Have a personal or library account? Click to login
The New Cold War: Cyber Frontline Cover
Open Access
|Dec 2022

References

  1. ‘“The Veto” UN Security Council Working Methods. (2020). The Security Council Report. Available at <https://www.securitycouncilreport.org/un-security-council-working-methods/the-veto.php>.
  2. ‘“Als Zielobjekt markiert” Der Enthüller Edward Snowden über die geheime Macht der NSA’ (2013). Der Spiegel [online]. Available at <https://cryptome.org/2013/07/snowden-spiegel-13–0707.pdf>[Accessed August 20, 2022].
  3. ‘Address by the President of the Russian Federation’. (2022). Retrieved from <http://en.kremlin.ru/events/president/transcripts/67828>.
  4. ‘Cyber Defence’. (2020). North Atlantic Treaty Organization. Available at <https://www.nato.int/cps/en/natohq/topics_78170.htm>.
  5. ‘Hong Kong: US passes sanctions as nations condemn new law’. (2020). BBC News [online]. Available at <https://www.bbc.com/news/world-asia-china-53259656.> [Accessed May 10, 2021].
  6. ‘Interim National Security Strategic Guidance’. (2021). The White House. Available at <https://www.whitehouse.gov/briefing-room/statements-releases/2021/03/03/interim-national-security-strategic-guidance/>.
  7. ‘José Manuel Durão Barroso President of the European Commission The European Union and multilateral global governance Conference at the European University Institute Florence 18 June 2010.’ (2010). European Commission. Available at <https://ec.europa.eu/commission/presscorner/detail/en/SPEECH_10_322>.
  8. ‘Lavrov skazal, chto zheleznyy zanaves mezhdu RF i Zapadom uzhe opuskayetsy.’(2022). InterFax.ru. Available at < https://www.interfax.ru/russia/849755>.
  9. ‘National Cyber Strategy of the United States of America.’ (2018). The White House. Available at <https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf>.
  10. ‘National Cyber Strategy of the United States of America’. (2018). The White House. Available at <https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf>.
  11. ‘Security Council — Veto List (in reverse chronological order).’ UN Documents, Dag Hammarskjöld Library. Available at <https://research.un.org/en/docs/sc/quick>.
  12. ‘US charges ‘China government hackers’.’ (2018). BBC News. Available at <https://www.bbc.com/news/world-us-canada-46638323>.
  13. ‘What is a distributed denial of service attack (DDoS) and what can you do about them?’ (2020). Emerging Threats, Security Center. Available at <https://us.norton.com/inter-netsecurity-emerging-threats-what-is-a-ddos-attack-30sectech-by-norton.html>.
  14. Agnew J. (2001). ‘The New Global Economy: Time-Space Compression, Geopolitics, and Global Uneven Development’. Journal of World-Systems Research VII. 2, 133.10.5195/jwsr.2001.167
  15. Ahang Y. (2019). ‘Huawei and “Made in China 2025” Challenging the US Tech Supremacy.’ Trade Finance Global. Available at: <https://www.tradefinanceglobal.com/posts/huawei-5g-flagship-challenging-us-supremacy/>.
  16. Allison G., Schmidt E. (2022) ‘China’s 5G Soars Over America’s’ Wall Street Journal [online]. Available at <https://www.wsj.com/articles/chinas-5g-america-streaming-speed-midband-investment-innovation-competition-act-semiconductor-biotech-ai11645046867?st=hmjpsnr5e7nmxni&reflink=article_copyURL_share>.
  17. Altynbayev K. (2020). ‘Putin’s invented territorial claims on post-Soviet states draw ire of Kazakhs’. Caravanserai [online]. Available at <https://central.asia-news.com/en_GB/articles/cnmi_ca/features/2020/06/29/feature-01.> [Accesssed on May 8, 2021].
  18. Alvarez J. (2015). ‘Stuxnet: The world’s first cyber weapon.’ Center for International Security and Cooperation. Available at <https://cisac.fsi.stanford.edu/news/stuxnet>.
  19. Bar-Siman-Tov Y. (1984) ‘The Strategy of War by Proxy’. Cooperation and Conflict 19, no. 4, 263–73. https://doi.org/10.1177/001083678401900405
  20. Boylan B. M., McBeath J., Wang B. ‘US–China Relations: Nationalism, the Trade War, and COVID-19’. Fudan Journal of the Humanities and Social Sciences 14, 23–40. Buchanan B. (2020). The Hacker and the State Cyber Attacks and the New Normal of Geopolitics. Harvard University Press.10.1007/s40647-020-00302-6
  21. Chen A. (2015). ‘The Agency’. New York Times [online]. Available at <https://www.ny-times.com/2015/06/07/magazine/the-agency.html>.
