References
- Agnew, J. (2005). Sovereignty regimes: Territoriality and state authority in contemporary world politics. Annals of the Association of American Geographers, 95(2), 437–461. doi: 10.1111/j.1467-8306.2005.00468.x
- Agnew, J. (2009). Globalization and sovereignty. New York: Rowman and Littlefield.
- Allen, J. (2011). Topological twists: Power's shifting geographies. Dialogues in Human Geography, 1(3), 283–298. doi: 10.1177/2043820611421546
- Arthur, C. (2011, December 12). Chinese cyber-attacks ‘pinned to users.’ The Guardian. Retrieved July 3, 2013 from http://www.guardian.co.uk/technology/2011/dec/12/china-us-hacking-tensions.
- Arthur, C. (2012, March 20). Syrian activists targeted by fake YouTube. Guardian Online. Retrieved July 23, 2013 from http://www.guardian.co.uk/technology/2012/mar/20/syrian-activists-fake-youtube
- BBC. (2013, June 23). China's Xinhua news agency condemns US ‘cyber-attacks’. Retrieved July 26, 2013 from http://www.bbc.co.uk/news/world-asia-23018938.
- Bodeen, C. (2013, February 20). Inside ‘Unit 61398’: Portrait of accused Chinese cyberspying group emerges. Huffington Post. Retrieved July 2, 2013 from http://www.huffingtonpost.com/2013/02/20/inside-unit-61398_n_2722356.html
- Bowden, M. (2011). Worm: The first digital world war. New York: Atlantic Monthly Press.
- Broad, W. J., Markoff, J., & Sanger, D. E. (2011). Israeli test on worm called crucial in Iran nuclear delay. New York Times. January 15, p. A1.
- Brumfield, B. (2012, February 17). Computer spyware is newest weapon in Syrian conflict. CNN Online. Retrieved July 23, 2013, from http://www.cnn.com/2012/02/17/tech/web/computer-virus-syria
- Brunet-Jailly, E. (2005). Theorizing borders: An interdisciplinary perspective. Geopolitics, 10(4), 633–649. doi: 10.1080/14650040500318449
- Carr, J. (2011). Inside cyber warfare: Mapping the cyber underworld. New York: O'Reilly Media.
- Cavelty, M. D. (2007). Cyber-terror – looming threat or phantom menace? The framing of the US cyber-threat debate. Journal of Information Technology & Politics, 4(1), 19–35. doi: 10.1300/J516v04n01_03
- Cho, J. (2013, March 20). North Korea eyed in huge cyber attack on South Korea. ABC News, Retrieved from http://abcnews.go.com/International/north-korea-eyed-huge-cyber-attack-south-korea/story?id=18769664
- Choe, S-H. (2013, March 20). Computer networks in South Korea are paralyzed in cyberattacks. New York Times. Retrieved from http://www.nytimes.com/2013/03/21/world/asia/south-korea-computer-network-crashes.html?pagewanted=all&_r=0
- Clarke, R., & Knake, R. (2010). Cyber war: The next threat to national security and what to do about it. New York: Ecco.
- Clayton, M. (2013). Massive cyberattacks from China? Report claims to expose secret ‘Unit 61398.’ Christian Science Monitor Online, February 19. Retrieved July 2, 2013, from http://www.csmonitor.com/USA/2013/0219/Massive-cyberattacks-from-China-Report-claims-to-expose-secret-Unit-61398.-video
- Clayton, M. (2014a). Major cyber-assaults on Ukraine, then Moscow, on eve of Crimean vote. C.S. Monitor Online. Retrieved May 5, 2014, from http://www.csmonitor.com/World/Security-Watch/Cyber-Conflict-Monitor/2014/0314/Major-cyber-assaults-on-Ukraine-then-Moscow-on-eve-of-Crimea-vote-video
- Clayton, M. (2014b). Massive cyberattacks slam official sites in Russian, Ukraine. Christian Science Monitor Online. Retrieved May 5, 2014, from http://www.csmonitor.com/World/Security-Watch/Cyber-Conflict-Monitor/2014/0318/Massive-cyberattacks-slam-official-sites-in-Russia-Ukraine
- Conway, M. (2002). Reality bytes: Cyberterrorism and terrorist ‘use’ of the internet. First Monday, 7(11). doi: 10.5210/fm.v7i11.1001
- Crang, M. (2000). Public space, urban space and electronic space: Would the real city please stand up? Urban Studies, 37(2), 301–317. doi: 10.1080/0042098002203
- Diener, A., & Hagen, J. (2012). Borders: A very short introduction. Oxford: Oxford University Press.
