Skip to main content Accessibility help
×
Hostname: page-component-788cddb947-jbjwg Total loading time: 0 Render date: 2024-10-19T07:24:10.611Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  02 November 2023

Derek S. Reveron
Affiliation:
U.S. Naval War College
John E. Savage
Affiliation:
Brown University
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Security in the Cyber Age
An Introduction to Policy and Technology
, pp. 347 - 386
Publisher: Cambridge University Press
Print publication year: 2023

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

47 U.S. Code § 230 – Protection for private blocking and screening of offensive material. (n.d.). LII/Legal Information Institute. Retrieved July 5, 2022, from www.law.cornell.edu/uscode/text/47/230Google Scholar
Abbate, J. (1999). Inventing the Internet. MIT Press.Google Scholar
Abbott, K. W., & Snidal, D. (1998). Why states act through formal international organizations. Journal of Conflict Resolution, 42(1), 332.CrossRefGoogle Scholar
Abelson, H., Anderson, R., Bellovin, S. M. et al. (2015). Keys under doormats: Mandating insecurity by requiring government access to all data and communications. Journal of Cybersecurity, 1(1), 6979. https://doi.org/10.1093/cybsec/tyv009Google Scholar
About OpenAI. (n.d.). Retrieved December 11, 2015, from https://openai.com/about/Google Scholar
Ackerman, E. (2019, April 1). Three Small Stickers in Intersection Can Cause Tesla Autopilot to Swerve into Wrong Lane. IEEE Spectrum. https://spectrum.ieee.org/three-small-stickers-on-road-can-steer-tesla-autopilot-into-oncoming-laneGoogle Scholar
ACPA Anticybersquatting Consumer Protection Act, 15 U.S.C. No. 1125(d) (1999). https://www.govinfo.gov/content/pkg/CRPT-106srpt140/html/CRPT-106srpt140.htmGoogle Scholar
Adams, G. S., Converse, B. A., Hales, A. H., & Klotz, L. E. (2021). People systematically overlook subtractive changes. Nature, 592(7853), Article 7853. https://doi.org/10.1038/s41586-021-03380-yGoogle Scholar
AI at Google (n.d.). Our Principles. Retrieved July 31, 2022, from https://ai.google/principles/Google Scholar
Akerlof, G. A. (1970). The market for “Lemons”: Quality uncertainty and the market mechanism. The Quarterly Journal of Economics, 84(3), 488500. https://doi.org/10.2307/1879431Google Scholar
Alagic, G., Alperin-Sheriff, J., Apon, D. et al. (2020). Status report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process (NIST Internal or Interagency Report (NISTIR) 8309). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.IR.8309Google Scholar
Alexander, K. B. (2007). Warfighting in cyberspace. Joint Force Quarterly, 46, 5861.Google Scholar
Allen-Ebrahimian, B. (2021, February 16). Growing number of countries issue warnings on China’s espionage. Axios. www.axios.com/2021/02/16/china-espionage-europeGoogle Scholar
Allied Powers. (1941). The Declaration of St. James Palace, History of the United Nations, June 12, 1941. See https://avalon.law.yale.edu/imt/imtjames.aspGoogle Scholar
Allison, G., & Simes, D. K. (2016, December 18). A Blueprint for Donald Trump to Fix Relations with Russia [Text]. The National Interest; The Center for the National Interest. https://nationalinterest.org/feature/blueprint-donald-trump-fix-relations-russia-18776Google Scholar
Alphabet Inc. (2020). Form 10-K: Annual Report Pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1934. https://abc.xyz/investor/static/pdf/20200204_alphabet_10K.pdf?cache=cdd6dbfGoogle Scholar
American Civil Liberties Union. (2003, December 18). Seven Reasons the US Should Reject the International Cybercrime Treaty. www.aclu.org/other/seven-reasons-us-should-reject-international-cybercrime-treatyGoogle Scholar
Angwin, J., Larson, J., Mattu, S., & Kirchner, L. (2016, May 23). Machine bias: There’s software used across the country to predict future criminals. And it’s biased against blacks. ProPublica. www.propublica.org/article/machine-bias-risk-assessments-in-criminal-sentencing?token=Tu5C70R2pCBv8Yj33AkMh2E-mHz3d6iuGoogle Scholar
Apple. (n.d.). Privacy. Apple. Retrieved September 5, 2022, from www.apple.com/privacy/Google Scholar
Aristotle. (2012). Aristotle’s Nicomachean Ethics (R. C. Bartlett & S. D. Collins, Trans.; Reprint edition). University of Chicago Press.Google Scholar
Arquilla, J., & Ronfeldt, D. (1993). Cyberwar is Coming! (RP-223; p. 38). RAND Corporation. www.rand.org/pubs/reprints/RP223.htmlGoogle Scholar
Asimov, I. (1942). Runaround. In Astounding Science Fiction (Vol. 29). Street & Smith Publications, Inc.Google Scholar
Bain, B. (2010, July 26). Military wrestles with cyber war battle planning. Defense One. www.defenseone.com/defense-systems/2010/07/military-wrestles-with-cyber-war-battle-planning/188817/Google Scholar
Baker, H., & Capestany, C. (Directors). (2018). It’s Getting Harder to Spot a Deep Fake Video. www.youtube.com/watch?v=gLoI9hAX9dwGoogle Scholar
Balzano, J. (2012). Crimes and the foreign sovereign immunities act: New perspectives on an old debate. NCJ International Law & Commercial Regulation, 38, 43.Google Scholar
Baran, P. (1964). On Distributed Communications: I. Introduction to Distributed Communications Networks. The Rand Corporation. www.rand.org/content/dam/rand/pubs/research_memoranda/2006/RM3420.pdfGoogle Scholar
Barlow, J. P. (1996, February 8). A Declaration of the Independence of Cyberspace. Electronic Frontier Foundation. www.eff.org/cyberspace-independenceGoogle Scholar
Barnes, J. E., & Goldman, A. (2020, May 30). Russia trying to stoke U.S. racial tensions before election, officials say. New York Times (Online).Google Scholar
Barocas, S., Hardt, M., & Narayanan, A. (2022). Fairness and machine learning. 253.Google Scholar
Beck, K. et al. (2001). Manifesto for Agile Software Development. https://agilemanifesto.org/Google Scholar
Beckstrom, R. (2014, December 16). CyberVaR: Quantifying the risk of loss from cyber attacks. Premiere Speakers Bureau. https://premierespeakers.com//rod_beckstrom/blog/2014/12/16/cybervar_quantifying_the_risk_of_loss_from_cyber_attacksGoogle Scholar
Bellamy, R. K. E., Dey, K., Hind, M. et al. (2019). AI Fairness 360: An extensible toolkit for detecting and mitigating algorithmic bias. IBM Journal of Research and Development, 63(4/5), 4:1–4:15. https://doi.org/10.1147/JRD.2019.2942287Google Scholar
Bensoussan, A. (2018). General Data Protection Regulation: Texts, Commentaries and Practical Guidelines (GDPR). Wolters Kluwer Belgium NV.Google Scholar
Berners-Lee, T. (1991). World Wide Web. CERN. http://info.cern.ch/hypertext/WWW/TheProject.htmlGoogle Scholar
Berners-Lee, T. (2019, March 12). 30 years on, what’s next #ForTheWeb? World Wide Web Foundation. https://webfoundation.org/2019/03/web-birthday-30/Google Scholar
Bertuzzi, L. (2022, March 2). China, Russia prepare new push for state-controlled internet. www.euractiv.com/section/digital/news/china-russia-prepare-new-push-for-state-controlled-internet/Google Scholar
Biggio, B., & Roli, F. (2018). Wild patterns: Ten years after the rise of adversarial machine learning. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2154–2156. https://doi.org/10.1145/3243734.3264418Google Scholar
Blinken, A. J. (2022, November 3). Remarks at a U.S.-German Futures Forum Moderated Discussion with German Foreign Minister Annalena Baerbock. United States Department of State. www.state.gov/remarks-at-a-u-s-german-futures-forum-moderated-discussion-with-german-foreign-minister-annalena-baerbock/Google Scholar
Borelli, S. (2017). State Responsibility in International Law: International Law-Oxford Bibliographies. Oxford Press. 10.9780199796953–0031.Google Scholar
Borghard, E. D., & Lonergan, S. W. (2017). The logic of coercion in cyberspace. Security Studies, 26(3), 452481. https://doi.org/10.1080/09636412.2017.1306396Google Scholar
Bossert, T. P. (2017, December 18). It’s official: North Korea Is behind WannaCry. Wall Street Journal. www.wsj.com/articles/its-official-north-korea-is-behind-wannacry-1513642537Google Scholar
Boston Dynamics (Director). (2022a). Atlas, the Biped Robot. www.bostondynamics.com/products/spotGoogle Scholar
Boston Dynamics (Director). (2022b). Spot, the Quadruped Robot. www.bostondynamics.com/products/spotGoogle Scholar
Boutros-Ghali, B. (1992, December 30). Empowering the United Nations. Foreign Affairs. www.foreignaffairs.com/articles/san-marino/1992-12-01/empowering-united-nationsGoogle Scholar
Brandeis, L. D. (1914). Other People’s Money, and How the Bankers Use It. Frederick A. Stokes. www.gutenberg.org/ebooks/57819Google Scholar
Bremmer, I., & Keat, P. (2009). The Fat Tail: The Power of Political Knowledge for Strategic Investing. Oxford University Press.Google Scholar
Brent, L. (2019, February 12). NATO’s role in cyberspace. NATO Review. www.nato.int/docu/review/articles/2019/02/12/natos-role-in-cyberspace/index.htmlGoogle Scholar
Brewster, T. (2021, October 14). Fraudsters cloned company director’s voice in $35 million bank heist, police find. Forbes. www.forbes.com/sites/thomasbrewster/2021/10/14/huge-bank-fraud-uses-deep-fake-voice-tech-to-steal-millions/Google Scholar
Brock, D. C. (2018). Learning from artificial intelligence’s previous awakenings: The history of expert systems. AI Magazine, 39(3), 315.CrossRefGoogle Scholar
Brodie, B. (1978). The development of nuclear strategy. International Security 2(4), 6583. www.muse.jhu.edu/article/446210.Google Scholar
Brooker, K. (2018, July 1). “I Was Devastated”: The Man Who Created the World Wide Web Has Some Regrets. Vanity Fair. www.vanityfair.com/news/2018/07/the-man-who-created-the-world-wide-web-has-some-regretsGoogle Scholar
Brownlee, J. (2019, June 16). A Gentle Introduction to Generative Adversarial Networks (GANs). Machine Learning Mastery. https://machinelearningmastery.com/what-are-generative-adversarial-networks-gans/Google Scholar
Brunner, I. (2020). 1998 – UNGA Resolution 53/70 “Developments in the field of information and telecommunications in the context of international security” and its influence on the international rule of law in cyberspace (SSRN Scholarly Paper No. 3856900). https://doi.org/10.2139/ssrn.3856900Google Scholar
Buchanan, B., & Cunningham, F. S. (2020). Preparing the cyber battlefield: Assessing a novel escalation risk in a Sino-American crisis. Texas National Security Review, 3(4), 5481.Google Scholar
Buntz, B. (2019, July 24). Charter of Trust: Siemens, NXP, Partners’ Growing Alliance. IoT World Today. www.iotworldtoday.com/2019/07/24/charter-of-trust-siemens-nxp-partners-growing-alliance/Google Scholar
Burlacu, M., & Tiganus, D. (2012). The role of the internet in the Arab spring. Annals – Series on Military Sciences, 4(1), 3850.Google Scholar
Burt, T., & Horvitz, E. (2020, September 1). New Steps to Combat Disinformation. Microsoft on the Issues. https://blogs.microsoft.com/on-the-issues/2020/09/01/disinformation-deepfakes-newsguard-video-authenticator/Google Scholar
Byman, D. (2006). Do targeted killings work? Foreign Affairs, 85(2), 95111. https://doi.org/10.2307/20031914Google Scholar
California. (2018, June 29). Privacy Law. California Legislative Information. https://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201720180AB375Google Scholar
Callamari, P., & Reveron, D. S. (2003). China’s use of perception management. International Journal of Intelligence and Counter Intelligence, 16(1), 115. https://doi.org/10.1080/713830380Google Scholar
Campaign to Stop Killer Robots. (n.d.). www.stopkillerrobots.org/about-us/#aboutGoogle Scholar
Campbell-Kelly, M. (1987). Data communications at the national physical laboratory (1965-1975). Annals of the History of Computing, 9(3/4), 221247. https://doi.org/10.1109/MAHC.1987.10023Google Scholar
CARICOM-Caribbean Community. (2023, August 7). CARICOM. https://caricom.org/Google Scholar
Carnegie. (n.d.). Cybernorms. Carnegie Endowment for International Peace. Retrieved November 7, 2022, from https://carnegieendowment.org/specialprojects/cybernorms/Google Scholar
Caroline Case. (1837). The Avalon Project, Yale Law School. https://avalon.law.yale.edu/19th_century/br-1842d.aspGoogle Scholar
Carter, A. (2017, October 1). A Lasting Defeat: The Campaign to Destroy ISIS. Belfer Center for Science and International Affairs. www.belfercenter.org/publication/lasting-defeat-campaign-destroy-isisGoogle Scholar
Cassirer, E., Lofts, S. G., & Gordon, P. E. (2021). The Philosophy of Symbolic Forms: Three Volume Set. Routledge. https://doi.org/10.4324/9780429284922Google Scholar
Castro, D., & Atkinson, R. D. (2014). Beyond Internet Universalism: A Framework for Addressing Cross-Border Internet Policy. ITIF, 22. https://doi.org/10.2139/ssrn.3079821Google Scholar
Cate, F. H. (2015). China and information security threats: Policy responses in the United States. In China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain (pp. 297332). Oxford University Press. https://academic.oup.com/book/25744Google Scholar
CCDCOE. (2015). 2015 UN GGE Report: Major Players Recommending Norms of Behaviour, Highlighting Aspects of International Law. NATO Cooperative Cyber Defence Centre of Excellence. https://ccdcoe.org/incyder-articles/2015-un-gge-report-major-players-recommending-norms-of-behaviour-highlighting-aspects-of-international-law/Google Scholar
Cellan-Jones, R. (2014, December 2). Stephen Hawking warns artificial intelligence could end mankind. BBC News. www.bbc.com/news/technology-30290540Google Scholar
Center for Strategic and International Studies (CSIS) (2010, June 3). CSIS Cybersecurity Policy Debate Series: U.S Cybersecurity Policy and the Role of U.S. CYBERCOM. https://csis-website-prod.s3.amazonaws.com/s3fs-public/event/100603csis-alexander.pdfGoogle Scholar
Cerf, V. (1999, April). The Internet is for everyone. Annual Computers, Freedom, and Privacy Conference, Washington, DC. www.internetsociety.org/news/speeches/2011/the-internet-is-for-everyone/Google Scholar
Chappellet-Lanier, T. (2017, June 22). The NSA is now sharing a bunch of code on GitHub. FedScoop. www.fedscoop.com/nsa-now-sharing-bunch-code-github/Google Scholar
Charter of the United Nations. (n.d.). Chapter vii – Action with respect to threats to the peace, breaches of the peace, and acts of aggression. Repertory of Practice of United Nations Organs. Retrieved August 6, 2022, from https://legal.un.org/repertory/art51.shtmlGoogle Scholar
Chen, J. (2022). Normal distribution definition. In Investopedia. www.investopedia.com/terms/n/normaldistribution.aspGoogle Scholar
Chesney, R., & Smeets, M. (2020). Policy roundtable: Cyber conflict as an intelligence contest. Texas National Security Review. https://tnsr.org/roundtable/policy-roundtable-cyber-conflict-as-an-intelligence-contest/Google Scholar
China Focus: China adopts law on cryptography. (2019, October 26). The National People’s Congress of the People’s Republic of China. www.npc.gov.cn/englishnpc/c2763/201910/bba90400f72b454e86c96d3964ca5bbe.shtmlGoogle Scholar
CISA. (2021a, August 1). Joint Cyber Defense Collaborative. www.cisa.gov/jcdcGoogle Scholar
CISA. (2021b, September 28). NSA-CISA-FBI Joint Advisory on Russian SVR Targeting U.S. and Allied Networks. www.cisa.gov/uscert/ncas/current-activity/2021/04/15/nsa-cisa-fbi-joint-advisory-russian-svr-targeting-us-and-alliedGoogle Scholar
Clapper, J. (2013, June 8). DNI Statement on the collection of intelligence pursuant to Section 702 of the Foreign Intelligence Surveillance Act. www.intelligence.gov/ic-on-the-record-database/results/50-dni-statement-on-the-collection-of-intelligence-pursuant-to-section-702-of-the-foreign-intelligence-surveillance-actGoogle Scholar
