Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-wzw2p Total loading time: 0 Render date: 2024-05-11T03:41:06.983Z Has data issue: false hasContentIssue false

Bibliography

Published online by Cambridge University Press:  24 March 2017

Alison Lawlor Russell
Affiliation:
Merrimack College, Massachusetts
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Aenlle, Conrad. “U.K. Firm Finds Niche in ‘Discount’ Satellites.” The New York Times, June 19, 2001.
Albanesius, Chloe. “Internet in North Korea Offline after Apparent Attack.” PC Magazine, December 22, 2014.
Alperovitch, Dmitri. “Towards Establishment of Cyberspace Deterrence Strategy.” In 2011 3rd International Conference on Cyber Conflict, edited by Tyugu, E., Czosseck, C., and Wingfield, T., 87–94. Tallinn, Estonia: CCD COE Publication, 2011.
Armstrong, LCDR Benjamin “BJ.”A2/AD, WWATMD?.” U.S. Naval Institute Blog, September 2012, no. 24.Google Scholar
Barr, Alistair and Pasztor, Andy. “Google Invests in Satellites to Spread Internet Access.” The Wall Street Journal, June 1, 2014.
Batson, Mickey and Labert, Matthew. “Expanding the Non-Kinetic Warfare Arsenal.” U.S. Naval Institute Proceedings 138, no. 1 (2012).Google Scholar
Beidleman, Scott W. “Defining and Deterring Cyber War.” US Army War College, 2009.
Berg, Rudolph. “How the ‘Net Works: An Introduction to Peering and Transit.” Ars Technica, http://arstechnica.com/features/2008/09/peering-and-transit/.
Biddle, Sam. “How to Destroy the Internet.” Gizmodo.com, http://gizmodo.com/5912383/how-to-destroy-the-internet.
Blank, Stephen. “Can Information Warfare Be Deterred?Defense Analysis 17, no. 2 (August 2001): 121–138.Google Scholar
Blenford, Adam and Jeavans, Christine. “After Snowden: How Vulnerable Is the Internet?” BBC News, January 27, 2014.
Blum, Andrew. Tubes : A Journey to the Center of the Internet. edn. New York: Ecco, 2012.
Carter, L., Burnett, D., Drew, S., Marle, G., Hagadorn, L., Bartlett-MacNeil, D., and Irvine, N.. Submarine Cables and the Oceans – Connecting the World. In UNEP-WCMC Biodiversity Series ICPC/UNEP/UNEP-WCMC, 2009.
Castells, Manuel. Communication Power. New York: Oxford University Press, 2009.
“Chinese Asat Test.” Center for Space Standards & Innovation, www.centerforspace.com/asat/.
Choucri, Nazli and Clark, David D.. “Integrating Cyberspace and International Relations: The Co-Evolution Dilemma.” In ECIR Workshop on Who Controls Cyberspace?: Explorations in Cyber International Relations. Harvard University and Massachusetts Institute for Technology, 2012. Workshop paper, http://ecir.mit.edu/images/stories/Clark_WORKSHOP.pdf.
Clark, David. Control Point Analysis. Cambridge, MA: Massachusetts Institute of Technology, 2012.
Clark, Stephen. “Iranian Satellite Successfully Placed in Orbit.” Spaceflight Now, Feburary 2, 2015.
Clarke, Richard A. and Knake, Robert K.. Cyber War: The Next Threat to National Security and What to Do about It. edn. New York: Ecco, 2010.
Clausewitz, Carl. On War. Oxford World's Classics. Translated by Howard, Michael and Paret, Peter, Introduction by Heuser, Beatrice. New York: Oxford University Press, 2006.
Cole, Harold T. “Warfare in the Electromagnetic Spectrum and Cyberspace: United States Air Force Cyber/Electromagnetic Warfare Command Construct.” Air War College, Air University, 2014.
Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack. Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack: Critical National Infrastructures. Washington, DC: Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack: For sale by the Supt. of Docs., U.S. G.P.O., 2008.
“Committee on the Peaceful Uses of Outer Space: Membership Evolution.” United Nations Office for Outer Space Affairs, www.unoosa.org/oosa/en/ourwork/copuos/members/evolution.html.
Connell, Michael. “Deterring Iran's Use of Offensive Cyber: A Case Study.” CNA, 2014.
