Subversion: from covert operations to cyber conflict
"In 2014, Russia launched a "Hybrid War" against Ukraine that, according to some, ushered in a revolution in conflict. The term is notoriously vague, referring to all measures short of war states use to attain strategic aims. States, of course, have long used measures in the "gra...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York, NY
Oxford University Press
[2024]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Literaturverzeichnis Register // Gemischte Register Inhaltsverzeichnis Literaturverzeichnis Register // Gemischte Register |
Zusammenfassung: | "In 2014, Russia launched a "Hybrid War" against Ukraine that, according to some, ushered in a revolution in conflict. The term is notoriously vague, referring to all measures short of war states use to attain strategic aims. States, of course, have long used measures in the "gray zone" between war and peace. Yet they did not always have the Internet."-- |
Beschreibung: | x, 338 Seiten Illustrationen 23,5 cm |
ISBN: | 9780197745861 9780197745854 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049699341 | ||
003 | DE-604 | ||
005 | 20240828 | ||
007 | t | ||
008 | 240528s2024 a||| b||| 00||| eng d | ||
020 | |a 9780197745861 |c paperback |9 978-0-19-774586-1 | ||
020 | |a 9780197745854 |c hardback |9 978-0-19-774585-4 | ||
035 | |a (OCoLC)1446252475 | ||
035 | |a (DE-599)BVBBV049699341 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 | ||
084 | |a OST |q DE-12 |2 fid | ||
100 | 1 | |a Maschmeyer, Lennart |e Verfasser |0 (DE-588)1228343632 |4 aut | |
245 | 1 | 0 | |a Subversion |b from covert operations to cyber conflict |c Lennart Maschmeyer |
246 | 1 | 3 | |a From covert operations to cyber conflict |
246 | 1 | 0 | |a From covert operations to cyber conflict |
264 | 1 | |a New York, NY |b Oxford University Press |c [2024] | |
300 | |a x, 338 Seiten |b Illustrationen |c 23,5 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
505 | 8 | |a Subversion and Power -- Information Technology and Subversion -- Traditional Subversion : Crushing the Prague Spring 1968-1973 -- Cyber-Enabled Subversion : Russia's 'Hybrid War' against Ukraine 2013-2018 -- Subversion in War : Russia's full-scale Invasion of Ukraine since February 2022 -- New possibilities and new perils | |
520 | 3 | |a "In 2014, Russia launched a "Hybrid War" against Ukraine that, according to some, ushered in a revolution in conflict. The term is notoriously vague, referring to all measures short of war states use to attain strategic aims. States, of course, have long used measures in the "gray zone" between war and peace. Yet they did not always have the Internet."-- | |
648 | 7 | |a Geschichte 1968- |2 gnd |9 rswk-swf | |
650 | 0 | 7 | |a Hybridkrieg |0 (DE-588)107366371X |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Subversion |0 (DE-588)4213485-7 |2 gnd |9 rswk-swf |
651 | 7 | |a Russland |0 (DE-588)4076899-5 |2 gnd |9 rswk-swf | |
651 | 7 | |a Sowjetunion |0 (DE-588)4077548-3 |2 gnd |9 rswk-swf | |
653 | 0 | |a Hybrid warfare / Russia (Federation) | |
653 | 0 | |a Cyberspace operations (Military science) / Russia (Federation) | |
653 | 0 | |a Subversive activities / Russia (Federation) | |
653 | 0 | |a Disinformation / Russia (Federation) | |
653 | 0 | |a Psychological warfare / Russia (Federation) | |
653 | 2 | |a Russia (Federation) / Foreign relations / Ukraine | |
653 | 2 | |a Ukraine / Foreign relations / Russia (Federation) | |
653 | 0 | |a Guerre hybride / Russie | |
653 | 0 | |a Cyberguerre (Science militaire) / Russie | |
653 | 0 | |a Activités subversives / Russie | |
653 | 0 | |a Désinformation / Russie | |
653 | 0 | |a Guerre psychologique / Russie | |
653 | 2 | |a Ukraine / Relations extérieures / Russie | |
689 | 0 | 0 | |a Sowjetunion |0 (DE-588)4077548-3 |D g |
689 | 0 | 1 | |a Russland |0 (DE-588)4076899-5 |D g |
689 | 0 | 2 | |a Subversion |0 (DE-588)4213485-7 |D s |
689 | 0 | 3 | |a Hybridkrieg |0 (DE-588)107366371X |D s |
689 | 0 | 4 | |a Geschichte 1968- |A z |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Online version |a Maschmeyer, Lennart, 1984- |t Subversion |d New York, NY : Oxford University Press, [2024] |z 9780197745885 |
856 | 4 | 2 | |m Digitalisierung BSB München - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung BSB München - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Literaturverzeichnis |