Clark, W. K., & Levin, P. L. (2009). Securing the information highway. Foreign Affairs. www.foreignaffairs.com/articles/united-states/2009-11-01/securing-information-highwayGoogle Scholar
Clarke, R. A., & Knake, R. K. (2011). Cyber War: The Next Threat to National Security and What to Do about It. HarperCollins. www.harpercollins.com/products/cyber-war-richard-a-clarkerobert-knakeGoogle Scholar
Clausewitz, C. von. (1976). On War (Howard, M. & Paret, P., Eds.). Princeton University Press.Google Scholar
CoE. (2001). Convention on Cybercrime (European Treaty Series No. 185; p. 22). Council of Europe. https://rm.coe.int/1680081561Google Scholar
Comey, J. B. (2014). Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course? Brookings Institution. www.fbi.gov/news/speeches/going-dark-are-technology-privacy-and-public-safety-on-a-collision-courseGoogle Scholar
The Commission on America’s National Interests. (2000). America’s national interests. www.belfercenter.org/sites/default/files/legacy/files/amernatinter.pdfGoogle Scholar
Conger, K. (2020, August 20). Former Uber security chief charged with concealing hack. The New York Times. www.nytimes.com/2020/08/20/technology/joe-sullivan-uber-charged-hack.htmlGoogle Scholar
Congressional Document. (1928). General pact for renunciation of war [text of Pact of Paris] [Text]. https://avalon.law.yale.edu/20th_century/kbhear.aspGoogle Scholar
Constantin, L. (2012, April 12). New Ransomware Prevents Windows from Starting. InfoWorld. www.infoworld.com/article/2616774/new-ransomware-prevents-windows-from-starting.htmlGoogle Scholar
Cook, T. (2016, February 16). A message to our customers. Apple. www.apple.com/customer-letter/Google Scholar
Cook, T. (2018, October 24). Debating ethics: Dignity and respect in data driven life. 40th International Conference of Data Protection and Privacy Commissioners (ICDPPC), Brussels. www.youtube.com/watch?v=kVhOLkIs20AGoogle Scholar
Coombs, T. (2018). Artificial Intelligence & Cybersecurity for Dummies®, IBM Limited Edition. 51.Google Scholar
Cooper, D. A. (2021). Arms Control for the Third Nuclear Age: Between Disarmament and Armageddon. Georgetown University Press. http://press.georgetown.edu/book/georgetown/arms-control-third-nuclear-ageGoogle Scholar
Council of Europe. (2003). Additional protocol to the convention on cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems (European Treaty Series-No. 189; p. 6). https://rm.coe.int/168008160fGoogle Scholar
Court of Justice of the EU (July 16, 2020). Data Protection Commissioner v Facebook Ireland and Maximillian Schrems, Case C-311/18. https://curia.europa.eu/jcms/upload/docs/application/pdf/2020-07/cp200091en.pdfGoogle Scholar
Crane, C. (2020, February 28). 20 ransomware statistics you’re powerless to resist reading. Security Boulevard. https://securityboulevard.com/2020/02/20-ransomware-statistics-youre-powerless-to-resist-reading/Google Scholar
Crichton, D., Miller, C., & Schneider, J. (2021). Labs over Fabs: How the U.S. Should Invest in the Future of Semiconductors. Foreign Policy Research Institute. https://issuu.com/foreignpolicyresearchinstitute/docs/semiconductors_report_issuuGoogle Scholar
CrowdStrike. (2016, August 25). CrowdStrike Machine Learning and VirusTotal. Crowdstrike.Com. www.crowdstrike.com/blog/crowdstrike-machine-learning-virustotal/Google Scholar
CVE List Home. (n.d.). Retrieved July 23, 2022, from https://cve.mitre.org/cve/Google Scholar
Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA), Pub. L. No. 117-103., 1068 (2022). www.cisa.gov/circiaGoogle Scholar
Cyberspace operations (Joint Publication 3-12). (2018). Joint Chiefs of Staff. www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_12.pdf?ver=2018-06-19-092120-930Google Scholar
Damrosch, L. F. (2019). International Law: Cases and Materials (Seventh edition.). West Academic Publishing.Google Scholar
Darrach, B. (1970, November 20). Meet Shaky, the first electronic person: The fascinating and fearsome reality of a machine with a mind of its own. LIFE.Google Scholar
Darwin, C. (1981). The Descent of Man, and Selection in Relation to Sex. Princeton University Press. www.biblio.com/book/descent-selection-relation-sex-darwin-charles/d/1240259683Google Scholar
Davis, J. H., & Sanger, D. E. (2015, September 25). Obama and Xi Jinping of China agree to steps on cybertheft. The New York Times. www.nytimes.com/2015/09/26/world/asia/xi-jinping-white-house.htmlGoogle Scholar
DC3I (2015). Cybersecurity Culture and Compliance Initiative. US Department of Defense. https://dod.defense.gov/Portals/1/Documents/pubs/OSD011517-15-RES-Final.pdfGoogle Scholar
DeepMind. (2020, November 30). AlphaFold: A solution to a 50-year-old grand challenge in biology. www.deepmind.com/blog/alphafold-a-solution-to-a-50-year-old-grand-challenge-in-biologyGoogle Scholar
Definition of an NP-complete problem. (n.d.). Retrieved September 6, 2022, from www.britannica.com/science/NP-complete-problemGoogle Scholar
Definition of ROBOT. (n.d.). In Merriam Webster. Retrieved November 8, 2022, from www.merriam-webster.com/dictionary/robotGoogle Scholar
Definition of social engineering. (n.d.). Lexico Dictionaries. Retrieved July 17, 2022, from www.lexico.com/en/definition/social_engineeringGoogle Scholar
Deibert, R. J. (2018). Toward a human-centric approach to cybersecurity. Ethics & International Affairs, 32(4), 411424. https://doi.org/10.1017/S0892679418000618Google Scholar
Demchak, C., & Dombrowski, P. (2013). Cyber Westphalia: Asserting state prerogatives in cyberspace. Georgetown Journal of International Affairs, 2938.Google Scholar
Department of Homeland Security (2016). National Cyber Incident Response Plan. www.cisa.gov/sites/default/files/ncirp/National_Cyber_Incident_Response_Plan.pdfGoogle Scholar
Department of Homeland Security. (2019). National Cybersecurity Protection System. www.dhs.gov/sites/default/files/publications/privacy-pia-dhscisa033-ncpsintrusiondetection-sept2019.pdfGoogle Scholar
Dickinson, S. (2019, November 7). China’s New Cryptography Law: Still No Place to Hide. Harris Bricken Sliwoski LLP. https://harrisbricken.com/chinalawblog/chinas-new-cryptography-law-still-no-place-to-hide/Google Scholar
Digital Watch. (n.d.). GGE on lethal autonomous weapons systems. Geneva Internet Platform. Retrieved September 5, 2022, from https://dig.watch/processes/gge-lawsGoogle Scholar
DoD. (2017). Autonomy in Weapon Systems. Department of Defense. https://irp.fas.org/doddir/dod/d3000_09.pdfGoogle Scholar
DoD (2019). Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China (p. 124). https://media.defense.gov/2019/May/02/2002127082/-1/-1/1/2019_CHINA_MILITARY_POWER_REPORT.pdfGoogle Scholar
DoD. (2020a, February 24). DoD Adopts Ethical Principles for Artificial Intelligence. U.S. Department of Defense. www.defense.gov/News/Releases/Release/Article/2091996/dod-adopts-ethical-principles-for-artificial-intelligence/Google Scholar
DoD. (2020b, May 21). DOD statement on Open Skies Treaty Withdrawal. U.S. Department of Defense. www.defense.gov/News/Releases/Release/Article/2195239/dod-statement-on-open-skies-treaty-withdrawal/Google Scholar
Dorsey, J. (2021). Written testimony of Twitter CEO Jack Dorsey (@Jack). U.S. House Committee on Energy & Commerce. https://energycommerce.house.gov/sites/democrats.energycommerce.house.gov/files/documents/Witness_Testimony_Dorsey_CAT_CPC_2021.03.25.pdfGoogle Scholar
Dwight, D. Eisenhower. (1957, November 14). Remarks at the National Defense Executive Reserve Conference. www.presidency.ucsb.edu/documents/remarks-the-national-defense-executive-reserve-conferenceGoogle Scholar
Edelman, M. J. (1985). The Symbolic Uses of Politics. University of Illinois Press.Google Scholar
Edwards, E. (2017, February 16). Research into artificial intelligence should not be left to military, says Google exec. The Irish Times. https://www.irishtimes.com/business/technology/research-into-artificial-intelligence-should-not-be-left-to-military-says-google-exec-1.2977720Google Scholar
Eitan, O. (2018). The missing link in assessing cyberrisk factors through supply chains. ISACA Journal, 2. www.isaca.org/resources/isaca-journal/issues/2018/volume-2/the-missing-link-in-assessing-cyberrisk-factors-through-supply-chainsGoogle Scholar
Elgammal, A. (2021, September 21). How Artificial Intelligence Completed Beethoven’s Unfinished Tenth Symphony. Smithsonian Magazine. www.smithsonianmag.com/innovation/how-artificial-intelligence-completed-beethovens-unfinished-10th-symphony-180978753/Google Scholar
Engel, J. M. (2018). Why does culture “eat strategy for breakfast”? Forbes. www.forbes.com/sites/forbescoachescouncil/2018/11/20/why-does-culture-eat-strategy-for-breakfast/Google Scholar
ENISA. (2018). Information sharing and analysis centers (ISACs) – Cooperative models (p. 51) [Report/Study]. ENISA. www.enisa.europa.eu/publications/information-sharing-and-analysis-center-isacs-cooperative-modelsGoogle Scholar
Epley, N., & Kumar, A. (2019, May 1). How to design an ethical organization. Harvard Business Review. https://hbr.org/2019/05/how-to-design-an-ethical-organizationGoogle Scholar
ETNO position paper on the New IP proposal. (2020). European Telecommunications Network Operators’ Association. https://etno.eu/downloads/positionpapers/etno%20position%20on%20new%20ip_short.pdfGoogle Scholar
European Union. (2018). Regulation (EU) 2018/1807 of the European Parliament and of the Council of 14 November 2018 on a framework for the free flow of non-personal data in the European Union. https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:32018R1807Google Scholar
EUROPOL. (2019). SIRIUS EU digital evidence situation report 2019: Cross-border access to electronic evidence. Europol. www.europol.europa.eu/cms/sites/default/files/documents/sirius_eu_digital_evidence_report.pdfGoogle Scholar
Evans, D. (2020, February 22). Why the US government is questioning WhatsApp’s encryption. CNBC. www.cnbc.com/2020/02/21/whatsapp-encryption-under-scrutiny-by-us-government.htmlGoogle Scholar
EXTERNALITY English Definition and Meaning | Lexico.com. (n.d.). Lexico Dictionaries | English. Retrieved July 23, 2022, from www.lexico.com/en/definition/externalityGoogle Scholar
Eykholt, K., Evtimov, I., Fernandes, E., Li, B., Rahmati, A., Xiao, C., Prakash, A., Kohno, T., & Song, D. (2018). Robust physical-world attacks on deep learning visual classification. 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 1625–1634. https://doi.org/10.1109/CVPR.2018.00175CrossRefGoogle Scholar
Faceswap. (n.d.). Faceswap. Retrieved November 8, 2022, from https://faceswap.dev/Google Scholar
FATE: Fairness, Accountability, Transparency & Ethics in AI. (2014). Microsoft Research Blog. www.microsoft.com/en-us/research/theme/fate/Google Scholar
FBI. (2016, March 24). Iranians charged with hacking U.S. financial sector [Story]. FBI Most Wanted. www.fbi.gov/news/stories/iranians-charged-with-hacking-us-financial-sectorGoogle Scholar
FBI. (2020, February 11). 2019 Internet Crime Report Released [Story]. Federal Bureau of Investigation. www.fbi.gov/news/stories/2019-internet-crime-report-released-021120Google Scholar
FCC. (1996). Telecommunications Act of 1996. Federal Communications Commission, 1128. www.fcc.gov/general/telecommunications-act-1996Google Scholar
Fearon, J. D. (1995). Rationalist explanations for war. International Organization, 49(3), 379414. https://doi.org/10.1017/S0020818300033324Google Scholar
Federal Register. (2016, December 20). Announcing request for nominations for public-key post-quantum cryptographic algorithms. Federal Register. www.federalregister.gov/documents/2016/12/20/2016-30615/announcing-request-for-nominations-for-public-key-post-quantum-cryptographic-algorithmsGoogle Scholar
Federal Register. (2019). NIST reveals 26 algorithms advancing to the post-quantum crypto ‘semifinals.’ www.nist.gov/news-events/news/2019/01/nist-reveals-26-algorithms-advancing-post-quantum-crypto-semifinalsGoogle Scholar
Feynman, R. P. (1997). “Surely you‘re joking, Mr. Feynman!” Adventures of a Curious Character (R. Leighton, Ed.) (p. 350). W. W. Norton. https://wwnorton.co.uk/books/9780393316049-surely-you-re-joking-mr-feynmanGoogle Scholar
Fick, N. C. (n.d.). Bureau of Cyberspace and Digital Policy. U.S. Department of State. www.state.gov/bureaus-offices/deputy-secretary-of-state/bureau-of-cyberspace-and-digital-policy/Google Scholar
Fidler, D. P. (2012). Inter arms silent leges Redux? The Law of Armed Conflict and Cyber Conflict. In Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World. Georgetown University Press.Google Scholar
Fidler, M. (2018, March 7). African union bugged by China: Cyber espionage as evidence of strategic shifts. Council on Foreign Relations. www.cfr.org/blog/african-union-bugged-china-cyber-espionage-evidence-strategic-shiftsGoogle Scholar
Finnemore, M., & Sikkink, K. (1998). International norm dynamics and political change. International Organization, 52(4), 887917. www.cambridge.org/core/journals/international-organization/article/abs/international-norm-dynamics-and-political-change/0A55ECBCC9E87EA49586E776EED8DB57Google Scholar
Fishman, C. (1996, December 31). They Write the Right Stuff. Fast Company. www.fastcompany.com/28121/they-write-right-stuffGoogle Scholar
Fiske, S. T., & Taylor, S. D. (1991). Social Cognition. McGraw-Hill.Google Scholar
Foltz, A. C. (2012). Stuxnet, Schmitt Analysis, and the cyber “Use-of-Force” debate. Joint Force Quarterly, 67, 4048.Google Scholar
Ford, Dr. C. A. (2019, September 11). Huawei and its siblings, the Chinese tech giants: National security and foreign policy implications. United States Department of State. https://2017-2021.state.gov/huawei-and-its-siblings-the-chinese-tech-giants-national-security-and-foreign-policy-implications/Google Scholar
France. (2019). International Law Applied to Operations in Cyberspace (UN Open Ended Working Group (OEWG), p. 19). France. https://documents.unoda.org/wp-content/uploads/2021/12/French-position-on-international-law-applied-to-cyberspace.pdfGoogle Scholar
Freedman, L. (2013). Strategy: A History. Oxford University Press.Google Scholar
Freedom on the Net 2020, Countries. (n.d.). Freedom House. Retrieved October 25, 2022, from https://freedomhouse.org/countries/freedom-net/scoresGoogle Scholar
Freymann, E. (2020). One Belt One Road. Harvard University Press. www.hup.harvard.edu/catalog.php?isbn=9780674247956Google Scholar
Fukuyama, F. (1992). The End of History and the Last Man. Free Press; Maxwell Macmillan Canada; Maxwell Macmillan International.Google Scholar
G7. (2016, May 27). G7 Ise-Shima Leaders’ Declaration. European Council. https://obamawhitehouse.archives.gov/the-press-office/2016/05/27/g7-ise-shima-leaders-declarationGoogle Scholar
G20. (2015). Leaders’ communiqué. G20 Information Centre. http://www.g20.utoronto.ca/2015/151116-communique.htmlGoogle Scholar
G20. (2017). Hamburg G20 leaders’ statement on countering terrorism. G20 Information Centre. www.g20.utoronto.ca/2017/170707-counterterrorism.htmlGoogle Scholar
Galston, W. A. (2020, March 10). Efficiency Isn’t the Only Economic Virtue. WSJ. www.wsj.com/articles/efficiency-isnt-the-only-economic-virtue-11583873155Google Scholar
Garamone, J. (2009, October 1). Lynn calls for collaboration in establishing cyber security. American Forces Press Service.Google Scholar
