References
- Aitel, Dave, and Matt Tait. 2016. “Everything You Know about the Vulnerability Equities Process is Wrong’.” Lawfare, August 18. Accessed June 15, 2021. https://www.lawfareblog.com/everything-you-know-about-vulnerability-equities-process-wrong.
- Alperovitch, Dmitri, and Ian Ward. 2021. “How Should the U.S. Respond to the SolarWinds and Microsoft Exchange Hacks?” Lawfare, March 12. Accessed August 26, 2021. https://www.lawfareblog.com/how-should-us-respond-solarwinds-and-microsoft-exchange-hacks.
- Baig, Reda. 2019. “Could Offensive Cyber Capabilities Tip India and Pakistan to War?” The Diplomat, March 26. Accessed August 26, 2021. https://thediplomat.com/2019/03/could-offensive-cyber-capabilities-tip-india-and-pakistan-to-war/.
- BBC. 2013. “Indonesia Leader Says Australia Spying Damaged Ties.” November 19. Accessed June 24, 2021. https://www.bbc.co.uk/news/world-asia-24986093.
- Bernal, Paul. 2016. “Data Gathering, Surveillance and Human Rights: Recasting the Debate.” Journal of Cyber Policy 1 (2): 243–264. doi:https://doi.org/10.1080/23738871.2016.1228990.
- Biden-Harris Transition. 2020. “Statement by President-elect Joe Biden on Cybersecurity, 17 December.” Accessed June 15, 2021. https://buildbackbetter.gov/press-releases/statement-by-president-elect-joe-biden-on-cybersecurity/.
- Bing, Christopher. 2020. “Hackers Spied on US Treasury Emails for a Foreign Government – Sources.” Reuters, December 13. Accessed June 15, 2021. https://uk.reuters.com/article/usa-cyber-treasury/exclusive-hackers-spied-on-u-s-treasury-emails-for-a-foreign-government-sources-idUSL1N2IT0KK.
- Bing, Christopher, and Joel Schectman. 2019. “Project Raven: Inside the UAE’s Secret Hacking Team of American Mercenaries.” Reuters, January 30. Accessed August 25, 2021. https://www.reuters.com/investigates/special-report/usa-spying-raven/.
- Boeke, Sergei, and Dennis Broeders. 2018. “The Demilitarisation of Cyber Conflict.” Survival 60 (6): 73–90. doi:https://doi.org/10.1080/00396338.2018.1542804.
- Borger, Julian. 2013. “Brazilian President: US Surveillance a ‘Breach of International Law’.” The Guardian, September 24. Accessed June 24, 2021. https://www.theguardian.com/world/2013/sep/24/brazil-president-un-speech-nsa-surveillance.
- Borghard, Erica. 2021a. “What Makes This Attribution of Chinese Hacking Different.” Carnegie Endowment for International Peace, July 22. Accessed August 26, 2021. https://carnegieendowment.org/2021/07/22/what-makes-this-attribution-of-chinese-hacking-different-pub-85023.
- Borghard, Erica. 2021b. “Was SolarWinds a Different Type of Cyber Espionage?” Lawfare, March 9. Accessed June 22, 2021. https://www.lawfareblog.com/was-solarwinds-different-type-cyber-espionage.
- Buchan, Russell. 2019. Cyber Espionage and International Law. Oxford: Hart Publishing.
- Buchanan, Ben. 2018. The Cybersecurity Dilemma: Hacking, Trust, and Fear between Nations. London: Hurst & Company.
- Cayford, Michelle, Wolter Pieters, and Constant Hijzen. 2018. “Plots, Murders, and Money: Oversight Bodies Evaluating the Effectiveness of Surveillance Technology.” Intelligence and National Security 33 (7): 999–1021. doi:https://doi.org/10.1080/02684527.2018.1487159.
- Daniel, Michael. 2014. “Heartbleed: Understanding When We Disclose Cyber Vulnerabilities.” The White House, April 28. Accessed June 15, 2021. https://obamawhitehouse.archives.gov/blog/2014/04/28/heartbleed-understanding-when-we-disclose-cyber-vulnerabilities.
- Deibert, Ronald J. 2013. Black Code: Inside the Battle for Cyberspace. Toronto, ON: Signal.