  22. Contemporary Russian Military Strategy.’ Finnish Defence Studies 22.
  23. Cormac R., Aldrich R. J. (2018). ‘Grey is the new black: covert action and implausible deniability’. International Affairs. vol. 94:3, 490.10.1093/ia/iiy067
  24. Davidson J. S. (2001). ‘East versus West: Human Rights and Cultural Difference.’ Canter Law Review 37.
  25. Davis D. L. (2016) ‘What the ‘World Police’ Analogy Gets Wrong’. The National Interest [online]. Available at <https://nationalinterest.org/blog/the-skeptics/what-the-world-police-analogy-gets-wrong-17903>.
  26. Deutsch K. W., Singer D. J. (1964). ‘Multipolar Power Systems and International Stability’. World Politics 16, no. 3, 390–406.10.2307/2009578
  27. Elliott L. (2021). ‘Xi Jinping warns of ‘new cold war’ if US keeps up protectionism’ The Guardian [online], Available at <https://www.theguardian.com/world/2021/jan/25/china-xi-jinping-warns-of-new-cold-war-us-protectionist-policies.> [Accessed January 5, 2021].
  28. Featherly K. (2021). ‘ARPANET’. Encyclopedia Britannica. Available at <https://www.britannica.com/topic/ARPANET>.
  29. Freeden M. (2003). ‘Editorial: ideological boundaries and ideological systems.’ Journal of Political Ideologies. 8.1, 6.10.1080/13569310306081
  30. Fukuyama F. (1989). ‘The End of History?’ The National Interest. no. 16, 3–18. Available at <http://www.jstor.org/stable/24027184>.
  31. Fukuyama F. (1989). ‘The End of History?’ The National Interest. no. 16, 3–18. http://www.jstor.org/stable/24027184.
  32. Gaddis J. L. (2005). The Cold War: A New History. New York: Penguin Books.
  33. Greenberg A. (2022). ‘Russia’s Sandworm Hackers Attempted a Third Blackout in Ukraine.’ Wired. Available at <https://www.wired.com/story/sandworm-russia-ukraine-blackout-gru/>.
  34. Griffiths J. (2019). ‘When Chinese hackers declared war on the rest of us.’ MIT Technology Review. Available at <https://www.technologyreview.com/2019/01/10/103560/when-chinese-hackers-declared-war-on-the-rest-of-us/>.
  35. Guyatt N. (2013). The End of the Cold War. In: R. H. Immerman, P. Goedde. The Oxford Handbook of the Cold War. Oxford: OUP.10.1093/oxfordhb/9780199236961.013.0034
  36. Hatch B. B. (2018) “Defining a Class of Cyber Weapons as WMD: An Examination of the Merits,” Journal of Strategic Security 11 no. 1, 48.10.5038/1944-0472.11.1.1657
  37. Heywood A. (2017). Political Ideologies: What They Are and Why They Matter. In Political Ideologies: An Introduction. Macmillian Education.10.1057/978-1-137-60604-4
  38. Hoffman F. G. (2007). ‘Conflict in the 21st century: the rise of hybrid Wars’. Potomac Institute for Policy Studies, 8.
  39. Insikt Group. (2020). ‘Swallowing the Snake’s Tail: Tracking Turla Infrastructure.’ Recorded Future [online]. Available at <https://www.recordedfuture.com/turla-apt-infrastructure/>.
  40. Kaplan R. D. (2019). A New Cold War Has Begun. Foreign Policy [online]. Available at <https://foreignpolicy.com/2019/01/07/a-new-cold-war-has-begun/>.10.31579/2690-1919/146
  41. Khalip A. (2018). ‘U. N. chief urges global rules for cyber warfare’. Reuters [online]. Available at <https://www.reuters.com/article/us-un-guterres-cyber-idUSKCN1G31Q4>.
  42. Klimburg A. (2018). The Darkening Web: The War for Cyberspace. New York: Penguin Books, 332.
  43. Kowalewski A. (2017). ‘Disinformation and Reflexive Control: The New Cold War’ Georgetown Security Studies Review. Available at <https://georgetownsecuritystudiesreview.org/2017/02/01/disinformation-and-reflexive-control-the-new-cold-war/>.
  44. Krauthammer Ch. (2017). ‘The Unipolar Moment’. Foreign Affairs [online]. Available at <https://www.foreignaffairs.com/articles/1990–01–01/unipolar-moment> [Accessed on 10 May 2021].