Gardam, J. G. (1993). Proportionality and force in international law. American Journal of International Law, 87(3), 391413. https://doi.org/10.2307/2203645Google Scholar
Gartzke, E. (2013). The myth of cyberwar: Bringing war in cyberspace back down to earth. International Security, 38(2), 4173.Google Scholar
Gartzke, E., & Lindsay, J. R. (2017). Thermonuclear cyberwar. Journal of Cybersecurity, 3(1), 3748. https://doi.org/10.1093/cybsec/tyw017Google Scholar
Gates, D. (2019, March 17). Flawed analysis, failed oversight: How Boeing, FAA certified the suspect 737 MAX flight control system. The Seattle Times. www.seattletimes.com/business/boeing-aerospace/failed-certification-faa-missed-safety-issues-in-the-737-max-system-implicated-in-the-lion-air-crash/Google Scholar
Gates, R. M. (2008). National Defense Strategy (p. 29). Department of Defense. https://history.defense.gov/Portals/70/Documents/nds/2008_NDS.pdfGoogle Scholar
GCSC. (2017). Global Commission on Stability of Cyberspace. https://hcss.nl/global-commission-on-the-stability-of-cyberspace-homepage/Google Scholar
GCSC. (2019). Advancing Cyberstability – Final Report. The Hague Centre for Strategic Studies. https://hcss.nl/wp-content/uploads/2019/11/GCSC-Final-Report-November-2019.pdfGoogle Scholar
Geers, K. (2010). Cyber weapons convention. The Computer Law and Security Report, 26(5), 547551. https://doi.org/10.1016/j.clsr.2010.07.005Google Scholar
Geers, K. (2014). Pandemonium: Nation states, national security, and the internet. The Tallinn Papers, 1(1), 17.Google Scholar
Gerstell, G. (2019, September 10). I Work for N.S.A. We cannot afford to lose the Digital Revolution. www.nytimes.com/2019/09/10/opinion/nsa-privacy.htmlGoogle Scholar
GGE. (1999). Developments in the Field of Information and Telecommunications in the Context of International Security (No. 53/70). https://documents-dds-ny.un.org/doc/UNDOC/GEN/N99/760/03/PDF/N9976003.pdf?OpenElementGoogle Scholar
GGE. (2000). Developments in the field of information and telecommunications in the context of international security (A/55/140). https://ccdcoe.org/uploads/2018/10/UN-000710-ITISreply.pdfGoogle Scholar
GGE. (2018). Developments in the field of information and telecommunications in the context of international security (A/73/27). United Nations. https://digitallibrary.un.org/record/1655670Google Scholar
GGE. (2019). Group of governmental experts, United Nations Office for Disarmament Affairs. www.un.org/disarmament/group-of-governmental-experts/Google Scholar
Gidney, C., & Ekerå, M. (2021). How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits. Quantum, 5, 433. https://doi.org/10.22331/q-2021-04-15-433Google Scholar
Gilad, Y. (2019). Metadata-private communication for the 99%. Communications of the ACM, 62(9), 8693. https://doi.org/10.1145/3338537Google Scholar
Giles, M. (2018, February 21). The GANfather: The man who’s given machines the gift of imagination. www.technologyreview.com/2018/02/21/145289/the-ganfather-the-man-whos-given-machines-the-gift-of-imagination/Google Scholar
Gleicher, N. (2020, July 8). Removing coordinated inauthentic behavior. https://about.fb.com/news/2020/07/removing-political-coordinated-inauthentic-behavior/Google Scholar
Goertzel, B. (2007). Human-level artificial general intelligence and the possibility of a technological singularity A reaction to Ray Kurzweil’s The Singularity Is Near, and McDermott’s critique of Kurzweil. Artificial Intelligence, 171(18), 11611173.Google Scholar
Goldman, E. O. (2021). Cyber diplomacy for strategic competition. The Foreign Service Journal. https://afsa.org/cyber-diplomacy-strategic-competitionGoogle Scholar
Goldsmith, J. (2011). Cybersecurity treaties: A Skeptical View. In Future Challenges in National Security and Law, Berkowitz, Perer, Ed. (p. 16). Hoover Institution, Stanford University. www.hoover.org/sites/default/files/research/docs/futurechallenges_goldsmith.pdfGoogle Scholar
Goldsmith, J. L., & Posner, E. A. (1998). A theory of customary international law (SSRN Scholarly Paper No. 145972). https://doi.org/10.2139/ssrn.145972Google Scholar
Goldwasser, S., Kim, M. P., Vaikuntanathan, V., & Zamir, O. (2022). Planting undetectable backdoors in machine learning models (arXiv:2204.06974). IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS), pp. 931-942, doi: 10.1109/FOCS54457.2022.00092Google Scholar
Goodin, D. (2020, February 14). US government goes all in to expose new malware used by North Korean hackers. Ars Technica. https://arstechnica.com/tech-policy/2020/02/us-government-exposes-malware-used-in-north-korean-sponsored-hacking-ops/Google Scholar
Google. (2010, January 12). A new approach to China. Google Official Blog. https://googleblog.blogspot.com/2010/01/new-approach-to-china.htmlGoogle Scholar
Gotterbarn, D., Miller, K., & Rogerson, S. (1997). Software engineering code of ethics. Communications of the ACM, 40(11), 110118. https://doi.org/10.1145/265684.265699Google Scholar
Gouzien, É., & Sangouard, N. (2021). Factoring 2048-bit RSA integers in 177 days with 13,436 qubits and a multimode memory. Physical Review Letters, 127(14), 140503. https://doi.org/10.1103/PhysRevLett.127.140503Google Scholar
GPS.gov: Other Global Navigation Satellite Systems (GNSS). (n.d.). Retrieved July 23, 2022, from www.gps.gov/systems/gnss/Google Scholar
Greenberg, A. (2018, August 22). The Untold Story of NotPetya, the Most Devastating Cyberattack in History. Wired. www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/Google Scholar
Greenberg, A. (2019a). A Boeing Code Leak Exposes Security Flaws Deep in a 787’s Guts. Wired. https://www.wired.com/story/boeing-787-code-leak-security-flaws/Google Scholar
Greenberg, A. (2019b). A Brief History of Russian Hackers’ Evolving False Flags. Wired. www.wired.com/story/russian-hackers-false-flags-iran-fancy-bear/Google Scholar
Greenberg, A. (2020, October 23). How 30 Lines of Code Blew Up a 27-Ton Generator. Wired. www.wired.com/story/how-30-lines-of-code-blew-up-27-ton-generator/Google Scholar
Greenemeier, L. (2009, December 4). Vint Cerf: Connecting with an Internet Pioneer, 40 Years Later. Scientific American. www.scientificamerican.com/article/internet-pioneer-cerf/Google Scholar
Grones, G. (2019, December 20). Top 10 cyber insurance companies in the US. Insurance Business America. www.insurancebusinessmag.com/us/news/cyber/top-10-cyber-insurance-companies-in-the-us-195463.aspxGoogle Scholar
Groopman, J. (2007, January 29). What’s the Trouble? – How Doctors Think. The New Yorker. www.newyorker.com/magazine/2007/01/29/whats-the-troubleGoogle Scholar
Grotius, H. (1916). The Freedom of the Seas, or, the Right Which belongs to the Dutch to Take Part in the East Indian Trade: A Dissertion (Scott, J. B., Ed.; R. V. D. Magoffin, Trans.). Oxford University Press. https://hdl.handle.net/2027/aeu.ark:/13960/t6k08bs06Google Scholar
Guariglia, M. (2020, June 24). Victory! Boston Bans Government Use of Face Surveillance. Electronic Frontier Foundation. www.eff.org/de/deeplinks/2020/06/victory-boston-bans-government-use-face-surveillanceGoogle Scholar
Guinness. (n.d.). Murtogh D. Guinness Collection of Mechanical and Musical Automata. Morris Museum.Google Scholar
Guri, M. (2021). Gairoscope: Injecting data from air-gapped computers to nearby gyroscopes. 18th International Conference on Privacy, Security and Trust (PST), 1–10. https://doi.org/10.1109/PST52912.2021.9647842Google Scholar
Guterres, A. (2017). Foreword to “Fast Forward Progress: Leveraging Tech to Achieve the Global Goals.” www.itu.int/en/sustainable-world/Documents/Fast-forward_progress_report_414709%20FINAL.pdfGoogle Scholar
Guterres, A. (2019, March 25). Autonomous weapons that kill must be banned, insists UN chief. UN News. https://news.un.org/en/story/2019/03/1035381Google Scholar
Gvosdev, N. K., Blankshain, J. D., & Cooper, D. A. (2019). Decision-Making in American Foreign Policy: Translating Theory into Practice. Cambridge University Press. https://doi.org/10.1017/9781108566742Google Scholar
Hafner, K. (2019, July 12). Fernando Corbató, a father of your computer (and your password), dies at 93. The New York Times. www.nytimes.com/2019/07/12/science/fernando-corbato-dead.htmlGoogle Scholar
Hamilton, A., Madison, J., & Jay, J. (1787, November 23). The Federalist Papers No. 10 [Text]. https://avalon.law.yale.edu/18th_century/fed10.aspGoogle Scholar
Hao, K. (2020, November 3). AI pioneer Geoff Hinton: “Deep learning is going to be able to do everything.” MIT Technology Review. www.technologyreview.com/2020/11/03/1011616/ai-godfather-geoffrey-hinton-deep-learning-will-do-everything/Google Scholar
Hardesty, L. (2018, February 11). Study finds gender and skin-type bias in commercial artificial-intelligence systems. http://news.mit.edu/2018/study-finds-gender-skin-type-bias-artificial-intelligence-systems-0212Google Scholar
Harknett, R. J., & Smeets, M. (2020). Cyber campaigns and strategic outcomes. Journal of Strategic Studies, 45(4), 534567. https://doi.org/10.1080/01402390.2020.1732354Google Scholar
Harknett, R. J., & Stever, J. A. (2009). The cybersecurity triad: Government, private sector partners, and the engaged cybersecurity citizen. Journal of Homeland Security and Emergency Management, 6(1). https://doi.org/10.2202/1547-7355.1649Google Scholar
Harnad, S. (1991). Other bodies, other minds: A machine incarnation of an old philosophical problem. Minds and Machines, 1(1), 4354. https://doi.org/10.1007/BF00360578Google Scholar
Hash Functions. (2020, June 22). Computer Security Resource Center, NIST. https://csrc.nist.gov/projects/hash-functionsGoogle Scholar
Hatch, B. B. (2018). Defining a class of cyber weapons as WMD: An examination of the merits. Journal of Strategic Security, 11(1), 4361.Google Scholar
Hayden, Gen. M. (2017, July 17). Cutting Cyber Command’s umbilical cord to the NSA. The Cipher Brief. www.thecipherbrief.com/cutting-cyber-commands-umbilical-cord-to-the-nsaGoogle Scholar
Hayden, M. V. (2011). The future of things “cyber.” Strategic Studies Quarterly, 5(1), 37.Google Scholar
Hayden, M. V. (2017, May 11). Cyber Strategy and Policy. Hearing to Receive Testimony on Cyber Policy, Strategy, and Organization. www.govinfo.gov/content/pkg/CHRG-115shrg28907/html/CHRG-115shrg28907.htmGoogle Scholar
Hayes, A. (2020). Interwoven ‘Destinies’: The Significance of Xinjiang to the China Dream, the Belt and Road Initiative, and the Xi Jinping Legacy. Journal of Contemporary China, 29(121), 3145. https://doi.org/10.1080/10670564.2019.1621528Google Scholar
Hayes, A. (2022). Financial risk: The art of assessing if a company is a good buy. In Investopedia. www.investopedia.com/terms/f/financialrisk.aspGoogle Scholar
Healey, J. (2011). The five futures of cyber conflict and cooperation (Cyber Statecraft Initiative) [IssueBrief]. Atlantic Council. www.atlanticcouncil.org/wp-content/uploads/2011/12/121311_ACUS_FiveCyberFutures.pdfGoogle Scholar
Healey, J., & Jordan, K. T. (2014, August 29). Nato’s cyber capabilities: Yesterday, today, and tomorrow. Atlantic Council. www.atlanticcouncil.org/in-depth-research-reports/issue-brief/natos-cyber-capabilities/Google Scholar
Heaven, W. D. (2021, February 24). Why GPT-3 is the best and worst of AI right now. MIT Technology Review, 124(2), 2435.Google Scholar
Heffernan, M. (2019). The human skills we need in an unpredictable world. TED: Ideas Worth Spreading. www.ted.com/talks/margaret_heffernan_the_human_skills_we_need_in_an_unpredictable_worldGoogle Scholar
Heuer, R. J. (1999). Psychology of Intelligence Analysis. Center for the Study of Intelligence, Central Intelligence Agency. www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/psychology-of-intelligence-analysis/PsychofIntelNew.pdfGoogle Scholar
Hildebrandt, M. (2013). Extraterritorial jurisdiction to enforce in cyberspace? Bodin, Schmitt, Grotius in cyberspace. University of Toronto Law Journal, 63(2), 196224.Google Scholar
Hochreiter, S., & Schmidhuber, J. (1997). Long short-term memory. Neural Computation, 9(8), 17351780. https://doi.org/10.1162/neco.1997.9.8.1735Google Scholar
Hoffman, W., & Levite, A. (2017). Private Sector Cyber Defense: Can Active Measures Help Stabilize Cyberspace? Carnegie Endowment for International Peace.Google Scholar
Hoffmann, S., Lazanski, D., & Taylor, E. (2020). Standardising the splinternet: How China’s technical standards could fragment the internet. Journal of Cyber Policy, 5(2), 239264. https://doi.org/10.1080/23738871.2020.1805482Google Scholar
Holl Lute, J., & McConnell, B. (2011, February 14). Op-ed: A civil perspective on cybersecurity. Wired. www.wired.com/2011/02/dhs-op-ed/Google Scholar
Horn, J. (2017). Project Zero: Reading privileged memory with a side-channel. Google. https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.htmlGoogle Scholar
Hörnle, J. (2021). Internet Jurisdiction Law and Practice. Oxford University Press, Incorporated.Google Scholar
Howard, P. N., & Hussain, M. M. (2013). Democracy’s Fourth Wave?: Digital Media and the Arab Spring. Oxford University Press. https://deepblue.lib.umich.edu/bitstream/handle/2027.42/117564/Democracy’s+Fourth+Wave.pdf?sequence=1Google Scholar
Hsu, J. (2019). How the United States Is developing post-quantum cryptography. IEEE Spectrum. https://spectrum.ieee.org/how-the-us-is-preparing-for-quantum-computings-threat-to-end-secrecyGoogle Scholar
Hui, M. N. (2009, October 6). Threat of next world war may be in cyberspace: UN, Agence France-Presse, Available through Communications of the ACM, October 6, 2009. https://cacm.acm.org/news/45269-threat-of-next-world-war-may-be-incyberspace-n/fulltextGoogle Scholar
Hughes, R. (2010). A treaty for cyberspace. International Affairs, 86(2), 523541. https://doi.org/10.1111/j.1468-2346.2010.00894.xGoogle Scholar
Hutchins, E. M., Cloppert, M. J., & Amin, R. M. (2011). Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare & Security Research, 1(1), 14.Google Scholar
IBM. (2012, March 7). IBM 1401: The Mainframe [CTB14]. IBM Corporation. www-03.ibm.com/ibm/history/ibm100/us/en/icons/mainframe/Google Scholar
ICANN History Project–ICANN. (n.d.). Retrieved August 9, 2023, from https://www.icann.org/historyGoogle Scholar
ICANN (1999, January 17). IANA Functions Agreement Negotiations. https://features.icann.org/1999-01-17-iana-functions-agreement-negotiationsGoogle Scholar
ICANN (2013, October 3). Montevideo statement on the future of Internet cooperation. ICANN Announcements. www.icann.org/en/announcements/details/montevideo-statement-on-the-future-of-internet-cooperation-7-10-2013-enGoogle Scholar
ICANN. (2019, November 28). Bylaws for Internet Corporation for Assigned Names and Numbers. www.icann.org/resources/pages/governance/bylaws-en/#article1Google Scholar
ICRC. (1950). Treaties, States parties, and Commentaries – Geneva Convention (I) on Wounded and Sick in Armed Forces in the Field, 1949. https://ihl-databases.icrc.org/ihl/full/GCI-commentaryGoogle Scholar
ICRC. (2018). Ethics and autonomous weapon systems: An ethical basis for human control? International Committee of the Red Cross. www.icrc.org/en/document/ethics-and-autonomous-weapon-systems-ethical-basis-human-controlGoogle Scholar
Internet Engineering Task Force (IETF) (n.d.). IETF Overview. www.ietf.org/proceedings/35/ietf-overview.htmlGoogle Scholar
Internet World Stats (2022). World Internet Usage and Population Statistics. www.internetworldstats.com/stats.htmGoogle Scholar
Inkster, N. (2018). China’s Cyber Power (First edition). Routledge. https://doi.org/10.4324/9780429031625Google Scholar
