References
- Administration of Donald J. Trump. (2017). Administration of Donald J. Trump, 2017 Executive Order 13800-Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Administration of Donald J. Trump, 2017 Executive Order 13800-Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Daily Compilation of Presidential Documents, 1–8.
- Barnes, J. E. (2020, September 22). Russia continues interfering in election to try to help trump, U.S. Intelligence says. The New York Times. https://www.nytimes.com/2020/08/07/us/politics/russia-china-trump-biden-election-interference.html.
- Berger, A. M. (2017). The end of the war as we know it: How an act of cyber warfare could impact the U.S. Energy Grid. Journal of Technology Law & Policy, 22, 141–164.
- Boussios, E. (2019). ICT, politics, and cyber intelligence: Revisiting the case of snowden. In A. Visvizi & L. Miltiades (Ed.), Politics and technology in the post-truth era, West Yorkshire (pp. 115–128). Emerald Group Publishing.
- Cyber Tops List of Threats to U.S., Director of National Intelligence [WWW Document]. (2018). U.S. Department of Defense. https://www.defense.gov/Explore/News/Article/Article/1440838/cyber-tops-list-of-threats-to-us-director-of-national-intelligence-says/.
- Dunn, J. P. (2016). Nixon’s nuclear specter: The secret alert of 1969, Madman diplomacy, and the Vietnam War. Choice: Current Reviews for Academic Libraries, 53, 940.
- Eichensehr, K. E. (2014). Tallinn manual on the international law applicable to cyber warfare; edited by Michael N. Schmitt. American Journal of International Law, 108(3), 585–589. https://doi.org/10.5305/amerjintelaw.108.3.0585
- Farrell, M. B., Starks, T., Bade, G. (2019). Trump is rattling sabers in cyberspace — but is the U.S. ready? [WWW Document]. Politico. https://politi.co/2jJjsVz.
- Granville, S. (2018). Nixon’s nuclear specter: The secret alert of 1969, Madman Diplomacy, and the Vietnam War Burr William Kimball Jeffrey P. Army History 48.
- Healey, J. (2013). China is a cyber victim, too. Foreign Policy. https://foreignpolicy.com/2013/04/16/china-is-a-cyber-victim-too/.
- Howard, T. D., & Arimatéia da Cruz, J. d. (2017). Stay the course: Why trump must build on Obama’s cybersecurity policy. Information Security Journal: A Global Perspective, 26(6), 276–286. https://doi.org/10.1080/19393555.2017.1385115
- Jarmon, J. A. (1951–2014). The new era in U.S. national security: An introduction to emerging threats and challenges. Rowman & Littlefield Publishers, Inc.
- Kimball, J. P., Burr, W. (2018). Nixon, Thieu, and the Bomb: CIA report sheds light on Richard Nixon’s Madman Diplomacy. Unredacted. https://unredacted.com/2018/02/20/thieu-and-the-bomb-cia-report-sheds-light-on-richard-nixons-madman-diplomacy/.
- Klein, J. X. (2018). ‘This must stop’: China accused of ‘huge hacks to steal trade secrets’ [WWW Document]. South China Morning Post. https://www.scmp.com/news/world/united-states-canada/article/21,78,981/us-and-more-dozen-allies-condemn-china-economic
- Lin, Y.-Y. (2019). China cyber warfare and cyber force. Tamkang Journal of International Affairs/淡江國際研究, 22, 119. https://doi.org/10.6185/TJIA.V.201901_22(3).0003
- Mansfield-Devine, S. (2017). Ransomware: The most popular form of attack. Computer Fraud & Security, 2017(10), 15–20. https://doi.org/10.1016/S1361-3723(17)30092-1
- Mazzetti, M. (2020). Senate panel details ties between 2016 Trump campaign and Russia – The New York Times. https://www.nytimes.com/2020/08/18/us/politics/senate-intelligence-russian-interference-report.html.