- Farwell, J., & Rohozinski, R. (2011). Stuxnet and the future of cyber war. Survival: Global Politics and Strategy, 53(1), 23–40. doi: 10.1080/00396338.2011.555586
- Flint, C. (2005). The geography of war and peace. New York: Oxford University Press.
- Galperin, E., & Marquis-Boire, M. (2012). The internet is back in Syria and so is malware targeting Syrian activists. Electronic Frontier Foundation. Retrieved July 23, 2013, from https://www.eff.org/deeplinks/2012/12/iinternet-back-in-syria-so-is-malware
- Goldman, D. (2012, September 28). Major banks hit with biggest cyberattacks in history. CNN. Retrieved August 5, 2013, from http://money.cnn.com/2012/09/27/technology/bank-cyberattacks/index.html?hpt=hp_t3
- Gray, C. (1999). Inescapable geography. Journal of Strategic Studies, 22(2–3), 161–177. doi: 10.1080/01402399908437759
- Gregory, D. (2011a). From a view to a kill: Drones and late modern war. Theory, Culture and Society, 28(7–8), 188–215. doi: 10.1177/0263276411423027
- Gregory, D. (2011b). The everywhere war. Geographical Journal, 177(3), 238–250. doi: 10.1111/j.1475-4959.2011.00426.x
- Haaretz online. (2013, July 9). Snowden says Israel, U.S. created Stuxnet virus that attacked Iran. Retrieved July 19, 2013, from http://www.haaretz.com/news/diplomacy-defense/1.534728
- Hafner, K. (1998). When wizards stay up late: The origins of the internet. New York: Simon and Schuster.
- Hersh, S. (2010, November 1). The online threat: Should we be worried about a cyber war? The New Yorker. Retrieved from http://www.newyorker.com/reporting/2010/11/01/101101fa_fact_hersh
- Hopkins, N., & Harding, L. (2013, April 29). Pro-Assad Syrian hackers launching cyber-attacks on western media. The Guardian. Retrieved July 23, 2013, from http://www.guardian.co.uk/world/2013/apr/29/assad-syrian-hackers-cyber-attacks
- Huffington Post. (2013, May 25). Israel says it foiled Syrian cyber attack on water system In Haifa. Retrieved July 23, 2013, from http://www.huffingtonpost.com/2013/05/25/israel-syria-cyber-attack_n_3336670.html
- Kellerman, A. (2002). The internet on Earth: A geography of information. Hoboken, NJ: Wiley.
- Kerr, P., Rollins, J., & Theohary, C. (2010). The Stuxnet computer worm: Harbinger of an emerging warfare capability. Washington, DC: Congressional Research Service. Retrieved from http://pubs.mantisintel.com/R41524.pdf
- Kim, H.-J. (2009, July 11). North Korea army, Lab 110, suspected over cyber attacks. Huffington Post. Retrieved from http://www.huffingtonpost.com/2009/07/11/north-korea-army-lab-110-_n_229986.html
- Kitchin, R., & Dodge, M. (2011). Code/space: Software and everyday life. Boston, MA: MIT Press.
- Krapp, P. (2005). Terror and play, or what was hacktivism? Grey Room, 21(8), 70–93. doi: 10.1162/152638105774539770
- Landler, M., & Markoff, J. (2007, May 29). Digital fears emerge after data siege in Estonia. New York Times, 29. Retrieved from http://www.nytimes.com/2007/05/29/technology/29estonia.html.
- Libicki, M. (2009). Cyberdeterrence and cyberwar. Santa Monica, CA: RAND Corporation.