856 | 4 | 2 | |m Digitalisierung BSB München - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000005&line_number=0003&func_code=DB_RECORDS&service_type=MEDIA |3 Register // Gemischte Register |
856 | 4 | 2 | |m Digitalisierung BSB München - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000007&line_number=0004&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung BSB München - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000009&line_number=0005&func_code=DB_RECORDS&service_type=MEDIA |3 Literaturverzeichnis |
856 | 4 | 2 | |m Digitalisierung BSB München - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000011&line_number=0006&func_code=DB_RECORDS&service_type=MEDIA |3 Register // Gemischte Register |
940 | 1 | |n oe | |
940 | 1 | |q BSB_NED_20240828 | |
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 090513 |g 471 |
942 | 1 | 1 | |c 909 |e 22/bsb |f 090513 |g 477 |
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 09046 |g 947.08 |
942 | 1 | 1 | |c 909 |e 22/bsb |f 090512 |g 477 |
942 | 1 | 1 | |c 909 |e 22/bsb |f 09046 |g 437 |
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 090512 |g 471 |
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 09047 |g 947.08 |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035041778 |
Datensatz im Suchindex
_version_ | 1815416422229082112 |
---|---|
adam_text |
Contents List ofFigures Preface vii ix Introduction 1 1. Subversion and Power 17 2. Information Technology and Subversion 42 3. Traditional Subversion: Crushing the Prague Spring, 1968-1973 60 4. Cyber-Enabled Subversion: Russia’s “Hybrid War” against Ukraine, 2013-2022 117 5. Subversion in War: Russia’s full-scale Invasion of Ukraine since February 2022 174 Conclusion: New Possibilities and New Perils Notes Bibliography Index 207 229 291 329
Bibliography “2 Ukrainian Border Guards Killed in Mine Explosion; Military Prosecutor Finds ‘No ■ Saboteurs’ at Ammo Depot.” The Interpreter, September 2017. http://www.interpreter mag.com/day-1319/. 5.ua. “Масова Хакерська Атака: Шд Удар Потрапив Навггь Кабиш—5 Канал.” June 2017.
https://www.5.ua/suspilstvo/masova-khakerska-ataka-pid-udar-potrapyv-kab min-metropoliten-nyzka-bankiv-ta-pidpryiemstv-148971.html. 24tv.ua. “Пщсумки 2017 Року: Найгучннш Вбивства в УкрашЕ” 24 Канал. Accessed Мау 13,2019. https://24tv.ua/news/showNews.doJpidsumki_2017_roku_v_ukrayini_ vbivstva_2017
objectld=895499. 112.ua. “СБУ Предупредила Хакерскую Атаку Российских Спецслужб На Энергообъекты Украины—112 Украина.” 112.Ua, December 2015. https://112.ua/ kriminal/sbu-predupredila-hakerskuyu-ataku-rossiyskih-specsluzhb-na-energoobe kty-ukrainy-281811 .html. Ablon, Lillian, and Andy Bogart. “Zero
Days, Thousands of Nights.” Rand, 2017. https:// www.rand.org/pubs/research_reports/RRl 751 .html. Adams, Lawrence. "AES-NI Ransomware Dev Releases Decryption Keys amid Fears of Being Framed for XData Outbreak.” Bleeping Computer, May 2017. https.7/www.bleep ingcomputer.com/news/security/aes-ni-
ransomware-dev-releases-decryption-keysamid-fears-of-being-framed-for-xdata-outbreak/. AIVD and MIVD. “De Russische Aanval Op Oekraïne: Een Keerpunt in de Geschiedenis.” February 2023. https://www.defensie.nl/binaries/defensie/documenten/publicaties/ 2023/02/20/publicatie-aivd-en-
mivd-24-2/Brochure_24-2+De+Russiche+aanval+ op-i-Oekraine_TG_web.pdf. Alexander, Keith. “Cyber Warfare in Ukraine Poses a Threat to the
Global System.” Financial Times, February 2022. https://www.ft.com/content/8ele8176-2279-45969c0f-98629b4db5a6. Allen, Cassandra. “Mapping Media Freedom: Ukrainian Journalists Subjected to Malicious Cyber-Attacks.” Index on Censorship (blog), July 2017. https://www.indexo ncensorship.org/2017/07/journalists-ukraine-cyber-attacks/. Àlperovitch, Dmitri. “Perhaps the Most Strategically Impactful Cyber Operation in Wartime History.” Twitter, @DAlperovitch. August 2022. https://twitter.com/DAlpe rovitch/status/1562560980105584640. Amos, Howard. “Ukraine: Sevastopol Installs Pro-Russian Mayor as Separatism Fears Grow.” The Guardian, February 25, 2014, sec. World News. https://www.theguardian. com/world/2014/feb/25/ukraine-sevastopol-installs-pro-russian-mayor. Anderson, James P. “Computer Security Technology Planning Study (Volume II)” October 1972. https://csrc.nist.rip/publications/history/ande72.pdf. Anderson, R. “Why Information Security Is Hard-An Economic Perspective.” In Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC Ό1), 358. Washington, DC: IEEE Computer Society, 2001. http://dl.acm.org/citation . cfm?id=872016.872155.