- Margulies, P. (2017). Global cybersecurity, surveillance, and privacy: The Obama administration’s conflicted legacy. Indiana Journal of Global Legal Studies, 24, 459–496. https://doi.org/10.2979/indjglolegstu.24.2.0459
- Marks, J. (2019). Analysis | The Cybersecurity 202: CyberCom sent a message by taking down a troll farm on Election Day. Was Russia listening? Washington Post.
- Munro, N. (2002). Who will raise the cyber-shield? The Bush administration deleted detailed recommendations before releasing its cybersecurity plan. National Journal-Washington, DC-2812.
- Nakashima, E. (2018). Trump gives the military more latitude to use offensive cyber tools against adversaries [WWW Document]. Washington Post. https://www.washingtonpost.com/world/national-security/trump-gives-the-military-more-latitude-to-use-offensive-cyber-tools-against-adversaries/2018/08/16/75f7a100-a160-11e8-8e87-c869fe70a721_story.html.
- Nechepurenko, I. (2019). Kremlin warns of cyberwar after report of U.S. hacking into Russian power grid – The New York Times [WWW Document]. The New York Times. https://www.nytimes.com/2019/06/17/world/europe/russia-us-cyberwar-grid.html.
- Network Security Tool Examples & Usage. (2019). Awake Security. Retrieved August 22, 2019, from https://awakesecurity.com/glossary/network-security-tools/.
- New York Times. (2018a). U.S. begins first cyberoperation against Russia aimed at protecting elections. Oswego News (NY).
- New York Times. (2018b). U.S. begins first cyberoperation against Russia aimed at protecting elections. Oswego News (NY). ).
- Nichter, J. R., Luke, A. (2014). Madman in the White House. Foreign Policy. https://foreignpolicy.com/2014/03/25/madman-in-the-white-house/.
- Pontbriand, K. (2019). Cyber entanglement: A framework for the study of U.S.–China relations. Proceedings of the European Conference on Cyber Warfare & Security 702.
- Power, A., & Oisin, T. (2011). Soft Law for the internet, lessons from international law. SCRIPTed: A Journal of Law, Technology and Society, 8(1), 31–45.
- President Bush signs cybersecurity R&D bill. (2002). Issues in Science and Technology 19, 21.
- Review, N. (n.d). The history of cyber attacks – A timeline [WWW Document]. NATO Review. http://www.nato.int/docu/review/2013/Cyber/timeline/EN/index.htm.
- Sanger, D. E., & Perlroth, N. (2019). U.S. escalates online attacks on Russia’s power grid. The New York Times.
- Stellios, I., Kotzanikolaou, P., Psarakis, M., Alcaraz, C., & Lopez, J. (2018). A survey of IoT-enabled cyberattacks: Assessing attack paths to critical infrastructures and services. IEEE Communications Surveys & Tutorials, 20(4), 3453–3495. https://doi.org/10.1109/COMST.2018.2855563
- The National Strategy to Secure Cyberspace. (2003). Department of Homeland Security.
- The White House. (2018). National Cyber Strategy of the United States of America. https://www.whitehouse.gov/wpcontent/uploads/2018/09/National-Cyber-Strategy.pdf.
- Trump, D. J. (2018). Letter to Congressional Leaders Transmitting the National Cyber Strategy and Classified Annex. Daily Compilation of Presidential Documents, 1–1.
- Visvizi, A. (2015). Safety, risk, governance and the Eurozone crisis: Rethinking the conceptual merits of ‘global safety governance’. In P. Kłosińska-Dąbrowska (Ed.), Essays on global safety governance: Challenges and solutions (pp. 21–39). Centre for Europe, University of Warsaw, ASPRA-JR.
- What is a data breach? [WWW Document], n.d. https://us.norton.com/internetsecurity-privacy-data-breaches-what-you-need-to-know.html.
- Wolff, J. (2018). Opinion | Trump’s reckless cybersecurity strategy. The New York Times.