Reference list
- Alexander, K. (2010a). Nominations before the Senate Armed Service Committee, Second Session, 111th Congress. Federation of American Scientists. https://irp.fas.org/congress/2010_hr/alexander.html.
- Alexander, K. (2010b). GEN Alexander remarks. Defense Visual Information Distribution Service. https://www.dvidshub.net/video/156219/gen-alexander-remarks.
- Alexander, K. (2011). Building a new command in cyberspace. Strategic Studies Quarterly, 5(2), 3–12.
- Alexander, K. (2013a). General Keith Alexander at AFCEA. Defense Visual Information Distribution Service. https://www.dvidshub.net/video/294914/general-keith-alexander-afcea.
- Alexander, K. (2013b). Transcript of remarks by GEN Keith Alexander, Commander, US Cyber Command (USCYBERCOM), Director, National Security Agency (NSA), Chief, Central Security Service (CSS) at the Aspen Security Forum on July 18, 2013. National Security Agency/Central Security Service. https://www.nsa.gov/Press-Room/Speeches-Testimony/Article-View/Article/1619508/transcript-of-remarks-by-gen-keith-alexander-commander-us-cyber-command-uscyber/.
- Alexander, K. (2014). Statement of General Keith B. Alexander, Commander, United States Cyber Command, Before the Senate Committee on Armed Services. Senate Armed Services Committee. https://www.armed-services.senate.gov/imo/media/doc/Alexander_02-27-14.pdf.
- Allison, G. (1968). Conceptual models and the Cuban missile crisis: Rational policy, organization process, and bureaucratic politics. RAND Corporation.
- Avant, D. D. (1996). Are the reluctant warriors out of control? Why the US military is averse to responding to post-cold war low-level threats. Security Studies, 6(2), 51–90. https://doi.org/10.1080/09636419608429306
- Barnes, J. E. (2020). US cyber command expands operations to Hunt Hackers From Russia, Iran and China. New York Times. https://www.nytimes.com/2020/11/02/us/politics/cyber-command-hackers-russia.html.
- Biddle, T. D. (2009). Rhetoric and reality in air warfare: The evolution of British and American ideas about strategic bombing, 1914-1945. Princeton University Press.
- Borghard, E. D., & Lonergan, S. W. (2023). Deterrence by denial in cyberspace. Journal of Strategic Studies, 46(3), 534–569. https://doi.org/10.1080/01402390.2021.1944856
- Branch, J. (2021). What’s in a name? Metaphors and cybersecurity. International Organization, 75(1), 39–70. https://doi.org/10.1017/S002081832000051X
- Brecher, M. (1996). Crisis escalation: Model and findings. International Political Science Review, 17(2), 215–230. https://doi.org/10.1177/019251296017002006
- Brown, M. E., CoteJr.O. R., Lynn-Jones, S. M., & Miller, S. E. (Eds.) (2004). Offense, defense, and war. MIT Press.
- Calcara, A., Gilli, A., Gilli, M., Marchetti, R., & Zaccagnini, I. (2022). Why drones have not revolutionized War: The enduring hider-finder competition in Air warfare. International Security, 46(4), 130–171. https://doi.org/10.1162/isec_a_00431
- Cardon, E. (2015a). Statement by Lieutenant General Edward C. Cardon, Commanding General, US Army Cyber Command and Second Army, Before the Senate Armed Services Committee. National Security Archive. https://nsarchive.gwu.edu/themes/custom/nsarchive/templates/pdfjs/web/viewer.html?file = https%3A%2F%2Fnsarchive.gwu.edu%2Fsites%2Fdefault%2Ffiles%2Fdocuments%2F3673005%2FDocument-05-Lt-Gen-Edward-C-Cardon-Commanding.pdf.
- Cardone, E. (2015b). 2015 Georgia Cyber Keynote: Edward C. Cardon. Augusta University. https://www.youtube.com/watch?v=scGj8N2JgiE.
- Cardon, E. (2016). The future of army maneuver-dominance in the land and cyber domains. Cyber Defense Review, 1(1), 15–20.
- Caverley, J. D., & Dombrowski, P. (2020). Cruising for a bruising: Maritime competition in an anti-access Age. Security Studies, 29(4), 671–700. https://doi.org/10.1080/09636412.2020.1811460
- Congressional Research Service. (2013). The unified command plan and combatant commands: Background and issues for Congress. https://crsreports.congress.gov/product/pdf/R/R42077/11.
