References
- Altman, Dan. 2016. “The Long History of ‘Green Men’ Tactics – And How They Were Defeated.” War on the Rocks, March 17, 2016. https://warontherocks.com/2016/03/the-long-history-of-green-men-tactics-and-how-they-were-defeated/.
- Anderson, Collin, and Karim Sadjapour. 2018. Iran’s Cyber Threat: Espionage, Sabotage, and Revenge. Washington, DC: Carnegie Endowment for International Peace.
- Bellovin, Steven M., Susan Landau, and Herbert Lin. 2019. “Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications.” In Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations, edited by Herbert Lin, and Amy Zegart, 265–288. Washington, DC: Brookings Institute Press.
- Bennett, John C. 1961. “Reinhold Niebuhr’s Social Ethics.” In Reinhold Niebuhr: His Religious, Social, and Political Thought, edited by Charles W. Kegley, and Robert W. Bretall, 45–78. New York: The Macmillan Company.
- Buchanan, Ben. 2016. The Cybersecurity Dilemma: Hacking, Trust, and Fear Between Nations. New York: Oxford University Press.
- Buchanan, Ben. 2020. The Hacker and the State. Cambridge, MA: Harvard University Press.
- Chen, Thomas M. 2014. Cyberterrorism After Stuxnet. Carlisle Barracks, PA: Strategic Studies Institute, US Army War College.
- Crosston, Matthew D. 2011. “World Gone Cyber MAD: How ‘Mutually Assured Debilitation’ Is the Best Hope for Cyber Deterrence.” Strategic Studies Quarterly 5 (1): 100–116. https://www.jstor.org/stable/10.230726270512.
- “Cyber Capabilities and National Power: A Net Assessment”. 2021. International Institute for Strategic Studies, June 28, 2021. https://www.iiss.org/blogs/research-paper/2021/06/cyber-capabilities-national-power.
- Fazzini, Kate. 2019. “Why Some of the World’s Top Cybersecurity Hackers Are Being Paid Millions to Use Their Powers for Good.” CNBC, May 18, 2019. https://www.cnbc.com/2019/05/17/cybersecurity-hackers-are-paid-millions-to-use-their-powers-for-good.html.
- Gervais, Michael. 2012. “Cyber Attacks and the Laws of War.” Journal of Law & Cyber Warfare 1 (1): 8–98. https://www.jstor.org/stable/26441233.
- Giles, Martin. 2019. “Triton Is the World’s Most Murderous Malware, and It’s Spreading.” MIT Technology Review, March 5, 2019. https://www.technologyreview.com/2019/03/05/103328/cybersecurity-critical-infrastructure-triton-malware/.
- Goldman, Emily O., and Michael Warner. 2017. “Why a Digital Pearl Harbor Makes Sense … and Is Possible.” In Understanding Cyber Conflict: Fourteen Analogies, edited by George Perkovich, and Ariel E. Levite, 147–157. Washington, DC: Georgetown University Press.
- Greenberg, Andy. 2022. “North Korea Hacked Him. So He Took Down Its Internet.” WIRED, February 2, 2022. https://www.wired.com/story/north-korea-hacker-internet-outage/.
- Hastey, Joshua Adam, and Adam Knight. 2021. “New Under the Sun?: Reframing the Gray Zone in International Security.” Journal of Strategic Security 14 (4): 21–36. https://doi.org/10.5038/1944-0472.14.4.1966.
- Hatch, Benjamin B. 2018. “Defining a Class of Cyber Weapons as WMD: An Examination of the Merits.” Journal of Strategic Security 11 (1): 43–61. https://www.jstor.org/stable/10.230726466905.
- Ilevičius, Paulius. 2022. “Stuxnet Explained — the Worm That Went Nuclear.” NordVPN, March 10, 2022. https://nordvpn.com/blog/stuxnet-virus.
- Jervis, Robert. 1978. “Cooperation Under the Security Dilemma.” World Politics 30 (2): 167–214. http://www.jstor.org/stable/2009958.
- Johnson, James Turner. 2005. The War to Oust Saddam Hussein: Just War and the New Face of Conflict. New York: Rowman & Littlefield.
- Kardon, Steve. 2021. “Florida Water Treatment Plant Hit with Cyber Attack.” Industrial Defender, February 9, 2021. https://www.industrialdefender.com/florida-water-treatment-plant-cyber-attack/.
- Kushner, David. 2013. “The Real Story of Stuxnet.” IEEE Spectrum 50 (3): 48–53.
- Kuznia, Rob, Blake Ellis, Daniel A. Medina, Isabelle Chapman, and Bob Ortega. 2022. “US Has ‘Significant’ Cyber Vulnerabilities, but a Sweeping Russian Cyberattack is Unlikely.” CNN, March 16, 2022. https://www.cnn.com/2022/03/16/politics/russia-us-cyberattack-infrastructure-invs/index.html.
- Lachow, Irving. 2011. “The Stuxnet Enigma: Implications for the Future of Cybersecurity.” Georgetown Journal of International Affairs 12: 118–126. https://www.jstor.org/stable/43133820.
- Lango, John. 2019. “Just War Theory, Armed Force Short of War and Escalation to War.” In Force Short of War in Modern Conflict: Jus ad Vim, edited by Jai Galliot, 148–169. Edinburgh: Edinburgh University Press.