- Devanny, Joe. 2020. “The Ethics of Offensive Cyber Operations.” Foreign Policy Centre, December 3. Accessed June 15, 2021. https://fpc.org.uk/the-ethics-of-offensive-cyber-operations/.
- Devanny, Joe. 2021. “‘Madman Theory’ or ‘Persistent Engagement’? The Coherence of US Cyber Strategy Under Trump.” Journal of Applied Security Research. doi:https://doi.org/10.1080/19361610.2021.1872359.
- Devanny, Joe, and Tim Stevens. 2021. “What Will Britain’s New Cyber Force Actually Do?” War on the Rocks, May 26. Accessed June 17, 2021. https://warontherocks.com/2021/05/what-will-britains-new-cyber-force-actually-do/.
- Ebert, Hannes. 2020. “Hacked IT Superpower: How India Secures Its Cyberspace as a Rising Digital Democracy.” India Review 19 (4): 376–413. doi:https://doi.org/10.1080/14736489.2020.1797317.
- Egloff, Florian J. 2020. “Public Attribution of Cyber Intrusions.” Journal of Cybersecurity 6 (1): tyaa012. doi:https://doi.org/10.1093/cybsec/tyaa012.
- Egloff, Florian J., and Max Smeets. 2021. “Publicly Attributing Cyber Attacks: A Framework.” Journal of Strategic Studies. doi:https://doi.org/10.1080/01402390.2021.1895117.
- Emmott, Robin. 2014. “Brazil, Europe Plan Undersea Cable to Skirt US Spying.” Reuters, February 24. Accessed June 24, 2021. https://www.reuters.com/article/us-eu-brazil-idUSBREA1N0PL20140224.
- GCHQ (Government Communications Headquarters). 2018. “The Equities Process.” Accessed June 15, 2021. https://www.gchq.gov.uk/information/equities-process.
- Georgieva, Ilina. 2020. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy 41 (1): 33–54. doi:https://doi.org/10.1080/13523260.2019.1677389.
- Gill, Peter. 2020. “Of Intelligence Oversight and the Challenge of Surveillance Corporatism.” Intelligence and National Security 35 (7): 970–989. doi:https://doi.org/10.1080/02684527.2020.1783875.
- Gioe, David V. 2017. “‘The More Things Change’: HUMINT in the Cyber Age.” In The Palgrave Handbook of Security, Risk and Intelligence, edited by Rob Dover, Huw Dylan, and Michael S. Goodman, 213–227. Basingstoke: Palgrave Macmillan.
- Gioe, David V., Michael S. Goodman, and Tim Stevens. 2020. “Intelligence in the Cyber Era: Evolution or Revolution?” Political Science Quarterly 135 (2): 191–224. doi:https://doi.org/10.1002/polq.13031.
- Goldsmith, Jack. 2020. “Quick Thoughts on the Russia Hack.” Lawfare, December 14. Accessed June 15, 2021. https://www.lawfareblog.com/quick-thoughts-russia-hack.
- Greenwald, Glenn, Ewan MacAskill, and Laura Poitras. 2013. “Edward Snowden: The Whistleblower Behind the NSA Surveillance Revelations.” The Guardian, June 11. Accessed June 15, 2021. https://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance.
- Grigsby, Alex. 2018. “The United Nations Doubles its Workload on Cyber Norms, and Not Everyone is Pleased.” Council on Foreign Relations, November 15. Accessed June 21, 2021. https://www.cfr.org/blog/united-nations-doubles-its-workload-cyber-norms-and-not-everyone-pleased.
- Groll, Elias. 2015. “Clapper: ‘We Don’t Know Exactly What Was Taken in the OPM Breach’.” Foreign Policy, September 24. Accessed June 24, 2021. https://foreignpolicy.com/2015/09/24/clapper-we-dont-know-exactly-what-was-taken-in-the-opm-breach/.
- Hannigan, Robert. 2019. “Organising a Government for Cyber: The Creation of the UK’s National Cyber Security Centre.” Royal United Services Institute Occasional Paper, February 27. Accessed June 25, 2021. https://static.rusi.org/20190227_hannigan_final_web.pdf.