International Committee of the Red Cross. (2002). Introduction to the law of armed conflict-basic knowledge. 29.Google Scholar
International Committee of the Red Cross. (2016). The Geneva Conventions of 1949 and their Additional Protocols. www.icrc.org/en/document/geneva-conventions-1949-additional-protocolsGoogle Scholar
Investigation: WannaCry cyber-attack and the NHS (p. 33). (2018). National Audit Office, UK.Google Scholar
iRobot. (n.d.). Roomba Vacuum. IRobot. www.irobot.com/en_US/us-roomba.htmlGoogle Scholar
Israni, E. T. (2017, October 26). When an Algorithm Helps Send You to Prison. The New York Times. www.nytimes.com/2017/10/26/opinion/algorithm-compas-sentencing-bias.htmlGoogle Scholar
ITU. (2019). Collection of the basic texts of the International Telecommunication Union adopted by the Plenipotentiary Conference. ITU Publications. www.itu.int/opb/ecommercedownload/0015021470-42330-EN.pdfGoogle Scholar
Jagoda, P. (2012). Speculative security. In Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World, Reveron, Derek S., Ed. (Washington D.C.: Georgetown UP, 2012), pp. 2136. (pp. 21–26). Georgetown University Press.Google Scholar
James Madison’s proposed amendments to the Constitution. (1789). Annals of Congress, House of Representatives, 1st Congress, 1st Session, 451453.Google Scholar
Janis, M. W. (1984). Jeremy Bentham and the fashioning of “international law.” American Journal of International Law, 78(2), 405418.Google Scholar
Jobin, A., Ienca, M., & Vayena, E. (2019). Artificial Intelligence: The global landscape of ethics guidelines. Nature Machine Intelligence, 1(9), 389399. https://doi.org/10.1038/s42256-019-0088-2Google Scholar
Johnson, D. B. (2019, February 1). Moving the needle on cyber norms. FCW. https://fcw.com/security/2019/02/moving-the-needle-on-cyber-norms/211140/Google Scholar
Johnson, L. (2008, April 24). Thru the Looking Glass: Why virtual worlds matter, where they are heading, and why we are all here. Federal Consortium on Virtual Worlds Expo.Google Scholar
Joint Chiefs of Staff. (2016). Joint Operating Environment 2035: The Joint Force in a Contested and Disordered World. www.jcs.mil/Portals/36/Documents/Doctrine/concepts/joe_2035_july16.pdf?ver=2017-12-28-162059-917Google Scholar
Joyce, R. (2016, January 28). USENIX Enigma 2016 – NSA TAO Chief on Disrupting Nation State Hackers (Video). YouTube. www.youtube.com/watch?v=bDJb8WOJYdAGoogle Scholar
Joyner, A. (2012). Competing Transatlantic Vision of Cybersecurity. In Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World (p. 23). Georgetown University Press. www.amazon.com/Cyberspace-National-Security-Threats-Opportunities/dp/1589019180Google Scholar
Judiciary Committee. (2020, June 23). Graham, Cotton, Blackburn Introduce Balanced Solution to Bolster National Security, End Use of Warrant-Proof Encryption that Shields Criminal Activity. United States Senate Committee on the Judiciary. www.judiciary.senate.gov/press/rep/releases/graham-cotton-blackburn-introduce-balanced-solution-to-bolster-national-security-end-use-of-warrant-proof-encryption-that-shields-criminal-activityGoogle Scholar
Jurkovich, M. (2020). What isn’t a norm? Redefining the conceptual boundaries of “norms” in the human rights literature. International Studies Review, 22(3), 693711.Google Scholar
Kahn, R., Leiner, B. M., Cerf, V. G., Clark, D. D., Kleinrock, L., Lynch, D. C., Postel, J., Roberts, L. E., & Wolff, S. (1997). The evolution of the Internet as a global information system. The International Information & Library Review, 29(2), 129151. https://doi.org/10.1006/iilr.1997.0042Google Scholar
Kahneman, D. (2013). Thinking, Fast and Slow. Farrar, Straus and Giroux. https://us.macmillan.com/books/9780374533557/thinkingfastandslowGoogle Scholar
Kahneman, D., & Tversky, A. (1979). Prospect theory: An analysis of decision under risk. Econometrica, 47(2), 263291. https://doi.org/10.2307/1914185Google Scholar
Kania, E., & Creemers, R. (2018, November 5). Xi Jinping Calls for ‘Healthy Development’ of AI (Translation). New America. http://newamerica.org/cybersecurity-initiative/digichina/blog/xi-jinping-calls-for-healthy-development-of-ai-translation/Google Scholar
Kapur, A. & United Nations Development Programme. (2005). Internet Governance: A Primer. Elsevier.Google Scholar
Karras, T., Laine, S., Aittala, M., Hellsten, J., Lehtinen, J., & Aila, T. (2020). Analyzing and improving the image quality of StyleGAN. 8110–8119. https://openaccess.thecvf.com/content_CVPR_2020/html/Karras_Analyzing_and_Improving_the_Image_Quality_of_StyleGAN_CVPR_2020_paper.htmlGoogle Scholar
Katzenstein, M. F. (1996). The Culture of National Security: Norms and Identity in World Politics. Columbia University Press.Google Scholar
Kehl, D., Guo, P., & Kessler, S. (2017). Algorithms in the Criminal Justice System: Assessing the Use of Risk Assessments in Sentencing. Responsive Communities Initiative. Berkman Klein Center for Internet & Society, Harvard Law School.Google Scholar
Kennedy, J. F. (1961). Address to Joint Session of Congress, May 25, 1961. JFK Presidential Library. www.jfklibrary.org/learn/about-jfk/historic-speeches/address-to-joint-session-of-congress-may-25-1961Google Scholar
Keohane, R. O. (1977). Power and Interdependence: World Politics in Transition. Little, Brown.Google Scholar
Khalip, A. (2018, February 19). U.N. chief urges global rules for cyber warfare. Reuters. www.reuters.com/article/us-un-guterres-cyber-idUSKCN1G31Q4Google Scholar
Kilovaty, I. (2015). Rethinking the prohibition on the use of force in the light of economic cyber warfare: Towards a broader scope of article 2(4) of the UN Charter. Journal of Law & Cyber Warfare, 4(3), 210244.Google Scholar
Kim, N., Herr, T., & Schneier, B. (2020, June 15). The reverse cascade: Enforcing security on the global IoT supply chain. Atlantic Council. www.atlanticcouncil.org/in-depth-research-reports/report/the-reverse-cascade-enforcing-security-on-the-global-iot-supply-chain/Google Scholar
King, S. A., & Gallagher, R. M. (2020). U.S. Cyberspace Solarium Commission Report (p. 182). www.solarium.gov/Google Scholar
Kissinger, H. (1957). Nuclear Weapons and Foreign Policy. Harper (for the Council on Foreign Relations). www.hoover.org/research/nuclear-weapons-and-foreign-policy-henry-kissinger-council-foreign-relations-1957Google Scholar
Koch, C. (2016, March 19). How the Computer Beat the Go Master. Scientific American. www.scientificamerican.com/article/how-the-computer-beat-the-go-master/Google Scholar
Kocher, P. C. (1996). Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems (pp. 104–113). Advances in Cryptology – CRYPTO ’96. https://link.springer.com/chapter/10.1007/3-540-68697-5_9Google Scholar
Koh, Y. (2018). Silicon Valley rivals take shots at Facebook. www.wsj.com/articles/silicon-valley-rivals-take-shots-at-facebook-1522595763Google Scholar
Kollars, N. (2020). Cyber conflict as an intelligence competition in an era of open innovation. Texas National Security Review, 3(4). http://dx.doi.org/10.26153/tsw/10964Google Scholar
Korolov, M. (2019, May 7). What is GPS spoofing? And how you can defend against it. CSO Online. www.csoonline.com/article/3393462/what-is-gps-spoofing-and-how-you-can-defend-against-it.htmlGoogle Scholar
Kruger, J., & Dunning, D. (1999). Unskilled and unaware of it: How difficulties in recognizing one’s own incompetence lead to inflated self-assessments. Journal of Personality and Social Psychology, 77(6), 11211134. https://doi.org/10.1037/0022-3514.77.6.1121Google Scholar
Landau, S. (2015a). Control use of data to protect privacy. Science (New York, N.Y.), 347(6221), 504506. https://doi.org/10.1126/science.aaa4961Google Scholar
Landau, S. (2015b, July 7). Keys under doormats: Mandating insecurity. Lawfare. www.lawfareblog.com/keys-under-doormats-mandating-insecurityGoogle Scholar
Landau, S. (2016a). Choices: Privacy & surveillance in a once & future Internet. Daedalus, 145(1), 5464. https://doi.org/10.1162/DAED_a_00365Google Scholar
Landau, S. (2016b). The real security issues of the iPhone case. Science, 352(6292), 13981399. https://doi.org/10.1126/science.aaf7708Google Scholar
Langevin, J. (2022). Opening Statement. Subcommittee on Cyber, Innovative Technologies, and Information Systems, US House of Representatives. https://armedservices.house.gov/_cache/files/d/3/d3a8eb33-2b90-4a02-8454-70795ab992ec/C049B7C355EE7BFFEA179AE1FD5A62EB.20220405-citi-opening-statement-langevin.pdfGoogle Scholar
LAWS. (n.d.). Lethal Autonomous Weapons Systems. Future of Life Institute. Retrieved September 6, 2022, from https://futureoflife.org/lethal-autonomous-weapons-systems/Google Scholar
Leiner, B. M., Cerf, V. G., Clark, D. D., Kahn, R. E., Kleinrock, L., Lynch, D. C., Postel, J., Roberts, L. G., & Wolff, S. (2009). A Brief History of the Internet. ACM SIGCOMM Computer Communication Review, 39(5), 2231. https://doi.org/10.1145/1629607.1629613Google Scholar
Leonhardt, D. (2008, September 26). Washington’s invisible hand. The New York Times. www.nytimes.com/2008/09/28/magazine/28wwln-reconsider.htmlGoogle Scholar
Lessig, L. (1998). The Laws of Cyberspace. Taiwan Net ’98, 16.Google Scholar
Levy, I., & Robinson, C. (2018, November 29). Principles for a More Informed Exceptional Access Debate. Lawfare. www.lawfareblog.com/principles-more-informed-exceptional-access-debateGoogle Scholar
Levy, S. (1999, April 1). The Open Secret. Wired. www.wired.com/1999/04/crypto/Google Scholar
Levy, S. (2017, May 23). What Deep Blue tells us about AI in 2017. Wired. www.wired.com/2017/05/what-deep-blue-tells-us-about-ai-in-2017/Google Scholar
Lewis, D. (2019, February 4). What Is NATO Really Doing in Cyberspace? War on the Rocks. https://warontherocks.com/2019/02/what-is-nato-really-doing-in-cyberspace/Google Scholar
Lewis, J. A. (2009). The “Korean” Cyber Attacks and Their Implications for Cyber Conflict (p. 10). Center for Strategic & International Studies.Google Scholar
Lewis, J. A. (2013). Internet Governance: Inevitable Transitions (Paper No. 4; Internet Governance). Centre for International Governance Innovation. www.cigionline.org/publications/internet-governance-inevitable-transitions/Google Scholar
Lewis, J. A. (2021, March 4). Toward a More Coercive Cyber Strategy. www.csis.org/analysis/toward-more-coercive-cyber-strategyGoogle Scholar
Lewis, J. A., Nye, J. S., Scowcroft, B. (2012). Harnessing Leviathan: Internet Governance, and Cybersecurity. In Burns, Nicholas and Price, Jonathon (Eds.), Securing Cyberspace: A New Domain for National Security. Aspen Institute (pp. 113126). www.jstor.org/stable/j.ctt19x3h93.9Google Scholar
Lewis, M. (2017). The Undoing Project. W. W. Norton. https://wwnorton.com/books/9780393354775Google Scholar
Li, S. (2020, March 6). Made-in-China Censorship for Sale. The Wall Street Journal. www.wsj.com/articles/made-in-china-censorship-for-sale-11583448433Google Scholar
Lighthill. (1973). Artificial Intelligence: A General Survey. Science Research Council (SRC). www.chilton-computing.org.uk/inf/literature/reports/lighthill_report/contents.htmGoogle Scholar
Lin, H. (2010). Offensive cyber operations and the use of force. Journal of National Security Law & Policy, 4(1), 6186.Google Scholar
Lin, H. (2012). Operational considerations in cyber-attack and cyber exploitation. In Cyberspace and National Security, Reveron, D. S. (Ed.). Georgetown University Press.Google Scholar
Lin, H. (2019). The existential threat from cyber-enabled information warfare. Bulletin of the Atomic Scientists, 75(4), 187196. https://doi.org/10.1080/00963402.2019.1629574Google Scholar
Lindemann, B., Müller, T., Vietz, H., Jazdi, N., & Weyrich, M. (2021). A survey on long short-term memory networks for time series prediction. Procedia CIRP, 99, 650655. https://doi.org/10.1016/j.procir.2021.03.088Google Scholar
Lindsay, J. R. (2013). Stuxnet and the limits of cyber warfare. Security Studies, 22(3), 365404. https://doi.org/10.1080/09636412.2013.816122Google Scholar
Lindsay, J. R. (2020, March 12). Digital Strangelove: The Cyber Dangers of Nuclear Weapons. Lawfare. www.lawfareblog.com/digital-strangelove-cyber-dangers-nuclear-weaponsGoogle Scholar
Lindsay, J. R., Cheung, T. M., & Reveron, D. S. (Eds.). (2015). China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press. https://academic.oup.com/book/25744Google Scholar
Lipsky, M. (2010). Street-Level Bureaucracy, 30th Ann. Ed. Dilemmas of the Individual in Public Service (30th anniversary expanded ed.). Russell Sage Foundation, Project MUSE.Google Scholar
Loleski, S. (2019). From cold to cyber warriors: The origins and expansion of NSA’s Tailored Access Operations (TAO) to Shadow Brokers. Intelligence and National Security, 34(1), 112128. https://doi.org/10.1080/02684527.2018.1532627Google Scholar
Lonergan, E. D. (2020, March 12). Operationalizing Defend Forward: How the Concept Works to Change Adversary Behavior. Lawfare. www.lawfareblog.com/operationalizing-defend-forward-how-concept-works-change-adversary-behaviorGoogle Scholar
Lou, X., Zhang, T., Jiang, J., & Zhang, Y. (2021). A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography. ACM Computing Surveys, 54(6), 122112237. https://doi.org/10.1145/3456629Google Scholar
Lovelace, A. A. (1844). Quoted in 1977: Donald E. Knuth: The Art of Computer Programming: Volume 1: Fundamental Algorithms (Third edition). Addison-Wesley.Google Scholar
Malone, T. W. (2018). Superminds: The Surprising Power of People and Computers Thinking Together (First edition.). Little, Brown and Company.Google Scholar
Manebrea, L. F. (1842). Sketch of The Analytical Engine (A. Lovelace, Trans.). Bibliothèque de Genève. www.fourmilab.ch/babbage/sketch.htmlGoogle Scholar
Maness, R. C., & Valeriano, B. (2016). The impact of cyber conflict on international interactions. Armed Forces & Society, 42(2), 301323. https://doi.org/10.1177/0095327X15572997Google Scholar
Mann, A. (2022, March 4). What is quantum mechanics? LIVESCIENCE. www.livescience.com/33816-quantum-mechanics-explanation.htmlGoogle Scholar
Mann, A., Pultarova, T., & Howell, E. (2022, April 14). SpaceX Starlink internet: Costs, collision risks and how it works. Space.Com. www.space.com/spacex-starlink-satellites.htmlGoogle Scholar
Marcus, G. (2014, June 9). What comes after the turing test? | The New Yorker. The New Yorker. www.newyorker.com/tech/annals-of-technology/what-comes-after-the-turing-testGoogle Scholar
Marczak, B., Weaver, N., Dalek, J., Ensafi, R., Fifield, D., McKune, S., Rey, A., Scott-Railton, J., Deibert, R., & Paxson, V. (2015). China’s Great Cannon (No. 52). Citizen Lab Research, University of Toronto. https://citizenlab.ca/2015/04/chinas-great-cannon/Google Scholar
Märgner, V., & Abed, H. E. (2009). ICDAR 2009 Arabic Handwriting Recognition Competition. 2009 10th International Conference on Document Analysis and Recognition, 1383–1387. https://doi.org/10.1109/ICDAR.2009.256Google Scholar
Mari, A. (2022, February 22). Data protection becomes a fundamental right in Brazil. ZDNET. www.zdnet.com/article/data-protection-becomes-a-fundamental-right-in-brazil/Google Scholar
Maurer, T., & Healey, J. (2017). What it’ll take to forge peace in cyberspace. Christian Science Monitor.Google Scholar
Mazarr, M. J., Cevallos, A. S., Priebe, M., Radin, A., Reedy, K., Rothenberg, A. D., Thompson, J. A., & Willcox, J. (2017). Measuring the Health of the Liberal International Order (p. 229) [RR-1994-OSD]. RAND Corporation. www.rand.org/pubs/research_reports/RR1994.htmlGoogle Scholar