Constantin, Lucian. “Report: Open DNS Resolvers Increasingly Abused to Amplify DDoS Attacks.” PC World, October 25, 2012.
Johnson, David E, Mueller, Karl P, and Taft, William H. Conventional Coercion across the Spectrum of Operations: The Utility of US Military Forces in the Emerging Security Environment. Santa Monica, CA: RAND Corporation, 2003. 9–10.
Cooper, Jeffrey R. New Approaches to Cyber-Deterrence: Initial Thoughts on a New Framework. McLean, VA: SAIC, 2009.
“The Cost of Building and Launching a Satellite.” www.globalcomsatphone.com/hughesnet/satellite/costs.html.
Cowie, Jim. “Border Gateway Protocol: The Good, the Bad and the Ugly of Internet Routing.” Paper presented at the Stanford EE Computer Systems Colloquium February 11, 2015.
Cowie, Jim. “China's 18-Minute Mystery.” Dyn Research, Engineering, Internet, Politics, Security blog, 2010. http://research.dyn.com/2010/11/chinas-18-minute-mystery/.
Crain, John K. “Assessing Resilience in the Global Undersea Cable Infrastructure.” Naval Postgraduate School, 2012.
Crowe, Eyre. “Memorandum on the Present State of British Relations with France and Germany.” London, 1907.
Dogrul, Murat, Aslan, Adil, and Celik, Eyyup. “Developing an International Cooperation on Cyber Defense and Deterrence against Cyber Terrorism.” In 2011 3rd International Conference on Cyber Conflict, edited by Tyugu, E., Czosseck, C., and Wingfield, T.. Tallinn, Estonia: CCD COE Publication, 2011. 29–43.
Dombrowski, Peter and Demchak, Chris C.. “Cyber War, Cybered Conflict, and the Maritime Domain.” Naval War College Review 67, no. 2 (Spring 2014): 71–96.Google Scholar
“Ea-6b Prowler.” U.S. Naval Air Systems Command, www.navair.navy.mil/index.cfm?fuseaction=home.display&key=C8B54023-C006-4699-BD20-9A45FBA02B9A.
The Effects of Nuclear Weapons. edn. Patuxent River, Maryland: United States Department of Defense and the Energy Research and Development Administration, 1977.
“Egypt Arrests as Undersea Internet Cable Cut Off Alexandria.” BBC News, March 27, 2013.
“Electromagnetic Spectrum Maneuver Warfare.” Navy Live, http://navylive.dodlive.mil/2013/10/30/electromagnetic-spectrum-maneuver-warfare.
Finnemore, Martha. “Cultivating International Cyber Norms.” In America's Cyber Future: Security and Prosperity in the Information Age, edited by Lord, Kristen and Sharp, Travis. Washington, DC: Center for a New American Security, 2011. 89–101.
Fisher, Richard D. Jr. “Df-26 Irbm May Have Asm Variant, China Reveals at 3 September Parade.” IHS Jane's Defence Weekly, September 2, 2015.
Flaherty, Mary Pat, Samenow, Jason, and Rein, Lisa. “Chinese Hack U.S. Weather Systems, Satellite Network.” Washington Post, local section, November 12, 2014. www.washingtonpost.com/local/chinese-hack-us-weather-systems-satellite-network/2014/11/12/bef1206a-68e9-11e4-b053-65cea7903f2e_story.html.
“Fm 3–38 Cyber Electromagnetic Activities.” Washington, DC: Headquarters, Department of the Army, February 2014. http://fas.org/irp/doddir/army/fm3-38.pdf.
Forstchen, William R. One Second After. edn. New York: Forge, 2009.
Freedman, Lawrence. The Evolution of Nuclear Strategy. Vol. 3. New York: Palgrave Macmillan, 2003.
Freier, Nathan. “The Emerging Anti-Access/Area-Denial Challenge.” Center for Strategic and International Studies, May 17, 2012.
Geere, Duncan. “How the First Cable Was Laid across the Atlantic.” Wired, January 18, 2011.
George, Alexander L. and Smoke, Richard. Deterrence in American Foreign Policy: Theory and Practice. New York: Columbia University Press, 1974.
Glaser, Charles L. “Deterrence of Cyber Attacks and U.S. National Security.” 8. Cyber Security Policy and Research Institute: The George Washington University, 2011.
