1 |
Abdollah, T. & Tucker, E. (2019 July 6). Mystery of NSA leak lingers as stolen document case winds up. ABC News. Retrieved from https://abcnews.go.com/Technology/wireStory/mystery-nsa-leak-lingers-stolen-document-case-winds-64163448 |
Media Article |
|
2 |
Abilov, A., Hua, Y., Matatov, H., Amir, O. & Naaman, M. (2021). VoterFraud2020: a Multi-modal Dataset of Election Fraud Claims on Twitter. arXiv. Retrieved on 31st January 2021 from https://arxiv.org/abs/2101.08210 |
Journal Article |
|
3 |
AD. (2020 November 20). Politie is klaar met ‘pedojagers’ die mannen opwachten en belagen. AD. Retrieved from https://www.ad.nl/binnenland/politie-is-klaar-met-pedojagers-die-mannen-opwachten-en-belagen~a14e4b43/?referrer=https%3A%2F%2Fwww.google.com%2F |
Media Article |
|
4 |
Adams, J. (1996). Principals and Agents, Colonialists and Company Men: The Decay of Colonial Control in the Dutch East Indies. American Sociological Review, 61 (1), 12 – 28. |
Journal Article |
|
5 |
Ahn, W., Chung, M., Min, B. & Seo, J. (2015). Development of Cyber-Attack Scenarios for Nuclear Power Plants Using Scenario Graphs. International Journal of Distributed Sensor Networks, 11 (9). |
Journal Article |
|
6 |
Akgul, O. et al. (2020). The Hackers’ Viewpoint: Exploring Challenges and Benefits of Bug-Bounty Programs. In 6th Workshop on Security Information Workers (WSIW 2020), Hannover, August 9th 2020. |
Conference Proceeding |
|
7 |
Akinwumi, O. (2001). Princes as highway men: A consideration of the phenomenon of armed banditry in precolonial Borgu. Cahiers d’Etudes africaines, 162, 333 – 350. |
Journal Article |
|
8 |
Alessio, D. & Villegas-Aristizabal, L. (2020). Re-thinking Religion and Empire: Non-State Organizations from the Knights Hospitallers to ISIS. Journal of Balkan and Near Eastern Studies, 22 (5), 580 – 596. |
Journal Article |
|
9 |
Allen, P. & Gilbert, D. (2009). The Information Sphere Domain Increasing Understanding and Cooperation. In C. Czosseck & K. Geers, The Virtual Battlefield: Perspectives on Cyber Warfare, 132 – 142. Amsterdam: IOS Press. |
Academic Book (Chapter) |
|
10 |
Altheide, D. (2009). Moral panic: From sociological concept to public discourse. Crime, Media, Culture: An International Journal, 5 (1), 79 – 99. |
Journal Article |
|
11 |
Amiti, M. & Wei, S. J. (2005). Fear of service outsourcing: is it justified?. Economic policy, 20 (42), 307-347. |
Journal Article |
|
12 |
Amoroso, E. G. (2013). Cyber attacks: Protecting national infrastructure (Student ed). Oxford: Butterworth-Heinemann/Elsevier. |
Academic Book (Chapter) |
|
13 |
Anderson, N. (2012 June 1). Confirmed: US and Israel created Stuxnet, lost control of it. ArsTechnica. |
Media Article |
|
14 |
Apps, P. (2011 October 26). Analysis: Agreement seen distant at London cyber conference. Reuters. Retrieved from https://de.reuters.com/article/us-technology-cyber-conference-idUSTRE79P2MC20111026 |
Media Article |
|
15 |
Arquilla, J. & Ronfeldt, D. (2001). Networks and netwars: the future of terror, crime, and militancy. Santa Monica, CA: Rand. |
Think Tank / NGO Article |
|
16 |
Associated Press. (2020 September 17). German hospital hacked, patient taken to another city dies. AP News. Retrieved from https://apnews.com/article/technology-hacking-europe-cf8f8eee1adcec69bcc864f2c4308c94 |
Media Article |
|
17 |
Auger, V. (2020). Right-Wing Terror: A Fifth Global Wave? Perspectives on Terrorism, 14 (3), 87 – 97. |
Journal Article |
|
18 |
Auley, J., Tonge, J. & Shirlow, P. (2009). Conflict, Transformation, and Former Loyalist Paramilitary Prisoners in Northern Ireland. Terrorism and Political Violence, 22 (1), 22 – 40. |
Journal Article |
|
19 |
Australian Government. (n.d.). Strategies to Mitigate Cyber Security Incidents. Retrieved from https://www.cyber.gov.au/acsc/view-all-content/publications/strategies-mitigate-cyber-security-incidents |
Government Issued |
|
20 |
Avant, D. (2000). From Mercenary to Citizen Armies: Explaining Change in the Practice of War. International Organization, 54 (1), 41 – 72. |
Journal Article |
|
21 |
Avant, D. (2007). The emerging market for private military services and the problem of regulation. In S. Chesterman & C. Lehnardt (eds.), From Mercenaries to Market: The Rise and Regulation of Private Military Companies. Oxford: Oxford University Press. |
Academic Book (Chapter) |
|
22 |
Avramov, K. (2019 March 30). The Advent of the “Digital Mercenaries”. Small Wars Journal. Retrieved from https://smallwarsjournal.com/jrnl/art/advent-digital-mercenaries |
Think Tank / NGO Article |
|
23 |
Baesso Moura, M. (2020). Operação Gedeón: o uso de companhias militares privadas na Venezuela. Revista Brasileira de Estudos Latino-Americanos, 10 (3), 457 – 471. |
Journal Article |
|
24 |
Baezner, M. (2018 August). Hotspot Analysis: Regional rivalry between IndiaPakistan: tit-for-tat in cyberspace. Center for Security Studies, ETH Zurich. |
Think Tank / NGO Article |
|
25 |
Bahadur Lamb, J. (2020). Death by SWAT: The three elements of swatting. In A. Lynes, K. Hoffin & C. Kelly (eds.), Video Games, Crime and Next-Gen Deviance: Reorienting the Debate. Bingley: Emerald Publishing Ltd. |
Academic Book (Chapter) |
|
26 |
Bamford, J. (2016 August 22). Commentary: Evidence points to another Snowden at the NSA. Reuters. Retrieved from https://www.reuters.com/article/us-intelligence-nsa-commentary-idUSKCN10X01P |
Media Article |
|
27 |
Barber, R. (2001). Hackers Profiled — Who Are They and What Are Their Motivations? Computer Fraud & Security, 2001(2), 14–17. |
Journal Article |
|
28 |
Bauer, C. (2017). Unsolved!: The History and Mystery of the World’s Greatest Ciphers from Ancient Egypt to Online Secret Societies. Princeton, NJ: Princeton University Press. |
Academic Book (Chapter) |
|
29 |
BBC. (2011 December 1). GCHQ challenges codebreakers via social networks. BBC. Retrieved from https://www.bbc.com/news/technology-15968878 |
Media Article |
|
30 |
BBC. (2017 June 1). Putin: Patriotic Russians may be involved in hacking. BBC. Retrieved from https://www.bbc.com/news/technology-40122943 |
Media Article |
|
31 |
BBC. (2020 July 17). Twitter hack: FBI investigates major Twitter attack. BBC. Retrieved from https://www.bbc.com/news/technology-53439585 |
Media Article |
|
32 |
BBC. (2021 January 19). US Capitol riots: Trump supporter arrested after Pelosi ‘data theft’. BBC. Retrieved from https://www.bbc.com/news/election-us-2020-55711200 |
Media Article |
|
33 |
Bearpark, A. & Schulz, S. (2007). The future of the market. In S. Chesterman & C. Lehnardt (eds.), From Mercenaries to Market: The Rise and Regulation of Private Military Companies. Oxford: Oxford University Press. |
Academic Book (Chapter) |
|
34 |
Becke, J. (2019). Varieties of expansionism: A comparative-historical approach to the study of state expansion and state contraction. Political Geography, 72, 64 – 75. |
Journal Article |
|
35 |
Belfer Center for Science and International Affairs. (2020 September). National Cyber Power Index 2020. Harvard Kennedy School. |
Think Tank / NGO Article |
|
36 |
Bellingcat. (2021 January 7). The Making of QAnon: A Crowdsourced Conspiracy. Bellingcat. Retrieved from https://www.bellingcat.com/news/americas/2021/01/07/the-making-of-qanon-a-crowdsourced-conspiracy/ |
Media Article |
|
37 |
Bendrath, R., Eriksson, J. & Giacomello, G. (2007). From ‘cyberterrorism’ to ‘cyberwar’, back and forth: How the United States securitized cyberspace. In International Relations and Security in the Digital Age, 57–82. London: Routledge. |
Academic Book (Chapter) |
|
38 |
Bidgoli, M., Knijnenburg, B., Grossklags, J. & Wardman, B. (2019). Report Now. Report Effectively. Conceptualizing the Industry Practice for Cybercrime Reporting. In 2019 APWG Symposium on Electronic Crime Research (eCrime), Pittsburgh, PA, 13-15 November 2019. |
Conference Proceeding |
|
39 |
Bigoli, M. & Grossklags, J. (2017). “Hello. This is the IRS calling.”: A Case Study on Scams, Extortion, Impersonation, and Phone Spoofing. In 2017 APWG Symposium on Electronic Crime Research, Scottsdale, AZ, 25-27 April 2017. |
Conference Proceeding |
|
40 |
Bocetta, S. (2017 November 23). Chinese state sponsored hacking. RealClearDefense. Retrieved from https://www.realcleardefense.com/articles/2017/11/23/chinese_state_sponsored_hacking_112675.html |
Other |
|
41 |
Bolt, P. & Cross, S. (2018). Emerging Non-traditional Security Challenges: Color Revolutions, Cyber and Information Security, Terrorism, and Violent Extremism. In China, Russia, and Twenty-First Century Global Geopolitics. Oxford: Oxford University Press. |
Academic Book (Chapter) |
|
42 |
Bossert, T. (2017 December 19). Press Briefing on the Attribution of the WannaCry Malware Attack to North Korea [Press Release]. United States White House. Retrieved from https://www.whitehouse.gov/briefings-statements/press-briefing-on-the-attribution-of-the-wannacry-malware-attack-to-north-korea-121917/ |
Government Issued |
|
43 |
Boulet, G. (2015). Cyber Operations by Private Actors in the Ukraine-Russia Conflict: From Cyber War to Cyber Security. American Society of International Law, 19 (1). Retrieved from https://www.asil.org/insights/volume/19/issue/1/cyber-operations-private-actors-ukraine-russia-conflict-cyber-war-cyber |