- Harding, Luke. 2014. The Snowden Files: The Inside Story of the World's Most Wanted Man. London: Guardian Faber Publishing.
- Harknett, Richard J. 2020. “SolarWinds: The Need for Persistent Engagement.” Lawfare, December 23. Accessed June 15, 2021. https://www.lawfareblog.com/solarwinds-need-persistent-engagement.
- Harknett, Richard J., and Max Smeets. 2020. “Cyber Campaigns and Strategic Outcomes.” Journal of Strategic Studies. doi:https://doi.org/10.1080/01402390.2020.1732354.
- Harris, Shane. 2014. @War: The Rise of the Military-Internet Complex. New York: Houghton Mifflin Harcourt.
- Healey, Jason. 2019. “The Implications of Persistent (and Permanent) Engagement in Cyberspace.” Journal of Cybersecurity 5 (1): tyz008. doi:https://doi.org/10.1093/cybsec/tyz008.
- Healey, Jason, and Robert Jervis. 2020. “The Escalation Inversion and Other Oddities of Situational Cyber Stability.” Texas National Security Review 3 (4): 30–53. doi:https://doi.org/10.26153/tsw/10962.
- Henriksen, Anders. 2019. “The End of the Road for the UN GGE Process: The Future Regulation of Cyberspace.” Journal of Cybersecurity 5 (1): tyy009. doi:https://doi.org/10.1093/cybsec/tyy009.
- Hitz, Frederick P. 2004. The Great Game: The Myth and Reality of Espionage. New York: Knopf.
- Homburger, Zine. 2019. “The Necessity and Pitfall of Cybersecurity Capacity Building for Norm Development in Cyberspace.” Global Society 33 (2): 224–242. doi:https://doi.org/10.1080/13600826.2019.1569502.
- Hudson, John, and Ellen Nakashima. 2021. “U.S., Allies Accuse China of Hacking Microsoft and Condoning Other Cyberattacks.” Washington Post, July 19. Accessed August 26, 2021. https://www.washingtonpost.com/national-security/microsoft-hack-china-biden-nato/2021/07/19/a90ac7b4-e827-11eb-84a2-d93bc0b50294_story.html.
- Ignatius, David. 2021. “Opinion: An Undeclared War is Breaking Out in Cyberspace. The Biden Administration is Fighting Back.” Washington Post, August 10. Accessed August 26, 2021. https://www.washingtonpost.com/opinions/2021/08/10/an-undeclared-war-is-breaking-out-cyberspace-biden-administration-is-fighting-back/.
- Jervis, Robert. 2016. “Some Thoughts on Deterrence in the Cyber Era.” Journal of Information Warfare 15 (2): 66–73.
- Jones, Marc. 2017. “Hacking, Bots and Information Wars in the Qatar Spat.” Washington Post, June 7. Accessed August 26, 2021. https://www.washingtonpost.com/news/monkey-cage/wp/2017/06/07/hacking-bots-and-information-wars-in-the-qatar-spat/.
- Lawson, Sean, and Brandon Valeriano. 2020. “The Russian ‘Cyber Pearl Harbor’ That Wasn’t.” Cato Institute, December 18. Accessed June 25, 2021. https://www.cato.org/publications/commentary/russian-cyber-pearl-harbor-that-wasnt.
- Lefebvre, Stéphane, and Holly Porteous. 2011. “The Russian 10 … 11: An Inconsequential Adventure?” International Journal of Intelligence and Counterintelligence 24 (3): 447–466. doi:https://doi.org/10.1080/08850607.2011.568290.
- Libicki, Martin C., and Olesya Tkacheva. 2020. “Cyberspace Escalation: Ladders or Lattices?” In Cyber Threats and NATO 2030: Horizon Scanning and Analysis, edited by Amy Ertan, Kathryn Floyd, Piret Pernik, and Tim Stevens, 62–72. Tallinn: NATO Cooperative Cyber Defence Centre of Excellence.
- Lieven, Anatol. 2021. “Biden’s Retaliatory Cyberattacks Against Russia are Folly.” Responsible Statecraft, March 11. Accessed June 22, 2021. https://responsiblestatecraft.org/2021/03/11/bidens-retaliatory-cyberattacks-against-russia-are-folly/.