- Crawford, N. (2002). Argument and change in world politics: Ethics, decolonization, and humanitarian intervention. Cambridge University Press.
- Desch, M. C. (1999). Civilian control of the military: The changing security environment. Johns Hopkins University Press.
- Devanny J., Dwyer, A., Ertan, A., & Stevens, T. (2021). The national cyber force that Britain needs? Kings College.
- Dunn Cavelty, M. (2013). From cyber-bombs to political fallout: Threat representations with an impact in the cyber-security discourse. International Studies Review, 15(1), 105–122. https://doi.org/10.1111/misr.12023
- Feaver, P. D. (2005). Armed servants: Agency, oversight, and civil-military relations. Harvard University Press.
- Feaver, P. D., & Gelpi, C. (2004). Choosing your battles: American civil-military relations and the Use of force. Princeton University Press.
- Ferris, J. (2020). Behind the enigma: The authorized history of GCHQ, Britain’s secret cyber-intelligence agency. Bloomsbury Publishing.
- Fischerkeller, M. P., Goldman, E. O., & Harknett, R. J. (2022). Cyber persistence theory: Redefining national security in cyberspace. Oxford University Press.
- Fischerkeller, M. P., & Harknett, R. J. (2017). Deterrence is not a credible strategy for cyberspace. Orbis, 61(3), 381–393. https://doi.org/10.1016/j.orbis.2017.05.003
- Fischerkeller, M. P., & Harknett, R. J. (2018). Persistent engagement, agreed competition, cyberspace interaction dynamics, and escalation. Institute for Defense Analyses.
- Fogarty, S. (2019). Keynote: LTG Stephen G. Fogarty, USA. AFCEA International. https://www.youtube.com/watch?v = tO1j-DUd6EY.
- Freedberg Jr., S. J. (2015). Army fights culture gap between cyber & Ops: “Dolphin Speak.” Breaking Defense. https://breakingdefense.com/2015/11/army-fights-culture-gap-between-cyber-ops-dolphin-speak/.
- Freedman, L. (2003). The evolution of nuclear strategy. Palgrave Macmillan.
- Friend, A. H., & Weiner, S. K. (2022). Principals with agency: Assessing civilian deference to the military. Texas National Security Review, 5(4), 11–28.
- Gartzke, E., & Lindsay, J. R. (2015). Weaving tangled webs: Offense, defense, and deception in cyberspace. Security Studies, 24(2), 316–348. https://doi.org/10.1080/09636412.2015.1038188
- Gates, R. R. M. (2009). Memorandum to secretaries of the military departments. National Security Archive. https://nsarchive.gwu.edu/document/21425-document-29.
- Glaser, C. L., & Kaufmann, C. (1998). What is the offense-defense balance and can we measure it? International Security, 22(4), 44–82. https://doi.org/10.2307/2539240.
- Goldfarb, A., & Lindsay, J. R. (2022). Prediction and judgement: Why artificial intelligence increases the importance of humans in War. International Security, 46(3), 7–50. https://doi.org/10.1162/isec_a_00425
- Gomez, M. A. (2021). Overcoming uncertainty in cyberspace: Strategic culture and cognitive schemas. Defence Studies, 21(1), 25–46. https://doi.org/10.1080/14702436.2020.1851603
- Gomez, M. A., & Villar, E. B. (2018). Fear, uncertainty, and dread: Cognitive heuristics and cyber threats. Politics and Governance, 6(2), 61–72. https://doi.org/10.17645/pag.v6i2.1279
- Haney, C. (2015). Strategic deterrence for the future. Air & Space Power Journal, 29(4), 4–8.
- Haney, C. (2016). 2016 deterrence and assurance workshop and conference. US Strategic Command. https://www.stratcom.mil/Media/Speeches/Article/986487/2016-deterrence-and-assurance-workshop-and-conference/.
- Hansen, L. (2013). Security as practice: Discourse analysis and the Bosnian war. Routledge.
- Hartman, J. (2021). Cybersecurity summit 2021: Federal Defenders. CISA. https://www.youtube.com/watch?v = FooVV13KVgk.
- Haugh, T. (2019). ICCE 2019 – Keynote by Brig. Gen. Timothy D. Haugh, USAF. Atlantic Council. https://www.youtube.com/watch?v = PjBqSWZbLtM.