Journal Article |
|
44 |
Boyd, A. (2015 August 18). FBI tries to recruit hackers as cyber special agents. Federal Times. Retrieved from https://www.federaltimes.com/2015/08/18/fbi-tries-to-recruit-hackers-as-cyber-special-agents/ |
Media Article |
|
45 |
Bradshaw, S. & Howard, P. N. (2017). Troops, Trolls and Troublemakers: A Global Inventory of Organized Social Media Manipulation [Working paper no. 2017.12]. University of Oxford. Retrieved from http://comprop.oii.ox.ac.uk/wp-content/uploads/sites/89/2017/07/Troops-Trolls-and-Troublemakers.pdf |
Journal Article |
|
46 |
Bran, D. (2021). The Return of Anonymous. The Atlantic. Retrieved from https://www.theatlantic.com/technology/archive/2020/08/hacker-group-anonymous-returns/615058/ |
Media Article |
|
47 |
Breton, L. & Pearson, A. (2010). Contextual Truth-Telling to Counter Extremist-Supportive Messaging Online: The Wikileaks “Collateral Murder” Case Study. Small Wars Journal. Retrieved from https://smallwarsjournal.com/jrnl/art/contextual-truth-telling-to-counter-extremist-supportive-messaging-online |
Think Tank / NGO Article |
|
48 |
Breton, L. Virtual non-state actors as Clausewitzian Centers of Gravity. Journal of Information Warfare, 12 (1), 63 – 69. |
Journal Article |
|
49 |
Breuer, A., Landman, T. & Farquhar, D. (2015). Social media and protest mobilization: evidence from the Tunisian revolution. Democratization, 22 (4), 764 – 792. |
Journal Article |
|
50 |
Brown, C. (2015). White or Black Hat? An Economic Analysis of Computer Hacking [Working Paper]. Washington, DC: Georgetown University. |
Journal Article |
|
51 |
Brundage, M. et al. (2018). The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. Future of Humanity Institute. Retrieved from https://www.eff.org/files/2018/02/20/malicious_ai_report_final.pdf |
Think Tank / NGO Article |
|
52 |
Bunker, R. & Heal, C. (2014). Fifth Dimensional Operations: Space-Time-Cyber Dimensionality in Conflict and War. Bloomington, IN: iUniverse. |
Academic Book (Chapter) |
|
53 |
Burt, T. (2020 September 10). New cyberattacks targeting U.S. elections. Microsoft. Retrieved on 31st January 2021 from https://blogs.microsoft.com/on-the-issues/2020/09/10/cyberattacks-us-elections-trump-biden/ |
Other |
|
54 |
Byman, D. (2008). Understanding Proto-Insurgencies. Journal of Strategic Studies, 31 (2), 165 – 200. |
Journal Article |
|
55 |
Caferro, W. (1996). Italy and the Companies of Adventure in the Fourteenth Century. The Historian, 58 (4), 795 – 810. |
Journal Article |
|
56 |
Calabro, S. (2020). From the Message Board to the Front Door: Addressing the Offline Consequences of Race- and Gender-Based Doxxing and Swatting. Suffolk University Law Review, 51 (1), 55 – 75. |
Journal Article |
|
57 |
Caltagirone, S. (2019 December 3). Industrial Cyber Attacks: A Humanitarian Crisis in the Making. Retrieved from https://blogs.icrc.org/law-and-policy/2019/12/03/industrial-cyber-attacks-crisis/ |
Think Tank / NGO Article |
|
58 |
Carlin, J. (2016 March 24). Assistant Attorney General John P. Carlin Delivers Remarks at Press Conference Announcing Seven Iranians Charged for Conducting Cyber Attacks against U.S. Financial Sector. US Department of Justice. Retrieved from https://www.justice.gov/opa/speech/assistant-attorney-general-john-p-carlin-delivers-remarks-press-conference-announcing |
Government Issued |
|
59 |
Carter, D. (2016). Provocation and the Strategy of Terrorist and Guerrilla Attacks. International Organization, 70 (1), 133 – 173. |
Journal Article |
|
60 |
Casanovas, P. (2009). Cyber Warfare and Organised Crime. A Regulatory Model and Meta-Model for Open Source Intelligence (OSINT). In M. Taddeo, L. Glorioso (eds.), Ethics and Policies for Cyber Operations. Retrieved from https://uploads-ssl.webflow.com/5cd23e823ab9b1f01f815a54/5cff33b8bbb1f7b1327173ed_Cyber%20Warfare%20and%20Organised%20Crime.%20A%20Regulatory%20Model%20and%20Meta-Model%20for%20Open%20Source%20Intelligence%20(OSINT).pdf |
Academic Book (Chapter) |
|
61 |
Centeno, M., Cruz, J., Flores, R., & Cano, G. (2013). Internal wars and Latin American nationalism. In J. Hall & S. Malešević (Eds.), Nationalism and War (pp. 279-305). Cambridge: Cambridge University Press. |
Academic Book (Chapter) |
|
62 |
Chadwick, N. (1970). The Celts. London: Penguin Books. |
Academic Book (Chapter) |
|
63 |
Chan, T., Cheung, C. & Wong, R. (2019). Cyberbullying on Social Networking Sites: The Crime Opportunity and Affordance Perspectives. Journal of Management Information Systems, 36 (2), 574 – 609. |
Journal Article |
|
64 |
Chang, L. & Poon, R. (2016). Internet Vigilantism: Attitudes and Experiences of University Students Toward Cyber Crowdsourcing in Hong Kong. International Journal of Offender Therapy and Comparative Criminology, 61 (16), 1912 – 1932. |
Journal Article |
|
65 |
Chappell, D. & Di Martino, V. (2006). Violence at Work (3rd edition). Geneva: International Labour Organization. |
Academic Book (Chapter) |
|
66 |
Chapsos, I. & Holtom, P. (2015). Floating Armouries in the Indian Ocean. In Small Arms Survey 2015: Weapons and the World, 216 – 241. Cambridge: Cambridge University Press. |
Academic Book (Chapter) |
|
67 |
Chatfield, A. & Reddick, C. (2017). Cybersecurity Innovation in Government: A Case Study of U.S. Pentagon’s Vulnerability Reward Program. In dg.o ’17: Proceedings of the 18th Annual International Conference on Digital Government Research, June 2017, 64 -73. |
Conference Proceeding |
|
68 |
Chen, M., Fischer, F., Meng, N., Wang, X. & Grossklags, J. (2019). How Reliable is the Crowdsourced Knowledge of Security Implementation? 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE), Montreal, QC, 25 – 31 May 2019. |
Conference Proceeding |
|
69 |
Cheong, P. & Gong, J. (2010). Cyber vigilantism, transmedia collective intelligence, and civic participation. Chinese Journal of Communication, 3 (4), 471 – 487. |
Journal Article |
|
70 |
Chisholm, A. (2015). From Warriors of Empire to Martial Contractors: Reimagining Gurkhas in Private Security. In M. Eichler (ed.), Gender and Private Security in Global Politics, 95 – 113. Oxford: Oxford University Press. |
Academic Book (Chapter) |
|
71 |
Choucri, N., & Goldsmith, D. (2012). Lost in cyberspace: Harnessing the Internet, international relations, and global security. Bulletin of the Atomic Scientists, 68(2), 70–77. https://doi.org/10.1177/0096340212438696 |
Journal Article |
|
72 |
Cimpanu, C. (2019 November ). Mysterious hacker dumps database of infamous IronMarch neo-nazi forum. ZDNet. Retrieved from https://www.zdnet.com/article/mysterious-hacker-dumps-database-of-infamous-ironmarch-neo-nazi-forum/ |
Media Article |
|
73 |
Cimpanu, C. (2020 January 13). Report: Chinese hacking group APT40 hides behind network of front companies. ZDNet. https://www.zdnet.com/article/report-chinese-hacking-group-apt40-hides-behind-network-of-front-companies/ |
Media Article |
|
74 |
Clausewitz, C. von. (1832). On War [Vom Krieg] (M. Howard & P. Paret, eds.). Princeton, NJ: Princeton University Press. |
Academic Book (Chapter) |
|
75 |
Clayton, R. (2005). Anonymity and traceability in cyberspace [Technical Report no. 653]. Cambridge: University of Cambridge. Retrieved from https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-653.pdf |
Journal Article |
|
76 |
Clayton, R. (2010). Might Governments Clean-up Malware? Communications & Strategies, 1 (81), 87 – 104. |
Journal Article |
|
77 |
Cohen, S. (2011). Folk Devils and Moral Panics. London: Routledge. |
Academic Book (Chapter) |
|
78 |
Collier, J. (2017). Proxy Actors in the Cyber Domain. St Antony’s International Review, 13 (1), 25 – 47. Retrieved from https://www.jstor.org/stable/26229121?seq=1 |
Journal Article |
|
79 |
Collin, B. (1997). Future of Cyberterrorism: The Physical and Virtual Worlds Converge. Crime and Justice International, 13 (2), 15 -18. |
Journal Article |
|
80 |
Colton, J., Holmes, S. & Walwema, J. (2017). From NoobGuides to #OpKKK: Ethics of Anonymous’ Tactical Technical Communication. Technical Communication Quarterly, 26 (1), 59-75. |
Journal Article |
|
81 |
Conklin, M. (2021). Capitol Offense: Is Donald Trump Guilty of Inciting a Riot at the Capitol? SSRN. |
Journal Article |
|
82 |
Conway, M. (2014). Reality Check: Assessing the (Un)Likelihood of Cyberterrorism. In T. Chen, L. Jarvis & S. Macdonald (eds.), Cyberterrorism. New York, NY: Springer New York. |
Academic Book (Chapter) |
|
83 |
Cormac, R. & Aldrich, R. (2018). Grey is the new black: covert action and implausible deniability. International Affairs, 94 (3), 477–94. |
Journal Article |
|
84 |
Council of Europe. (2003). Additional Protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems [Treaty no. 189]. |
Law/Treaty |
|
85 |
Council of Europe. (2004). Convention on Cybercrime [Treaty no. 185]. |
Law/Treaty |
|
86 |
Creemers, R. (2016). Cyber China: Upgrading Propaganda, Public Opinion Work and Social Management for the Twenty-First Century. Journal of Contemporary China, 26 (103), 85 – 100. Retrieved from https://www.tandfonline.com/doi/full/10.1080/10670564.2016.1206281 |