Goodman, Will. “Cyber Deterrence: Tougher in Theory Than in Practice?” Strategic Studies Quarterly Fall (2010): 102–135.
Green, Philip. Deadly Logic: The Theory of Nuclear Deterrence. Columbus: Ohio State University Press, 1966.
Greenert, Admiral Jonathan. “Projecting Power, Assuring Access.” The Official Blog of Chief of Naval Operations Admiral Jonathan Greenert (2012). Published electronically May 10, http://cno.navylive.dodlive.mil/2012/05/10/projecting-power-assuring-access/.
Groll, Elias. “White House: The Internet May Be a Strategic Liability to the West.” Foreign Policy, February 11, 2016.
“Hacker Vigilante Group Anonymous Ramps up Fight against Isis Online.” CBS News, November 19, 2015.
Haley, Christopher. “A Theory of Cyber Deterrence.” Georgetown Journal of International Affairs, February 6, 2013. http://journal.georgetown.edu/a-theory-of-cyber-deterrence-christopher-haley/.
Harknett, Richard J. “Information Warfare and Deterrence.” Parameters (Autumn 1996): 93–107.
Hyde, Charles Cheney. International Law, Chiefly as Interpreted and Applied by the United States. rev. edn., 3 vols. Boston, MA: Little, Brown and Company, 1945.
“Icann Factsheet: Root Server Attack on 6 February 2007.” 2007. www.icann.org/en/system/files/files/factsheet-dns-attack-08mar07-en.pdf.
International Space Station Again Dodges Debris.” Orbital Debris Quarterly News, National Aeronautics and Space Administration 15, no. 3 (July 2011): 1.
“Internet Backbone Withstands Major Attack.” MacWorld.com, October 23, 2002.
“Iran Sends New Home-Made Satellite into Orbit.” Fars New Agency, February 2, 2015.
Kahn, Herman. On Thermonuclear War. Princeton, NJ: Princeton University Press, 1960.
Kanet, Roger E. and Kolodziej, Edward A.. The Cold War as Cooperation. Baltimore, MD: Johns Hopkins University Press, 1991.
Kazianis, Harry. “The Real Anti-Access Story: Cyber.” Flashpoints: Diplomacy by Other Means (2013). Published electronically May 15, http://thediplomat.com/flashpoints-blog/2013/05/15/the-real-anti-access-story-cyber/.
Kent, Stephen T.Securing the Border Gateway Protocol.” The Internet Protocol Journal 6, no. 3. 2003.Google Scholar
Krepinevich, Andrew, Watts, Barry, and Work, Robert. Meeting the Anti-Access and Area-Denial Challenge. Washington, DC: Center for Strategic and Budgetary Assessments, 2003.
Kugler, Richard L. “Deterrence of Cyber Attacks.” In Cyberpower and National Security, edited by Starr, Stuart H., Kramer, Franklin D., and Wentz, Larry K.. Washington, DC: National Defense University Press, 2009. 309–342.
Kurose, James F. and Ross, Keith W.. Computer Networking: A Top Down Approach. edn. Boston: Pearson, 2013.
LaGrone, Sam. “Pentagon Drops Air Sea Battle Name, Concept Lives On.” U.S. Naval Institute News, January 20, 2015.
Libicki, Martin C. Defending Cyberspace, and Other Metaphors. Edited by National Defense University. Center for Advanced Concepts and Technology. Washington, DC: National Defense University, 1997.
Mahan, Alfred Thayer. The Influence of Sea Power upon History, 1660–1783. edn. Boston: Little, Brown, and Company, 1894.
Maloof, F. Michael. A Nation Forsaken: Emp, the Escalating Threat of an American Catastrophe. edn. Washington DC: New York: WND Books; Midpoint Trade Books (distributor), 2013.
Mazanec, Brian M. The Evolution of Cyber War: International Norms for Emerging-Technology Weapons. Lincoln: Potomac Books, an imprint of the University of Nebraska Press, 2015.
McDonough, David S. “Tailored Deterrence: The ‘New Triad’ and the Tailoring of Nuclear Superiority.” Canadian International Council, 2009.