- Healey, J. (2013). Obama’s cyberwarfare strategy will backfire. US News. https://www.usnews.com/opinion/blogs/world-report/2013/03/08/clandestine-american-strategy-on-cyberwarfare-will-backfire.
- Healey, J. (2021). Understanding the offense’s systemwide advantage in cyberspace. Lawfare. https://www.lawfaremedia.org/article/understanding-offenses-systemwide-advantage-cyberspace.
- Healey, J., & Jervis, R. (2021). Overclassification and its impact on cyber conflict and democracy. Modern War Institute. https://mwi.usma.edu/overclassification-and-its-impact-on-cyber-conflict-and-democracy/.
- Horowitz, M. C. (2019). When speed kills: Lethal autonomous weapons systems, deterrence, and stability. Journal of Strategic Studies, 42(6), 764–788. https://doi.org/10.1080/01402390.2019.1621174
- Horowitz, M. C., & Lin-Greenberg, E. (2022). Algorithms and influence artificial intelligence and crisis decision-making. International Studies Quarterly, 66(4), 1–11. https://doi.org/10.1093/isq/sqac069
- Hunter, C., & Bowen, B. E. (2023). We’ll never have a model of an AI major general: Artificial intelligence, command decisions, and kitsch visions of War. Journal of Strategic Studies, 47(1), 1–31. https://doi.org/10.1080/01402390.2023.2241648.
- Huntington, S. P. (1957). The soldier and the state. Harvard University Press.
- Huysmans, J. (2011). What’s in an act? On security speech acts and little security nothings. Security Dialogue, 42(4-5), 371–383. https://doi.org/10.1177/0967010611418713
- Hyten, J. (2017). AFA air space and cyber conference. US Strategic Command. https://www.stratcom.mil/Media/Speeches/Article/1329490/afa-air-space-and-cyber-conference/.
- Jensen, B., & Work, J. D. (2018). Cyber civil-military relations: Balancing interests on the digital frontier. War on the Rocks. https://warontherocks.com/2018/09/cyber-civil-military-relations-balancing-interests-on-the-digital-frontier/.
- Jervis, R. (1978). Cooperation under the security dilemma. World Politics, 30(2), 167–214. https://doi.org/10.2307/2009958
- Johnson, L. (2021). Gen. Nakasone: ‘Partnership is where our power is.' MeriTalk. https://www.meritalk.com/articles/gen-nakasone-partnership-is-where-our-power-is.
- Johnson, J. (2022). Delegating strategic decision-making to machines: Dr. Strangelove redux? Journal of Strategic Studies, 45(3), 439–477. https://doi.org/10.1080/01402390.2020.1759038
- Joint Chiefs of Staff. (1996). Joint Doctrine for Command and Control Warfare (C2W). US Department of Defense. https://apps.dtic.mil/sti/pdfs/ADA357635.pdf.
- Joint Chiefs of Staff. (2000). Joint Vision 2020: American’s Miliary—Preparing for Tomorrow. Joint Force Quarterly. https://apps.dtic.mil/sti/pdfs/ADA526044.pdf.
- Joint Chiefs of Staff. (2006). Joint Publication 3-13: Information Operations. US Department of Defense. https://www.globalsecurity.org/intell/library/policy/dod/joint/jp3_13_2006.pdf.
- Joint Chiefs of Staff. (2018). Joint Publication 3-12: Cyberspace Operations. US Department of Defense. https://irp.fas.org/doddir/dod/jp3_12.pdf.
- Junio, T. J. (2013). How probable is cyber war? Bringing IR theory back In to the cyber conflict debate. Journal of Strategic Studies, 36(1), 125–133. https://doi.org/10.1080/01402390.2012.739561
- Kaplan, F. (1991). The wizards of Armageddon. Stanford University Press.
- Kehler, C. (2010a). Advanced questions for General Robert C. Kehler, USAF, Nominee for Commander, United States Strategic Command. Senate Armed Services Committee. https://www.armed-services.senate.gov/imo/media/doc/Kehler%2011-18-10.pdf.
- Kehler, C. (2010b). Military nominations. C-SPAN. https://www.c-span.org/video/?296690-1/military-nominations.
- Kier, E. (1997). Imagining war: French and British military doctrine between the wars. Princeton University Press.
