Notes:

[1] Fred Kaplan, Dark Territory: The Secret History of Cyber War, (New York: Simon & Schuster, 2016), 2-12.

[2] Angus King et al., United States Cyberspace Solarium Commission Report, (Washington, D.C.: The Cyberspace Solarium Commission, 2020).

[3] Thomas Schelling, Arms and Influence, (London: Yale University Press, 2008), 22-79.

[4] Leon Panetta, “Defending the Nation from Cyberattack,” Office of the Secretary of Defense, October 11, 2012, http://www.defense.gov/Speeches/Speech.aspx?SpeechID=1728. This speech by the then Secretary of Defense is a good sampler of this approach.

[5] Chris Kubecka and Jack Rhysider, “EP30: Shamoon,” January 22, 2019, in Darknet Diaries, produced by Darknet Diaries, podcast, MP3 audio, 35:11, https://darknetdiaries.com/episode/30/.

[6] Hewlett-Packard, Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape, HP Security Briefing Episode #16, (HP Security Research, 2014), 3.

[7] Tim Maurer, Cyber Mercenaries: The State, Hackers, and Power, (Cambridge: Cambridge University Press, 2018): 13-14.

[8] Benjamin Jensen, Brandon Valeriano, and Ryan Maness, “Fancy Bears and Digital Trolls: Cyber Strategy with a Russian Twist,” Journal of Strategic Studies 42, no. 2 (2019): 212-234.

[9] Lyu Jinghua, “What Are China’s Cyber Capabilities and Intentions?,” Carnegie Endowment for International Peace, April 1, 2019, https://carnegieendowment.org/2019/04/01/what-are-china-s-cyber-capabilities-and-intentions.

[10] Lucas Kello, “Cyber Legalism: Why It Fails and What To Do About It,” Journal of Cybersecurity (2021): 1-15. Again, a good example of the sentiment in the field.

[11] U.S. Cyber Command PAO, “CYBER 101 – Defend Forward and Persistent Engagement,” United States Cyber Command, October 25, 2022, https://www.cybercom.mil/Media/News/Article/3198878/cyber-101-defend-forward-and-persistent-engagement/.

[12] Jason Healey, “Triggering the Forever War, in Cyberspace,” The Cipher Brief, April 1, 2018, https://www.thecipherbrief.com/article/tech/triggering-new-forever-war-cyberspace. Yet again, one sampling.

[13] Michael Fischerkeller and Richard Harknett, “Deterrence Is Not a Credible Strategy for Cyberspace,” Foreign Policy Research Institute (2017): 381-393, https://doi: 10.1016,

[14] Jon Lindsay, “Stuxnet and the Limits of Cyber Warfare,” Security Studies 22, no. 3 (2015): 375-376.

[15] Emily Goldman and Michael Warner, “The Military Instrument in Cyber Strategy,” SAIS Review of International Affairs 41, no. 2 (2021): 56-57.

[16] Brandon Valeriano, et. al., Dyadic Cyber Incident Dataset v 2.0, Harvard Dataverse, September 2017, 2022, https://doi.org/10.7910/DVN/CQOMYV.

[17] Office of the Director of National Intelligence, Annual Threat Assessment of the U.S. Intelligence Community, (Washington, D.C.: Office of the Director of National Intelligence, 2023), 28.

[18] U.S. Department of Homeland Security, U.S. Department of Homeland Security Strategy, (Washington, D.C.: U.S. Department of Homeland Security, 2018), 11.

[19] Cyber National Mission Force Public Affairs and NSA Public Affairs, “How U.S. Cyber Command, NSA Are Defending the Midterm Elections: One Team, One Fight,” U.S. Cyber Command, August 25, 2022, https://www.cybercom.mil/Media/News/Article/3139691/how-us-cyber-command-nsa-are-defending-midterms-elections-one-team-one-fight/.

[20] Cyber National Mission Force Public Affairs, “Before the Invasion: Hunt Forward in Ukraine,” U.S. Cyber Command, November 28, 2022, https://www.cybercom.mil/Media/News/Article/3229136/before-the-invasion-hunt-forward-operations-in-ukraine/.

[21] Michael Connell and Sarah Vogler, “Russia’s Approach to Cyber Warfare,” N00014-16-D-5003, (Washington, D.C.: Center for Naval Analyses, 2017), 3-6.

[22] Jinghua, “Chinese Cyber Capabilities and Intentions.”

[23] Michael Kolton, “Interpreting China’s Pursuit of Cyber Sovereignty and Its View on Cyber Deterrence,” The Cyber Defense Review 2, no. 1 (2017): 119-154.

LEAVE A REPLY

Please enter your comment!
Please enter your name here