847
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Another manifestation of cyber conflict: attaining military objectives through cyber avenues of approach

Pages 167-187 | Received 15 Nov 2017, Accepted 05 Apr 2018, Published online: 25 Apr 2018

References

  • Aday, S., et al., 2012. Blogs and bullets II. Washington, DC: United States Institute for Peace Peaceworks Paper.
  • Addington, L., 1994. The patterns of war since the eighteenth century. Bloomington, IN: Indiana University Press.
  • Alexander, K., 2007. Warfighting in cyberspace. Joint force quarterly, 46 (3), 58–61.
  • Anti-Defamation League, 2002. Jihad online: Islamic terrorists and the internet [online]. New York, NY: Anti-Defamation League. Available from: https://www.scribd.com/document/115895915/Jihad-Online-Islamic-Terrorists-and-the-Internet [Accessed 16 October 2017].
  • Baker, R., 2007. HUMINT-centric operations. Military review, 87 (2), 12–21.
  • Berger, J. and Morgan, J., 2015. The ISIS Twitter Census. Washington, DC: Brookings Analysis Paper.
  • Beyerchen, A., 1992. Clausewitz, nonlinearity and the unpredictability of war. International security, 17 (3), 59–90.
  • Bloom, D., Canning, D., and Fink, G., 2008. Urbanization and the wealth of nations. Boston, MA: Harvard Initiative for Global Health Working Paper.
  • Bodine-Baron, E., et al., 2016. Examining ISIS support and opposition networks on Twitter. Santa Monica, CA: RAND.
  • Bolger, D., 2014. Why we lost. New York, NY: Houghton Mifflin Harcourt.
  • Cerf, V. and Kahn, R., 1974. A protocol for packet network intercommunication. Institute of electrical and electronics engineers (IEEE) transactions on communications, 22 (5), 637–648.
  • Chan-Olmsted, S., Cho, M. and Lee, S., 2013. User perceptions of social media. Online journal of communication and media technologies, 3 (4), 149–178.
  • Cisco, 2016. Cisco visual networking index: global mobile data traffic forecast update, 2015-2020 [online]. San Jose, CA: Cisco Systems, white paper Available from: https://www.cisco.com/c/dam/m/en_in/innovation/enterprise/assets/mobile-white-paper-c11-520862.pdf [Accessed 16 October 2017].
  • Clarke, R. and Knake, R., 2010. Cyber war. New York, NY: HarperCollins.
  • Clausewitz, C., 1976. On war. M. Howard and P. Paret, trans. and ed. Princeton, NJ: University Press.
  • Crevald, M., 2004. Supplying war. 2nd ed. Cambridge: University Press.
  • D’Souza, S. 2015. Smartphone market in the GCC way ahead of the West. bq Magazine [online], 2 March. Available from: https://alexkoshy338.wordpress.com/2016/10/10/smartphone-market-in-the-gcc-way-ahead-of-the-west/ [Accessed 16 October 2017].
  • Decker, S., and Saitto S., 2014. Uber seeks to patent pricing surges that critics call gouging. Bloomberg business [online], 19 December. Available from: http://www.bloomberg.com/news/articles/2014-12-18/uber-seeks-to-patent-pricing-surges-that-critics-call-gouging [Accessed 16 October 2017].
  • Department of the Army, 2006. Field manual (FM) 2-22.3: human intelligence collector operations. Washington, DC: US Government Printing Office.
  • Department of the Army, 2011. Army tactics, techniques, and procedures (ATTP) 4–10: operational contract support. Washington, DC: US Government Printing Office.
  • Dombrowski, P. and Demchak, C., 2014. Cyber war, cybered conflict, and the maritime domain. Naval war college review, 67 (2), 71–96.
  • Dorman, E. and Latham, W., 2016. Operational contract support. Military review, 96 (6), 52–59.
  • Drury, G., 2008. Opinion piece: Social media: should marketers engage and how can it be done effectively? Journal of direct, data and digital marketing practice, 9 (3), 274–277.