- Krebs, R. R. (2015). How dominant narratives rise and fall: Military conflict, politics, and cold War consensus. International Organization, 69(4), 809–845. https://doi.org/10.1017/S0020818315000181
- Larsen, J. A., & Wirtz, J. J. (2023). The meaning of ‘strategic’ in US national-security policy. Survival, 65(5), 95–116. https://doi.org/10.1080/00396338.2023.2261249
- Lawson, S. T. (2020). Cybersecurity discourse in the United States: Cyber-doom rhetoric and beyond. Routledge.
- Levy, J. S. (1984). The offensive/defensive balance of military technology: A theoretical and historical analysis. International Studies Quarterly, 28(2), 219–238. https://doi.org/10.2307/2600696
- Levy, J. S. (1986). Organizational routines and the causes of war. International Studies Quarterly, 30(2), 193–222. https://doi.org/10.2307/2600676
- Lieber, K. A. (2000). Grasping the technological peace: The offense-defense balance and international security. International Security, 25(1), 71–104. https://doi.org/10.1162/016228800560390
- Lin, H. S. (2010). Offensive cyber operations and the use of force. Journal of National Security Law & Policy, 4(63), 63.
- Lindsay, J. R. (2013). Stuxnet and the limits of cyber warfare. Security Studies, 22(3), 365–404. https://doi.org/10.1080/09636412.2013.816122
- Lindsay, J. R. (2021). Cyber conflict vs. Cyber command: Hidden dangers in the American military solution to a large-scale intelligence problem. Intelligence and National Security, 36(2), 260–278. https://doi.org/10.1080/02684527.2020.1840746
- Loleski, S. (2019). From cold to cyber warriors: The origins and expansion of NSA’s tailored access operations (TAO) to shadow brokers. Intelligence and National Security, 34(1), 112–128. https://doi.org/10.1080/02684527.2018.1532627
- Lonergan, E. D., & Lonergan, S. W. (2023). Escalation dynamics in cyberspace. Oxford University Press.
- Lonergan, E. D. & Schneider, J. (2023). The power of beliefs in US cyber strategy: The evolving role of deterrence, norms, and escalation. Journal of Cybersecurity, 9(1), 1–10. https://doi.org/10.1093/cybsec/tyad006
- Long, A. (2017). A cyber SIOP? Operational considerations for strategic offensive cyber planning. Journal of Cybersecurity, 3(1), 19–28. https://doi.org/10.1093/cybsec/tyw016.
- Lopez, C. T. (2020a). Commander discusses a decade of DOD cyber power. US Department of Defense. https://www.defense.gov/News/News-Stories/Article/Article/2193130/commander-discusses-a-decade-of-dod-cyber-power/.
- Lopez, C. T. (2020b). For 2020 election, threat is bigger than Russia. US Department of Defense. https://www.defense.gov/News/News-Stories/Article/Article/2306001/for-2020-election-threat-is-bigger-than-russia/.
- March, J. G., & Simon, H. A. (1993). Organizations. Wiley.
- Martelle, M. (2019). Joint task force - computer network defense: 20 years later. National Security Archive. https://nsarchive.gwu.edu/briefing-book/cyber-vault/2019-06-29/joint-task-force-computer-network-defense-20-years-later.
- Maschmeyer, L. (2021). The subversive trilemma: Why cyber operations fall short of expectations. International Security, 46(2), 51–90. https://doi.org/10.1162/isec_a_00418
- Maschmeyer, L. (2023). Secrecy in strategy. In R. Chesney, & M. Smeets (Eds.), Deter, disrupt, or deceive: Assessing cyber conflict as an intelligence contest (pp. 86–108). Georgetown University Press.
- Matishak, M. (2023). One leader for cyber command, NSA Has “Substantial Benefits,” Report Says. Recorded Future. https://therecord.media/nakasone-cybercom-nsa-dual-hat-dunford-report.
- Nakashima, E. (2017). US military cyber operation to attack ISIS last year sparked heated debate over alerting allies. The Washington Post. https://www.washingtonpost.com/world/national-security/us-military-cyber-operation-to-attack-isis-last-year-sparked-heated-debate-over-alerting-allies/2017/05/08/93a120a2-30d5-11e7-9dec-764dc781686f_story.html.
- Nakashima, E., & Ryan, M. (2016). US military has launched a new digital war against the Islamic state,” The Washington Post. https://www.washingtonpost.com/world/national-security/us-militarys-digital-war-against-the-islamic-state-is-off-to-a-slow-start/2016/07/15/76a3fe82-3da3-11e6-a66f-aa6c1883b6b1_story.html?utm_term = .1566a745b555.