- Lin, Herb. 2020. “Reflections on the SolarWinds Breach.” Lawfare, December 22. Accessed June 15, 2021. http://www.lawfareblog.com/reflections-solarwinds-breach.
- Loleski, Steven. 2019. “From Cold to Cyber Warriors: The Origins and Expansion of NSA’s Tailored Access Operations (TAO) to Shadow Brokers.” Intelligence and National Security 34 (1): 112–128. doi:https://doi.org/10.1080/02684527.2018.1532627.
- Lukoff, Lee. 2018. “Pardon Me? An Assessment of Jonathan Pollard’s Quest for Presidential Clemency.” Journal of Intelligence History 17 (2): 85–103. doi:https://doi.org/10.1080/16161262.2018.1425032.
- Martin, Ciaran. 2020. “Cyber Weapons are Called Viruses for a Reason: Statecraft, Security and Safety in the Digital Age.” King’s College London, November 10. Accessed June 15, 2021. https://thestrandgroup.kcl.ac.uk/event/ciaran-martin-cyber-weapons-are-called-viruses-for-a-reason-statecraft-security-and-safety-in-the-digital-age/.
- Martin, Ciaran. 2021. “Cyber ‘Deterrence’: A Brexit Analogy.” Lawfare, January 15. Accessed June 15, 2021. https://www.lawfareblog.com/cyber-deterrence-brexit-analogy.
- Menn, Joseph. 2015. “China Tried to Hack US Firms Even after Cyber Pact: CrowdStrike.” Reuters, October 20. Accessed June 15, 2021. https://www.reuters.com/article/us-usa-china-cybersecurity-idUSKCN0SD0AT20151020.
- Miller, Maggie. 2020. “Lawmakers Ask Whether Massive Hack Amounted to Act of War.” The Hill, December 18. Accessed June 24, 2021. https://thehill.com/policy/cybersecurity/530784-lawmakers-ask-whether-massive-hack-amounted-to-act-of-war.
- Miller, Greg. 2020. “The Intelligence Coup of the Century.” Washington Post, February 11. Accessed June 15, 2021. https://www.washingtonpost.com/graphics/2020/world/national-security/cia-crypto-encryption-machines-espionage/.
- Mueller, Milton L. 2010. Networks and States: The Global Politics of Internet Governance. Cambridge, MA: MIT Press.
- Nakashima, Ellen. 2016. “Chinese Hacking Activity Down Sharply Since Mid-2014, Researchers Say.” Washington Post, June 20. Accessed June 15, 2021. https://www.washingtonpost.com/world/national-security/chinese-hacking-activity-down-sharply-since-mid-2014-researchers-say/2016/06/20/089703e6-36fd-11e6-9ccd-d6005beac8b3_story.html.
- Nakashima, Ellen, and Steven Mufson. 2015. “US, China Vow Not to Engage in Economic Cyberespionage.” Washington Post, September 25. Accessed June 15, 2021. https://www.washingtonpost.com/national/us-china-vow-not-to-engage-in-economic-cyberespionage/2015/09/25/90e74b6a-63b9-11e5-8e9e-dce8a2a2a679_story.html.
- Nakashima, Ellen, and Craig Timberg. 2020. “Russian Government Hackers are Behind a Broad Espionage Campaign that has Compromised US Agencies, Including Treasury and Commerce.” Washington Post, December 14. Accessed June 15, 2021. https://www.washingtonpost.com/national-security/russian-government-spies-are-behind-a-broad-hacking-campaign-that-has-breached-us-agencies-and-a-top-cyber-firm/2020/12/13/d5a53b88-3d7d-11eb-9453-fc36ba051781_story.html.
- Nakashima, Ellen, and William Wan. 2014. “US Announces First Charges against Foreign Country in Connection with Cyberspying.” Washington Post, May 19. Accessed June 15, 2021. https://www.washingtonpost.com/world/national-security/us-to-announce-first-criminal-charges-against-foreign-country-for-cyberspying/2014/05/19/586c9992-df45-11e3-810f-764fe508b82d_story.html.