292 BIBLIOGRAPHY Andrew, Christopher Μ. The Mitrokhin Archive: The KGB in Europe and the West. . London: Allen Lane, 2000. Andrew, Christopher Μ., and Oleg Gordlevsky. KGB: The inside Story of Its Foreign Operationsfrom Lenin to Gorbachev. New York: Harper Collins Publishers, 1990. Andrew, Christopher Μ., and Vasili Mitrokhin. The Sword and the Shield: The Mitrokhin Archive and the Secret History of the KGB. New York: Basic Books, 1999. Anti-Virus .by. “News: VirusBlokAda.” 2010. http://www.anti-virus.by/en/tempo.shtml. Arghire, lonut. “NotPetya Connected to BlackEnergy/KillDisk: Researchers.” Security Week, July 2017. https://www.securityweek.com/notpetya-connected-blackenergyk illdisk-researchers. ASERT Team. “The Anatomy of the DDoS Attack Campaign Targeting Organizations in Ukraine.” NETSCOUT (blog), February 2022. https://www.netscout.com/blog/asert/ ddos-attack-campaign-targeting-multiple-organizations-ukraine. “Assessment of Ukraine’s Economic Losses from the Temporary Occupation of the Crimean Peninsula.” Center for Economic Strategy, July 2021. https://ces.org.ua/ass essment-of-ukraines-economic-losses-from-crimea/. Bainbridge, David I. “Hacking. The Unauthorised Access of Computer Systems: The Legal Implications.” Modern Law Review 52, no. 2 (1989): 236-245. Baldwin, David A. “Power Analysis and World Politics: New Trends versus Old Tendencies.” World Politics 31, no. 2 (1979): 161-194. Baldwin, David A. Power and International Relations: A Conceptual Approach. Princeton, NJ: Princeton University Press, 2016. Balzacq, Thierry, and Myriam Dunn Cavelty. “A Theory of
Actor-Network for Cyber Security.” European Journal of International Security 1, no. 2 (July 2016): 176-198. https://doi.Org/10.1017/eis.2016.8. Barnett, Michael, and Raymond Duvall. “Power in International Politics.” International Organization 59, no. 1 (2005): 39-75. Bateman, Jon. “Russia’s Wartime Cyber Operations in Ukraine: Military Impacts, Influences, and Implications.” December 2022. https://carnegieendowment.org/files/ Bateman_Cyber-FINAL21 .pdf. Batvinis, Raymond J. “The Future of FBI Counterintelligence through the Lens of the Past Hundred Years.” In The Oxford Handbook of National Security Intelligence, Oxford Handbooks, edited by Loch K. Johnson, 505-517. Oxford: Oxford University Press, 2010. Baumgartner, Kurt. “BE2 Extraordinary Plugins, Siemens Targeting, Dev Fails.” February 2015. https://securelist.com/be2-extraordinary-plugins-siemens-targeting-dev-fails/ 68838/. BBC. "Crimea Blackout ‘Sabotage by Ukraine.”’ BBC News, November 2015, sec. Europe. https://www.bbc.com/news/world-europe-34967093. BBC. “Nato to Counter ‘Hybrid Warfare’ from Russia.” BBC News, May 2015, sec. Europe. https://www.bbc.com/news/world-europe-32741688. BBC. “Putin Strategist Returns to Kremlin.” BBC News, September 2013, sec. Europe. https://www.bbc.com/news/world-europe-24178947. BBC. “Ukraine Power Cut ‘Was Cyber-Attack.’ ” BBC News, January 2017, sec. Technology. https://www.bbc.com/news/technology-38573074. Behr, Roy L., and Shanto Iyengar. “Television News, Real-World Cues, and Changes in the Public Agenda.” Public Opinion Quarterly 49, no. 1 (Januàry 1985): 38-57. https://doi.
org/10.1086/268900.