Journal Article |
|
87 |
Creemers, R. (2016, December 27). National Cyberspace Security Strategy. China Copyright and Media. Retrieved from https://chinacopyrightandmedia.wordpress.com/2016/12/27/national-cyberspace-security-strategy/ |
Other |
|
88 |
Cristina Bicchieri. (2016). Norms in the Wild. How to Diagnose, Measure, and Change Social Norms. Oxford: Oxford University Press. |
Academic Book (Chapter) |
|
89 |
Crockett, M. (2017). Moral outrage in the digital age. Nature Human Behaviour, 1, 769 – 771. |
Journal Article |
|
90 |
Croninn, A. K. (2006 September 10). Cyber-Mobilization: The New Levee en Masse. US Army. Retrieved from https://www.army.mil/article/40/cyber_mobilization_the_new_levee_en_masse |
Government Issued |
|
91 |
Cruz, J. da & Pedron, S. (2020). Cyber Mercenaries: A New Threat to National Security. International Social Science Review, 96 (2). |
Journal Article |
|
92 |
Dahan, M. (2013). Hacking for the Homeland: Patriotic Hackers Versus Hacktivists. In D. Hart, ICIW 2013 Proceedings of the 8th International Conference on Information Warfare and Security: ICIW 2013, Denver: CO. |
Conference Proceeding |
|
93 |
Danet, D. (2019). Hackers and the Military: How to Recruit and Manage Hidden Talents. In T. Cruz & P. Simoes (eds.), ECCWS 2019 18th European Conference on Cyber Warfare and Security, 124 – 131. |
Conference Proceeding |
|
94 |
Danks, D. & Danks, J. (2018). Beyond Machines: Humans in Cyber Operations, Espionage, and Conflict. Carnegie Mellon University. |
Journal Article |
|
95 |
DeLuca, C. (2013). The Need for International Laws of War to Include Cyber Attacks: Involving State and Non-State Actors. Pace International Review Online Companion, 278. Retrieved from https://digitalcommons.pace.edu/cgi/viewcontent.cgi?article=1033&context=pilronline |
Journal Article |
|
96 |
Dempsey, G. (2002). Napoleon’s Mercenaries: Foreign Units in the French Army under the Consulate and Empire, 1799-1814. London: Greenhill Books. |
Academic Book (Chapter) |
|
97 |
Donald C. Hellman Task Force Program. (2020). The World Wide Race for Artificial Intellligence: A Path Forward for US Policy. Henry M. Jackson School of International Studies. |
Think Tank / NGO Article |
|
98 |
Donelly, L. (2018 February 6). More than 900 NHS deaths yearly may be caused by IT failings. The Telegraph. Retrieved from https://www.telegraph.co.uk/news/2018/02/06/900-nhs-deaths-yearly-may-caused-failings/ |
Media Article |
|
99 |
Dorfman, Z. (2020 December 21). China used stolen data to expose CIA operatives in Africa and Europe. Foreign Policy. https://foreignpolicy.com/2020/12/21/china-stolen-us-data-exposed-cia-operatives-spy-networks/# |
Media Article |
|
100 |
Dunn Cavelty, M. (2012). The Militarisation of Cyber Security as a Source of Global Tension. SSRN Scholarly Paper. Rochester, NY: Social Science Research Network. Retrieved from https://papers.ssrn.com/abstract=2007043. |
Journal Article |
|
101 |
Dunn Cavelty, M. (2016). Cyber-Security. In A. Collins (ed.), Contemporary Security Studies. Oxford: Oxford University Press |
Academic Book (Chapter) |
|
102 |
Egloff, F. (2015). Cybersecurity and the Age of Privateering: A Historical Analogy. Oxford: Cyber Studies Programme. Retrieved from https://www.politics.ox.ac.uk/materials/centres/cyber-studies/Working_Paper_No.1_Egloff.pdf |
Journal Article |
|
103 |
Egloff, F. (2016 November 17). Cyber Privateering: A Risky Policy Choice for the United States. Lawfare. Retrieved from https://www.lawfareblog.com/cyber-privateering-risky-policy-choice-united-states |
Media Article |
|
104 |
Egloff, F. (2017 October 16). Cybersecurity and the Age of Privateering. Carnegie Endowment for International Peace. Retrieved from https://carnegieendowment.org/2017/10/16/cybersecurity-and-age-of-privateering-pub-73418 |
Journal Article |
|
105 |
Egloff, F. (2018). Cybersecurity and Non-State Actors: A Historical Analogy with Mercantile Companies, Privateers, and Pirates [PhD Thesis]. University of Oxford. Retrieved from https://ora.ox.ac.uk/objects/uuid:77eb9bad-ca00-48b3-abcf-d284c6d27571/download_file?file_format=pdf&safe_filename=Florian%2BEgloff%2BDPhil%2BCybersecurity%2Band%2BNon-State%2BActors%2BA%2BHistorical%2BAnalogy%2Bwith%2BMercantile%2BCompanies%2BPrivateers%2Band%2BPirate.pdf&type_of_work=Thesis |
Other |
|
106 |
Etudo, U., Yoon, V. & Yaraghi, N. (2019). From Facebook to the Streets: Russian Troll Ads and Black Lives Matter Protests. Proceedings of the 52nd Hawaii International Conference on System Sciences. |
Conference Proceeding |
|
107 |
Europol. (n.d.). Europe’s Most Wanted Fugitives. Retrieved on 31st January 2021 from https://eumostwanted.eu/ |
Other |
|
108 |
Europol. (n.d.). Stop Child Abuse – Trace an Object. Retrieved on 9th December 2020 from https://www.europol.europa.eu/stopchildabuse |
Other |
|
109 |
Fagan, K. (2020). Zodiac ‘340 Cipher’ cracked by code experts 51 years after it was sent to the S.F. Chronicle. San Francisco Chronicle. Retrieved from https://www.sfchronicle.com/hdn/hrlm/p/fastly_redirect.html?dm=https%3A%2F%2Fwww.sfchronicle.com%2Fcrime%2Farticle%2FZodiac-340-cypher-cracked-by-code-expert-51-years-15794943.php |
Media Article |
|
110 |
Falconer, R. (2019 April 22). Russia’s increasingly working with cyber criminals, former national security official warns. Axios. https://www.axios.com/russia-spies-working-with-cyber-criminals-5c2f12f7-8f25-419a-a850-3bc89de346a3.html |
Media Article |
|
111 |
Fandos, N. (2015 July 17). N.S.A. Summer Camp: More Hacking Than Hiking. The New York Times. Retrieved from https://www.nytimes.com/2015/07/18/us/nsa-summer-camp-hacking-cyber-defense.html?emc=eta1&_r=0 |
Media Article |
|
112 |
Farmand, M. (2016). Who Watches This Stuff: Videos Depicting Actual Murder and the Need for a Federal Criminal Murder-Video Statute. Florida Law Review, 68, 1915. |
Journal Article |
|
113 |
Farnelli, G. (2015). Vessel Protection Detachments and Maritime Security: An Evaluation of Four Years of Italian Practice. Maritime Safety Law Journal, 1, 16 – 32. |
Journal Article |
|
114 |
Federal Bureau of Investigations. (2020 December 23). Iranian Cyber Actors Responsible for Website Threatening U.S. Election Officials. FBI. Retrieved on 12 January 2021 from https://www.fbi.gov/news/pressrel/press-releases/iranian-cyber-actors-responsible-for-website-threatening-us-election-officials |
Government Issued |
|
115 |
Federal Bureau of Investigations. (2021 January 5). JOINT STATEMENT BY THE FEDERAL BUREAU OF INVESTIGATION (FBI), THE CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY (CISA), THE OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE (ODNI), AND THE NATIONAL SECURITY AGENCY (NSA). FBI. Retrieved on 13th January 2021 from https://www.cisa.gov/news/2021/01/05/joint-statement-federal-bureau-investigation-fbi-cybersecurity-and-infrastructure |
Government Issued |
|
116 |
Federal Bureau of Investigations. (n.d.). Ten Most Wanted Fugitives. Retrieved on 31st January 2021 from https://www.fbi.gov/wanted/topten |
Government Issued |
|
117 |
FireEye Inc. (2013). Operation Safron Rose. Retrieved from https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-operation-saffron-rose.pdf |
Other |
|
118 |
Foltz, B. (2004). Cyberterrorism, computer crime, and reality. Information Management & Computer Security, 12 (2), 154 – 166. |
Journal Article |
|
119 |
Fortune. (2020, July 22). It’s getting harder to tell state-sponsored hackers and cybercriminals apart. Fortune. Retrieved from https://fortune.com/2020/07/22/state-sponsored-hacking-cybercrime-china-hong-kong/ |
Media Article |
|
120 |
Foxall, A. (2016). Putin’s Cyberwar: Russia’s Statecraft in the Fifth Domain. Henry Jackson Society. |
Think Tank / NGO Article |
|
121 |
Froissart, J. (n.d.). Chronicles of England, France, Spain, and the adjoining countries. 1857 Translation by Thomas Jonhes. Retrieved from https://catalog.hathitrust.org/Record/000537473 |
Other |
|
122 |
Fuentes Diaz, A. & Paleta Perez, G. (2015). Violencia y autodefensas comunitarias en Michoacán, México. Iconos: Revista de Ciencias Sociales, 53, 171 – 186. |
Journal Article |
|
123 |
Funk, M. (2015 January 30). The Hack that Warmed the World. Foreign Policy. Retrieved from https://foreignpolicy.com/2015/01/30/climate-change-hack-carbon-credit-black-dragon/ |
Media Article |
|
124 |
Furnell, S., Downland, P. & Sanders, P. (1999). Dissecting the “Hacker Manifesto”. Information Management & Computer Security, 7 (2). |
Journal Article |
|
125 |
Futter, A. (2016). Cyber Threats and Nuclear Weapons. RUSI. Retrieved from https://rusi.org/sites/default/files/cyber_threats_and_nuclear_combined.1.pdf |
Think Tank / NGO Article |
|
126 |
Future of Life Institute. (2018 November 13). Slaughterbots. Youtube. Retrieved from https://www.youtube.com/watch?v=HipTO_7mUOw |
Other |
|
127 |
Galeotti, M. (2018). The mythical ‘Gerasimov Doctrine’ and the language of threat. Critical Studies on Security, 7 (2), 157 – 161. |
Journal Article |
|
128 |
