Notes:
[1] Fred Kaplan, Dark Territory: The Secret History of Cyber War, (New York: Simon & Schuster, 2016), 2-12.
[2] Angus King et al., United States Cyberspace Solarium Commission Report, (Washington, D.C.: The Cyberspace Solarium Commission, 2020).
[3] Thomas Schelling, Arms and Influence, (London: Yale University Press, 2008), 22-79.
[4] Leon Panetta, “Defending the Nation from Cyberattack,” Office of the Secretary of Defense, October 11, 2012, http://www.defense.gov/Speeches/Speech.aspx?SpeechID=1728. This speech by the then Secretary of Defense is a good sampler of this approach.
[5] Chris Kubecka and Jack Rhysider, “EP30: Shamoon,” January 22, 2019, in Darknet Diaries, produced by Darknet Diaries, podcast, MP3 audio, 35:11, https://darknetdiaries.com/episode/30/.
[6] Hewlett-Packard, Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape, HP Security Briefing Episode #16, (HP Security Research, 2014), 3.
[7] Tim Maurer, Cyber Mercenaries: The State, Hackers, and Power, (Cambridge: Cambridge University Press, 2018): 13-14.
[8] Benjamin Jensen, Brandon Valeriano, and Ryan Maness, “Fancy Bears and Digital Trolls: Cyber Strategy with a Russian Twist,” Journal of Strategic Studies 42, no. 2 (2019): 212-234.
[9] Lyu Jinghua, “What Are China’s Cyber Capabilities and Intentions?,” Carnegie Endowment for International Peace, April 1, 2019, https://carnegieendowment.org/2019/04/01/what-are-china-s-cyber-capabilities-and-intentions.
[10] Lucas Kello, “Cyber Legalism: Why It Fails and What To Do About It,” Journal of Cybersecurity (2021): 1-15. Again, a good example of the sentiment in the field.
[11] U.S. Cyber Command PAO, “CYBER 101 – Defend Forward and Persistent Engagement,” United States Cyber Command, October 25, 2022, https://www.cybercom.mil/Media/News/Article/3198878/cyber-101-defend-forward-and-persistent-engagement/.
[12] Jason Healey, “Triggering the Forever War, in Cyberspace,” The Cipher Brief, April 1, 2018, https://www.thecipherbrief.com/article/tech/triggering-new-forever-war-cyberspace. Yet again, one sampling.
[13] Michael Fischerkeller and Richard Harknett, “Deterrence Is Not a Credible Strategy for Cyberspace,” Foreign Policy Research Institute (2017): 381-393, https://doi: 10.1016,
[14] Jon Lindsay, “Stuxnet and the Limits of Cyber Warfare,” Security Studies 22, no. 3 (2015): 375-376.
[15] Emily Goldman and Michael Warner, “The Military Instrument in Cyber Strategy,” SAIS Review of International Affairs 41, no. 2 (2021): 56-57.
[16] Brandon Valeriano, et. al., Dyadic Cyber Incident Dataset v 2.0, Harvard Dataverse, September 2017, 2022, https://doi.org/10.7910/DVN/CQOMYV.
[17] Office of the Director of National Intelligence, Annual Threat Assessment of the U.S. Intelligence Community, (Washington, D.C.: Office of the Director of National Intelligence, 2023), 28.
[18] U.S. Department of Homeland Security, U.S. Department of Homeland Security Strategy, (Washington, D.C.: U.S. Department of Homeland Security, 2018), 11.
[19] Cyber National Mission Force Public Affairs and NSA Public Affairs, “How U.S. Cyber Command, NSA Are Defending the Midterm Elections: One Team, One Fight,” U.S. Cyber Command, August 25, 2022, https://www.cybercom.mil/Media/News/Article/3139691/how-us-cyber-command-nsa-are-defending-midterms-elections-one-team-one-fight/.
[20] Cyber National Mission Force Public Affairs, “Before the Invasion: Hunt Forward in Ukraine,” U.S. Cyber Command, November 28, 2022, https://www.cybercom.mil/Media/News/Article/3229136/before-the-invasion-hunt-forward-operations-in-ukraine/.
[21] Michael Connell and Sarah Vogler, “Russia’s Approach to Cyber Warfare,” N00014-16-D-5003, (Washington, D.C.: Center for Naval Analyses, 2017), 3-6.
[22] Jinghua, “Chinese Cyber Capabilities and Intentions.”
[23] Michael Kolton, “Interpreting China’s Pursuit of Cyber Sovereignty and Its View on Cyber Deterrence,” The Cyber Defense Review 2, no. 1 (2017): 119-154.