BIBLIOGRAPHY 293 Beilenson, Lawrence W. Power through Subversion. Washington, DC: Public Affairs Press, 1972. Benkler, Yochai, Robert Faris, and Hal Roberts. Network Propaganda: Manipulation, Disinformation, and Radicalization in American Politics. New York, NY: Oxford University Press, 2018. https://www.oxfordscholarship.com/view/10.1093/oso/978019 0923624.001.0001/oso-9780190923624. Bennett, W. Lance, and Steven Livingston. “The Disinformation Order: Disruptive Communication and the Decline of Democratic Institutions” European Journal of Communication, 33, no. 2 (April 2018). https://doi.org/10.1177/0267323118760317. Bergman, Ronen, Rick Gladstone, and Farnaz Fassihi. “Blackout Hits Iran Nuclear Site in What Appears to Be Israeli Sabotage.” New York Times, April 2021, sec. World, https:// www.nytimes.com/2021/04/ll/world/middleeast/iran-nuclear-natanz.html. Betts, Richard K. Enemies of Intelligence: Knowledge and Power in American National Security. New York: Columbia University Press, 2007. Biddle, Stephen. Military Power: Explaining Victory and Defeat in Modern Battle. Princeton, NJ: Princeton University Press, 2010. Bijker, Wiebe E„ and John Law, eds. Shaping Technology/Building Society: Studies in Sociotechnical Change, Inside Technology, repr. Cambridge, MA: MIT Press, 2010. “The Birth of the Web.” CERN. Accessed January 18,2023. https://home.web.cern.ch/scie nce/computing/birth-web. Bischof, Günter, Stefan Karner, and Peter Ruggenthaler, eds. The Prague Spring and the Warsaw Pact Invasion of Czechoslovakia in 1968, Harvard Cold War Studies Book Series. Lanham, MD:
Lexington Books, 2010. Bittman, Ladislav. The Deception Game. New York: Ballantine Books, 1981. Bittman, Ladislav. The KGB and Soviet Disinformation: An Insider’s View. Washington, DC: Pergamon-Brassey’s, 1985. Bjola, Corneliu, and Stuart Murray. Secret Diplomacy: Concepts, Contexts and Cases. London, UK: Routledge, 2016. Blackstock, Paul W. The Strategy ofSubversion: Manipulating the Politics of Other Nations. Chicago: Quadrangle Books, 1964. “Blasts at Ukrainian Munitions Depot Let $800 Mln of Weapons Go Up in Smoke.” TASS, September 2017. http://tass.com/world/967814. Bloomberg. “Ukraine Protesters Urge Yanukovych’s Return at Rally in Donetsk.” March 2014. https://www.bloomberg.com/news/articles/2014-03-22/ukraine-protestersurge-yanukovych-s-return-at-rally-in-donetsk. Blunden, Bill, and Violet Cheung. Behold a Pale Farce: Cyberwar, Threat Inflation, the Malware Industrial Complex. Waterville, OR: Trine Day, 2014. BND. “Dokumente Des Bundesnachrichtendienstes Zum Prager Frühling 1968.” Mitteilungen Der Forschungs-Und Arbeitsgruppe „Geschichte Des BND,»2016. http:// uzsi.cz/files/spolkova-zpravodajska-sluzba-prazske-jaro-1968.pdf. Boyes, Hugh, Bil Hallaq, Joe Cunningham, and Tim Watson. “The Industrial Internet of Things (IIoT): An Analysis Framework.” Computers in Industry 101 (October 2018): 112. https://doi.Org/10.1016/j.compind.2018.04.015. Brandy, Aaron F., Nerea Μ. Cal, and Devlin P. Winkelstein. “Defending the Borderland.” Army Cyber Institute, December 2017. https://vtechworks.lib.vt.edu/handle/10919/ 81979. Brandy, Aaron Franklin. The Decision to Attack: Military
and Intelligence Cyber DecisionMaking. Athens, Georgia: University of Georgia Press, 2016. http://muse.jhu.edu/ book/45365.