Morgan, Patrick. “Applicability of Traditional Deterrence Concepts and Theory to the Cyber Realm.” In Workshop on Deterring Cyber Attack: Informing Strategies and Developing Options for US Policy, 55–76. Irving, CA: National Academies Press, 2010.
Mosbergen, Dominique. “Anonymous Declares War on Isis after Paris Attacks.” Huffington Post, November 17, 2015.
Nair, Brigadier V. K. War in the Gulf: Lessons for the Third World. New Delhi, India: Lancer International, 1992.
“Networks and EMS (NES) Roadmap – Navy EW and Cyber Convergence.” 2011 DoD Spectrum Workshop, December 16, 2011.
Nordrum, Amy. “Hibernia Networks Bets Speed of New Fiber Optic Cable Will Win Customers in Crowded North Atlantic Corridor.” International Business Times, August 12, 2015.
Northcutt, Stephen. “Are Satellites Vulnerable to Hackers?” www.sans.edu/research/security-laboratory/article/satellite-dos.
Nye, Joseph S. “Cyber Power.” Belfer Center for Science and International Affairs, Harvard University, May 2010.
Osinga, Frans P. B. Science, Strategy and War: The Strategic Theory of John Boyd. Strategy and History. London; New York: Routledge, 2007.
Patrikakis, Charalampos, Masikos, Michalis, and Zouraraki, Olga. “Distributed Denial of Service Attacks.” The Internet Protocol Journal 7, no. 4 (December 2004), www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-30/dos-attacks.html.Google Scholar
Payne, Keith B. The Great American Gamble: Deterrence Theory and Practice from The Cold War to the Twenty-First Century. Fairfax, VA: National Institute Press, 2008.
Peterson, Andrea. “How a Us Cyber Attack on North Korea Failed – Because Country Has Practically No Internet.” The Independent, June 2, 2015.
Prince, Matthew. “The Ddos That Almost Broke the Internet.” Cloudflare, March 27, 2013.
“Quadrennial Defense Review Report.” U.S. Department of Defense, Washignton, DC, 2006.
Rattray, Gregory J. Strategic Warfare in Cyberspace. Cambridge, MA: MIT Press, 2001.
Rid, Thomas. Cyber War Will Not Take Place. New York: Oxford University Press, 2013.
“Root Servers.” Internet Assigned Numbers Authority (IANA), www.iana.org/domains/root/servers.
“Root Servers Technical Operations Assn.” www.root-servers.org/.
Russell, Alison Lawlor. “Cyber and Naval Strategy.” In Routledge Handbook of Naval Strategy and Security, edited by Krause, Joachim and Bruns, Sebastian: New York, NY: Routledge, 2015. 189–201.
Russell, Alison Lawlor. Cyber Blockades. Washington, DC: Georgetown University Press, 2014.
Saffo, Paul. “Disrupting Undersea Cables: Cyberspace's Hidden Vulnerability.” International Relations and Security Network (ISN), www.isn.ethz.ch/Digital-Library/Articles/Detail/?id=162869.
Schelling, Thomas C. Arms and Influence. New Haven, CT: Yale University Press, 1966.
Schelling, Thomas C. The Strategy of Conflict. Cambridge, MA: Harvard University Press, 1960.
Schmitt, Michael, ed. The Tallinn Manual on the International Law Applicable to Cyber Warfare. New York, NY: Cambridge University Press, 2013.
Schwartz, Norton A. and Greenert, Jonathan W.. “Air-Sea Battle.” The American Interest February 20, 2012.
Sechrist, Michael. “New Threats, Old Technology: Vulnerabilities in Undersea Communications Cable Network Management Systems.” Belfer Discussion Paper, No. 2012-03, Harvard Kennedy School, February 2012.
Secretary, Office of the Press. “Factsheet: Cybersecurity National Action Plan.” news release, February 9, 2016, www.whitehouse.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan.
Singer, P. W. Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford; New York: Oxford University Press, 2014.
Smith, Bradley R. and Garcia-Luna-Aceves, J. J.. “Securing the Border Gateway Routing Protocol.” In Global Telecommunications Conference, 1996. GLOBECOM ‘96. ‘Communications: The Key to Global Prosperity, Edited by Jacobsen, Ole J.. 81–85. London: Institute for Electrical and Electronics Engineers, 1996.