Gardner, B. (2018). Social Engineering in Non-Linear Warfare. Journal of Applied Digital Evidence, 1 (1), 1 – 29. |
Journal Article |
|
129 |
Gartzke, E. (2013). The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth. International Security, 38 (2), 41–73. https://doi.org/10.1162/ISEC_a_00136 |
Journal Article |
|
130 |
Gattiker, U. (2004). The Dictionary of Information Security. Boston, MA: Springer Science. |
Academic Book (Chapter) |
|
131 |
Geers, K. (2017). Cyberspace and the Changing Nature of Warfare. NATO. Retrieved from https://www.blackhat.com/presentations/bh-jp-08/bh-jp-08-Geers/BlackHat-Japan-08-Geers-Cyber-Warfare-Whitepaper.pdf |
Government Issued |
|
132 |
Gierson, J. & Gibbs, S. (2017 August 14). Message showing apparent hack appears on neo-Nazi Daily Stormer website. The Guardian. Retrieved from https://www.theguardian.com/technology/2017/aug/14/anonymous-hackers-take-over-neo-nazi-website-daily-stormer-charlottesville-heather-heyer |
Media Article |
|
133 |
Goode, L. (2015). Anonymous and the Political Ethos of Hacktivism. International Journal of Media and Culture, 13 (1), 74 – 86. |
Journal Article |
|
134 |
Goodin, D. (2015 February 16). How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last. ArsTechnica. Retrieved from https://arstechnica.com/information-technology/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/ |
Media Article |
|
135 |
Goodin, D. (2019 May 7). Stolen NSA hacking tools were used in the wild 14 months before Shadow Brokers leak. ArsTechnica. Retrieved from https://arstechnica.com/information-technology/2019/05/stolen-nsa-hacking-tools-were-used-in-the-wild-14-months-before-shadow-brokers-leak/ |
Media Article |
|
136 |
Goodwin, B. (2016). Using Political Ideas, 6th Edition. Hoboken, NJ: Wiley. |
Academic Book (Chapter) |
|
137 |
Gordon, S. & Ford, R. (2002). Cyberterrorism? Computers & Security, 21 (7), 636 – 647. |
Journal Article |
|
138 |
Gorr, D. & Schünemann, W. (2013). Creating a Secure Cyberspace – Securitization in Internet Governance Discourses and Dispositives in Germany and Russia. International Review of Information Ethics, 20 (12), 37–51. |
Journal Article |
|
139 |
Grand View Research. (2020 June). Cyber Security Market Size, Share & Trends Analysis Report By Component, By Security Type, By Solution, By Service, By Deployment, By Organization, By Application, By Region, And Segment Forecasts, 2020 – 2027. Retrieved from https://www.grandviewresearch.com/industry-analysis/cyber-security-market |
Think Tank / NGO Article |
|
140 |
Gross, M. (2016). Vigilante violence and “forward panic” in Johannesburg’s townships. Theory and Society, 45, 239 – 263. |
Journal Article |
|
141 |
Hampson, F. J. (1991). Mercenaries: Diagnosis before Proscription. Netherlands Yearbook of International Law, 22, 3-38. |
Journal Article |
|
142 |
Hannas, W., Mulvenon, J. & Puglisi, A. (2013). Chinese Industrial Espionage: Technology Acquisition and Military Modernisation. New York City, NY: Routledge. |
Academic Book (Chapter) |
|
143 |
Harcourt, B. & Ludwig, J. (2006). Broken Windows: New Evidence from New York City and a Five-City Social Experiment. Univesity of Chicago Law Review, 73 (1), 271 – 320. |
Journal Article |
|
144 |
Hare, F. (2017). Privateering in Cyberspace: Should Patriotic Hacking Be Promoted as National Policy? Asian Security, 15 (2), 93 – 102. |
Journal Article |
|
145 |
Hewman, L. (2019 June 5). What Israel’s Strike on Hamas Hackers Means For Cyberwar. Wired. Retrieved from https://www.wired.com/story/israel-hamas-cyberattack-air-strike-cyberwar/ |
Media Article |
|
146 |
Hobsbawm, E. (1959). Primitive Rebels: Studies in Archaic Forms of Social Movement in the 19th and 20th Centuries. Norton Library. Norton, KS: Norton Public Library. |
Academic Book (Chapter) |
|
147 |
Hobsbawm, E. (1969). Bandits. London: Weidenfeld & Nicolson. |
Academic Book (Chapter) |
|
148 |
Hoeferkamp, J. (2020). Combatting the Swatting Problem: The Need for a New Criminal Statute to Address a Growing Threat. Michigan State Law Review, 2019(4), 1133 – 1175. |
Journal Article |
|
149 |
Hoekstra, Q. (2018). Helping the Contras: The Effectiveness of U.S. Support for Foreign Rebels During the Nicaraguan Contra War (1979–1990). Studies in Conflict & Terrorism. |
Journal Article |
|
150 |
Hoffman, L., & Zahadat, N. (2018). Securing Democracy: A Comparative Look at Modern and Future US Voting Systems Through the Lens of the CIA Triad. Journal of Information Assurance and Security, 13, 118–124. |
Journal Article |
|
151 |
Hollinger, R. (1991). Hackers: computer heroes or electronic highwaymen? ACM SIGCAS Computers and Society, 21 (1). |
Journal Article |
|
152 |
Honig, O. & Yahel, I. (2017). A Fifth Wave of Terrorism? The Emergence of Terrorist Semi-States. Terrorism and Political Violence, 31 (6), 1210 – 1228. |
Journal Article |
|
153 |
Hosenball, M. (2020 December 23). U.S. suspects Iranians created website threatening U.S. election officials. Reuters. Retrieved from https://www.reuters.com/article/us-usa-elections-iran/u-s-suspects-iranians-created-website-threatening-u-s-election-officials-idUSKBN28X2M4 |
Media Article |
|
154 |
Hou, T. & Wang, V. (2020). Industrial espionage – A systematic literature review (SLR). Computers Security, 98. |
Journal Article |
|
155 |
Howard, P., Ganesh, B., Liotsiou, D., Kelly, J. & Francois, C. (2019). The IRA, Social Media and Political Polarization in the United States, 2012-2018. Select Committee on Intelligence United States Senate. |
Government Issued |
|
156 |
Iasiello, E. Are cyber weapons effective military tools? Military and Strategic Affairs, 7 (1), 23–40. |
Journal Article |
|
157 |
Ingrao, C. (1987). The Hessian Mercenary State: Ideas, Institutions, and Reform under Frederick II, 1760 – 1785. Cambridge: Cambridge University Press. |
Academic Book (Chapter) |
|
158 |
International Convention against the Recruitment, Use, Financing and Training of Mercenaries, Dec. 4, 1989, A/RES/44/34 |
Law/Treaty |
|
159 |
Interpol. (n.d.). View Red Notices. Retrieved on 31st January 2021 from https://www.interpol.int/en/How-we-work/Notices/View-Red-Notices |
Other |
|
160 |
Jaffe, E. (2016). Swatting: The New Cyberbullying Frontier After Elonis v. United States. Drake Law Review, 64, 455 – 483. |
Journal Article |
|
161 |
Jarvis, L. & Macdonald, S. (2014). What Is Cyberterrorism? Findings From a Survey of Researchers. Terrorism and Political Violence, 27 (4), 657 – 678. |
Journal Article |
|
162 |
Jenkins, B. (2008). Will Terrorists Go Nuclear? RAND. Retrieved from https://www.rand.org/pubs/commercial_books/CB413.html |
Think Tank / NGO Article |
|
163 |
Jensen, B. (2014 March 19). Animal Instinct: How Cat-Loving Sleuths Found an Accused Killer Sadist. Rolling Stone. Retrieved from https://www.rollingstone.com/culture/culture-news/animal-instinct-how-cat-loving-sleuths-found-an-accused-killer-sadist-111273/ |
Media Article |
|
164 |
Jensen, J. & Ramey, A. (2019). Going Postal: State Capacity and Violent Dispute Resolution. Journal of Comparative Economics, 48 (4), 779 – 796. |
Journal Article |
|
165 |
Jesiek, B. (2003). Democratizing software: Open source, the hacker ethic, and beyond. First Monday, 8(10). |
Journal Article |
|
166 |
Johnson, A. L. (2013 June 19). Prepare for #OpPetrol Targeting Gas and Oil. Retrieved from https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=310e8c92-02c8-4064-9c54-fbc56cb3233d&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments |
Other |
|
167 |
Johnson, A. L. (2013 June 19). Prepare for #OpPetrol Targeting Gas and Oil. Retrieved from https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=310e8c92-02c8-4064-9c54-fbc56cb3233d&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments |
Media Article |
|
168 |
Jones, S. (2017 March 16). Licensed to hack: the rise of the cyber privateer. Financial Times. Retrieved from https://www.ft.com/content/21be48ec-0a48-11e7-97d1-5e720a26771b |
Media Article |
|
169 |
Josefsson, A., Anderson, J., Norlander, A. & Marcusson, B. (2019). Mission Command when waging cyber operations. 24th International Command and Control Research & Technology Symposium, Laurel: MA, 29-31 October 2019. Retrieved from https://www.fhs.se/download/18.7cc6824116dedebbe60639e5/1572899607668/Mission%20Command%20in%20Cyber%20Operations.pdf |
Conference Proceeding |
|
170 |
Kaldor, M. (2013). New and Old Wars: Organized Violence in a Global Era (3rd Edition). Stanford, CA: Stanford University Press. |
Academic Book (Chapter) |
|
171 |
Kaufman, Z. (2020). Digital Age Samaritans. Boston College Law Review, 62 (4). |
Journal Article |
|
172 |
Kelling, G. & Wilson, J. (1982). Broken Windows: The police and neighborhood safety. The Atlantic Magazine. Retrieved from https://www.theatlantic.com/magazine/archive/1982/03/broken-windows/304465/ |
Media Article |
|
173 |
Kello, L. (2017). The virtual weapon and international order. New Haven, CT: Yale University Press. |
Academic Book (Chapter) |
|
174 |
Kerr, O. & Murphy, S. (2017). Government Hacking to Light the Dark Web: Risks to International Relations and International Law? Stanford Law Review, 70. Retrieved from https://www.stanfordlawreview.org/online/government-hacking-to-light-the-dark-web/ |