  • Dunigan, M., 2014. The future of US military contracting: current trends and future implications. International journal, 69 (4), 510–524.
  • Economist, 2015a. There’s an app for that. Economist, 3 January, 17–19.
  • Economist, 2015b. Your money or your data. Economist, 17 January, 57.
  • Economist, 2015c. Planet of the phones. Economist, 28 February, 9.
  • Economist, 2015d. Ski-fi. Economist, 11 April, 72–74.
  • Economist, 2015e. The pioneering continent. Economist [online], 25 April. Available from: http://www.economist.com/news/middle-east-and-africa/21649516-innovation-increasingly-local-pioneering-continent [Accessed 16 October 2017].
  • Ericsson, 2014. Ericsson mobility report November 2014 [online]. Stockholm: Ericsson. Available from: https://www.slideshare.net/Ericsson/ericsson-mobility-report-november-2014 [Accessed 17 October 2017].
  • Evans, M., 2009. Lethal genes. Journal of strategic studies, 32 (4), 515–552.
  • Falk, M., 2009. Iraqi transportation network. Army sustainment, 41 (6), 54–55.
  • Fontaine, R. and Rogers, W., 2011. Internet freedom: a foreign policy imperative in the digital age. Washington, DC: Center for a New American Security.
  • Fridman, O., 2012. Civilians on the battlefield. Small wars journal [online]. Available from: http://smallwarsjournal.com/node/12089 [Accessed 16 October 2017].
  • Galula, D., 2006. Counterinsurgency warfare: theory and practice. Westport, CT: Praeger.
  • Gartzke, E., 2013. The myth of cyberwar. International security, 38 (2), 41–73.
  • Grübler, A., 1990. The rise and fall of infrastructures. Heidelberg: Physica-Verlag.
  • Hoffman, B., 2006. The use of the internet by Islamic extremists. Santa Monica, CA: RAND Testimony presented to the House Permanent Select Committee on Intelligence.
  • Hoffman, F., 2009. Hybrid warfare and challenges. Joint force quarterly, 52 (1), 34–39.
  • Horn, B., 2016. On hybrid warfare. Winnipeg: Publishing Office.
  • Kemp, S., 2015. Global digital & social media stats: 2015 [online]. Social Medial Today. Available from: http://www.socialmediatoday.com/content/global-digital-social-media-stats-2015 [Accessed 21 May 2016].
  • Kesling, B., and Nabhan, A., 2016. Iraqis seek help in restored cell service. Wall Street Journal Europe, 2 November, A3.
  • Kobrin, S., 1998. Back to the future: neomedievalism and the post modern digital world. Journal of international affairs, 51 (2), 361–386.
  • Leng, B., Wang, Y., and Zhao, W., 1999. Bringing Internet warfare into the military system is of equal significance with land, sea and air power. Liberation army daily, 11 November, 7.
  • Libicki, M., 2007. Conquest in cyberspace. Cambridge, NY: University Press.
  • Libicki, M., 2009. Cyberdeterrence and cyberwar. Santa Monica, CA: RAND.
  • Liddell Hart, B.H., 1954. Strategy: the indirect approach [online]. London: Faber. Available from: https://archive.org/details/strategyofindire035126mbp [Accessed 10 October 2017].
  • Lynn, W., 2010. Defending a new domain. Foreign affairs [online], 89 (5). Available from: https://www.foreignaffairs.com/articles/united-states/2010-09-01/defending-new-domain [Accessed 14 October 2017].
  • Mantel, B., 2009. Terrorism and the internet. CQ researcher, 3 (11), 285–310.
  • Maurer, B., Nelms, T. and Swartz, L., 2013. When perhaps the real problem is money itself. Social semiotics, 23 (2), 261–277.
  • McCroskey, E. and Monk, C., 2017. Operational graphics for cyberspace. Joint forces quarterly, 85 (2), 42–49.