Snyder, Glynn Herald. Deterrence and Defense. Princeton, NJ: Princeton University Press, 1961.
Sontag, Sherry, Drew, Christopher, and Drew, Annette Lawrence. Blind Man's Bluff : The Untold Story of American Submarine Espionage. New York: Public Affairs, 1998.
“Submarine Cable Map.” TeleGeography, www.submarinecablemap.com/.
Tangredi, Sam J. Anti-Access Warfare: Countering A2/AD Strategies. Annapolis, MD: Naval Institute Press, 2013. www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf.
Toonk, Andree. “Bgp Routing Incidents in 2014, Malicious or Not?” BGPMON, February 17, 2015.
“Treaty Banning Nuclear Weapon Tests in the Atmosphere, in Outer Space and under Water.” U.S. Department of State, www.state.gov/t/isn/4797.htm.
U.S. Department of Defense. “Joint Publication 3–13.1 Electronic Warfare.” edited by U.S. Department of Defense, January 25, 2007. www.usna.edu/Training/_files/documents/References/2C%20MQS%20References/Joint%20Publication%203-13-1%20Electronic%20Warfare.pdf.
U.S. Department of Defense. “Department of Defense Dictionary of Military and Associated Terms.” Washington, DC: U.S. Department of Defense 2015. www.dtic.mil/doctrine/dod_dictionary/.
U.S. Department of Defense. “Joint Publication (JP) 3–12, Cyberspace Operations.” Washington, DC: U.S. Department of Defense 2013. www.dtic.mil/doctrine/new_pubs/jp3_12R.pdf.
U.S. Department of Defense. “Sustaining U.S. Global Leadership: Priorities for 21st Century Defense.” Washington, DC: U.S. Department of Defense 2012. http://archive.defense.gov/news/Defense_Strategic_Guidance.pdf.
U.S. Department of Defense. “Joint Operational Access Concept.” 2012.
U.S. Department of Homeland Security. “Characteristics and Common Vulnerabilities Infrastructure Category: Cable Landing Stations.” Draft – Version 1, January 15, 2004.
Valeriano, Brandon and Maness, Ryan C.. Cyber War Versus Cyber Realities: Cyber Conflict in the International System. Oxford; New York: Oxford University Press, 2015.
Vixie, Paul, Sneeringer, Gerry, and Schliefer, Mark. “Events of 21-Oct-2002.” November 24, 2002.
“What Are Root Name Servers?” Netnod, www.netnod.se/what-are-root-name-servers.
“What Is a Ddos Attack?” Digital Attack Map, www.digitalattackmap.com/understanding-ddos/.
The White House. “International Strategy for Cyberspace.” Washington, DC, May 2011. www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf.
Lynn, William J.. “Deputy Secretary of Defense Speech: Remarks on the Department of Defense Cyber Strategy.” News Release, July 14, 2011, http://archive.defense.gov/speeches/speech.aspx?speechid=1593.
Work, Robert O. The Challenge of Maritime Transformation: Is Bigger Better? Washington, DC: Center for Strategic and Budgetary Assessments, 2002.
Wrenn, Christopher. “Strategic Cyber Deterrence.” Tufts University, 2012.
Zetter, Kim. “Revealed: The Internet's Biggest Security Hole.” Wired, August 26, 2008.
Zetter, Kim. “Someone's Been Siphoning Data through a Huge Security Hole in the Internet.” Wired, December 5, 2013.
Zmijewski, Earl. “A Baker's Dozen, 2014 Edition.” Dyn Research, 2015.

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Bibliography
  • Alison Lawlor Russell, Merrimack College, Massachusetts
  • Book: Strategic A2/AD in Cyberspace
  • Online publication: 24 March 2017
  • Chapter DOI: https://doi.org/10.1017/9781316817001.007
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Bibliography
  • Alison Lawlor Russell, Merrimack College, Massachusetts
  • Book: Strategic A2/AD in Cyberspace
  • Online publication: 24 March 2017
  • Chapter DOI: https://doi.org/10.1017/9781316817001.007
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Bibliography
  • Alison Lawlor Russell, Merrimack College, Massachusetts
  • Book: Strategic A2/AD in Cyberspace
  • Online publication: 24 March 2017
  • Chapter DOI: https://doi.org/10.1017/9781316817001.007
Available formats
×