Journal Article |
|
175 |
Kesling, B. (2020 May 17). Army Deploys Videogames to Reach Recruits Amid Pandemic. The Wall Street Journal. Retrieved from https://www.wsj.com/articles/army-deploys-videogames-to-reach-recruits-amid-pandemic-11589734800 |
Media Article |
|
176 |
Kirkpatrick, G. (2002). The Hacker Ethic and the Spirit of the Information Age. Max Weber Studies, 2 (2), 163 – 185. |
Journal Article |
|
177 |
Klein, A. (2015). Vigilante Media: Unveiling Anonymous and the Hacktivist Persona in the Global Press. Communication Monographs, 82 (3), 379 – 401. |
Journal Article |
|
178 |
Klimburg, A. (2011). Mobilising Cyber Power. Global Politics and Strategy, 53 (1), 41 – 60. |
Journal Article |
|
179 |
Koch, A. (2019). The Non-Jihadi Foreign Fighters: Western Right-Wing and Left-Wing Extremists in Syria. Terrorism and Political Violence. |
Journal Article |
|
180 |
Kocic, M. (2014). Venice and Hajduci in the Era of the Morean War [Venecija i Hajduci u doba Morejskog rata]. Belgrade: Hesperia. |
Academic Book (Chapter) |
|
181 |
Kohn, H. (1944). The Idea of Nationalism: A Study in its Origins and Background [Republished 2005]. London: Routledge. |
Academic Book (Chapter) |
|
182 |
Koliopoulos, J. (1987). Brigands with a Cause: Brigandage and Irredentism in Modern Greece 1821 – 1912. Oxford: Oxford University Press. |
Academic Book (Chapter) |
|
183 |
Koller, C. (2013). Recruitment Policies and Recruitment Experiences in the French Foreign Legion. In, N. Arielli & B. Collins (eds.), Transnational Soldiers. London: Palgrave Macmillan. |
Academic Book (Chapter) |
|
184 |
Kreegipuu, T. & Lauk, E. (2007). The 1940 Soviet Coup-d’État in the Estonian Communist Press: Constructing History to Reshape Collective Memory. Westminster Papers in Communication and Culture, 4 (4), 42 – 64. |
Journal Article |
|
185 |
Kwai, I. & Moses, C. (2021 January 15). Dutch Police Urge Public to Stop ‘Pedo-Hunting’ After Vigilante Violence. The New York Times. Retrieved from https://www.nytimes.com/2020/11/19/world/europe/netherlands-pedophile-hunters.html |
Media Article |
|
186 |
Leaven, T. & Dodge, C. (2010). The United States Cyber Command: International Restrictions vs. Manifest Destiny. North Carolina Journal of Law & Technology, 12(3), 1-28. |
Journal Article |
|
187 |
Lee, S. (2014). The Ethics of Cyberattack. In L. Floridi & M. Taddeo (eds.), The Ethics of Information Warfare, 105 – 122. Cham: Springer International Publishing. |
Academic Book (Chapter) |
|
188 |
Leventopoulos, S. & Benias, N. (2017). Cyber Warfare Affecting Land, Sea, Air and Space Operations. Journal of Computations & Modelling, 7 (1), 29 – 56. |
Journal Article |
|
189 |
Leyden, J. (2020 October 7). Researchers map threat actors’ use of open source offensive security tools. The Daily Swig. Retrieved from https://portswigger.net/daily-swig/researchers-map-threat-actors-use-of-open-source-offensive-security-tools |
Media Article |
|
190 |
Lindvall, A. (2019). Political Hacktivism: Doxing & the First Amendment. Creighton Law Review, 53 (1), 1 – 14. |
Journal Article |
|
191 |
Linvill, D. & Warren, P. (2020). Troll Factories: Manufacturing Specialized Disinformation on Twitter. Political Communication, 37 (4), 447 – 467. |
Journal Article |
|
192 |
Little, C. & Sheffield, C. (1983). Frontiers and Criminal Justice: English Private Prosecution Societies and American Vigilantism in the Eighteenth and Nineteenth Centuries. American Sociological Review, 48 (6), 796 – 808. |
Journal Article |
|
193 |
Liu, H. (2015). Cybersecurity and Cyberwarfare as Emerging Gaps in Private Military and Security Company Regulation: Thoughts for the UN Working Group on the Use of Mercenaries. OHCHR. Retrieved from https://ohchr.org/Documents/Issues/Mercenaries/WG/Event2015/HinYanLiu.pdf |
Think Tank / NGO Article |
|
194 |
Lo, M. (2019) The Islamic State: The Rise of Vigilante Justice. In: Political Islam, Justice and Governance. Political Economy of Islam. Cham: Palgrave Macmillan. |
Academic Book (Chapter) |
|
195 |
Lokot, T. (2017). Public Networked Discourses in the Ukraine-Russia Conflict: ‘Patriotic Hackers’ and Digital Populism. Irish Studies in International Affairs, 28, 99 – 116. |
Journal Article |
|
196 |
Loveluck, B. (2019). The many shades of digital vigilantism. A typology of online self-justice. Global Crime, 21 (3-4), 213 – 241. |
Journal Article |
|
197 |
Lucas, G. (2014). Permissible Preventive Cyberwar: Restricting Cyber Conflict to Justified Military Targets. In L. Floridi & M. Taddeo (eds.), The Ethics of Information Warfare, 73 – 84. Cham: Springer International Publishing. |
Academic Book (Chapter) |
|
198 |
Lucas, G. (2017). State-sponsored hacktivism and the advent of “Soft War”. In M. Gross & T. Meisels (eds.), Cyber Warfare, Media Warfare, and Lawfare, 77 – 87. Cambridge: Cambridge University Press. http://www.ethikundmilitaer.de/en/full-issues/20142-cyberwar/lucas-state-sponsored-hacktivism-and-the-advent-of-soft-war/ |
Academic Book (Chapter) |
|
199 |
Luceri, L., Giordano, S., & Ferrara, E. (2020). Detecting Troll Behavior via Inverse Reinforcement Learning: A Case Study of Russian Trolls in the 2016 US Election. Proceedings of the International AAAI Conference on Web and Social Media, 14(1), 417-427. |
Conference Proceeding |
|
200 |
Machiavelli, N. (1521). The Prince. Translation to English, 1996, Milner, S. Phoenix, AZ: Phoenix Press. |
Other |
|
201 |
Maffei, A. & Monnier, M. (1865). Brigand life in Italy: A history of Bourbonist reaction. Los Angeles, CA: University of California. Retrieved from https://archive.org/details/brigandlifeinit05monngoog/page/n21/mode/2up |
Academic Book (Chapter) |
|
202 |
Makuch, B. (2020 April 21). Neo-Nazis Are Spreading a List of Emails and Passwords for Gates Foundation and WHO Employees. VICE. Retrieved from https://www.vice.com/en/article/akwxzp/neo-nazis-are-spreading-a-list-of-emails-and-passwords-for-gates-foundation-and-who-employees |
Media Article |
|
203 |
Marmura, S. (2018). Emerging Affinities: WikiLeaks in the Context of a Legitimation Crisis. In: The Wikileaks Paradigm, 87 – 108. Cham: Palgrave Pivot. |
Journal Article |
|
204 |
Martin, C. (2017). White hat, black hat: the ethics of cybersecurity. ACM Inroads, 8 (1), 33 |
Think Tank / NGO Article |
|
205 |
Masood, R. (2016 August). Assessment of Cyber Security Challenges in Nuclear Power Plants: Security Incidents, Threats, and Initiatives. Cyber Security and Privacy Research Institute. Retrieved from https://cspri.seas.gwu.edu/sites/g/files/zaxdzs1446/f/downloads/GW-CSPRI-2016-03+MASOOD+Rahat+Nuclear+Power+Plant+Cybersecurity.pdf |
Think Tank / NGO Article |
|
206 |
Maurer, T. & Hoffman, W. (2019). The Privatization of Security and the Market for Cyber Tools and Services [Business and Security Series No. 3]. Geneva Centre for Security Sector Governance. Retrieved from https://www.dcaf.ch/sites/default/files/publications/documents/Carnegie_MaurerHoffmann_July2019.pdf |
Think Tank / NGO Article |
|
207 |
Maurer, T. (2016). ‘Proxies’ and Cyberspace. Journal of Conflict and Security Law, 21 (3), 383 – 403. Retrieved from https://carnegieendowment.org/files/JConflictSecurityLaw-2016-Maurer-383-403.pdf |
Journal Article |
|
208 |
Maurer, T. (2018). Cyber Mercenaries: The State, Hackers, and Power. Cambridge: Cambridge University Press. |
Academic Book (Chapter) |
|
209 |
McEvoy, M. (2014 April 30). US Navy attempting to recruit cryptologists through Facebook game. The Telegraph. Retrieved from https://www.telegraph.co.uk/news/worldnews/northamerica/usa/10799470/US-Navy-attempting-to-recruit-cryptologists-through-Facebook-game.html |
Government Issued |
|
210 |
McGrath, R. (1987). Gunfighters, Highwaymen, and Vigilantes: Violence on the Frontier. Berkeley, CA: University of California Press. |
Academic Book (Chapter) |
|
211 |
McGuffin, C. & Mitchell, P. (2014). On domains: Cyber and the practice of warfare. International Journal, 69 (3), 394 – 412. |
Journal Article |
|
212 |
Meer, S. van der. (2015 December). Signalling as a foreign policy instrument to deter cyber aggression by state actors. Clingendael Netherlands Institute of International Relations. |
Think Tank / NGO Article |
|
213 |
Meer, van der S. (2020 June). How states could respond to non-state cyber-attackers. Clingendael. Retrieved from https://www.clingendael.org/sites/default/files/2020-06/Policy_Brief_Cyber_non-state_June_2020.pdf |
Think Tank / NGO Article |
|
214 |
Mello, J. P. (2012 January 4). Anonymous Targets Neo-Nazi Sites: Anti-Hate Groups Condemn Action. PCWorld. Retrieved from https://www.pcworld.com/article/247271/anonymous_targets_neo_nazis_sites_anti_hate_groups_condemn_action.html |
Media Article |
|
215 |
Merari, A. (1993). Terrorism as a strategy of insurgency. Terrorism and Political Violence, 5 (4), 213 – 251. |
Journal Article |
|
216 |
Merton, R. (1938). Social Structure and Anomie. American Sociological Review, 3 (5), 672 – 682. |
Journal Article |
|
217 |