McCarthy, J., Minsky, M. L., Rochester, N., & Shannon, C. E. (2006). A proposal for the Dartmouth summer research project on artificial intelligence, August 31, 1955. AI Magazine, 27(4), Article 4. https://doi.org/10.1609/aimag.v27i4.1904Google Scholar
Mcclain, C., Vogels, E. A., Perrin, A., Sechopoulos, S., & Rainie, L. (2021, September 1). The Internet and the Pandemic. Pew Research Center: Internet, Science & Tech. www.pewresearch.org/internet/2021/09/01/the-internet-and-the-pandemic/Google Scholar
McClintock, B., Hornung, J. W., & Costello, K. (2021). Russia’s Global Interests and Actions: Growing Reach to Match Rejuvenated Capabilities. RAND Corporation. https://doi.org/10.7249/PE327Google Scholar
McConnell, M., Chertoff, M., & Lynn, W. (2015, July 28). Why the fear over ubiquitous data encryption is overblown. Washington Post. www.washingtonpost.com/opinions/the-need-for-ubiquitous-data-encryption/2015/07/28/3d145952-324e-11e5-8353-1215475949f4_story.htmlGoogle Scholar
McCorduck, P. (2004). Machines Who Think: A Personal Inquiry into the History and Prospects of Artificial Intelligence (25th anniversary update). A.K. Peters.Google Scholar
McCullagh, D. (2008, February 25). How Pakistan knocked YouTube offline (and how to make sure it never happens again). CNET. www.cnet.com/culture/how-pakistan-knocked-youtube-offline-and-how-to-make-sure-it-never-happens-again/Google Scholar
McCulloch, W. S., & Pitts, W. (1943). A logical calculus of the ideas immanent in nervous activity. The Bulletin of Mathematical Biophysics, 5(4), 115133. https://doi.org/10.1007/BF02478259Google Scholar
McKay, A., Neutze, J., Nicholas, P., & Sullivan, K. (2014). International Cybersecurity Norms: Reducing Conflict in an Internet-dependent World (p. 24). Microsoft.Google Scholar
McKune, S. (2015). “Foreign Hostile Forces”: The Human Rights Dimension of China’s Cyber Campaigns. In Lindsay, J. R., Cheung, T. M., & Reveron, D. S. (Eds.), China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain (pp. 260–294). Oxford University Press. https://doi.org/10.1093/acprof:oso/9780190201265.003.0011Google Scholar
McLeod, S. (2017). The Milgram Shock Experiment. Simply Psychology. www.simplypsychology.org/milgram.htmlGoogle Scholar
McMillan, R., & Seetharaman, D. (2018, July 31). Facebook pulls fake accounts that mimic Russian tactics ahead of election. Wall Street Journal. www.wsj.com/articles/facebook-removes-fake-accounts-that-displayed-activity-consistent-with-russian-efforts-during-2016-election-1533055712Google Scholar
Mechanical Art & Design Museum. (n.d.). History of Automata. The Mechanical Art & Design Museum. Retrieved September 6, 2022, from https://themadmuseum.co.uk/history-of-automata/Google Scholar
Mecklin, J. (Ed.). (2020). Closer than ever: It is 100 seconds to midnight – 2020 Doomsday Clock Statement. https://thebulletin.org/doomsday-clock/2020-doomsday-clock-statement/Google Scholar
Mecklin, J. (Ed.). (2021). This is your COVID Wake-Up Call: It is 100 Seconds to Midnight: 2021 Doomsday Clock Statement. https://thebulletin.org/2020/01/press-release-it-is-now-100-seconds-to-midnight/Google Scholar
Medberry. (2019, September 3). Cisco Ranked #1 in Market Share for Industrial Networking. Cisco Blogs. https://blogs.cisco.com/internet-of-things/cisco-ranked-1-in-market-share-for-industrial-networkingGoogle Scholar
Merton, R. (1936). The unanticipated consequences of purposive social action. American Sociological Review, 1(6), 894904.Google Scholar
Meta. (2018, April 3). Authenticity matters: The IRA has no place on Facebook. Meta. https://about.fb.com/news/2018/04/authenticity-matters/Google Scholar
Meta. (2020, May 5). April 2020 Coordinated Inauthentic Behavior Report. https://about.fb.com/news/2020/05/april-cib-report/Google Scholar
Metz, C. (2015, September 16). Google Is 2 Billion Lines of Code – And It’s All in One Place. Wired. www.wired.com/2015/09/google-2-billion-lines-codeand-one-place/Google Scholar
Meyer, F. (2019, December 11). A new network design for the “Internet from space.” TechXplore. https://techxplore.com/news/2019-12-network-internet-space.htmlGoogle Scholar
Microsoft. (2022). Special Report: Ukraine, An overview of Russia’s cyberattack activity in Ukraine. https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4VwwdGoogle Scholar
Miles, D. (2009). Gates Establishes New Cyber Subcommand. Armed Forces Press Service. www.dvidshub.net/news/35575/gates-establishes-new-cyber-subcommandGoogle Scholar
Miles, R. E. (1978). The origin and meaning of Miles’ Law. Public Administration Review, 38(5), 399403.Google Scholar
Miller, C. C. (2014, January 24). Google pushes back against data localization. The New York Times. https://archive.nytimes.com/bits.blogs.nytimes.com/2014/01/24/google-pushes-back-against-data-localization/Google Scholar
MIT TR. (2018, February 21). The GANfather: The man who’s given machines the gift of imagination. www.technologyreview.com/2018/02/21/145289/the-ganfather-the-man-whos-given-machines-the-gift-of-imagination/Google Scholar
MITRE ATT&CK®. (2015). The MITRE Corporation. https://attack.mitre.org/Google Scholar
Moore, T. (2010). The economics of cybersecurity: Principles and policy options. International Journal of Critical Infrastructure Protection, 3(3–4), 103117. https://doi.org/10.1016/j.ijcip.2010.10.002Google Scholar
Morgan, P. M. (2003). Deterrence Now. Cambridge University Press. https://doi.org/10.1017/CBO9780511491573Google Scholar
MSFT. (2017). A Digital Geneva Convention to protect cyberspace, Microsoft Cybersecurity. www.microsoft.com/en-us/cybersecurity/content-hub/a-digital-geneva-convention-to-protect-cyberspaceGoogle Scholar
MSFT. (2020, January 17). Microsoft appoints senior government affairs leaders in Brussels and New York, establishes New York office to work with the United Nations. EU Policy Blog. https://blogs.microsoft.com/eupolicy/2020/01/17/senior-gov-affairs-leaders-appointed-brussels-new-york/Google Scholar
M-Trends 2022, Special Report (p. 95). (2022). FireEye-Mandiant Services. www.mandiant.com/media/15671Google Scholar
Murgia, M., & Gross, A. (2020, March 17). Inside China’s Controversial Mission to Reinvent the Internet. Financial Times Magazine. www.ft.com/content/ba94c2bc-6e27-11ea-9bca-bf503995cd6fGoogle Scholar
Murphy, S. D. (2002). Hate-Speech Protocol to Cybercrime Convention. American Journal of International Law, 96(4), 973975. https://doi.org/10.2307/3070700Google Scholar
Musser, M., & Garriott, A. (2021). Machine Learning and Cybersecurity: Hype and Reality. Center for Security and Emerging Technology, School of Foreign Service, Georgetown University. https://cset.georgetown.edu/publication/machine-learning-and-cybersecurity/Google Scholar
Nakashima, E. (2021, April 21). Biden administration plans to name former senior NSA officials to White House cyber position and head of CISA. Washington Post. www.washingtonpost.com/national-security/former-senior-nsa-officials-named-to-white-house-cyber-position-and-head-of-dhs-cyber-agency/2021/04/11/b9d408cc-9b2d-11eb-8005-bffc3a39f6d3_story.htmlGoogle Scholar
Nakashima, E., & Pomfret, J. (2009, November 11). China proves to be an aggressive foe in cyberspace. Washington Post. www.washingtonpost.com/wp-dyn/content/article/2009/11/10/AR2009111017588.htmlGoogle Scholar
Nakasone, G. P. M. (2019). Statement of General Paul M. Nakasone, Commander, United States Cyber Command Before the Senate Committee on Armed Services. February 14, 2019. Unclassified|National Security Archive. https://nsarchive.gwu.edu/document/20133-national-security-archive-167-statementGoogle Scholar
Nakasone, P. M. (2019). A Cyber Force for Persistent Operations. Joint Force Quarterly, 92.Google Scholar
Nakasone, P. M., & Sulmeyer, M. (2021, August 25). How to Compete in Cyberspace: Cyber Command’s New Approach. Foreign Affairs. www.foreignaffairs.com/articles/united-states/2020-08-25/cybersecurityGoogle Scholar
National Institute of Standards and Technology. (2012). Information Security. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdfGoogle Scholar
National Institute of Standards and Technology (2013). Digital Signature Standard (DSS) (FIPS PUB 186-4; Federal Information Processing Standards (FIPS) Publication). Information Technology Laboratory, U.S. Department of Commerce. https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.186-4.pdfGoogle Scholar
National Security Agency/Central Security Service. (n.d.a). About NSA/CSS. Retrieved July 19, 2022, from www.nsa.gov/about/mission-values/Google Scholar
National Security Agency/Central Security Service. (n.d.b). “Authorities.” www.nsa.gov/Culture/Operating-Authorities/Authorities/Google Scholar
NATO. (1949). The North Atlantic Treaty. North Altlantic Treaty Organization. www.nato.int/cps/en/natohq/official_texts_17120.htmGoogle Scholar
NATO. (2014, September 5). Wales Summit Declaration www.nato.int/cps/en/natohq/official_texts_112964.htm#cyberGoogle Scholar
NATO. (2016, July 8). Cyber Defence Pledge. www.nato.int/cps/en/natohq/official_texts_133177.htmGoogle Scholar
NATO. (2021). Brussels Summit Communiqué issued by NATO Heads of State and Government. www.nato.int/cps/en/natohq/news_185000.htmGoogle Scholar
NATO. (2022, July 11). Collective Defence—Article 5. North Atlantic Treaty Organization. www.nato.int/cps/en/natohq/topics_110496.htmGoogle Scholar
NATO Secretary General Jens Stoltenberg. (2015, March 25). Keynote Speech. www.nato.int/cps/en/natohq/opinions_118435.htm?selectedLocale=enGoogle Scholar
NCIJT. (n.d.). FBI, National Cyber Investigative Joint Task Force. Federal Bureau of Investigation. Retrieved August 4, 2022, from www.fbi.gov/investigate/cyber/national-cyber-investigative-joint-task-forceGoogle Scholar
NCSC. (2020). National Counterintelligence Strategy of the United States of America, 2020–2022. www.dni.gov/files/NCSC/documents/features/20200205-National_CI_Strategy_2020_2022.pdfGoogle Scholar
Nelson, T. H. (1974). Computer Lib: You Can and Must Understand Computers NOW (First edition). Nelson.Google Scholar
New Scientist (Director). (2007, July 5). New Scientist recreates a robot made by the ancient Greeks. www.youtube.com/watch?v=xyQIo9iS_z0Google Scholar
Newell, A., & Simon, H. (1956). The logic theory machine: A complex information processing system. IRE Transactions on Information Theory, 2(3), 6179. https://doi.org/10.1109/TIT.1956.1056797Google Scholar
Newman, L. H. (2018, May 6). What Israel’s Strike on Hamas Hackers Means for Cyberwar. Wired. www.wired.com/story/israel-hamas-cyberattack-air-strike-cyberwar/Google Scholar
Newman, L. H. (2019, March 5). The NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source. www.wired.com/story/nsa-ghidra-open-source-tool/Google Scholar
Newton, C. (2018, October 25). How China Complicates Apple’s Chest-thumping about Privacy. The Verge. www.theverge.com/2018/10/25/18020508/how-china-complicates-apples-chest-thumping-about-privacyGoogle Scholar
Nichols, T. M. (2017). The Death of Expertise: The Campaign against Established Knowledge and Why it Matters. Oxford University Press.Google Scholar
Nikolas K Gvosdev. (2012). The Bear Goes Digital: Russia and Its Cyber Capabilities. In Reveron, Derek S. (Ed.), Cyberspace and National Security. Georgetown University Press, pp. 173190.Google Scholar
NIST. (2018, February 5). Framework Documents: Cybersecurity Framework Version 1.1. NIST. www.nist.gov/cyberframework/frameworkGoogle Scholar
NIST (Computer Security Resource Center). (2023, June 11). Hash Functions. Retrieved July 16, 2023, from https://csrc.nist.gov/projects/hash-functionsGoogle Scholar
Nusca, A. (2020, February 17). The Conversation: Microsoft CEO Satya Nadella on How the Tech Industry Can Win Back Public Trust. Fortune. https://fortune.com/longform/microsoft-ceo-satya-nadella-interview-conversation-tech-society/Google Scholar
NYC Cyber Command. (n.d.). Retrieved October 24, 2022, from www1.nyc.gov/content/oti/pages/meet-the-team/cyber-commandGoogle Scholar
NyeJr., J. S. (2010). Cyber Power. Belfer Center, Harvard UniversityGoogle Scholar
Nye, Jr., J. S. (2011). Nuclear Lessons for Cyber Security? Strategic Studies Quarterly, 5(4), 1838.Google Scholar
Nye, Jr., J. S. (2014). The Regime Complex for Managing Global Cyber Activities (p. 20). Global Commission on Internet Governance. www.cigionline.org/sites/default/files/gcig_paper_no1.pdfGoogle Scholar
Nye, Jr., J. S. (2017). Deterrence and Dissuasion in Cyberspace. International Security, 41(3), 4471. https://doi.org/10.1162/ISEC_a_00266Google Scholar
Obama, P. B. (2013, May 23). Remarks by the President at the National Defense University. https://obamawhitehouse.archives.gov/the-press-office/2013/05/23/remarks-president-national-defense-universityGoogle Scholar
ODNI. (2021a). Annual Threat Assessment of the U.S. Intelligence Community. Office of Director of National Intelligence. www.dni.gov/files/ODNI/documents/assessments/ATA-2021-Unclassified-Report.pdfGoogle Scholar
ODNI. (2021b). Foreign Threats to the 2020 US Federal Elections. Office of Director of National Intelligence. www.odni.gov/files/ODNI/documents/assessments/ICA-declass-16MAR21.pdfGoogle Scholar
OECD. (2023). Gross Domestic Spending on R&D (Indicator). https://doi.org/10.1787/d8b068b4-enGoogle Scholar
OECD.AI. (n.d.). OECD AI Principles. Retrieved September 5, 2022, from www.oecd.org/digital/artificial-intelligence/Google Scholar
OEWG. (2021a). Chair’s Summary: Open-ended working group on developments in the field of information and telecommunications in the context of international security (A/AC.290/2021/CRP.3; p. 20). UN General Assembly. https://front.un-arm.org/wp-content/uploads/2021/03/Chairs-Summary-A-AC.290-2021-CRP.3-technical-reissue.pdfGoogle Scholar
OEWG. (2021b). Open-ended working group (A/AC.290/2021/CRP.2; p. 11). UN General Assembly.Google Scholar
OEWG. (2021c). Open-ended Working Group, UN Office for Disarmament Affairs, Final Substantive Report. https://front.un-arm.org/wp-content/uploads/2021/03/Final-report-A-AC.290-2021-CRP.2.pdfGoogle Scholar
OEWG. (2021d). Revised Consensus-aimed Draft Report of the OEWG Tabled by the Russian Federation.Google Scholar
Office of the Coordinator for Cyber Issues (S/CCI). (2015). Cybercrime Fact Sheet. Department of State.Google Scholar
Office of the Historian, US Department of State. (n.d.). Sputnik, 1957. Retrieved July 17, 2022, from https://history.state.gov/milestones/1953-1960/sputnikGoogle Scholar
Olmstead, K., & Smith, Aa. (2017). American Views about Cybersecurity Policy. www.pewresearch.org/internet/2017/01/26/3-attitudes-about-cybersecurity-policy/Google Scholar
Olson, M. (1971). The Logic of Collective Action: Public Goods and the Theory of Groups, Second Printing with a New Preface and Appendix. Harvard University Press. https://doi.org/10.2307/j.ctvjsf3tsGoogle Scholar
On confidence- and security-building measures. (2011). Organization for Security and Co-operation in Europe (OSCE). www.osce.org/files/f/documents/a/4/86597.pdfGoogle Scholar
OpenAI Codex. (2021, August 10). OpenAI. https://openai.com/blog/openai-codex/Google Scholar
Organization for Security and Co-operation in Europe. (1992). Treaty on Open Skies. www.osce.org/files/f/documents/1/5/14127.pdfGoogle Scholar
Orszag, P. (2007). Report by Director of CBO on Climate Change. www.cbo.gov/sites/default/files/presentation/11-16-climatechangeconf0.pdfGoogle Scholar
OSCE. (2016, March 10). Permanent Council Decision No. 1202. www.osce.org/pc/227281Google Scholar