- Nye Jr., Joseph S. 2014. “The Regime Complex for Managing Global Cyber Activities.” Global Commission on Internet Governance Paper Series 1. Accessed June 21, 2021. https://www.cigionline.org/sites/default/files/gcig_paper_no1.pdf.
- Omand, David. 2015. “Understanding Digital Intelligence and the Norms That Might Govern It.” Global Commission on Internet Governance, March 8. Accessed August 25, 2021. https://www.cigionline.org/sites/default/files/gcig_paper_no8.pdf.
- Omand, David, and Mark Phythian. 2018. Principled Spying: The Ethics of Secret Intelligence. Oxford: Oxford University Press.
- Pawlak, Patryk, and Panagiota-Nayia Barmpaliou. 2017. “Politics of Cybersecurity Capacity Building: Conundrum and Opportunity.” Journal of Cyber Policy 2 (1): 123–144. doi:https://doi.org/10.1080/23738871.2017.1294610.
- Pepper, David. 2010. “The Business of SIGINT: The Role of Modern Management in the Transformation of GCHQ.” Public Policy and Administration 25 (1): 85–97. doi:https://doi.org/10.1177/0952076709347080.
- Perlroth, Nicole. 2021. This is How They Tell Me the World Ends: The Cyber Weapons Arms Race. London: Bloomsbury.
- Poitras, Laura, Marcel Rosenbach, and Holger Stark. 2014. “GCHQ and NSA Targeted Private German Companies and Merkel.” Der Spiegel, March 29. Accessed June 15, 2021. https://www.spiegel.de/international/germany/gchq-and-nsa-targeted-private-german-companies-a-961444.html.
- Powers, Shawn M., and Michael Jablonski. 2015. The Real Cyber War: The Political Economy of Internet Freedom. Urbana, IL: University of Illinois Press.
- Putnam, Robert. 1988. “Diplomacy and Domestic Politics: The Logic of Two-Level Games.” International Organization 42 (3): 427–460. doi:https://doi.org/10.1017/S0020818300027697.
- Resnyansky, Lucy. 2010. “The Role of Technology in Intelligence Practice: Linking the Developer and the User Perspectives.” Prometheus 28 (4): 361–374. doi:https://doi.org/10.1080/08109028.2010.544076.
- Sabbagh, Dan. 2021. “Ransomware is Biggest Online Threat to People in UK, Spy Agency Chief to Warn.” The Guardian, June 14. Accessed June 15, 2021. https://www.theguardian.com/technology/2021/jun/14/ransomware-is-biggest-online-threat-to-people-in-uk-spy-agency-chief-to-warn.
- Sanger, David E., Julian E. Barnes, and Nicole Perlroth. 2021. “Preparing for Retaliation Against Russia, US Confronts Hacking by China.” New York Times, March 7. Accessed June 15. https://www.nytimes.com/2021/03/07/us/politics/microsoft-solarwinds-hack-russia-china.html.
- Schia, Niels N., and Lars Gjesvik. 2020. “Hacking Democracy: Managing Influence Campaigns and Disinformation in the Digital Age.” Journal of Cyber Policy 5 (3): 413–428. doi:https://doi.org/10.1080/23738871.2020.1820060.
- Schmidt, Michael S., David E. Sanger, and Nicole Perlroth. 2014. “Chinese Hackers Pursue Key Data on US Workers.” New York Times, June 7. Accessed June 15, 2021. https://www.nytimes.com/2014/07/10/world/asia/chinese-hackers-pursue-key-data-on-us-workers.html.
- Scott, Len. 2013. “Human Intelligence.” In Routledge Companion to Intelligence Studies, edited by Robert Dover, Michael S. Goodman, and Claudia Hillebrand, 96–104. London: Routledge.
- Segal, Adam. 2013. “The Code Not Taken: China, the United States, and the Future of Cyber Espionage.” Bulletin of the Atomic Scientists 69 (5): 38–45. doi:https://doi.org/10.1177/0096340213501344.
- Sexton, Michael, and Eliza Campbell, eds. 2020. Cyber War and Cyber Peace in the Middle East: Digital Conflict in the Cradle of Civilization. Washington, DC: The Middle East Institute.
