention. Microsoft Corporation, 1–15. Retrieved from https://mscorpmedia.azureedge.net/mscorpmedia/2017/03/Transcript-of-Brad-Smiths-Keynote-Address-at-the-RSA-Conference-2017.pdf
- Smith, J. H. (2006). Keynote address. Michigan Journal of International Law, 28, 543–552.
- Stevens, T. (2012). A cyberwar of ideas? Deterrence and norms in cyberspace. Contemporary Security Policy, 33, 148–170. doi: 10.1080/13523260.2012.659597
- Stout, M., & Warner, M. (2018). Intelligence is as intelligence does. Intelligence and National Security, 33, 517–526. doi: 10.1080/02684527.2018.1452593
- Tikk, E., & Kerttunen, M. (2017). The Alleged Demise of the UN GGE: An Autopsy and Eulogy. 1–41. Retrieved from http://cpi.ee/wp-content/uploads/2017/12/2017-Tikk-Kerttunen-Demise-of-the-UN-GGE-2017-12-17-ET.pdf
- Tikk-Ringas, E. (2017). International cyber norms dialogue as an exercise of normative power. Georgetown Journal of International Affairs, 17(3), 47–59. doi: 10.1353/gia.2016.0036
- Treib, O., Bähr, H., & Falkner, G. (2007). Modes of governance: Towards a conceptual clarification. Journal of European Public Policy, 14, 1–20. doi: 10.1080/135017606061071406
- United Nations. (2010). Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security A/65/201. Retrieved from https://undocs.org/A/65/201
- United Nations. (2011). Letter dated 12 September 2011 from the Permanent Representatives of China, the Russian Federation, Tajikistan and Uzbekistan to the United Nations addressed to the Secretary-General. Retrieved from https://www.un.org/disarmament/publications/library/66-ga-ga-sc/
- United Nations. (2015). Letter dated 9 January 2015 from the Permanent Representatives of China, Kazakhstan, Kyrgyzstan, the Russian Federation, Tajikistan and Uzbekistan to the United Nations addressed to the Secretary-General. Retrieved from https://digitallibrary.un.org/record/786846
- Van den Berg, J., Van Zoggel, J., Snels, M., Van Leeuwen, M., Boeke, S., Van de Koppen, L., … De Bos, T. (2014). On (the Emergence of) Cyber Security Science and its Challenges for Cyber Security Education. Proceedings of the NATO IST-122 Cyber Security Science and Engineering Symposium, 13–14. Retrieved from https://www.csacademy.nl/images/MP-IST-122-12-paper-published.pdf
- Warner, M. (2017). Intelligence in cyber-and cyber in intelligence. In G. Perkovich, & A. E. Levite (Eds.), Understanding cyber conflict: Fourteen Analogies (pp. 17–29). Washington, DC: Georgetown University Press.
- Warner, M., & Andregg, M. (2007). The study of intelligence/ sources and methods for the study of intelligence/intelligence ethics. In L. K. Johnson (Ed.), Handbook of intelligence studies (pp. 17–63). London: Routledge.
- Wright, Q. (1962). Espionage and the doctrine of non-intervention in international affairs. In R. J. Stanger (Ed.), Essays on espionage and international Law (Vol. 3, pp. 3–28). Columbus: Ohio State University Press.
- Zetter, K. (2010). Google Hack Attack Was Ultra Sophisticated, New Details Show. Wired. Retrieved from https://www.wired.com/2010/01/operation-aurora/
- Zetter, K. (2014). DarkHotel: A Sophisticated New Hacking Attack Targets High-Profile Hotel Guests. Wired. Retrieved from https://www.wired.com/2014/11/darkhotel-malware/
- Zetter, K. (2018). Leaked Files Show How the NSA Tracks Other Countries’ Hackers. The Intercept. Retrieved from https://theintercept.com/2018/03/06/leaked-files-show-how-nsa-tracks-other-countries-hackers/
- Ziolkowski, K. (2013). Peacetime cyber espionage: New tendencies in public international law. In K. Ziolkowski (Ed.), Peacetime regime for state activities in cyberspace: International law, international relations and diplomacy (pp. 425–464). Tallinn: NATO Cooperative Cyber Defence Centre of Excellence.