O’Sullivan, K. (2021, March 29). UN Makes Critical Progress on Cybersecurity. Microsoft On the Issues. https://blogs.microsoft.com/on-the-issues/2021/03/29/un-working-group-cybersecurity-report/Google Scholar
O’Toole, G. (n.d.). It’s Difficult to Make Predictions, Especially About the Future. Quote Investigator. Retrieved July 19, 2022, from https://quoteinvestigator.com/2013/10/20/no-predict/Google Scholar
Ottis, R. (2008). Analysis of the 2007 Cyber Attacks against Estonia from the Information Warfare Perspective (p. 6). Cooperative Cyber Defence Centre of Excellence. https://ccdcoe.org/uploads/2018/10/Ottis2008_AnalysisOf2007FromTheInformationWarfarePerspective.pdfGoogle Scholar
Owen, M. (2021, March 16). Apple capitulates to Russia laws requiring preinstalled software on iPhone, Mac. AppleInsider. https://appleinsider.com/articles/21/03/16/apple-agrees-to-russia-laws-requiring-preinstalled-software-on-iphone-macGoogle Scholar
Pagden, A. (2002). The Idea of Europe From Antiquity to the European Union (L. H. Hamilton, Ed.; 1st ed.). Cambridge University PressGoogle Scholar
Pan American Union. (1933). The Seventh Pan-American Conference, “Convention on Rights and Duties of States” (pp. 1944) [Treaty Series]. League of Nations. https://treaties.un.org/doc/Publication/UNTS/LON/Volume%20165/v165.pdfGoogle Scholar
Patton, G. S. (1947). War as I Knew It. Houghton Mifflin Co., Boston.Google Scholar
Pearson, H. (n.d.). Mechanical miracles: The rise of the automaton | Christie’s. Retrieved September 6, 2022, from www.christies.com/features/The-History-of-the-Automaton-Mechanical-miracles-6382-1.aspxGoogle Scholar
Pearson, J. (2014, July 8). Forget Turing, the Lovelace Test Has a Better Shot at Spotting AI. Vice. www.vice.com/en/article/pgaany/forget-turing-the-lovelace-test-has-a-better-shot-at-spotting-aiGoogle Scholar
Peking University School of Law. (2018). National Intelligence Law of the People’s Republic of China (2018 Amendment). https://en.pkulaw.cn/display.aspx?cgid=313975&lib=lawGoogle Scholar
Pellerin, C. (2014, November 21). Cybercom Chief Details U.S. Cyber Threats, Trends. U.S. Department of Defense. https://www.defense.gov/News/News-Stories/Article/Article/603696/Google Scholar
Pellerin, C. (2017, July 21). Project Maven to Deploy Computer Algorithms to War Zone by Year’s End. DOD News. Retrieved from www.defense.gov/News/News-Stories/Article/Article/1254719/project-maven-to-deploy-computer-algorithms-to-war-zone-by-years-end/Google Scholar
PJI. (2022). Pretrial Justice Institute. Pretrial Justice Institute. www.pretrial.org/missionGoogle Scholar
Posture statement of General Paul M. Nakasone, Commander, United States Cyber Command before the 117th Congress. (2022). www.armed-services.senate.gov/imo/media/doc/5%20Apr%20SASC%20CYBERCOM%20Posture%20Statement%20(GEN%20Nakasone)%20-%20FINAL.pdfGoogle Scholar
Poznansky, M. (2021, March 23). Covert Action, Espionage, and the Intelligence Contest in Cyberspace. War on the Rocks. http://warontherocks.com/2021/03/covert-action-espionage-and-the-intelligence-contest-in-cyberspace/Google Scholar
President Obama. (2013). The National Security Agency: Missions, Authorities, Oversight and Partnerships. https://irp.fas.org/nsa/nsa-story.pdfGoogle Scholar
Presidential directive. (n.d.). In Wikipedia. https://en.wikipedia.org/wiki/Presidential_directiveGoogle Scholar
PPD-41 (2016) Presidential Policy Directive on United States Cyber Incident Coordination. (2016, July 26). Whitehouse.Gov. https://obamawhitehouse.archives.gov/the-press-office/2016/07/26/fact-sheet-presidential-policy-directive-united-states-cyber-incident-1eGoogle Scholar
Preskill, J. (2018). Quantum Computing in the NISQ era and beyond. Quantum, 2, 79. https://doi.org/10.22331/q-2018-08-06-79Google Scholar
Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflicts, art. 49, 1. (1977).Google Scholar
Pry, P. V. (2017). Nuclear EMP Attack Scenarios and Combined-Arms Warfare: Report to the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack. https://apps.dtic.mil/sti/pdfs/AD1097009.pdfGoogle Scholar
Qiu, Q. (2019, December 17). India’s internet shutdown shows normal practice for sovereign countries. People’s Daily Online, 1.Google Scholar
Quattrociocchi, W., Scala, A., & Sunstein, C. R. (2016). Echo Chambers on Facebook (SSRN Scholarly Paper No. 2795110). https://doi.org/10.2139/ssrn.2795110Google Scholar
Raman, K. (2008). Ask and you will receive: The psychology of social engineering: Why does it work? McAfee Security Journal, Fall. www.wired.com/images_blogs/threatlevel/files/mcafee_security_journal_fall_2008.pdfReagan, R. (1986). News Conference. www.reaganfoundation.org/ronald-reagan/reagan-quotes-speeches/news-conference-1/Google Scholar
Reich, S., & Dombrowski, P. (2017). The End of Grand Strategy: US Maritime Operations in the Twenty-First Century. Cornell University Press. www.cornellpress.cornell.edu/book/9781501714627/the-end-of-grand-strategy/Google Scholar
Reno, Attorney General of the United States, et al. V. American Civil Liberties Union et al., No. 96-11 (US District Court for the Eastern District of Pennsylvania June 26, 1997). www.aclu.org/legal-document/reno-v-aclu-supreme-court-decisionGoogle Scholar
Reuters. (2018, November 8). U.S. accuses China of violating bilateral anti-hacking deal. Reuters. www.reuters.com/article/us-usa-china-cyber-idUSKCN1NE02EGoogle Scholar
Reuters Staff. (2021, February 15). SolarWinds hack was “largest and most sophisticated attack” ever: Microsoft president. Reuters. www.reuters.com/article/us-cyber-solarwinds-microsoft-idUSKBN2AF03RGoogle Scholar
Reveron, D. S., & Cook, J. L. (2013). From National to Theater: Developing Strategy. Joint Force Quarterly, 70, 8.Google Scholar
Reveron, D. S., & Gvosdev, N. K. (2015). (Re)Discovering the National Interest: The Future of U.S. Foreign Policy and Defense Strategy. Orbis, 59(3), 299316. https://doi.org/10.1016/j.orbis.2015.04.001Google Scholar
Reveron, D. S., & Mahoney-Norris, K. A. (2019). Human and National Security: Understanding Transnational Challenges. Routledge. https://doi.org/10.4324/9780429503726Google Scholar
Reveron, D. S., & Mahoney-Norris, K. A. (2011). Human Security in a Borderless World: Understanding Transnational Challenges. Routledge. https://doi.org/10.4324/9780429499951Google Scholar
Reveron, D. S., & Murer, J. S. (2006). Flashpoints in the War on Terrorism (First edition). Routledge, Taylor & Francis Group. www.routledge.com/Flashpoints-in-the-War-on-Terrorism/Reveron-Murer/p/book/9780415954914Google Scholar
Reveron, D. S. & Savage, J. E. (2020). Digital Human Security, Orbis, 64 (4): 555570.Google Scholar
Revised consensus-aimed draft report of the OEWG tabled by the Russian Federation. (2021d). Open Ended Working Group (OEWG).Google Scholar
Reveron, D. S., Gvosdev, N. K., & Owens, M. T. (2014). US Foreign Policy and Defense Strategy: The Evolution of an Incidental Superpower. Georgetown University Press. http://press.georgetown.edu/book/georgetown/us-foreign-policy-and-defense-strategyGoogle Scholar
Rid, T. (2013). Cyber War Will Not Take Place. Oxford University Press.Google Scholar
Rid, T. (2020). Active Measures: The Secret History of Disinformation and Political Warfare (First edition.). Farrar, Straus and Giroux.Google Scholar
Riley, T. (2021, January 14). The Cybersecurity 202: NSA cyber chief Anne Neuberger is heading to the Biden White House. Washington Post. www.washingtonpost.com/politics/2021/01/14/cybersecurity-202-nsa-cyber-chief-anne-neuberger-is-heading-biden-white-house/Google Scholar
Roberts, L. G. (1978). The Evolution of Packet Switching. Proceedings of the IEEE, 66(11), 7.Google Scholar
Robertson, A. (2018, February 11). I’m using AI to face-swap Elon Musk and Jeff Bezos, and I’m really bad at it. The Verge. www.theverge.com/2018/2/11/16992986/fakeapp-deepfakes-ai-face-swappingGoogle Scholar
Robertson, J., & Riley, M. (2018, October 4). The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies. Bloomberg Businessweek. https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companiesGoogle Scholar
Robertson, J., & Riley, M. (2021, February 12). The Long Hack: How China Exploited a U.S. Tech Supplier. Bloomberg.Com. https://www.bloomberg.com/features/2021-supermicro/Google Scholar
Robertson, J., Mehrotra, K., & Gallagher, R. (2021, March 9). China’s Microsoft Hack, Russia’s SolarWinds Hacks Could Overwhelm U.S. – Bloomberg. Bloomberg News. www.bloomberg.com/news/articles/2021-03-09/microsoft-solarwinds-breaches-spark-two-front-war-on-hackers#xj4y7vzkgGoogle Scholar
Rodríguez, M. (2017). Declaration by Miguel Rodríguez, representative of Cuba, at the final session of Group of Governmental Experts on Developments in the Field of Information and Telecommunicatioins in the Context of International Security. UNODA.Google Scholar
Roman Zakharov v. Russia, No. 47143/06 (European Court of Human Rights December 1, 2015). https://hudoc.echr.coe.int/fre#{%22itemid%22:[%22002-10793%22]}Google Scholar
Rona, G., & Aarons, L. (2016). State responsibility to respect, protect and fulfill human rights obligations in cyberspace. Journal of National Security Law & Policy, 8(3), 503.Google Scholar
Rosenbach, E., Kayyem, J., & Mitra, L. (2021, August 19). The Limits of Cyberoffense. www.foreignaffairs.com/articles/united-states/2021-08-11/limits-cyberoffenseGoogle Scholar
Rosenberger, L., & Fly, J. (2017). Lessons from France for fighting Russian interference in democracy. https://securingdemocracy.gmfus.org/lessons-from-france-for-fighting-russian-interference-in-democracy/Google Scholar
Rosenberger, L., & Gorman, L. (2020). How Democracies Can Win the Information Contest. The Washington Quarterly, 43(2), 7596. https://doi.org/10.1080/0163660X.2020.1771045Google Scholar
Rowland, T. (n.d.). Church-Turing Thesis. Wolfram MathWorld, Created by Eric. W. Weisstein; Wolfram Research, Inc. Retrieved September 6, 2022, from https://mathworld.wolfram.com/Church-TuringThesis.htmlGoogle Scholar
Royce, W. W. (1987). Managing the development of large software systems: Concepts and techniques. Proceedings of the 9th International Conference on Software Engineering, 328–338. https://doi.org/978-0-89791-216-7Google Scholar
Ruan, L., Knockel, J., & Crete-Nishihata, M. (2020). Censored Contagion: How Information on the Coronavirus is Managed on Chinese Social Media (Citizen Lab Research Report No. 125). University of Toronto. https://citizenlab.ca/2020/03/censored-contagion-how-information-on-the-coronavirus-is-managed-on-chinese-social-media/Google Scholar
Ruhl, C., Hollis, D., Hoffman, W., & Maurer, T. (2020). Cyberspace and Geopolitics: Assessing Global Cybersecurity Norm Processes at a Crossroads. Carnegie Endowment for International Peace, 32.Google Scholar
Rumsfeld, D. H. (2005). The National Defense Strategy of the United States of America. https://nssarchive.us/wp-content/uploads/2020/04/2005_NDS.pdfGoogle Scholar
Rundle, J., & Stupp, C. (2022, April 12). Ukraine Thwarts Cyberattack on Electric Grid, Officials Say. Wall Street Journal.Google Scholar
Russell, A. L. (2014). Cyber Blockades. Georgetown University Press. http://press.georgetown.edu/book/georgetown/cyber-blockadesGoogle Scholar
Russell, S. J., & Norvig, P. (2003). Artificial Intelligence: A Modern Approach. Pearson Education.Google Scholar
Sak, H., Senior, A., Rao, K., Beaufays, F., & Schalkwyk, J. (2015, September 24). Google voice search: Faster and more accurate. Google AI Blog. https://ai.googleblog.com/2015/09/google-voice-search-faster-and-more.htmlGoogle Scholar
Sanger, D. E. (2010, September 25). Iran Fights Malware Attacking Computers. The New York Times. www.nytimes.com/2010/09/26/world/middleeast/26iran.htmlGoogle Scholar
Sanger, D. E. (2018). The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Penguin Random House. www.penguinrandomhouse.com/books/547683/the-perfect-weapon-by-david-e-sanger/Google Scholar
Sanger, D. E., & Perlroth, N. (2021, May 14). Pipeline Attack Yields Urgent Lessons About U.S. Cybersecurity. The New York Times. www.nytimes.com/2021/05/14/us/politics/pipeline-hack.htmlGoogle Scholar
Sanger, D. E., Barnes, J. E., & Perlroth, N. (2021, October 25). Preparing for Retaliation Against Russia, U.S. Confronts Hacking by China. The New York Times. www.nytimes.com/2021/03/07/us/politics/microsoft-solarwinds-hack-russia-china.htmlGoogle Scholar
Savage, J. E., & McConnell, B. W. (2015). Exploring Multi-Stakeholder Internet Governance | EastWest Institute (p. 16) [Discussion Paper]. EastWestInstitute. www.eastwest.ngo/idea/exploring-multi-stakeholder-internet-governanceGoogle Scholar
Scharre, P., & Riikonen, A. (2020). Defense Technology Strategy. Center for New American Security. www.cnas.org/publications/reports/defense-technology-strategyGoogle Scholar
Schlegel, A. (2017, July 27). Divided Differences Method of Polynomial Interpolation. R-Bloggers. www.r-bloggers.com/2017/07/divided-differences-method-of-polynomial-interpolation/Google Scholar
Schleifer, T. (2018, January 19). Google CEO Sundar Pichai says AI is more profound than electricity and fire—Vox. Vox. www.vox.com/2018/1/19/16911180/sundar-pichai-google-fire-electricity-aiGoogle Scholar
Schmid, J. (2018, February 16). Siemens and partners sign joint charter on cybersecurity. Munich Security Conference, Munich, Germany. www.charteroftrust.com/wp-content/uploads/2020/02/180216-Siemens-and-partners-sign-joint-charter-on-cybersecurity.pdfGoogle Scholar
Schmitt, M. (2020, February 28). Norm-Skepticism in Cyberspace? Counter-factual and Counterproductive. Just Security. www.justsecurity.org/68892/norm-skepticism-in-cyberspace-counter-factual-and-counterproductive/Google Scholar
Schmitt, M. N. (2002). Preemptive strategies in international law. Michigan Journal of International Law, 24, 513.Google Scholar
Schmitt, M. N. (2012). “Attack” as a Term of Art in International Law: The Cyber Operations Context. 4th International Conference on Cyber Conflict, 11.Google Scholar
Schmitt, M. N. (2017a). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (Second edition). Cambridge University Press. https://doi.org/10.1017/9781316822524Google Scholar
Schmitt, M. N. (2017b). Peacetime Cyber Responses and Wartime Cyber Operations Under International Law: An Analytical Vade Mecum (SSRN Scholarly Paper No. 3180699). https://papers.ssrn.com/abstract=3180699Google Scholar
Schmitt, M., & Vihul, L. (2017, June 30). International Cyber Law Politicized: The UN GGE’s Failure to Advance Cyber Norms. Just Security. www.justsecurity.org/42768/international-cyber-law-politicized-gges-failure-advance-cyber-norms/Google Scholar
Schneider, J. (2020). A Strategic Cyber No-First-Use Policy? Addressing the US Cyber Strategy Problem. The Washington Quarterly, 43(2), 159175. https://doi.org/10.1080/0163660X.2020.1770970Google Scholar
Schneier, B. (2015, March 25). NSA Doesn’t Need to Spy on Your Calls to Learn Your Secrets. Wired. www.wired.com/2015/03/data-and-goliath-nsa-metadata-spying-your-secrets/Google Scholar
Schneier, B. (2017, January 27). Click Here to Kill Everyone. New York Magazine. www.schneier.com/essays/archives/2017/01/click_here_to_kill_e.htmlGoogle Scholar
Schulman, R. (2019, July 18). Why the Ghost Keys “Solution” to Encryption is No Solution. Just Security. www.justsecurity.org/64968/why-the-ghost-keys-solution-to-encryption-is-no-solution/Google Scholar