- Liff, A. (2012). Cyberwar: A new ‘absolute weapon’? The proliferation of cyberwarfare capabilities and interstate war. Journal of Strategic Studies, 35(3), 401–428. doi: 10.1080/01402390.2012.663252
- Luke, T., & Tuathail, G. Ó. (2000). Thinking geopolitical space: The spatiality of war, speed and vision in the work of Paul Virilio. In M. Crang & N. Thrift (Eds.), Thinking space (pp. 360–379). London: Routledge.
- Lushing, D. (2012, May 4). Syria uses Skype malware to spy on activists: Tech Firm. Newser. Retrieved July 23, 2013, from http://www.newser.com/story/145427/syria-uses-skype-malware-to-spy-on-activists-tech-firm.html
- Malecki, E., & Moriset, B. (2008). The digital economy: Business organisation, production processes, and regional developments. London: Routledge.
- Malpas, J. (2012). Putting space in place: Philosophical topography and relational geography. Environment and Planning D: Society and Space, 30(2), 226–242. doi: 10.1068/d20810
- Marching off to cyberwar. (2008). The Economist Online. Retrieved May 5, 2014, from http://www.economist.com/node/12673385
- Markov, J. (2010a). Before the gunfire, cyberattacks. New York Times. Retrieved May 5, 2014, from http://www.nytimes.com/2008/08/13/technology/13cyber.html?_r=0
- Markov, J. (2010b, September 26). A silent attack, but not a subtle one. New York Times. Retrieved from https://www.nytimes.com/2010/09/27/technology/27virus.html
- Markov, J., & Sanger, D. (2010, September 29). In a computer worm, a possible Biblical clue. New York Times. Retrieved from http://www.nytimes.com/2010/09/30/world/middleeast/30worm.html?pagewanted=1&_r=3&hpw
- Massey, D. (2005). For space. London: Sage.
- Mauro, R. (2009, July 13). North Korea's cyber war. Front Page Magazine. Retrieved from http://www.freerepublic.com/focus/f-news/2291454/posts
- Mazanec, B. (2009). The art of (cyber) war. Journal of International Security Affairs. 16.
- McGraw, G. (2013). Cyber war is inevitable (unless we build security in). Journal of Strategic Studies, 36(1), 109–119. doi: 10.1080/01402390.2012.742013
- McWilliams, B. (2003, June 2). North Korea's school for hackers. Wired, Retrieved from http://www.wired.com/politics/law/news/2003/06/59043
- Menn, J. (2013, May 18). Cyber attacks against banks more severe than most realize. Reuters. Retrieved August 5, 2013, from http://www.reuters.com/article/2013/05/18/us-cyber-summit-banks-idUSBRE94G0ZP20130518
- Miles, K. (2014). Security experts warn of possible Russian cyberattack against the U.S., Ukraine. Retrieved May 5, 2014, from http://www.huffingtonpost.com/2014/04/30/russian-cyberattack-us-ukraine_n_5237377.html
- Morozov, E. (2012). The net delusion: The dark side of internet freedom. New York: PublicAffairs.
- Murdoch, J. (2006). Post-structuralist geography: A guide to relational space. London: Sage.
- Paasi, A. (2004). Place and region: Looking through the prism of scale. Progress in Human Geography, 28(4), 536–546. doi: 10.1191/0309132504ph502pr
- Palka, E., & Galgano, F. (2005). Military geography from peace to war. New York: McGraw-Hill.
- Pérez-Peña, R. (2013, July 17). Universities face a rising barrage of cyberattacks. New York Times, pp. 1–15.
- Perlroth, N. (2013, May 17). Hunting for Syrian hackers’ chain of command. New York Times, p. B1.
- Poindexter, D. (2013). The Chinese information war: Espionage, cyberwar, communications control and related threats to United States interests. Jefferson, NC: MacFarland.
- Popescu, G. (2012). Bordering and ordering the twenty-first century. Lanham, MD: Rowman and Littlefield.