- Shires, James. 2021. “The Cyber Operation Against Qatar News Agency.” In The 2017 Gulf Crisis: An Interdisciplinary Approach, edited by Mahjoob Zweiri, Md Mizanur Rahman, and Arwa Kamal, 101–113. Singapore: Springer.
- Smith, Brad. 2020. “A Moment of Reckoning: The Need for a Strong and Global Cybersecurity Response.” Microsoft, December 17. Accessed June 15, 2021. https://blogs.microsoft.com/on-the-issues/2020/12/17/cyberattacks-cybersecurity-solarwinds-fireeye/.
- Solar, Carlos. 2020. “Cybersecurity and Cyber Defence in the Emerging Democracies.” Journal of Cyber Policy 5 (3): 392–412. doi:https://doi.org/10.1080/23738871.2020.1820546.
- Temple-Raston, Dina. 2021. “A ‘Worst Nightmare’ Cyberattack: The Untold Story of the SolarWinds Hack.” National Public Radio, April 16. Accessed June 15, 2021. https://www.npr.org/2021/04/16/985439655/a-worst-nightmare-cyberattack-the-untold-story-of-the-solarwinds-hack.
- Traynor, Ian, and Paul Lewis. 2013. “Merkel Compared NSA to Stasi in Heated Encounter with Obama.” The Guardian, December 17. Accessed June 15, 2021. https://www.theguardian.com/world/2013/dec/17/merkel-compares-nsa-stasi-obama.
- UN GGE (United Nations Group of Government Experts). 2021. “Advance Copy: Report of the Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security.” May 28. Accessed June 15, 2021. https://front.un-arm.org/wp-content/uploads/2021/06/final-report-2019-2021-gge-1-advance-copy.pdf.
- United Nations. 2013. “General Assembly Backs Right to Privacy in Digital Age.” December 19. Accessed June 24, 2021. https://news.un.org/en/story/2013/12/458232-general-assembly-backs-right-privacy-digital-age.
- Urban, Mark. 2018. The Skripal Files: The Life and Near Death of a Russian Spy. London: Macmillan.
- Valeriano, Brandon, and Ryan C. Maness. 2018. “How We Stopped Worrying about Cyber Doom and Started Collecting Data.” Politics and Governance 6 (2): 49–60. doi:https://doi.org/10.17645/pag.v6i2.1368.
- Volz, Dustin, and Aruna Viswanatha. 2021. “Biden Administration Blames Hackers Tied to China for Microsoft Cyberattack Spree.” Wall Street Journal, July 19. Accessed August 26. https://www.wsj.com/articles/biden-administration-to-blame-hackers-tied-to-china-for-microsoft-cyberattack-spree-11626692401.
- Walsh, Patrick F., and Seumas Miller. 2016. “Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden.” Intelligence and National Security 31 (3): 345–368. doi:https://doi.org/10.1080/02684527.2014.998436.
- Warner, Michael. 2017. “Intelligence in Cyber – and Cyber in Intelligence.” In Understanding Cyber Conflict: Fourteen Analogies, edited by George Perkovich, and Ariel E. Levite, 17–29. Washington, DC: Georgetown University Press.
- Weissmann, Andrew. 2020. Where Law Ends: Inside the Mueller Investigation. New York: Random House.
- Whyte, Christopher. 2020. “Beyond Tit-for-Tat in Cyberspace: Political Warfare and Lateral Sources of Escalation Online.” European Journal of International Security 5 (2): 195–214. doi:https://doi.org/10.1017/eis.2020.2.
- Wight, Martin. 1977. Systems of States. Leicester: Leicester University Press.
- Winter, Brian. 2013. “Brazil’s Rousseff Wants US Apology for NSA Spying.” Reuters, September 4. Accessed June 24, 2021. https://www.reuters.com/article/us-usa-security-snowden-brazil-idUSBRE98314N20130904.
- Wolf, Markus. 1997. Without a Face: The Autobiography of Communism’s Greatest Spymaster. New York: Random House.
- Zhao, Manfeng. 2021. “The Big Brother is Watching You!” China Daily, June 2. Accessed 21 June 2021. http://global.chinadaily.com.cn/a/202106/02/WS60b70b2da31024ad0bac315c.html.