Schultz, T. (2017, April 26). A Decade After “Web War 1,” Former Estonian President Blasts EU Cyber Inertia. Atlantic Council. www.atlanticcouncil.org/blogs/new-atlanticist/a-decade-after-web-war-1-former-estonian-president-blasts-eu-cyber-inertia/Google Scholar
Schwarz, O. (2019). In 2016, Microsoft’s Racist Chatbot Revealed the Dangers of Online Conversation. IEEE Spectrum. https://spectrum.ieee.org/in-2016-microsofts-racist-chatbot-revealed-the-dangers-of-online-conversationGoogle Scholar
Schwarzenbach, A., Voo, J., Hemani, I., Jones, S., DeSombre, W., & Cassidy, D. (2021). Harvard Belfer National Cyber Power Index 2020 [Data set]. Harvard Dataverse. https://doi.org/10.7910/DVN/LT55JYGoogle Scholar
Scott, K. D. (2018). Joint Publication 3-0 (p. 224). Joint Chiefs of Staff. https://irp.fas.org/doddir/dod/jp3_0.pdfGoogle Scholar
Section 230 as First Amendment rule. (2018). Harvard Law Review. https://harvardlawreview.org/2018/05/section-230-as-first-amendment-rule/Google Scholar
Section 230 of the Communications Decency Act. (n.d.-a). Electronic Frontier Foundation. Retrieved August 5, 2022, from www.eff.org/issues/cda230Google Scholar
Section 230 of the Communications Decency Act. (n.d.-b). Electronic Frontier Foundation. Retrieved October 25, 2022, from www.eff.org/issues/cda230Google Scholar
Segal, A. (2017). The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age. www.publicaffairsbooks.com/titles/adam-segal/the-hacked-world-order/9781610394161/Google Scholar
Segal, A. (2020). China’s Alternative Cyber Governance Regime. Council on Foreign Relations, for the U.S. China Economic Security Review Commission, 8.Google Scholar
Sermpezis, P. et al. (2018). ARTEMIS: Neutralizing BGP Hijacking Within a Minute, IEEE/ACM Transactions on Networking, 26 (6), 24712486.Google Scholar
Shackelford, S., Russell, S., & Kuehn, A. (2016). Unpacking the International Law on Cybersecurity Due Diligence: Lessons from the Public and Private Sectors. Chicago Journal of International Law, 17(1), 150. https://chicagounbound.uchicago.edu/cjil/vol17/iss1/1Google Scholar
Shahbaz, A., Funk, A., & Vesteinsson, K. (2022). Freedom on the Net 2022: Countering an Authoritarian Overhaul of the Internet. Freedom House. https://freedomhouse.org/sites/default/files/2022-10/FOTN2022Digital.pdfGoogle Scholar
Shamir, A., Melamed, O., & BenShmuel, O. (2022). The Dimpled Manifold Model of Adversarial Examples in Machine Learning (arXiv:2106.10151). arXiv. https://doi.org/10.48550/arXiv.2106.10151Google Scholar
Shamir, A., Safran, I., Ronen, E., & Dunkelman, O. (2019). A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance (arXiv:1901.10861). arXiv. https://doi.org/10.48550/arXiv.1901.10861Google Scholar
Shane, S., & Wakabayashi, D. (2018, April 4). ‘The Business of War’: Google Employees Protest Work for the Pentagon. The New York Times. www.nytimes.com/2018/04/04/technology/google-letter-ceo-pentagon-project.htmlGoogle Scholar
Shannon, C. E. (1949), Communication Theory of Secrecy Systems. Bell System Technical Journal, 28, 65715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.xGoogle Scholar
Shelley, M. (1922). Frankenstein or, The Modern Prometheus. The Cornhill Publishing Company. www.gutenberg.org/files/84/84-h/84-h.htmGoogle Scholar
Sherman, J. (2020, May 1). The Russian Doll of Putin’s Internet Clampdown. Wired. www.wired.com/story/opinion-the-russian-doll-of-putins-internet-clampdown/Google Scholar
Sherman, W. R. (2022, September 16). Global Emerging Technology Summit, Remarks. www.state.gov/global-emerging-technology-summit/Google Scholar
Shor, P. W. (1997). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 26(5), 14841509. https://doi.org/10.1137/S0097539795293172Google Scholar
Shuttleworth, M. (n.d.). Heron’s Inventions includes Holy Water Dispenser and the Aeolipile. Explorable. Retrieved September 6, 2022, from https://explorable.com/heron-inventionsGoogle Scholar
Silver, D., Hubert, T., Schrittwieser, J. et al. (2018). A general reinforcement learning algorithm that masters chess, shogi, and Go through self-play. Science, 362(6419), 11401144. https://doi.org/10.1126/science.aar6404Google Scholar
Silver, D., Schrittwieser, J., Simonyan, K. et al. (2017). Mastering the game of Go without human knowledge. Nature, 550(7676), Article 7676. https://doi.org/10.1038/nature24270Google Scholar
Simon, H. A. (1960). The New Science of Management Decision. Harber & Brothers.Google Scholar
Simon, H. A., & Newell, A. (1958). Heuristic problem solving: The next advance in operations research. Operations Research, 6(1), 110. https://doi.org/10.1287/opre.6.1.1Google Scholar
Simonite, T. (2018, November 1). Will “Deepfakes” Disrupt the Midterm Election? Wired. www.wired.com/story/will-deepfakes-disrupt-the-midterm-election/Google Scholar
Slayton, R. (2021). What is a cyber warrior? The Emergence of U.S. Military Cyber Expertise, 1967–2018. Texas National Security Review, 4(1), 6196.Google Scholar
Smart, W. (2018). Lessons Learned Review of the WannaCry Ransomware Cyber Attack (p. 42). Department of Health & Social Care, NHS.Google Scholar
Smeets, M. (2018). A matter of time: On the transitory nature of cyberweapons. Journal of Strategic Studies, 41(1–2), 632. https://doi.org/10.1080/01402390.2017.1288107Google Scholar
Smeltz, D., Daalder, I., Friedhoff, K., Kafura, C., & Helm, B. (2019). Rejecting Retreat: Americans Support US Engagement in Global Affairs. Chicago Journal on Global Affairs, 1–40.Google Scholar
Smith, A. (2020, August 5). Deepfakes are the most dangerous crime of the future, researchers say. The Independent. www.independent.co.uk/tech/deepfakes-dangerous-crime-artificial-intelligence-a9655821.htmlGoogle Scholar
Smith, A. (2021, January 1). H.R.6395 – 116th Congress (2019–2020): William M. (Mac) Thornberry National Defense Authorization Act for Fiscal Year 2021 (2019/2020) [Legislation]. www.congress.gov/Google Scholar
Smith, B. (2017, February 14). The need for a Digital Geneva Convention. Microsoft on the Issues. https://blogs.microsoft.com/on-the-issues/2017/02/14/need-digital-geneva-convention/Google Scholar
Smith, B., & Browne, C. A. (2019). Tools and Weapons: The Promise and the Peril of the Digital Age. Penguin Press.Google Scholar
Smith, D. (2002, December 1). Psychologist wins Nobel Prize. www.apa.org, 33(11), 22.Google Scholar
Smith, D. (2008, May 31). Stream Cipher Reuse: A Graphic Example. Cryptosmith. https://cryptosmith.com/2008/05/31/stream-reuse/Google Scholar
Smith, R. (2014, March 12). U.S. Risks National Blackout from Small-Scale Attack. WSJ. http://online.wsj.com/article/SB10001424052702304020104579433670284061220.htmlGoogle Scholar
Solove, D. J. (2006). A brief history of information privacy law. Proskauer on Privacy, PLI, 47, 146. https://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2076&context=faculty_publicationsGoogle Scholar
South Africa. (2021). Statement by South Africa at the Informal OEWG. OEWG.Google Scholar
Sparkes, M. (2021, November 15). IBM creates largest ever superconducting quantum computer. New Scientist. www.newscientist.com/article/2297583-ibm-creates-largest-ever-superconducting-quantum-computer/Google Scholar
Spector, M., & Ma, W. (2018, June 3). If You Want to Do Business in China, Mind Your T’s: Taiwan and Tibet. The Wall Street Journal. www.wsj.com/articles/if-you-want-to-do-business-in-china-mind-your-ts-taiwan-and-tibet-1527937201Google Scholar
Spinazze (2020). Disciplinary Counsel v. Spinazze, 159 Ohio St.3d 187, 2020-Ohio-957. www.supremecourt.ohio.gov/rod/docs/pdf/0/2020/2020-Ohio-957.pdfGoogle Scholar
Stahl, R. (2017, December 12)._ Justice Department Announces Charges And Guilty Pleas In Three Computer Crime Cases Involving Significant Cyber Attacks, USAO-NJ, Department of Justice. https://web.archive.org/web/20171213203120/ www.justice.gov/usao-nj/pr/justice-department-announces-charges-and-guilty-pleas-three-computer-crime-casesGoogle Scholar
Statement for the Record, Nominee for the National Cyber Director. (2021). www.hsgac.senate.gov/imo/media/doc/Prepared%20Statement-Inglis-2021-06-10.pdfGoogle Scholar
Statista. (n.d.). Global Market Share Held by Operating Systems for Desktop PCs. Statista. Retrieved October 25, 2022, from www.statista.com/statistics/218089/global-market-share-of-windows-7/Google Scholar
Statt, N. (2020, February 26). Google Translate supports new languages for the first time in four years, including Uyghur. The Verge. www.theverge.com/2020/2/26/21154417/google-translate-new-languages-support-odia-tatar-turkmen-uyghur-kinyarwandaGoogle Scholar
Statute of the International Court of Justice. (1945). Statute of the International Court of Justice. Great Neck Publishing. www.icj-cij.org/en/statuteGoogle Scholar
Stoltenberg, N. S. G. J. (2020, June 8). Stoltenberg Urges NATO Unity Amid Challenges from China, Russia. Radio Free Europe/Radio Liberty. www.rferl.org/a/stoltenberg-urges-nato-unity-amid-challenges-from-china-russia/30659609.htmlGoogle Scholar
Stone, G. R., & Bollinger, L. C. (2018). The Free Speech Century. Oxford University Press.Google Scholar
Strayer, R. L. (2019, July 25). Remarks at the 2019 Internet Governance Forum USA Conference. United States Department of State. https://2017-2021.state.gov/remarks-at-the-2019-internet-governance-forum-usa-conference/Google Scholar
Strickling, L. E. (2013, March 2). Moving Together Beyond Dubai|National Telecommunications and Information Administration. National Telecommunications and Information Administration, United States Department of Commerce. www.ntia.doc.gov/blog/2013/moving-together-beyond-dubaiGoogle Scholar
Struckman, D. (2022, July 20). America Cannot Afford to Leave The Open Skies Treaty [Text]. The National Interest. https://nationalinterest.org/feature/america-cannot-afford-leave-open-skies-treaty-106986Google Scholar
Stuart-Ulin, C. R. (2018, July 31). Microsoft’s politically correct chatbot is even worse than its racist one. Quartz. https://qz.com/1340990/microsofts-politically-correct-chat-bot-is-even-worse-than-its-racist-one/Google Scholar
Stupp, C. (2019, August 30). Fraudsters Used AI to Mimic CEO’s Voice in Unusual Cybercrime Case. Wall Street Journal. www.wsj.com/articles/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402Google Scholar
Suarez, F. F., & Lanzolla, G. (2005, April 1). The Half-Truth of First-Mover Advantage. Harvard Business Review. https://hbr.org/2005/04/the-half-truth-of-first-mover-advantageGoogle Scholar
Sullivan, J. J. (2019, September 23). Remarks at the Second Ministerial Meeting on Advancing Responsible State Behavior in Cyberspace. United States Department of State. https://2017-2021.state.gov/remarks-at-the-second-ministerial-meeting-on-advancing-responsible-state-behavior-in-cyberspace/index.htmlGoogle Scholar
Sunstein, C. R., & Thaler, R. (2016, December 7). The Two Friends Who Changed How We Think About How We Think. The New Yorker. www.newyorker.com/books/page-turner/the-two-friends-who-changed-how-we-think-about-how-we-thinkGoogle Scholar
Swaine, M. R., & Freiberger, P. A. (2020). Analytical Engine | Description & Facts | Britannica. In Britannica. Encyclopedia Britannica. www.britannica.com/technology/Analytical-EngineGoogle Scholar
Taleb, N. N. (2010). The Black Swan (Second edition). Penguin Random House. www.penguinrandomhouse.com/books/176226/the-black-swan-second-edition-byGoogle Scholar
Tarabay, J. (2018, December 6). Australian Government Passes Contentious Encryption Law. The New York Times. www.nytimes.com/2018/12/06/world/australia/encryption-bill-nauru.htmlGoogle Scholar
Taulli, T. (2020, November 27). Turing Test At 70: Still Relevant for AI (Artificial Intelligence)? Forbes. www.forbes.com/sites/tomtaulli/2020/11/27/turing-test-at-70-still-relevant-for-ai-artificial-intelligence/Google Scholar
Tavakoli, O. (2021, April 30). A Tale of Two Hacks: From SolarWinds to Microsoft Exchange. Threatpost. https://threatpost.com/solarwinds-hack-seismic-shift/165758/Google Scholar
Team, T. (2019, September 24). AMD vs Intel: A Detailed Comparison of Revenue and Key Operating Metrics. Forbes. www.forbes.com/sites/greatspeculations/2019/09/24/amd-vs-intel-a-detailed-comparison-of-revenue-and-key-operating-metrics/Google Scholar
Teitelbaum, S. (1992). Scientists Say Asimov Put the Stars in Their Eyes. The Los Angeles Times. www.latimes.com/archives/la-xpm-1992-04-08-vw-636-story.htmlGoogle Scholar
Temple-Raston, D. (2021, April 16). A “Worst Nightmare” Cyberattack: The Untold Story Of The SolarWinds Hack. NPR. www.npr.org/2021/04/16/985439655/a-worst-nightmare-cyberattack-the-untold-story-of-the-solarwinds-hackGoogle Scholar
Tetlock, P. E. (2016). Superforecasting: The Art and Science of Prediction. Random House Books.Google Scholar
Tetlock, P. E. (2017). Expert Political Judgment: How Good Is It? How Can We Know. Princeton University Press. https://press.princeton.edu/books/hardcover/9780691178288/expert-political-judgmentGoogle Scholar
The Internet Society. (n.d.). Internet Society. Retrieved August 6, 2022, from www.internetsociety.org/Google Scholar
The National Academies. (2018). Decrypting the Encryption Debate: A Framework for Decision Makers. National Academies Press. https://doi.org/10.17226/25010Google Scholar
The Tao of IETF: A Novice’s Guide to the Internet Engineering Task Force. (n.d.). IETF. Retrieved August 6, 2022, from www.ietf.org/about/participate/tao/Google Scholar
Thompson, N. (2020, January 15). UN Secretary-General: US-China Tech Split Worse Than Cold War. Wired. www.wired.com/story/un-secretary-general-antonio-guterres-internet-risks/Google Scholar
Thumfart, J. (2020). Public and private just wars: Distributed cyber deterrence based on Vitoria and Grotius. Internet Policy Review, 9(3). https://doi.org/10.14763/2020.3.1500Google Scholar
Title 10 USC 394: Authorities concerning military cyber operations. (n.d.). Retrieved August 4, 2022, from https://uscode.house.gov/view.xhtml?req=granuleid:USC-prelim-title10-section394&num=0&edition=prelimGoogle Scholar
Tombs, N., & Fournier-Tombs, E. (2020, August). Ambiguity in authenticity of top-level coronavirus-related domains. The Harvard Kennedy School Misinformation Review, 1(Covid-19 and Misinformation). misinforeview.hks.harvard.eduGoogle Scholar
TRS-80. (n.d.). Radio Shack TRS-80 Model 1 Personal Computer. National Museum of American History. Retrieved November 9, 2022, from https://americanhistory.si.edu/collections/search/object/nmah_334337Google Scholar
Tully, P., & Foster, L. (2021, October 31). Repurposing Neural Networks to Generate Synthetic Media for Information Operations. Mandiant. www.mandiant.com/resources/blog/repurposing-neural-networks-to-generate-synthetic-media-for-information-operationsGoogle Scholar
Turing, A. M. (1996). Computing Machinery and Intelligence. In Readings in Language and Mind, Geirsson, Heimir, & Losonsky, Michael [Eds], Blackwell Publishers Inc, pp. 245264.Google Scholar
Tversky, A., & Kahneman, D. (1973). Availability: A heuristic for judging frequency and probability. Cognitive Psychology, 5(2), 207232. https://doi.org/10.1016/0010-0285(73)90033-9Google Scholar
Tversky, A., & Kahneman, D. (1986). Rational choice and the framing of decisions. The Journal of Business, 59(4), 251278.Google Scholar
Twitter. (2020, July 18). An Update on Our Security Incident. Retrieved from https://blog.twitter.com/en_us/topics/company/2020/an-update-on-our-security-incident.htmlGoogle Scholar
UN. (1948, December 10). Universal Declaration of Human Rights. United Nations; United Nations. www.un.org/en/about-us/universal-declaration-of-human-rightsGoogle Scholar