Miller, G. (2020 February 11). The intelligence coup of the century. The Washington Post. Retrieved from https://www.washingtonpost.com/graphics/2020/world/national-security/cia-crypto-encryption-machines-espionage/ |
Media Article |
|
218 |
Milliard, T. (2003). Overcoming Post-Colonial Myopia: A call to recognize and regulate private military companies. Military Law Review, 176, 1 – 95. |
Journal Article |
|
219 |
Mockler, A. (1969). The Mercenaries. London: Macdonald. |
Academic Book (Chapter) |
|
220 |
Moffa, A. (2012). Two Competing Models of Activism, One Goal: A Case Study of Anti-Whaling Campaigns in the South Ocean. Yale Journal of International Law, 37 (1), 201 – 215. |
Journal Article |
|
221 |
Moghadam, A., Berger, R. & Beliakova, P. (2014). Say Terrorist, Think Insurgent: Labeling and Analyzing Contemporary Terrorist Actors. Perspectives on Terrorism, 8 (5), 2 – 17. |
Journal Article |
|
222 |
Mohurle, S. & Patil, M. (2017). A brief study of Wannacry Threat: Ransomware Attack 2017. International Journal of Advanced Research in Computer Science, 8 (5), 1938 – 1940. |
Journal Article |
|
223 |
Moncada, E. (2017). Varieties of vigilantism: conceptual discord, meaning and strategies. Global Crime, 18 (4), 403 – 423. |
Journal Article |
|
224 |
Moore, D. & Rid, T. (2016). Cryptopolitik and the Darknet. Global Politics and Strategy, 58 (1), 7 – 38. Retrieved from https://www.tandfonline.com/doi/full/10.1080/00396338.2016.1142085 |
Journal Article |
|
225 |
Morozov, E. (2008 August 14). An Army of Ones and Zeroes. Slate. Retrieved from https://slate.com/technology/2008/08/how-i-became-a-soldier-in-the-georgia-russia-cyberwar.html |
Media Article |
|
226 |
Morozov, E. (2009 April 9). Do governments enlist cybergangs in their war efforts? Foreign Policy. Retrieved from https://foreignpolicy.com/2009/04/09/do-governments-enlist-cybergangs-in-their-war-efforts/ |
Media Article |
|
227 |
Mortensen, E. (2018). The Mode of Lynching: One Method of Vigilante Justice. Canadian Review of American Studies, 48 (1), 20 – 39. |
Journal Article |
|
228 |
Moyer, E. (2013 September 12). NSA disguised itself as Google to spy, say reports. CNET. Retrieved from https://www.cnet.com/news/nsa-disguised-itself-as-google-to-spy-say-reports/ |
Media Article |
|
229 |
Muthuppalaniappan, M. & Stevenson, K. (2020). Healthcare cyber-attacks and the COVID-19 pandemic: an urgent threat to global health. International Journal for Quality in Health Care, 2020. Retrieved from https://academic.oup.com/intqhc/advance-article/doi/10.1093/intqhc/mzaa117/5912483?login=true |
Journal Article |
|
230 |
Navy Recruiting Command Public Affairs. (2015 February 5). Navy Recruiting Command Cryptology & Technology Facebook Page Launches New Challenge. Retrieved on 30th January 2021 from https://www.doncio.navy.mil/%28npmedcusnh5gftzqz2wvrp55%29/CHIPS/ArticleDetails.aspx?ID=6013 |
Government Issued |
|
231 |
Nelsen, J. (1987). “Auftragstaktik”: A Case for Decentralized Battle. The US Army War College Quarterly: Parameters, 17 (1), 21 – 34. |
Journal Article |
|
232 |
Nhan, J., Huey, L. & Broll, R. (2017). Digilantism: An Analysis of Crowdsourcing and the Boston Marathon Bombings. British Journal of Criminology, 57 (2), 341 – 361. |
Journal Article |
|
233 |
Nye, J. S. (2017). Deterrence and Dissuasion in Cyberspace. International Security, 41(3), 44–71. https://doi.org/10.1162/ISEC_a_00266 |
Journal Article |
|
234 |
Oboler, A. (2012 February 12). Impersonating Anonymous: Is it state sponsored terrorism? The Jerusalem Post. Retrieved from https://www.jpost.com/blogs/internet-engagement/impersonating-anonymous-is-it-state-sponsored-terrorism-366110 |
Media Article |
|
235 |
O’Brien, K. (2000). Private Military Companies and African Security 1990–98. In A. F. Musah & J. K. Fayemi (eds.), Mercenaries: An African Security Dilemma. Sterling, VA: Pluto Press. |
Academic Book (Chapter) |
|
236 |
O’Sullivan, K. & Turnbull, B. (2015). The cyber simulation terrain: Towards an open source cyber effects simulation ontology. Australian Information Warfare and Security Conference, 2015. Retrieved from https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1059&context=isw |
Conference Proceeding |
|
237 |
Oude Breuil, B. & Rozema, R. (2009). Fatal imaginations: death squads in Davao City and Medellín compared. Crime, Law and Social Change, 52, 405 – 424. |
Journal Article |
|
238 |
P&S Intelligence. (2020 August). Global Artificial Intelligence (AI) in Cyber Security Market 2020. PS Market Research. Retrieved on 13th January 2021 from https://www.psmarketresearch.com/market-analysis/artificial-intelligence-in-cyber-security-market |
Other |
|
239 |
Palou-Loverdos, J. & Armendariz, L. (2011). The Privatization of Warfare, Violence and Private Military & Security Companies: A factual and legal approach to human rights abuses by PMSC in Iraq. Nova Inovacio Social. Retrieved from https://novact.org/wp-content/uploads/2012/09/The-privatization-of-warfare.pdf |
Journal Article |
|
240 |
Pan, N. (2018). The Mobilization of Cyber-Nationalism by the Communist Youth League: Pressure, Opportunity and Strategy. Journal of Asia-Pacific Studies, 30, 139 – 157. |
Journal Article |
|
241 |
Pan, N. (2018). The Mobilization of Cyber-Nationalism by the Communist Youth League: Pressure, Opportunity and Strategy. Journal of Asia-Pacific Studies, 30, 139 – 157. Retrieved from https://core.ac.uk/download/pdf/159504217.pdf |
Journal Article |
|
242 |
Paszyn, D. (2000). The Extent of Soviet Military and Economic Assistance to the Sandinista Leftist Regime prior to Gorbachev Assuming Office. In: The Soviet Attitude to Political and Social Change in Central America, 1979–90. Studies in Russia and East Europe. London: Palgrave Macmillan. |
Academic Book (Chapter) |
|
243 |
Percy, S. (2007). Mercenaries: The History of a Norm in International Relations. Oxford: Oxford University Press. |
Academic Book (Chapter) |
|
244 |
Percy, S. (2014). The Unimplemented Norm: Anti-Mercenary Law and the Problems of Institutionalization. In A. Betts & P. Orchard, Implementation and World Politics: How International Norms Change Practice, Oxford: Oxford University Press. |
Academic Book (Chapter) |
|
245 |
Peterson, A. (2015 October 24). How the government tries to recruit hackers on their own turf. The Washington Post. Retrieved from https://www.washingtonpost.com/news/the-switch/wp/2015/10/24/how-the-government-tries-to-recruit-hackers-on-their-own-turf/ |
Media Article |
|
246 |
Phillips, A. (2016). Company sovereigns, private violence and colonialism. In R. Abrahamsen & A. Leander, Routledge Handbook of Private Security Studies, London: Routledge. |
Academic Book (Chapter) |
|
247 |
Pollpeter, K. (2015). Chinese Writings on Cyberwarfare and Coercion. In J. R. Lindsay, T. M. Cheung, & D. S. Reveron (Eds.), China and Cybersecurity, 138–162. Oxford: Oxford University Press. https://doi.org/10.1093/acprof:oso/9780190201265.003.0006 |
Academic Book (Chapter) |
|
248 |
Porup, J. (2016 May 18). Hacking Team hacker steals €10K in Bitcoin, sends it to Kurdish anticapitalists in Rojava. ArsTechnica. |
Media Article |
|
249 |
Pratten, D. (2008). ‘The Thief Eats His Shame’: Practice and Power in Nigerian Vigilantism. Africa: Journal of the International African Institute, 78 (1), 64 – 83. |
Journal Article |
|
250 |
Prem B. (2018) Who Am I? The Blurring of the Private Military and Security Company (PMSC) Category. In: Bures O., Carrapico H. (eds) Security Privatization. Springer, Cham. |
Academic Book (Chapter) |
|
251 |
Raffield, B. (2019). The slave markets of the Viking world: comparative perspectives on an ‘invisible archaeology’. Slavery & Abolition, 40 (4), 682 – 705. |
Journal Article |
|
252 |
Rapoport, D. C. (2004). The four waves of modern terrorism. In A. K. Cronin & J. M. Ludes (Eds.), Attacking terrorism: Elements of a grand strategy (pp. 46–73). Washington, DC, Georgetown University Press. |
Academic Book (Chapter) |
|
253 |
Rathaur, K. (2001). British Gurkha Recruitment : A Historical Perspective. Voice of History, 16 (2), 19 -24. |
Journal Article |
|
254 |
Rediker, M. (2004). Villains of All Nations: Atlantic Pirates in the Golden Age. Boston, MA: Beacon Press. |
Academic Book (Chapter) |
|
255 |
Reeves, S. & Wallace, D. (2015). The Combatant Status of the ‘Little Green Men’ and Other Participants in the Ukraine Conflict. International Law Studies, 91, 361 – 401. |
Journal Article |
|
256 |
Reynard, L. (2019). Troll Farm: Anonymity as a Weapon for Online Character Assassination. In I. Chiluwa & S. Samoilenko (eds.), Handbook of Research on Deception, Fake News, and Misinformation Online. Hershey, PA: IGI Global. |
Academic Book (Chapter) |
|
257 |
Richards, I. & Wood, M. (2018). Hacktivists against terrorism: a cultural criminological analysis of anonymous’ anti-IS campaigns. International Journal of Cybercriminology, 12 (1), 187 – 205. |
Journal Article |
|
258 |
Richardson, D. (1976). FOREIGN FIGHTERS IN SPANISH MILITIAS: THE SPANISH CIVIL WAR 1936-1939. Military Affairs, 40 (1), 7 – 14. |
Journal Article |
|
259 |
Ricks, T. (2014 April 29). Cyber-privateers. Foreign Policy. Retrieved from https://foreignpolicy.com/2014/04/29/cyber-privateers/ |