294 BIBLIOGRAPHY Brewster, Thomas. ‘“Most Severe’ Cyberattack Since Russian Invasion Crashes Ukraine Internet Provider.” Forbes, March 2022, sec. Cybersecurity, https://www.forbes.com/ sites/thomasbrewster/2022/03/28/huge-cyberattack-on-ukrtelecom-biggest-sincerussian-invasion-crashes-ukraine-telecom/. Buchanan, Ben. The Cybersecurity Dilemma Hacking, Trust and Fear between Nations. Oxford: Oxford University Press, 2017. Buchanan, Ben. The Hacker and the State: Cyber Attacks and theNewNormal ofGeopolitics. Cambridge, MA: Harvard University Press, 2020. Buchanan, Ben. “The Legend of Sophistication in Cyber Operations.” Belfer Center for Science and International Affairs (blog), 2017. https://www.belfercenter.org/publicat ion/legend-sophistication-cyber-operations. Bull, Hedley. The AnarchicalSociety:AStudy ofOrderin World Politics. New York: Columbia University Press, 1977. Bumiller, Elisabeth, and Thom Shanker. “Panetta Warns of Dire Threat of Cyberattack on U.S.” New York Times, October 12, 2012, sec. World, https://www.nytimes.com/2012/ 10/12/world/panetta-warns-of-dire-threat-of-cyberattack.html. Burdiga, Igor. “«Чорний ΒίΒτοροκ» украшського IT: яких збитк1в завдала юбератака, та хто ïï вчинив.” July 2017. https://hromadske.ua/posts/naslidki-kiberataki. Burt, Jeff. “Sandworm Gärig Launches Monster Ransomware Attacks on Ukraine.” November 2022. https://www.theregister.eom/2022/l l/29/russia_ransomboggs_ran somware_ukraine/. Butchenko, Maksym. “Ukraine’s Territorial Defence on a War Footing.” ICDS (blog), April 2022. https://icds.ee/en/ukraines-territorial-defence-on-a-
war-footing/. Butusov, Yuri. “День кризи: 6 kbîthh 2014 року росгйськг спецслужби атакували органи влади на твденному сход! Украши.” Цензор.НЕТ, April 2017. https:// censor.net.ua/ua/resonance/435372/den_kryzy_6_kvitnya_2014_roku_rosiyiski_ spetsslujby_atakuvaly_organy_vlady_na_pivdennomu_shodi_ukrayiny. California Energy Commission. “California ISO Glossary.” n.d. https://www.energy. ca.gov/glossary/ISO_GLOSSARY.PDE Callanan, James.' Covert Action in the Cold War: US Policy, Intelligence and CIA Operations. London: I. B. Tauris, 2009. Cameron, Dell. “In WannaCry’s Wake, a New Rapidly Spreading Ransomware Attack Appeared Today.” Gizmodo, May 2017. https://gizmodo.com/in-wannacrys-wake-anew-rapidly-spreading-ransomware-a-1795385418. Cappelli, Dawn, Andrew Moore, and Randall Trzeciak. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud), Sei Series in Software Engineering. Upper Saddle River, NJ: AddisonWesley, 2012. Carr, Jeffrey. “The GRU-Ukraine Artillery Hack That May Never Have Happened.” Medium (blog), January 2017. https://medium.com/@jeffreyscarr/the-gru-ukraineartillery-hack-that-may-never-have-happened-820960bbb02d. Carson, Austin. “Facing Off and Saving Face: Covert Intervention and Escalation Management in the Korean War.” International Organization 70, no. 1 (2016): 103-131. https://d0i.0rg/l 0.1017/S0020818315000284. Carson, Austin. Secret Wars: Covert Conflict in International Politics, Princeton Studies in International History and Politics. Princeton, NJ: Princeton University Press,
2018. CBC. “Riots Erupt in Vancouver after Canucks Loss.” CBC News, June 2011. https://www. cbc.ca/news/canada/british-columbia/riots-erupt-in-vancouver-after-canucks-loss1.993707.