- Nakasone, P. (2015a). Center for strategic and international studies: The role of the US Military in Cyberspace. National Security Archive. https://nsarchive.gwu.edu/document/16424-center-strategic-and-international-studies.
- Nakasone, P. (2015b). ILW Contemporary Military Forum #11: Army Cyber – Today and Tomorrow. Defense Visual Information Service. https://www.dvidshub.net/video/428373/ilw-contemporary-military-forum-11-army-cyber-today-and-tomorrow.
- Nakasone, P. (2017). TechNet Augusta 2017 Keynote: LTG Paul M. Nakasone, USA. AFCEA International. https://www.youtube.com/watch?v = _WJmfhuvBaI.
- Nakasone, P. (2018a). Countering Threats Old and New. The Aspen Institute. https://www.youtube.com/watch?v = WFRrI_XLztQ.
- Nakasone, P. (2018b). General Paul Nakasone Keynote. Billington CyberSecurity. https://www.youtube.com/watch?v = uUjWVvBiWPo.
- Nakasone, P. (2019a). An Interview with Paul M. Nakasone. Joint Force Quarterly, 4-9. https://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-92/jfq-92_4-9_Nakasone-Interview.pdf.
- Nakasone, P. (2019b). Statement of General Paul M. Nakasone, Commander, United States Cyber Command, Before the Senate Committee on Armed Services. Senate Armed Services Committee. https://www.armed-services.senate.gov/imo/media/doc/Nakasone_02-14-19.pdf.
- Nakasone, P. (2019c). Army Cyber + Networks Hot Topic 2019 – GEN Paul Nakasone – US Cyber Command. Association of the US Army. https://www.youtube.com/watch?v = fZjGw7m5f18.
- Nakasone, P. (2020). Statement of General Paul M. Nakasone, Commander, United States Cyber Command, Before the House Committee on Armed Services Subcommittee on Intelligence and Emerging Threats and Capabilities. House Armed Services Committee. https://www.congress.gov/116/meeting/house/110592/witnesses/HHRG-116-AS26-Wstate-NakasoneP-20200304.pdf.
- Nakasone, P. (2021a). Posture Statement of General Paul M. Nakasone, Commander, United States Cyber Command, Before the 117th Congress, Senate Armed Services Committee. Senate Armed Services Committee. https://www.armed-services.senate.gov/imo/media/doc/Nakasone_03-25-21.pdf.
- Nakasone, P. (2021b). INSA leadership dinner with GEN Paul M. Nakasone. Intelligence & National Security Alliance. https://www.youtube.com/watch?v = 6S6DA8L19qQ&authuser = 0.
- Nakasone, P. (2021c). INSA leadership dinner with GEN Paul M. Nakasone. Intelligence & National Security Alliance. https://www.youtube.com/watch?v = 6S6DA8L19qQ.
- Nakasone, P. (2023). 2023 posture statement of General Paul M. Nakasone. US Cyber Command. https://www.cybercom.mil/Media/News/Article/3320195/2023-posture-statement-of-general-paul-m-nakasone/.
- Pape, R. A. (1996). Bombing to win: Air power and coercion in war. Cornell University Press.
- Pomerlau, M. (2019). What good are exceptional cyber capabilities without authority. C4ISRNET. https://www.c4isrnet.com/dod/2019/07/16/what-good-are-exceptional-cyber-capabilities-without-authority/.
- Posen, B. R. (1984). The sources of military doctrine: France, Britain, and Germany between the world wars. Cornell University Press.
- Reed, J. (2007). As efforts ramp Up … officials announce cyber command will take an offensive posture. Inside the Air Force, 18(40), 1. 6-8.
- Rid, T. (2013). Cyber war will Not take place. Oxford University Press.
- Risse, T. (2000). Let’s argue!” communicative action in world politics. International Organization, 54(1), 1–39. https://doi.org/10.1162/002081800551109
- Rogers, M. (2014a). Confirmation hearing opening statement to the US Senate Armed Service Committee. https://www.americanrhetoric.com/speeches/michaelrogersopstsarc.htm.
- Rogers, M. (2014b). Transcript of Admiral Michael S. Rogers Keynote speech, Sharing Cyber Threat Information to Protect Business and America, at the US Chamber of Commerce event on October 28, 2014. National Security Agency/Central Security Service. https://www.nsa.gov/Press-Room/Speeches-Testimony/Article-View/Article/1619428/transcript-of-admiral-michael-s-rogers-keynote-speech-sharing-cyber-threat-info/.