- Pötzsch, H. (2013). The emergence of iWar: Changing practices and perceptions of military engagement in a digital era. New Media & Society doi:10.1177/1461444813516834
- Reuters. (2013, June 5). China has ‘mountains of data’ about U.S. cyber attacks: official. Retrieved July 26, 2013, from http://www.reuters.com/article/2013/06/05/us-china-usa-hacking-idUSBRE95404L20130605
- Rid, T. (2012). Cyber war will not take place. Journal of Strategic Studies, 35(1), 5–32. doi: 10.1080/01402390.2011.608939
- Rid, T., & McBurney, P. (2012). Cyber-weapons. The RUSI Journal, 157(1), 6–13. doi: 10.1080/03071847.2012.664354
- Roberts, S., Secor, A., & Zook, M. (2012). Critical infrastructure: Mapping the leaky plumbing of US hegemony. Antipode, 44(1), 5–9. doi: 10.1111/j.1467-8330.2011.00931.x
- Samson, A. (2012). Cyber terrorists threaten fresh attacks against U.S. banks. Fox Business. December 11. Retrieved August 5, 2013, from http://www.foxbusiness.com/industries/2012/12/11/cyber-terrorists-threaten-fresh-attacks-against-us-banks/
- Sang-Hun, C. (2013a, March 23). Computer networks in South Korea are paralyzed in cyberattack. New York Times, p. A5.
- Sang-Hun, C. (2013b, March 16). North Korea sees South and U.S. behind hacks. New York Times, p. 7.
- Sanger, D. E. (2012, June 1). Obama order sped up wave of cyberattacks against Iran. New York Times, p. A1.
- Sanger, D., Barboza, D., & Perlroth, N. (2013, February 19). China's army seen as tied to hacking against U.S. New York Times, p. A1, 9.
- Sanger, D., & Perlroth, N. (2013, May 20). Hackers from China resume attacks on U.S. targets. New York Times, p. A1.
- Schwartz, M. (2013). How South Korea traced hacker to Pyongyang. Information Week, Retrieved from http://www.informationweek.com/security/attacks/how-south-korea-traced-hacker-to-pyongya/240152702
- Scott-Railton, J., & Marquis-Boire, M. (2013). A call to harm: New malware attacks target the Syrian opposition. The Citizen Lab, June 21. Retrieved July 23, 2013, from https://citizenlab.org/2013/06/a-call-to-harm/
- Shaw, I. (2013). Predator empire: The geopolitics of US drone warfare. Geopolitics, 18(3), 536–559. doi: 10.1080/14650045.2012.749241
- Stohl, M., Myers, P., & Danis, M. (2008). The dark side of WEB 2.0: Criminals; terrorists, the state and cyber security. Harvard Asia Pacific Review, 9(2), 47–50.
- Strohm, C., & Klimasinska, K. (2014). Officials say Russian hackers may retaliate for sanctions. Bloomberg News. Retrieved May 5, 2014, from http://www.bloomberg.com/news/2014-04-26/officials-say-russian-hackers-may-retaliate-for-sanctions.html
- Tandon, S. (2011). US in new push to break China Internet firewall. AFP. Retrieved August 5, 2013, from http://www.google.com/hostednews/afp/article/ALeqM5gQDwIqmcmreKnPDpFpUM1YOwBRrg
- T. P. (2013, February 19). Hello, Unit 61398. The Economist Online. Retrieved July 2, 2013, from http://www.economist.com/blogs/analects/2013/02/chinese-cyber-attacks
- Trayner, I. (2007). Russia accused of unleashed cyberwar to disable Estonia. The Guardian. Retrieved May 5, 2014, from http://www.theguardian.com/world/2007/may/17/topstories3.russia.
- Virilio, P. (1986). Speed and politics. New York: Semiotext(e).
- Virilio, P. (1995). The art of the motor. Minneapolis: University of Minnesota Press.
- Virilio, P. (1999). The politics of the very worst. New York: Semiotext(e).
- Woodyard, C. (2014). Milken 2014: Russia could wage cyberwar on U.S. USA Today. Retrieved May 5, 2014, from http://www.usatoday.com/story/money/business/2014/04/30/russia-cyber-attack/8500661/
- Zook, M., & Graham, M. (2007). The creative reconstruction of the internet: Google and the privatization of cyberspace and digiplace. Geoforum, 38(6), 1322–1343. doi: 10.1016/j.geoforum.2007.05.004