- Lin, Herbert. 2020. “Reflections on the SolarWinds Breach.” Lawfare, December 22, 2020. https://www.lawfareblog.com/reflections-solarwinds-breach.
- Lyngaas, Sean. 2021. “US Warns Hundreds of Millions of Devices at Risk from Newly Revealed Software Vulnerability.” CNN, December 14, 2021. https://www.cnn.com/2021/12/13/politics/us-warning-software-vulnerability/index.html.
- Maschmeyer, Lennart. 2021. “The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations.” International Security 46 (2): 51–90.
- May, Larry. 2007. War Crimes and Just War. New York: Cambridge University Press.
- McKeogh, Colm. 1997. The Political Realism of Reinhold Niebuhr: A Pragmatic Approach to Just War. New York: St. Martin’s Press.
- McMahan, Jeff. 2004. “The Ethics of Killing in War.” Ethics 114 (4): 693–733. https://doi.org/10.1086/422400.
- Mehrotra, Kartikay. 2021. “U.S. Water and Power Are Shockingly Vulnerable to Cyberhacks.” Bloomberg, June 14, 2021. https://www.bloomberg.com/news/articles/2021-06-12/u-s-water-and-power-are-shockingly-vulnerable-to-cyberhacks.
- Murphy, James. 2014. War’s Ends: Human Rights, International Order, and the Ethics of Peace. Washington, DC: The Georgetown University Press.
- National Conference of Catholic Bishops. 1983. The Challenge of Peace: God’s Promise and Our Response: A Pastoral Letter on War and Peace. May 3, 1983. https://www.usccb.org/upload/challenge-peace-gods-promise-our-response-1983.pdf.
- Newman, Lily Hay. 2021. “North Korea Targets—and Dupes—Cybersecurity Experts.” WIRED, January 26, 2021. https://www.wired.com/story/north-korea-hackers-target-cybersecurity-researchers/.
- Niebuhr, Reinhold. 2021. Moral Man Immoral Society: A Study in Ethics and Politics. Louisville, KY: Westminster John Knox Press.
- O’Brien, William V. 1981. The Conduct of Just and Limited War. New York: Praeger Publishers.
- Oeter, Stefan. 1999. “Methods and Means of Combat.” In The Handbook of Humanitarian Law in Armed Conflicts, edited by Dieter Fleck, 105–207. New York: Oxford University Press.
- Patterson, Eric. 2016. “Just War Theory and Terrorism.” Providence, November 30, 2016. https://providencemag.com/2016/11/just-war-theory-terrorism/.
- Porche, Isaac R., Jerry M. Sollinger, and Shawn McKay. 2011. A Cyberworm That Knows No Boundaries. Santa Monica, CA: RAND Corporation.
- Ramsey, Paul. 2002. The Just War: Force and Political Responsibility. New York: Rowman & Littlefield.
- Schmitt, Michael N., ed. 2013. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press.
- Schneider, Jacquelyn. 2017. “Cyber and Crisis Escalation: Insights from Wargaming.” USASOC Futures Forum 43. http://pacs.einaudi.cornell.edu/sites/pacs/files/Schneider.Cyber%20and%20Crisis%20Escalation%20Insights%20from%20Wargaming%20Schneider%20for%20Cornell.10-12-17.pdf.
- Schneider, Jacquelyn. 2019. “Persistent Engagement: Foundation, Evolution and Evaluation of a Strategy.” Lawfare, May 10, 2019. https://www.lawfareblog.com/persistent-engagement-foundation-evolution-and-evaluation-strategy.
- Slayton, Rebecca. 2017. “What Is the Cyber Offense-Defense Balance?: Conceptions, Causes, and Assessment.” International Security 41 (3): 72–109. https://doi.org/10.1162/ISEC_a_00267.
- Smeets, Max. 2018. “The Strategic Promise of Offensive Cyber Operations.” Strategic Studies Quarterly 12 (3): 90–113.
- Smotherman, Joseph W. 2016. “Justified Physical Response to Cyber Attacks.” Army War College Review 2 (3): 43–53.
- St. Augustine. 2003. City of God. Translated by Henry Bettenson. London: Penguin Classics.
- Toner, Christopher. 2010. “The Logical Structure of Just War Theory.” The Journal of Ethics 14 (2): 81–102.
- Tsui, Sabrina. 2018. “Stuxnet.” Dangerous World: Understanding Existential Risks. UC Santa Cruz, Baskin Engineering. March 12, 2018. https://dangerousworld.soe.ucsc.edu/2018/03/12/stuxnet/.
- Van Dine, Alexandra. 2017. “After Stuxnet: Acknowledging the Cyber Threat to Nuclear Facilities.” In Project on Nuclear Issues: A Collection of Papers from the 2016 Nuclear Scholars Initiative and PONI Conference Series, edited by Mark Cancian, 101–114. Washington, DC: Center for Strategic and International Studies (CSIS).
- Vergun, David. 2021. “‘Persistent Engagement’ Strategy Paying Dividends, Cybercom General Says.” DOD News, November 10, 2021. https://www.defense.gov/News/News-Stories/Article/Article/2840284/persistent-engagement-strategy-paying-dividends-cybercom-general-says/.
- Walzer, Michael. 2006a. Just and Unjust Wars: A Moral Argument with Historical Illustrations. 4th ed. New York: Basic Books.
- Walzer, Michael. 2006b. “Regime Change and Just War.” Dissent 53 (3): 103–108.