Media Article |
|
260 |
Russian Scientific Agency of Electronic Warfare. (2020 December 3). VKontakte Pinned Post. VKontakte. Retrieved on 31st January 2021 from https://web.archive.org/web/20210131205200/https://vk.com/wall-94744292_77 |
Government Issued |
|
261 |
Sadok, M., Welch, C. & Bednar, P. (2019). A socio-technical perspective to counter cyber-enabled industrial espionage. Security Journal, 33, 27 – 42. |
Journal Article |
|
262 |
Sanford, V. (2003). Learning to Kill by Proxy: Colombian Paramilitaries and the Legacy of Central American Death Squads, Contras, and Civil Patrols. Social Justice, 30 (3), 63 – 81. |
Journal Article |
|
263 |
Sanger, D. E. (2019). The perfect weapon: War, sabotage, and fear in the cyber age (1st ed). New York City, NY: Broadway Books. |
Academic Book (Chapter) |
|
264 |
Sanger, D., Perlroth, N. & Barnes, J. (2021 January 5). As Understanding of Russian Hacking Grows, So Does Alarm. The New York Times. Retrieved from https://www.nytimes.com/2021/01/02/us/politics/russian-hacking-government.html |
Media Article |
|
265 |
Sauter, M. (2016). Kevin Mitnick, the New York Times, and the Media’s Conception of the Hacker. In J. Hunsinger & A. Schrock (eds.), Making Our World: The Hacker and Maker Movements in Context. New York City, NY: Peter Lang Publishing. |
Academic Book (Chapter) |
|
266 |
Sayfayn, N. & Madnick, S. (2017 May). Cybersafety Analysis of the Maroochy Shire Sewage Spill [Working Paper CISL# 2017-09]. MIT Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity. Retrieved from http://web.mit.edu/smadnick/www/wp/2017-09.pdf |
Journal Article |
|
267 |
Schmitt, M. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press. |
Law/Treaty |
|
268 |
Schneier, B. (2016 September 13). Someone Is Learning How to Take Down the Internet. Lawfare. Retrieved from https://www.lawfareblog.com/someone-learning-how-take-down-internet |
Media Article |
|
269 |
Schneier, B. (2017 May 23). Who are the Shadow Brokers? The Atlantic. Retrieved from https://www.theatlantic.com/technology/archive/2017/05/shadow-brokers/527778/ |
Media Article |
|
270 |
Scott, J. (2010). The Art of Not Being Governed: An Anarchist History of Upland Southeast Asia. New Haven, CT: Yale University Press. |
Academic Book (Chapter) |
|
271 |
Seal, G. (2009). The Robin Hood Principle: Folklore, History, and the Social Bandit. Journal of Folklore Research, 46 (1), 67 – 89. |
Journal Article |
|
272 |
SecurityWeek.Com. (2017). Russian outsourcing provides plausible deniability for state-sponsored hacking. SecurityWeek. Retrieved from https://www.securityweek.com/russian-outsourcing-provides-plausible-deniability-state-sponsored-hacking |
Media Article |
|
273 |
Seligman, L. (2018). Why the military must learn to love Silicon Valley. Foreign Policy. |
Media Article |
|
274 |
Serracino-Inglott, P. (2017). Is it OK to be an Anonymous? In K. Miller & M. Taddeo (eds.), The Ethics of Information Technologies. London: Routledge. |
Academic Book (Chapter) |
|
275 |
Seward, D. (1999). The Hundred Years War. The English in France 1337 – 1453. London: Penguin Books. |
Academic Book (Chapter) |
|
276 |
Shamir, E. (2011). Transforming Command: The Pursuit of Mission Command in the U.S., British, and Israeli Armies. Stanford: Stanford University Press. |
Academic Book (Chapter) |
|
277 |
Shane, S. (2017 May 16). Malware Case is Major Blow for the NSA. The New York Times. Retrieved from https://www.nytimes.com/2017/05/16/us/nsa-malware-case-shadow-brokers.html |
Media Article |
|
278 |
Shaw, M. (1999) ‘War and globality: the role and character of war in the global transition’, in Ho-won Jeong (ed.), The New Agenda for Peace Research, Abingdon: Ashgate pp. 61–80 |
Academic Book (Chapter) |
|
279 |
Shearing, C. & Stenning, P. (1981). Modern Private Security: Its Growth and Implications. Crime and Justice, 3, 193 – 245. |
Journal Article |
|
280 |
Sigholm, J. (2016). Non-State Actors in Cyberspace Operations. Journal of Military Studies, 4 (1), 1 – 37. |
Journal Article |
|
281 |
Sigholm, J. (2016). Non-State Actors in Cyberspace Operations. Swedish National Defence College. |
Government Issued |
|
282 |
Simone, A. (2017 May 17). The strange history of ransomware. Public Radio International. Retrieved from https://www.pri.org/stories/2017-05-17/strange-history-ransomware |
Media Article |
|
283 |
Simpson, T. (2014). The Wrong in Cyberattacks. In L. Floridi & M. Taddeo (eds.), The Ethics of Information Warfare, 141 – 154. Cham: Springer International Publishing. |
Academic Book (Chapter) |
|
284 |
Singer, P. & Friedman, A. (2013). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford: Oxford University Press. |
Academic Book (Chapter) |
|
285 |
Singer, P. (2003). Corporate Warriors: The Rise of the Privatized Military Industry. Ithaca, NY: Cornell University Press. |
Academic Book (Chapter) |
|
286 |
Singer, P. (2009). Wired for War: The Robotics Revolution and Conflict in the 21st Century. London: Penguin Books. |
Academic Book (Chapter) |
|
287 |
Singer, P. (2019). LikeWar: The Weaponization of Social Media. Boston, MA: Houghton Mifflin Harcourt. |
Academic Book (Chapter) |
|
288 |
Sossai, M. (2016). The legal framework for the armed forces and the regulation of private security. In R. Abrahamsen & A. Leander, Routledge Handbook of Private Security Studies, London: Routledge. |
Academic Book (Chapter) |
|
289 |
Spearin, C. (2014). Promising Privateers?: Understanding the Constraints of Contemporary Private Security at Sea. Naval War College Review, 67 (2), 97 – 116. |
Journal Article |
|
290 |
Speech by Foreign Minister Heiko Maas on European digital sovereignty on the occasion of the opening of the Smart Country Convention of the German Association for Information Technology, Telecommunications and New Media (Bitkom). Retrieved from https://www.auswaertiges-amt.de/en/newsroom/news/maas-bitkom/2410398 |
Government Issued |
|
291 |
Starbird, K., Maddock, J., Orand, M., Achterman, P., & Mason, R. M. (2014). Rumors, False Flags, and Digital Vigilantes: Misinformation on Twitter after the 2013 Boston Marathon Bombing. In iConference 2014 Proceedings, 654 – 662. |
Conference Proceeding |
|
292 |
Steele, S. & Wargo, C. (2007). An Introduction to Insider Threat Management. Information Systems Security, 16 (1), 23 – 33. |
Journal Article |
|
293 |
Stoneman, E. & Packer, J. (2020). Reel cruelty: Voyeurism and extra-juridical punishment in true-crime documentaries. Crime, Media, Culture: An International Journal. |
Journal Article |
|
294 |
Storr, J. (2003). A command philosophy for the information age: The continuing relevance of mission command. Defence Studies, 3 (3), 119 – 129. |
Journal Article |
|
295 |
Stubbs, J. (2021 January 11). SolarWinds hackers linked to known Russian spying tools, investigators say. Reuters. Retrieved from https://www.reuters.com/article/global-cyber-solarwinds/solarwinds-hackers-linked-to-known-russian-spying-tools-investigators-say-idINKBN29G16Z |
Media Article |
|
296 |
Sullivan, J. (2018 November 28). Russian Cyber Operations: State-led Organised Crime. RUSI. Retrieved from https://rusi.org/commentary/russian-cyber-operations-state-led-organised-crime |
Think Tank / NGO Article |
|
297 |
Summer, D. & Weidman, L. (2013). Eco-terrorism or Eco-tage: An Argument for the Proper Frame. ISLE: Interdisciplinary Studies in Literature and Environment, 20 (4), 855 – 876. |
Journal Article |
|
298 |
Taddeo, M. & Floridi, L. (2018). Regulate artificial intelligence to avert cyber arms race. Nature, 556, 296 – 298. |
Journal Article |
|
299 |
The Economist. (2008 December 6). Marching off to cyberwar. The Economist. Retrieved from https://www.economist.com/technology-quarterly/2008/12/06/marching-off-to-cyberwar |
Media Article |
|
300 |
The New York Times. (2016, December 29). How Russia recruited elite hackers for its Cyberwar (Published 2016). Retrieved from https://www.nytimes.com/2016/12/29/world/europe/how-russia-recruited-elite-hackers-for-its-cyberwar.html |
Media Article |
|
301 |
The New York Times. (2017 March 13). How Russia recruits hackers. Retrieved from https://www.nytimes.com/2017/03/13/podcasts/the-daily/the-daily-how-russia-recruits-hackers.html |
Other |
|
302 |
The Washington Post. (2015 October 24). How the government tries to recruit hackers on their own turf. The Washington Post. https://www.washingtonpost.com/news/the-switch/wp/2015/10/24/how-the-government-tries-to-recruit-hackers-on-their-own-turf/ |
Media Article |
|
303 |
Thomson, J. (1994). Mercenaries, Pirates, and Sovereigns: State-Building and Extraterritorial Violence in Early Modern Europe. Princeton, NJ: Princeton University Press. |
Academic Book (Chapter) |
|
304 |
Thonnard, O., Bilge, L. O’Gorman, G., Kiernan, S. & Lee, M. (2012). Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat. In: Balzarotti D., Stolfo S.J., Cova M. (eds) Research in Attacks, Intrusions, and Defenses. RAID 2012. Lecture Notes in Computer Science, vol 7462. Berlin: Springer. |
Academic Book (Chapter) |
|
305 |