UN. (2004). UN Security Council Resolution 1540. United Nations. www.un.org/disarmament/wmd/sc1540/Google Scholar
UN Office on Drugs and Crime. (2018). Comments Received in Accordance with the Chair’s Proposal for the Work Plan for the Period 2018-2021.Google Scholar
UN Press Bureau. (2014). Cyber warfare, unchecked, could topple entire edifice of international security, says speaker in First Committee at conclusion of thematic debate segment. United Nations. https://press.un.org/en/2014/gadis3512.doc.htmGoogle Scholar
UN Press Bureau. (2018, October 30). First Committee delegates exchange views on best tools for shielding cyberspace from global security threats triggered by dual-use technologies, innovations. UN Press Blog. https://press.un.org/en/2018/gadis3613.doc.htmGoogle Scholar
UNESCO. (2005). Precautionary Principle. www.precautionaryprinciple.eu/Google Scholar
UNGA. (2018). UN General Assembly, Resolution 73/266, Advancing Responsible State Behaviour in Cyberspace in the Context of International Security. UN General Assembly. https://undocs.org/A/RES/73/266Google Scholar
United Nations. (n.d.-a). Charter. United Nations; United Nations. Retrieved September 7, 2022, from www.un.org/en/about-us/un-charter/preambleGoogle Scholar
United Nations. (n.d.-b). Full Text, Charter of the United Nations.Google Scholar
United Nations. (n.d.-c). Growth in United Nations membership. United Nations; United Nations. Retrieved September 7, 2022, from www.un.org/en/about-us/growth-in-un-membershipGoogle Scholar
United Nations. (1994). United Nations Convention on the Law of the Sea (UNCLOS). United Nations. www.un.org/depts/los/convention_agreements/texts/unclos/unclos_e.pdfGoogle Scholar
United Nations. (2018). Developments in the Field of Information and Telecommunications in the Context of International Security: Report to the Secretary General (A/RES/73/27; p. 5). https://documents-dds-ny.un.org/doc/UNDOC/GEN/N18/418/04/PDF/N1841804.pdf?OpenElementGoogle Scholar
United Nations Office on Genocide Prevention and the Responsibility to Protect. (n.d.). Retrieved September 7, 2022, from www.un.org/en/genocideprevention/about-responsibility-to-protect.shtmlGoogle Scholar
UNODA. (2019). Fact Sheet: Developments in the field of information and telecommunications in the context of international security. United Nations Office for Disarmaments Affairs.Google Scholar
UNODA. (2022). Index to UNODA Reports on Developments in the field of information and telecommunications in the context of international security.Google Scholar
U.S. (1978). U.S. Foreign Intelligence Surveillance Court. www.fisc.uscourts.gov/Google Scholar
U.S. Attorney’s Office, Eastern District of New York. (2018, November 27). Two International Cybercriminal Rings Dismantled and Eight Defendants Indicted for Causing Tens of Millions of Dollars in Losses in Digital Advertising Fraud. www.justice.gov/usao-edny/pr/two-international-cybercriminal-rings-dismantled-and-eight-defendants-indicted-causingGoogle Scholar
US Fleet Cyber Command/US Tenth Fleet. (2020). Strategic Plan 2020–2025. US Navy.Google Scholar
U.S. Government Publishing Office. (2011). U.S. Code Title 18 – Crimes and Criminal Procedure. Govinfo. www.govinfo.gov/content/pkg/USCODE-2011-title18/html/USCODE-2011-title18-partI-chap90.htmGoogle Scholar
U.S. House Committee on Energy & Commerce. (2021). Hearing on “Disinformation Nation: Social Media’s Role in Promoting Extremism and Misinformation.” https://energycommerce.house.gov/committee-activity/hearings/hearing-on-disinformation-nation-social-medias-role-in-promotingGoogle Scholar
U.S. Senate Armed Services Committee (2017). Hearing to Receive Testimony on Cyber Policy, Strategy, and Organization. www.armed-services.senate.gov/imo/media/doc/17-45_05-11-17.pdfGoogle Scholar
US Supreme Court ____ (2023, May 18). Gonzales v. Google LLC, 598 U. S., No. 21-1333. www.supremecourt.gov/opinions/22pdf/21-1333_6j7a.pdfGoogle Scholar
USA v. Basaaly Faeed Moalin, USA v. Mohamed Mohamed Mohamud, USA v. Issa Doreh, USA v. Ahmed Nasir Taalil Mohamud, US Court of Appeals, Ninth Circuit (p. 59). (2020). https://cdn.ca9.uscourts.gov/datastore/opinions/2020/09/02/13-50572.pdfGoogle Scholar
USA v. Viktor Borisovich Netyksho [and 11 others], defendants: Case 1:18-cr-00215-ABJ, (US District Court for the District of Columbia (Washington, D.D.) 2018). https://permanent.fdlp.gov/gpo115873/file1080281download.pdfGoogle Scholar
Utsumi, Y. (2002). Information Society-The Strategy for Development in the 21st Century. International Telecommunications Union. www.itu.int/osg/sg/speeches/2003/0401kiev-wsis.htmlGoogle Scholar
Valeriano, B. (2020, March 27). Cost Imposition Is the Point: Understanding U.S. Cyber Operations and the Strategy Behind Achieving Effects. Lawfare. www.lawfareblog.com/cost-imposition-point-understanding-us-cyber-operations-and-strategy-behind-achieving-effectsGoogle Scholar
Valeriano, B., & Maness, R. C. (2015). Cyber War versus Cyber Realities: Cyber Conflict in the International System. Oxford University Press. https://doi.org/10.1093/acprof:oso/9780190204792.001.0001Google Scholar
Valeriano, B., Jensen, B., & Maness, R. C. (2018). Cyber Strategy: The Evolving Character of Power and Coercion. Oxford University Press. https://doi.org/10.1093/oso/9780190618094.001.0001Google Scholar
Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A. N., Kaiser, L., & Polosukhin, I. (2017). Attention Is All You Need (arXiv:1706.03762). arXiv. http://arxiv.org/abs/1706.03762Google Scholar
Vavra, S. (2021, February 17). White House warns SolarWinds breach cleanup will take time. CyberScoop. www.cyberscoop.com/solarwinds-cyber-espionage-russia-neuberger/Google Scholar
Vestergaard, C., & Roul, A. (2011). A (F)utile Intersessional Process?: Strengthening the BWC by Defining Its Scope. The Nonproliferation Review, 18(3), 489497. https://doi.org/10.1080/10736700.2011.618616Google Scholar
Vietnamese Law 24 on Cybersecurity. (2018). Allens Law. https://data.allens.com.au/pubs/pdf/priv/cupriv22jun18.pdfGoogle Scholar
W3C (2022). The World Wide Web Consortium. www.w3.org/Consortium/Google Scholar
Wallace, D., & Visger, M. (2017). Responding to the Call for a Digital Geneva Convention: An Open Letter to Brad Smith and the Technology Community. JL & Cyber Warfare, 6, 3.Google Scholar
Warner, M. (2020). The Character of Cyber Conflict. Texas National Security Review, 3(4). https://tnsr.org/roundtable/policy-roundtable-cyber-conflict-as-an-intelligence-contest/#essay2, 26-42.Google Scholar
Warner, U. S. Mark. R. (2020, January 14). National Security Senators Introduce Bipartisan Legislation to Develop 5G Alternatives to Huawei. Mark R. Warner. www.warner.senate.gov/public/index.cfm/2020/1/national-security-senators-introduce-bipartisan-legislation-to-develop-5g-alternatives-to-huaweiGoogle Scholar
Weinstein, D. (2021, February 26). Hackers May Be Coming for Your City’s Water Supply: More digitized and connected than ever, the nation’s infrastructure is vulnerable to cyberattack. The Wall Street Journal. www.wsj.com/articles/hackers-may-be-coming-for-your-citys-water-supply-11614379990?page=1Google Scholar
Weiss, T. G., Forsythe, D. P., Coate, R. A., & Pease, K.-K. (2019). The United Nations and Changing World Politics (Seventh edition). Routledge. https://doi.org/10.4324/b22600Google Scholar
White House. (1998, May 22). The Clinton Administration’s Policy on Critical Infrastructure Protection: Presidential Decision Directive 63. https://clintonwhitehouse4.archives.gov/WH/EOP/NSC/html/documents/NSCDoc3.htmlGoogle Scholar
White House. (2001, November 23). Message from the President of the United States transmitting the Council of Europe Convention on Cybercrime (“The “Cybercrime Convention” or the “Convention”) which was signed by the United States on November 23, 2001 (11/17/2003–08/03/2006) [Legislation]. www.congress.gov/Google Scholar
White House. (2003). The National Strategy to Secure Cyberspace. https://georgewbush-whitehouse.archives.gov/pcipb/Google Scholar
White House. (2005). Dr. Vinton Cerf and Dr. Robert Kahn, Medal of Freedom Recipients. The White House. https://georgewbush-whitehouse.archives.gov/government/cerf-kahn-bio.htmlGoogle Scholar
White House. (2010). The National Security Strategy of The United States of America. https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/national_security_strategy.pdfGoogle Scholar
White House. (2015, February 13). Executive Order – Promoting Private Sector Cybersecurity Information Sharing. Whitehouse.Gov. https://obamawhitehouse.archives.gov/the-press-office/2015/02/13/executive-order-promoting-private-sector-cybersecurity-information-shariGoogle Scholar
White House. (2017). National Security Strategy of the United States of America. United States. White House Office. www.hsdl.org/?abstract&did=806478Google Scholar
White House. (2018). National Cyber Strategy. US White House, President Donald J. Trump. https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdfGoogle Scholar
White House. (2019). Artificial Intelligence for the American People (Executive Order 13859,). https://trumpwhitehouse.archives.gov/ai/2019-02-01Google Scholar
White House. (2021a, March 3). Interim National Security Strategic Guidance. The White House. www.whitehouse.gov/briefing-room/statements-releases/2021/03/03/interim-national-security-strategic-guidance/Google Scholar
White House. (2021b, July 27). Remarks by President Biden at the Office of the Director of National Intelligence. White House. www.whitehouse.gov/briefing-room/speeches-remarks/2021/07/27/remarks-by-president-biden-at-the-office-of-the-director-of-national-intelligence/Google Scholar
White, S. P. (2019). Subcultural Influence on Military Innovation: The Development of U.S. Military Cyber Doctrine [Doctoral, Harvard University]. https://dash.harvard.edu/handle/1/42013038Google Scholar
Wikiwand. (1983). Convention on Certain Conventional Weapons, Arms Control Treaty. Wikiwand. https://wikiwand.com/en/Convention_on_Certain_Conventional_WeaponsGoogle Scholar
Wikiwand—SORM. (n.d.). Wikiwand. Retrieved August 9, 2023, from https://www.wikiwand.com/en/SORMGoogle Scholar
Williams, B. D. (2021, July 22). US Playing Long Game to Pressure China on Cyber Ops: Experts. Breaking Defense. https://breakingdefense.com/2021/07/us-playing-long-game-to-pressure-china-on-cyber-ops-experts/Google Scholar
Williams-King, D., Gobieski, G., Williams-King, K. et al. (2016). Shuffler: Fast and deployable continuous code re-randomization. Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation, 367–382.Google Scholar
Wilshusen, G. C. (2018). Supply Chain Risks Affecting Federal Agencies (GAO-18-667T; Information Security). US Government Accountability Office (GAO). www.gao.gov/assets/gao-18-667t.pdfGoogle Scholar
WinnefeldJr., J. A. (Sandy), Kirchhoff, C., & Upton, D. M. (2015, September 1). Cybersecurity’s Human Factor: Lessons from the Pentagon. Harvard Business Review. https://hbr.org/2015/09/cybersecuritys-human-factor-lessons-from-the-pentagonGoogle Scholar
WIPO Arbitration and Mediation Center. (2001, January 25). WIPO Domain Name Decision: D2000-1532. Administrative Panel Decision: Bruce Springstein v. Jeff Burgar and Bruce Springsteen Club, Case No. D2000-1532. www.wipo.int/amc/en/domains/decisions/html/2000/d2000-1532.htmlGoogle Scholar
Wong, C. Y. (2013, April). Bubble Value at Risk: A Countercyclical Risk Management Approach, revised edition. Wiley. www.wiley.com/en-us/Bubble+Value+at+Risk%3A+A+Countercyclical+Risk+Management+Approach%2C+Revised+Edition-p-9781118550342Google Scholar
Wray, C. A. (2017). Statement of Christopher A. Wray, Director Federal Bureau of Investigation, before the Committee on Homeland Security, U.S. House of Representatives. https://docs.house.gov/meetings/HM/HM00/20171130/106651/HHRG-115-HM00-Wstate-WrayC-20171130.pdfGoogle Scholar
Wray, C. A. (2019). Statement of Christopher Wray Director Federal Bureau of Investigation Before the Committee on the Judiciary of the United States Senate. www.judiciary.senate.gov/imo/media/doc/Wray%20Testimony1.pdfGoogle Scholar
WSIS (2005, November 18) Tunis agenda for the Information Society.). World Summit on the Information Society, Geneva 2001 – Tunis 2005. www.itu.int/net/wsis/docs2/tunis/off/6rev1.htmlGoogle Scholar
WSJ. (2021, September 1). The Facebook Files: A Wall Street Journal investigation. Wall Street Journal. www.wsj.com/articles/the-facebook-files-11631713039Google Scholar
Wu, Y., Bao, W.-S., Cao, S. et al. (2021). Strong Quantum Computational Advantage Using a Superconducting Quantum Processor. Physical Review Letters, 127(18), 180501. https://doi.org/10.1103/PhysRevLett.127.180501Google Scholar
Wu, Y., Schuster, M., Chen, Z. et al. (2016). Google’s Neural Machine Translation System: Bridging the Gap between Human and Machine Translation (arXiv:1609.08144). arXiv. https://doi.org/10.48550/arXiv.1609.08144Google Scholar
Xi, J. (2017). Secure a Decisive Victory in Building a Moderately Prosperous Society in All Respects and Strive for the Great Success of Socialism with Chinese Characteristics for a New Era. 19th National Congress of the Communist Party of China. www.xinhuanet.com/english/download/Xi_Jinping’s_report_at_19th_CPC_National_Congress.pdfGoogle Scholar
Yang, Y., & Liu, N. (2019, December 8). Beijing orders state offices to replace foreign PCs and software. Financial Times. www.ft.com/content/b55fc6ee-1787-11ea-8d73-6303645ac406Google Scholar
Zelikow, P. (1997). George C. Marshall and the Moscow CFM meeting of 1947. Diplomacy & Statecraft, 8(2), 97124. https://doi.org/10.1080/09592299708406045Google Scholar
Zelikow, P. (2019, September 10). To Regain Policy Competence: The Software of American Public Problem-Solving. Texas National Security Review. https://tnsr.org/2019/09/to-regain-policy-competence-the-software-of-american-public-problem-solving/Google Scholar
Zetter, K. (2013). Legal Experts: Stuxnet Attack on Iran Was Illegal “Act of Force.” Wired. www.wired.com/2013/03/stuxnet-act-of-force/Google Scholar
Zetter, K. (2016, March 3). Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid. Wired. www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/Google Scholar
Zitun, Y. (2017, April 16). Head of IDF’s new Cyber Division: It’s a world with no rules. Ynetnews. www.ynetnews.com/articles/0,7340,L-4949752,00.htmlGoogle Scholar
Zojer, G. (2019). The interconnectedness of digitalisation and human security in the European High North: Cybersecurity conceptualised through the human security lens. The Yearbook of Polar Law, 10(1), 297320. https://doi.org/10.1163/22116427_010010014Google Scholar
Zucconi, A. (2014, March 14). Understanding the Technology Behind Deepfakes. Retrieved from www.alanzucconi.com/2018/03/14/understanding-the-technology-behind-deepfakes/Google Scholar
Zuckerberg, M. (2018, July 31). Facebook Blog Post [Blog]. SEC Wire. www.facebook.com/zuck/posts/10105140110214721Google Scholar
Zuckerberg, M. (2019). An Examination of Facebook and Its Impact on the Financial Services and Housing Sectors before the US House Committee on Financial Services. https://financialservices.house.gov/uploadedfiles/hhrg-116-ba00-wstate-zuckerbergm-20191023-u1.pdfGoogle Scholar
Zweig, J. (2015, September 26). The trick to making better forecasts. Wall Street Journal (Online), n/a.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×