  45. Lord N. (2018). ‘What is an Advanced Persistent Threat? APT Definition.’ Digital Guardian. Available at <https://digitalguardian.com/blog/what-advanced-persistent-threat-apt-definition>.
  46. Machnikowski R. M. (2020). Hezbollah as an Iranian proxy in the Age of the Cold War. In: Hänni A., Riegler T. and Gasztold P. eds. Terrorism in the Cold War State Support in the West, Middle East and Latin America.10.5040/9780755600304.0010
  47. Maurer T. (2017). Cyber Mercenaries: The State, Hackers, and Power. Cambridge: Cambridge University Press, 123.10.1017/9781316422724
  48. Maurer T. (2018).’ Why the Russian Government Turns a Blind Eye to Cybercriminals’. Carnegie Endowment for International Peace [online]. Available at < https://carneg-ieendowment.org/2018/02/02/why-russian-government-turns-blind-eye-to-cybercriminals-pub-75499> [Accessed on 20 August 2022].
  49. Morgenthau H. J. (1978). Politics Among Nations: The Struggle for Power and Peace. Fifth Edition, Revised. New York: Alfred A. Knopf.
  50. Osgood K. A. (2000) ‘Form before Substance: Eisenhower’s Commitment to Psychological Warfare and Negotiations with the Enemy.’ Diplomatic History 24. no. 3, 405–33.10.1111/0145-2096.00225
  51. Padover S. K. (1951). ‘Psychological Warfare and Foreign Policy.’ The American Scholar. vol. 20. no. 2, 151–161.
  52. Pattara P. R. (2021). ‘Cyber Mutually Assured Destruction & Counterproliferation for the 21st Century: ‘How I stopped worrying and learned to love the software exploit.’’ Liberty University Journal of Statesmanship & Public Policy 1. no. 2. Available at <https://digitalcommons.liberty.edu/cgi/viewcontent.cgi?article=1052&context=jspp>.
  53. Rauta V. (2019). ‘Towards a typology of non-state actors in ‘hybrid warfare’: proxy, auxiliary, surrogate and affiliated forces’. Cambridge Review of International Affairs. DOI: 10.1080/09557571.2019.1656600.10.1080/09557571.2019.1656600
  54. Rid T. (2020). Active Measures: The Secret History of Disinformation and Political Warfare. London: Profile Books.
  55. Schmitt M. N., Vihul L. (2014). ‘Proxy Wars in Cyberspace: The Evolving International Law of Attribution’. Fletcher Security Review. vol. 1, 2.
  56. Segev H., Doron E., Orion A. (2019). ‘My Way or the Huawei? The United States-China Race for 5G Dominance’. Institute for National Security Studies.
  57. Steger M. B. (2005). ‘Ideologies of globalization.’ Journal of Political Ideologies 10.10.1080/1356931052000310263
  58. Thomas T. L. (2004). ‘Russia’s Reflexive Control Theory and the Military’. Journal of Slavic Military Studies. vol. 17, 237.10.1080/13518040490450529
  59. Tsygankov A. P. (2018) ‘The sources of Russia’s fear of NATO’. Communist and Post-Communist Studies 51, 2. Weitz R. (2016). ‘Russia Wants to Remake Globalization in Its Own Image’. Yale Global Online [online]. Available at <https://yaleglobal.yale.edu/content/russia-wants-remake-globalization-its-own-image>. [Accessed on May 8, 2021].10.1016/j.postcomstud.2018.03.002
  60. Vasara A. (2020). ‘Theory of Reflexive Control Origins, Evolution and Application in the Framework of Contemporary Russian Military Strategy’. Finnish Defence Studies 22.
  61. Waltz K. (1964). ‘The Stability of a Bipolar World’. Population, Prediction, Conflict, Existentialism, Vol. 93, No. 3, 884.
  62. Weitz R. (2016). ‘Russia Wants to Remake Globalization in Its Own Image.’ Yale Global Online [online]. Available at <https://yaleglobal.yale.edu/content/russia-wants-re-make-globalization-its-own-image>.
  63. Wohlforth W. C. (1999). ‘The Stability of a Unipolar World’. International Security 24. no. 1.10.1162/016228899560031
  64. Yeisley M. O. (2011). ‘Bipolarity, Proxy Wars, and the Rise of China.’ Strategic Studies Quarterly 5. no. 4., 75–91.
Language: English
Page range: 14 - 31
Published on: Dec 30, 2022
Published by: University of Wroclaw, Faculty of Law, Administration and Economics
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2022 Bogdana Sybikowska, published by University of Wroclaw, Faculty of Law, Administration and Economics
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.