- Rogers, M. (2014c). Advanced questions for Admiral Michael S. Rogers, USN, Nominee for Commander, United States Cyber Command. Senate Armed Services Committee. https://www.armed-services.senate.gov/imo/media/doc/Rogers_03-11-14.pdf.
- Rogers, M. (2015a). A challenge for the military cyber workforce. Military Cyber Affairs, 1(1), 1–2. https://doi.org/10.5038/2378-0789.1.1.1012
- Rogers, M. (2015b). Briefing with Admiral Rogers, Commander of US Cyber Command. Wilson Center. https://www.wilsoncenter.org/event/briefing-admiral-michael-rogers-commander-us-cyber-command.
- Rogers, M. (2016a). A conversation with Admiral Michael Rogers. Harvard Kennedy School Institute of Politics. https://iop.harvard.edu/forum/conversation-admiral-michael-rogers.
- Rogers, M. (2016b). Nsa Director Rogers on DNC Hacking, Cyberwar, and ISIS. NPR. https://www.npr.org/2016/08/02/488336952/nsa-director-rogers-on-dnc-hacking-cyberwarfare-and-isis.
- Rogers, M. (2017a). West 2017: Are we organized and aligned to fight the cyber war? WEST Conference. February 23, 2107. https://www.youtube.com/watch?v = d8WITQuOQFI.
- Rogers, M. (2017b). Cybercom Commader Testifies at SASC Hearing. Department of Defense. https://www.youtube.com/watch?v = 5_Dq0fJpU5U.
- Rogers, M. (2017c). Statement of Admiral Michael S. Rogers, Commander, United States Cyber Command, Before the Senate Committee on Armed Services. Senate Armed Services Committee. https://www.armed-services.senate.gov/imo/media/doc/Rogers_05-09-17.pdf.
- Rogin, J. (2012). Nsa Chief: Cybercrime constitutes the ‘greatest transfer of wealth in history. Foreign Policy. https://foreignpolicy.com/2012/07/09/nsa-chief-cybercrime-constitutes-the-greatest-transfer-of-wealth-in-history/.
- Rosenberg, D. A., & Moore, W. B. (1981). Smoking radiation ruin at the end of two hours”: Documents on American plans for nuclear war with the Soviet Union, 1954-55. International Security, 6(3), 3–38. https://doi.org/10.2307/2538605
- Rovner, J. (2019). Cyber war as an intelligence contest. War on the Rocks. https://warontherocks.com/2019/09/cyber-war-as-an-intelligence-contest/.
- Rudesill, D. S. (2020). Cyber operations, legal secrecy, and civil-military relations. In L. Beehner, R. Brooks, & D. Maurer (Eds.), Reconsidering American civil-military relations: The military, society, politics, and modern war (pp. 245–262). Oxford University Press.
- Sagan, S. D. (1985). Nuclear alerts and crisis management. International Security, 9(4), 99–139. https://doi.org/10.2307/2538543
- Schmidle, R. (2011). JWC 2011: LtGen Robert E. Schmidle, Jr., USMC. https://www.youtube.com/watch?v = 6DYwbv047so.
- Schneider, J. G., Goldman, E. O., & Warner, M., (Eds.) (2020). Ten years in: Implementing strategic approaches to cyberspace. Naval War College Press.
- Singer, P. W., & Friedman, A. (2014). Cyber cult of the offensive. Foreign Policy. https://foreignpolicy.com/2014/01/15/cult-of-the-cyber-offensive/.
- Slayton, R. (2017). What is the cyber offense-defense balance? Conceptions, causes, and assessment. International Security, 41(3), 72–109. https://doi.org/10.1162/ISEC_a_00267
- Slayton, R. (2020/2021). What is a cyber warrior? The emergence of US military cyber expertise, 1967-2018. Texas National Security Review, 4(1), 61–96.
- Smeets, M. (2018). A matter of time: On the transitory nature of cyberweapons. Journal of Strategic Studies, 41(1-2), 6–32. https://doi.org/10.1080/01402390.2017.1288107
- Smythe, C. (2020). Cult of the cyber offensive: Misperceptions of the cyber offense/defense balance. Yale Journal of International Affairs, 15(98), 98–114.
