Have a personal or library account? Click to login
Cyber-Attacks and Freedom of Expression: Coercion, Intimidation and Virtual Occupation Cover

Cyber-Attacks and Freedom of Expression: Coercion, Intimidation and Virtual Occupation

By: Joe Burton  
Open Access
|Dec 2019

References

  1. Aquila, J. & Ronfeldt, D. (1993), ‘Cyberwar is coming!’ RAND Corporation. Retrieved from https://www.rand.org/pubs/reprints/RP223.html [accessed 6 Oct 2019]
  2. Bárd, P.; Uszkiewicz, E.; Alemanno, A.; Bayer, J.; Szakács, J. & Bitiukova, N. (2019), ‘Disinformation and propaganda Impact on the functioning of the rule of law in the EU and its Member States.’ Retrieved from http://www.europarl.europa.eu/thinktank/en/document.html?reference=IPOL_STU(2019)608864 [accessed 12 May 2019]
  3. Borghard, E. D. & Lonergan, S. W. (2017), ‘The logic of coercion in cyberspace,’ Security Studies, vol. 26, no. 3, pp. 452–481. https://doi.org/10.1080/09636412.2017.130639610.1080/09636412.2017.1306396
  4. Buchanan, B. (2014), ‘Cyber deterrence isn’t MAD; it’s mosaic,’ International Engagement on Cyber IV: Post-Snowden Cyberspace, Georgetown Journal of International Affairs, pp. 130–140.
  5. Cook, S. (2013), ‘Congressional-executive commission on China roundtable China’s treatment of foreign journalists,’ Freedom House. Retrieved from https://freedomhouse.org/article/china-treatment-foreign-journalists [accessed 12 May 2019]
  6. Derfner, A. & Hebert, J. G. (2016), ‘Voting is speech,’ Yale Law and Policy Review, vol. 34, no. 2, p. 471.
  7. Geers, K., ed. (2015), Cyber War in Perspective: Russian Aggression against Ukraine, Tallinn: NATO CCD COE Publications.
  8. Giles, K. (2015), ‘Russia and its neighbours: old attitudes, new capabilities,’ in K. Giles & K. Geers (eds.) Cyber War in Perspective: Russian Aggression against Ukraine, Tallinn: NATO CCD COE Publications, pp. 19–28.
  9. Giles, K. (2016), Russia’s ‘New’ Tools for Confronting the West: Continuity and Innovation in Moscow’s Exercise of Power, Chatham House Research Paper. Retrieved from https://www.chathamhouse.org/sites/default/files/publications/2016-03-russia-new-tools-giles.pdf [accessed 12 May 2019]
  10. Giles, K. & Hagestad, W. (2013), ‘Divided by a common language: Cyber definitions in Chinese, Russian and English, 5th International Conference on Cyber Conflict (CYCON 2013), pp. 1 17.
  11. Gomez, M. & Villar, E. (2018), ‘Fear, uncertainty, and dread: cognitive heuristics and cyber threats,’ Politics and Governance, vol. 6, no. 2, pp. 61–72. https://doi.org/10.17645/pag.v6i2.127910.17645/pag.v6i2.1279
  12. Greenberg, A. (2018), ‘The untold story of NotPetya, the most devastating cyberattack,’ Wired. Retrieved from https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ [accessed 12 May 2019]
  13. Hodgson, Q. (2018), ‘Understanding and countering cyber coercion’ in T. Minárik, R. Jakschis & L. Lindström (eds.) 10th International Conference on Cyber Conflict CyCon X: Maximising Effects, Tallinn: NATO CCD COE Publications, pp. 73–88. https://doi.org/10.23919/CYCON.2018.840501110.23919/CYCON.2018.8405011
  14. Human Rights First (2108), ‘Fake news, free speech, and foreign influence: the smart way the United States can combat disinformation.’ Retrieved from https://www.humanrightsfirst.org/sites/default/files/Disinformation-Brief-March-2018.pdf [accessed 12 May 2019]
  15. Jasper, S. (2017), Strategic Cyber Deterrence: The Active Cyber Defense Option, Lanham, ML: Rowman & Littlefield.
  16. Jensen, B.; Valeriano, B. & Maness, R. (2018), Cyber Strategy: The Evolving Character of Power and Coercion, Oxford: Oxford University Press. https://doi.org/10.1093/oso/9780190618094.001.000110.1093/oso/9780190618094.001.0001