  • McGrath, J., 2006. Boots on the ground. Fort Leavenworth, KS: Combat Studies Institute Press Occasional Paper.
  • Moghaddam, F., 2005. The staircase to terrorism: a psychological exploration. American psychologist, 60 (2), 161–169.
  • Murray, W. and Millett, A., eds., 1996. Military innovation in the interwar period. Cambridge: University Press.
  • National Intelligence Council, 2012. Global trends 2030: alternative worlds. Washington, DC: Government Printing Office.
  • Oh, O., Agrawal, M. and Rao, R., 2011. Information control and terrorism. Information systems frontiers, 13 (1), 33–43.
  • Olsen, G., 2004. Neo-medievalism in Africa. In: N. Winn, ed. Neo-medievalism and civil wars. London: Frank Cass, 71–89.
  • Rapley, J., 2006. The new Middle Ages. Foreign affairs [online], 85 (3). Available from: https://www.foreignaffairs.com/articles/2006-05-01/new-middle-ages [Accessed 14 October 2017].
  • Rid, T., 2012. Cyber war will not take place. Journal of strategic studies, 35 (1), 5–32.
  • Ripley, T., 2011. War of words - social media as a weapon in Libya’s conflict. Jane’s intelligence review, 23 (9), 1–9.
  • Sajithra, K., and Patil, R., 2013. Social media – history and components. International organization of scientific research journal of business and management, 7 (1), 69–74.
  • Schmitt, M., 2010. Cyber operations in international law. In National Research Council, eds. Proceedings of a workshop on deterring cyberattacks: informing strategies and developing options for U.S. policy. Washington, DC: National Academies Press, 151–178.
  • Schnaufer, T., 2017. Redefining hybrid warfare. Journal of strategic security, 10 (1), 17–31.
  • Smith, G., 2011. How social media users are helping NATO fight Gadhafi in Libya. The globe and mail [online], 14 June. Available from: https://www.theglobeandmail.com/news/world/how-social-media-users-are-helping-nato-fight-gadhafi-inlibya/article583325/ [Accessed 15 January 2018].
  • Staff, Joint, 2008. Joint publication (JP) 4–10: operational contract support. Washington, DC: US Government Printing Office.
  • Stallings, R. and Foley, M., 2003. CI and HUMINT operations in support of operation Enduring Freedom. Military intelligence, 29 (4), 43–46.
  • Stone, J., 2012. Cyber war will take place!. Journal of strategic studies, 36 (1), 101–108.
  • Theohary, C. and Rollins, J., 2011. Terrorist use of the internet: information operations in cyberspace. Washington, DC: Congressional Research Service Report.
  • Tunnicliffe, I. and Tatham, S., 2017. Social media–the vital ground: can we hold it? Carlisle, PA: US Army War College Press Letort Paper.
  • Tzu, S., 1963. The art of war. S. B. Griffith, trans. and ed. Oxford: Clarendon Press.
  • United Nations, 2015. World population prospects: the 2015 revision. New York, NY: Department of Economic and Social Affairs.
  • US Defense Department, 2017. DOD dictionary of military and associated terms [online]. Available from: http://www.dtic.mil/doctrine/new_pubs/dictionary.pdf [Accessed 10 November 2017].
  • Uttley, M., 2004. Private contractors on deployed operations: the United Kingdom experience. Defence studies, 4 (2), 145–165.
  • Uttley, M. and Kinsey, C., 2012. The role of logistics in war. In: J. Lindley-French and Y. Boyer, eds. The Oxford handbook of war. Oxford: University Press, 401–416.
  • Waldman, T., 2010. Politics and war: Clausewitz’ paradoxical equation. Parameters, 40 (3), 1–13.
  • Wenger, A. and Mason, S., 2008. The growing importance of civilians in armed conflict. C. Findlay, trans. Center for security studies (CSS) analyses in security policy, 3 (45), 1–3.
  • Williams, D. and Latham, W., 2016. Sustainers should understand operational contract support. Army sustainment, 48 (3), 4–5.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.