Tian, E. (2021 January 29). The QAnon Timeline: Four Years, 5,000 Drops and Countless Failed Prophecies. Bellingcat. Retrieved from https://www.bellingcat.com/news/americas/2021/01/29/the-qanon-timeline/ |
Media Article |
|
306 |
Tidy, J. (2020 October 19). Mysterious ‘Robin Hood’ hackers donating stolen money. BBC. Retrieved from https://www.bbc.com/news/technology-54591761 |
Media Article |
|
307 |
Tilly, C. (1975). The formation of national states in Europe. Princeton, NJ: Princeton University Press. |
Academic Book (Chapter) |
|
308 |
Tilly, C. (1985). War making and state making as organized crime. In Evans, P., Rueschemeyer, D., & Skocpol, T. (Eds.), Bringing the State Back In (169-187). Cambridge: Cambridge University Press. |
Academic Book (Chapter) |
|
309 |
Titahena, J. & Sumser-Lupson, K. (2013). Privately Contracted Armed Security Personnel (PCASP) On Ships in High Risk Areas: Impacts, Concerns and Challenges. In E. Bosse, E. Shahbazian & G. Rogova (eds.), Prediction and Recognition of Piracy Efforts Using Collaborative Human-Centric Information Systems. Amsterdam: IOS Press. |
Academic Book (Chapter) |
|
310 |
Townsend, C. (2019). Fifth Sun: A New History of the Aztecs. Oxford: Oxford University Press. |
Academic Book (Chapter) |
|
311 |
Treebridge, P., Westbrook, J. & Sharevski, F. (2018). Sorry: Ambient Tactical Deception Via Malware-Based Social Engineering. Journal of Cognition and Neuroethics, 6 (1), 103 -123. Retrieved from https://www.researchgate.net/publication/328575878_Sorry_Ambient_Tactical_Deception_Via_Malware-Based_Social_Engineering |
Journal Article |
|
312 |
Trundle, M. (2004). Greek Mercenaries: From the Late Archaic Period to Alexander. London: Routledge. |
Academic Book (Chapter) |
|
313 |
Tuchman, B. (1987). A Distant Mirror: The Calamitous 14th Century. London: Random House Trade. |
Academic Book (Chapter) |
|
314 |
U.S-China Economic and Security Review Commission (USCC). (2009 November). 2009 Report to Congress of the US-China Economic and Security Review Commission. Retrieved from https://apps.dtic.mil/dtic/tr/fulltext/u2/a520210.pdf |
Government Issued |
|
315 |
US Cybersecurity & Infrastructure Security Agency (CISA). (2017 August 23). HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure. CISA. Retrieved on 13th January 2021 from https://us-cert.cisa.gov/ncas/alerts/TA17-164A |
Government Issued |
|
316 |
US Cybersecurity & Infrastructure Security Agency (CISA). (2020 April 15). Guidance on the North Korean Cyber Threat. CISA. Retrieved on 13th January 2021 from https://us-cert.cisa.gov/ncas/alerts/aa20-106a |
Government Issued |
|
317 |
US Department of Justice (DoJ). (2018 September 6). North Korean Regime-Backed Programmer Charged With Conspiracy to Conduct Multiple Cyber Attacks and Intrusions. US DoJ Office of Public Affairs. Retrieved from https://www.justice.gov/opa/pr/north-korean-regime-backed-programmer-charged-conspiracy-conduct-multiple-cyber-attacks-and |
Government Issued |
|
318 |
US Department of Justice. (2018 July 13). Indictment Case 1:18-cr-00215-ABJ [Indictment of 12 Russian Officers]. US Department of Justice. Retrieved from https://www.justice.gov/file/1080281/download |
Government Issued |
|
319 |
US White House. (2018 February 15). Statement from the Press Secretary. US White House. Retrieved from https://www.whitehouse.gov/briefings-statements/statement-press-secretary-25/ |
Government Issued |
|
320 |
US White House. (2021 January 26). Readout of President Joseph R. Biden, Jr. Call with President Vladimir Putin of Russia. Retrieved from https://www.whitehouse.gov/briefing-room/statements-releases/2021/01/26/readout-of-president-joseph-r-biden-jr-call-with-president-vladimir-putin-of-russia/ |
Government Issued |
|
321 |
Valeriano, B. & Maness, R. (2015). Cyber War versus Cyber Realities: Cyber Conflict in the International System. Oxford: Oxford University Press. |
Academic Book (Chapter) |
|
322 |
Valeriano, B., Jensen, B., & Maness, R. C. (2018). Cyber Strategy: The Evolving Character of Power and Coercion. In Cyber Strategy. Oxford: Oxford University Press. |
Academic Book (Chapter) |
|
323 |
Vallor, S. (2014). Armed Robots and Military Virtue. In L. Floridi & M. Taddeo (eds.), The Ethics of Information Warfare, 169 – 185. Cham: Springer International Publishing. |
Academic Book (Chapter) |
|
324 |
Verton, D. (1999). Serbs launch cyberattack on NATO. Federal Computer Week. Retrieved from https://fcw.com/articles/1999/04/04/serbs-launch-cyberattack-on-nato.aspx?m=2 |
Media Article |
|
325 |
Vincent, A. (2017). State-sponsored hackers: The new normal for business. Network Security, 9, 10-12. |
Journal Article |
|
326 |
Vlahakis, J. & Partridge, W. (1989). Assessment of Security at Facilities That Produce Nuclear Weapons. In: Golden B.L., Wasil E.A., Harker P.T. (eds) The Analytic Hierarchy Process. Heidelberg: Springer. |
Academic Book (Chapter) |
|
327 |
Voss, K. (2014). Washingtons Söldner: Verdeckte US-Interventionen im Kalten Krieg und ihre Folgen. Hamburg: Hamburger Edition. |
Academic Book (Chapter) |
|
328 |
Waddell, K. (2016 May 10). The Computer Virus That Haunted Early AIDS Researchers. The Atlantic. Retrieved from https://www.theatlantic.com/technology/archive/2016/05/the-computer-virus-that-haunted-early-aids-researchers/481965/ |
Media Article |
|
329 |
Wall, J. (2017). Where to prosecute cybercrimes. Duke Law & Technology Review, 17 (1), 147 – 61. Retrieved from https://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1335&context=dltr |
Journal Article |
|
330 |
Walter, D., Ophir, Y. & Jamieson, K. (2020). Russian Twitter Accounts and the Partisan Polarization of Vaccine Discourse, 2015–2017. American Journal of Public Health, 110 (5), 718 – 724. |
Journal Article |
|
331 |
Ware, V. (2016). Military migrants and mercenary markets. In R. Abrahamsen & A. Leander, Routledge Handbook of Private Security Studies, London: Routledge. |
Academic Book (Chapter) |
|
332 |
Watkins, J. (2018). No Good Deed goes Unpunished: The Duties Held by Malware Researchers, Penetration Testers, and White Hat Hackers. Minnesota Journal of Law, Science & Technology, 19, 535. |
Journal Article |
|
333 |
Weber, M. (1919). Politics as a Vocation. |
Other |
|
334 |
Weber, V. (2018). Linking cyber strategy with grand strategy: the case of the United States. Journal of Cyber Policy, 3 (2), 236-257. DOI: 10.1080/23738871.2018.1511741 |
Journal Article |
|
335 |
Weimann, G. (2005). Cyberterrorism: The Sum of All Fears? Studies in Conflict & Terrorism, 28 (2), 129 – 149. |
Journal Article |
|
336 |
Westberg, A. (2016). Anti-piracy in a sea of predation: the interaction of navies, fishermen and pirates off the coast of Somalia. Journal of the Indian Ocean Region, 12 (2), 209 – 226. |
Journal Article |
|
337 |
Wheeler, T. (2020 December 22). NATO, We Want to Go to War With You. Foreign Policy. Retrieved from https://foreignpolicy.com/2020/12/22/nato-we-want-to-go-to-war-with-you/ |
Media Article |
|
338 |
Whelan, M. (2006). The Battle of Jadotville: Irish Soldiers in Combat in the Congo 1961. Dublin: South Dublin Libraries. |
Academic Book (Chapter) |
|
339 |
Wickham-Crowley, T. (1987). The Rise (And Sometimes Fall) of Guerrilla Governments in Latin America. Sociological Forum, 2 (3), 473 – 499. |
Journal Article |
|
340 |
Wilhelm, T. & Andress, J. (2010). Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques. Amsterdam: Syngress. |
Academic Book (Chapter) |
|
341 |
Williams, C. (2005). From Conscripts to Volunteers. Naval War College Review, 58 (1), 1 – 28. |
Journal Article |
|
342 |
Williams, P. (2008). Violent Non-State Actors and National and International Security. Zurich: ETH Zurich |
Journal Article |
|
343 |
Young, P. (2019 May 1). Artificial Intelligence: A Non-State Actor’s New Best Friend. Over the Horizon Journal. Retrieved from https://othjournal.com/2019/05/01/artificial-intelligence-a-non-state-actors-new-best-friend/ |
Journal Article |
|
344 |
Zannettou, S., Caulfield, T., Setzer, W., Sirivianos, M., Stringhini, G., & Blackburn, J. (2019). Who let the trolls out? Proceedings of the 10th ACM Conference on Web Science – WebSci ’19. |
Media Article |
|
345 |
Zelalem, Z. (2020 June 27). An Egyptian cyber attack on Ethiopia by hackers is the latest strike over the Grand Dam. Quartz Africa. Retrieved from https://qz.com/africa/1874343/egypt-cyber-attack-on-ethiopia-is-strike-over-the-grand-dam/ |
Media Article |
|
346 |
Zetter, K. (2015 May 15). Feds Say That Banned Researcher Commandeered a Plane. Wired. Retrieved from https://www.wired.com/2015/05/feds-say-banned-researcher-commandeered-plane/ |
Media Article |
|
347 |
Zgoba, K. (2006). Spin doctors and moral crusaders: the moral panic behind child safety legislation. Criminal Justice Studies, 17 (4), 385 – 404. |
Journal Article |
|
348 |
Zilber, N. (2018 August 31). The Rise of the Cyber-Mercenaries. Foreign Policy. Retrieved from https://foreignpolicy.com/2018/08/31/the-rise-of-the-cyber-mercenaries-israel-nso/ |
Media Article |
|
349 |
Zwanenburg, M. (2012). Military Vessel Protection Detachments: The Experience of the Netherlands. Military Law and Law of War Review, 51, 97. |
Journal Article |
|