  17. Johnson, D. R. & Post, D. G. (1996), ‘Law and borders – the rise of law in cyberspace,’ Stanford Law Review, vol. 48, no. 5, pp. 1367–1402. https://doi.org/10.2307/122939010.2307/1229390
  18. Kogan, R. (2015), ‘Bedep trojan malware spread by the Angler exploit kit gets political,’ Trustwave. Retrieved from https://www.trustwave.com/Resources/SpiderLabs-Blog/Bedep-trojan-malware-spread-by-the-Angler-exploit-kit-gets-political/ [accessed 12 May 2019]
  19. Kostyuk, N. & Zhukov, Y. (2019), ‘Invisible digital front: can cyber attacks shape battlefield events?’ Journal of Conflict Resolution, vol. 63, no. 2, pp. 317–347. https://doi.org/10.1177/002200271773713810.1177/0022002717737138
  20. Koval, N. (2015), ‘Revolution hacking,’ in K. Geers (ed.) Cyber War in Perspective: Russian Aggression against Ukraine, Tallinn: NATO CCD COE Publications, pp. 55–58.
  21. Libicki, M. C. (2018), ‘Drawing inferences from cyber espionage,’ in T. Minárik, R. Jakschis & L. Lindström (eds.) 10th International Conference on Cyber Conflict CyCon X: Maximising Effects, Tallinn: NATO CCD COE Publications, pp. 109–122. https://doi.org/10.23919/CYCON.2018.840501310.23919/CYCON.2018.8405013
  22. Neuman, C. & Poznansky, M. (2016), ‘Swaggering in cyberspace: busting the conventional wisdom on cyber coercion,’ War on the Rocks, 28 June. Retrieved from https://warontherocks.com/2016/06/swaggering-in-cyberspace-busting-the-conventional-wisdom-on-cyber-coercion/ [accessed 12 May 2019].
  23. Past, L. (2015), ‘Missing in action: rhetoric on cyber warfare,’ in K. Geers (ed.) Cyber War in Perspective: Russian Aggression against Ukraine, Tallinn: NATO CCD COE Publications, pp. 95–102.
  24. Piiparinen, A. (2016), ‘China’s secret weapon in the South China Sea: cyber attacks,’ The Diplomat, 22 July. Retrieved from https://thediplomat.com/2016/07/chinas-secret-weapon-in-the-south-china-sea-cyber-attacks/ [accessed 12 May 2019]
  25. Rid, T. & Buchanan, B. (2018), ‘Hacking democracy,’ The SAIS Review of International Affairs, vol. 38, no. 1, pp. 3–16. https://doi.org/10.1353/sais.2018.000110.1353/sais.2018.0001
  26. Schelling, T. C. (1960), The Strategy of Conflict, Cambridge, MA: Harvard University Press.
  27. Schelling, T. C. (2008), Arms and Influence, New Haven, CT: Yale University Press.
  28. Schmitt, M. N. (2018), ‘Virtual disenfranchisement: cyber election meddling in the grey zones of international law,’ Chicago Journal of International Law, vol. 19, no. 1, pp. 8–16.
  29. Universal Declaration of Human Rights (1948), United Nations General Assembly, New York. Retrieved from https://www.un.org/en/universal-declaration-human-rights/ [accessed 12 May 2019]
  30. Weedon, J. (2015), ‘Beyond ‘cyber war’: Russia’s use of strategic cyber espionage and information operations in Ukraine,’ in K. Geers (ed.) Cyber War in Perspective: Russian Aggression against Ukraine, Tallinn: NATO CCD COE Publications, pp. 67–78.
  31. Wilton, C. (2017), ‘Sony, cyber security, and free speech: preserving the First Amendment in the modern world,’ Pace Intellectual Property, Sports & Entertainment Law Forum, vol. 7, no. 1.10.58948/2329-9894.1058
  32. Zetter, K. (2016), ‘Inside the cunning, unprecedented hack of Ukraine’s power grid,’ Wired, 3 March. Retrieved from https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/ [accessed 12 May 2019]
DOI: https://doi.org/10.1515/bjes-2019-0025 | Journal eISSN: 2674-4619 | Journal ISSN: 2674-4600
Language: English
Page range: 116 - 133
Published on: Dec 21, 2019
Published by: Tallinn University of Technology
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2019 Joe Burton, published by Tallinn University of Technology
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.