- Snyder, J. (1984). Civil-military relations and the cult of the offensive, 1914 and 1984. International Security, 9(1), 108–146. https://doi.org/10.2307/2538637
- Stewart, V. (2018). Lt. Gen. Vince Stewart, Deputy Commander, US Cyber Command. Army Cyber Institute. https://www.youtube.com/watch?v = DFHU7B0FoUA.
- Temple-Raston, D. (2019). How the US Hacked ISIS. NPR. https://www.npr.org/2019/09/26/763545811/how-the-u-s-hacked-isis.
- Tighe, J. (2015). WEST 2015 VADM Jan E. Tighe, USN, Commander, Fleet Cyber Command/Commander, TENTH Fleet. US Naval Institute. https://www.youtube.com/watch?v = 9nP9VdvBn4o.
- US Congress House of Representatives. (2018). National Defense Authorization Act for Fiscal Year 2019. https://www.congress.gov/115/crpt/hrpt676/CRPT-115hrpt676.pdf.
- US Cyber Command. (2016). Uscybercom to CDRUSACYBER, Subj: CYBERCOM FRAGORD 01 to TASKORD 16-0063 To Establish Joint Task Force (JTF)-ARES to Counter the Islamic State of Iraq and the Levant (ISIL) in Cyber Space, May 5, 2016. Secret//Rel to USA, [Redacted]. National Security Archive. https://nsarchive.gwu.edu/document/22840-document-07-uscybercom-cdrusacyber-subj#document/p13.
- US Cyber Command. (2018). Achieve and maintain cyberspace superiority: Command vision for US Cyber Command. https://www.cybercom.mil/Portals/56/Documents/USCYBERCOM%20Vision%20April%202018.pdf.
- US Department of Defense. (2015). The Department of Defense Cyber Strategy. https://nsarchive.gwu.edu/document/21384-document-25.
- US Department of Defense. (2018). Summary: Department of Defense Cyber Strategy. https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF.
- US Department of Defense. (2023). Summary: 2023 Cyber Strategy of the Department of Defense. https://media.defense.gov/2023/Sep/12/2003299076/-1/-1/1/2023_DOD_Cyber_Strategy_Summary.PDF.
- US Government Accountability Office. (2019). US Cyber Command and Services Should Take Actions to Maintain a Trained Cyber Mission Force. https://apps.dtic.mil/sti/pdfs/AD1156807.pdf.
- US Strategic Command. (2023). History. https://www.stratcom.mil/About/History/#:~:text = US%20Strategic%20Command%20is%20one,Defense%20Department's%20Global%20Information%20Grid.
- Valeriano, B., & Jensen, B. (2019). The myth of the cyber offense: The case for restraint. CATO Institute.
- Van Evera, S. (1984). The cult of the offensive and the origins of the First World War. International Security, 9(1), 58–107. https://doi.org/10.2307/2538636
- Van Evera, S. (1998). Offense, defense, and the causes of war. International Security, 22(4), 5–43. https://doi.org/10.1162/isec.22.4.5
- Voo, J., Hemani, I., & Cassidy, D. (2022). National cyber power index 2022. Belfer Center for Science and International Affairs, Harvard University.
- Warner, M. (2020). US Cyber Command’s First Decade. A Hoover Institution Essay. Aegis Series Paper 2008.
- Weeks, J. L. (2012). Strongmen and straw men: Authoritarian regimes and the initiation of international conflict. American Political Science Review, 106(2), 326–347. https://doi.org/10.1017/S0003055412000111
- Weggeman, C. (2017). Maj. Gen. Christopher Weggeman. MaxwellGunterAFB. https://www.youtube.com/watch?v = tfR3Z32Nfqk.
- Weggeman, C. (2021). Exclusive Interview with Lt. Gen. Chris Weggeman. Defense Visual Information Distribution Service. https://www.dvidshub.net/news/400082/exclusive-interview-with-lt-gen-chris-weggeman.
- Weiner, C. (2016). Penetrate, exploit, disrupt, destroy: The rise of computer network operations as a major military innovation [PhD diss., George Mason University].
- White, S. P. (2019a). Subcultural influences on military innovation: The development of US military cyber doctrine [PhD diss., Harvard University].
- White, T. J. (2019b). Fall quarter graduation. Naval Postgraduate School. https://www.youtube.com/watch?v = 4WzI6-5zpGY.
- White, T. J. (2020). Are we ready to fight and win in fully contested zones? AFCEA International. https://www.youtube.com/watch?v = 8AYkukFfUxc.