BIBLIOGRAPHY 295 Censor.net. “Начальника пожежно! охорони арсеналу в Калишвщ не було покарано за недбал1Сть через закшчення терм!Н1в притягнення до адмшввдповщальноси.” Цензор.НЕТ, October 2018. https://censor.net.ua/ua/news/3091002/nachalnyka_
pojejnoyi_ohorony_arsenalu_v_kalynivtsi_ne_bulo_pokarano_za_nedbalist_cher ez_zakinchennya. CERT-UA. “Cyber Attack on Websites of State Bodies.” January 2022. https://cert.gov.ua/. CERT-UA. “A Fragment of the Research on Cyber Attacks 01.14.2022.” January 2022. https://cert.gov.ua/article/18101.
CERT-UA. “Heavy Cyberattack on Ukraine’s Energy Sector Prevented.” April 2022. https://cip.gov.ua/en/news/poperedzhena-masshtabna-kiberataka-na-energetichniisektor-ukrayini. CERT-UA. “Information on Cyber Attacks on February 15, 2022.” Accessed January 12, 2023. https://cert.gov.ua/. CERT-UA.
“Ukrainian Media Are Attacked with Black Energy.” January 2016. https:// web.archive.org/web/20160116110418/http://cert.gov.ua/?p=2370. CERT-UA. “Юбератака Групи Sandworm (UAC-0082) На Об’екти Енергетики Украши з Використанням Шюдливих Програм INDUSTROYER2 Та CADDYWIPER (CERT-UA#4435).” April 2022.
https://cert.gov.ua/. Cerulus, Laurens. “How Ukraine Became a Test Bed for Cyberweaponry” Politico, February 2019. https://www.politico.eu/article/ukraine-cyber-war-frontline-russiamalware-attacks/. Chappell, Bill. “‘Petya’ Ransomware Hits at Least 65 Countries; Microsoft Traces It to Tax Software.”
NPR, June 2017. https://www.npr.org/sections/thetwo-way/2017/06/28/ 534679950/petya-ransomware-hits-at-least-65-countries-microsoft-traces-it-to-taxsoftware.
Cherkasets, Olena. “Медведчук Отримав В1д ФСБ Мыьярд На П1дготовку Вшни.” July 2022. https://umoloda.kyiv.Ua/number/0/2006/168191. Chiwis, Christopher S. “Hybrid War: Russian Contemporary Political Warfare.” Bulletin of the Atomic Scientists: How Dangerous Is Hybrid War? 73, no. 5 (2017): 316-321. https://doi.org/10.1080/00963402.2017.1362903 . Chulov, Martin. “Israel Appears to Confirm It Carried Out Cyberattack on Iran Nuclear Facility.” The Guardian, April 11, 2021, sec. World News, https://www.theguardian.com/world/2021/apr/ll/israel-appe ars-confirm-cyberattack-iran-nuclear-facility. CIA. “The Crisis in Czechoslovakia.” July 1968. CIA. “Eastern Europe and the USSR in the Aftermath of the Invasion of Czechoslovakia.” November 1968. CIA. “Intelligence Memorandum: Czechoslovakia in Transition.” April 1968. CIA. “Intelligence Memorandum: The Soviet Decision to Intervene in Czechoslovakia.” August 1968. CIA. “National Intelligence Survey 18; Czechoslovakia; The Society.” 1974. https://www. cia.gov/library/readingroom/docs/CIA-RDP01-00707R000200110015-7.pdf. CIA. “The Situation in Czechoslovakia 10/5/1968,10am.” May 1968. CIA Office of National Estimates. “Czechoslovakia: A New Direction.” Special Memorandum, CIA, January 1968. Cimpanu, Catalin. “M.E.Doc Software Was Backdoored 3 Times, Servers Left without Updates Since 2013.” Bleeping Computer, 2017. https://www.bleepingcomputer.com/ news/security/m-e-doc-software-was-backdoored-3-times-servers-left-without-upda tes-since-2013/.
296 BIBLIOGRAPHY Cisco Taios. “The MeDoc Connection.” 2017. http://blog.talosintelligence.coni/2017/07/ the-medoc-connection.html. Cisco Talos. “Threat Spotlight: Follow the Bad Rabbit.” 2017. http://blog.talosintelligence. com/2017/10/bad- rabbit.html. Cisco Talos. “Ukraine Campaign Delivers Defacement and Wipers, in Continued Escalation.” Cisco Talos (blog), January 2022. https://blog.talosintelligence.com/ukra ine-campaign-delivers-defacement/. Clausewitz, Carl von. On War, Oxford Worlds Classics. Edited by Beatrice Heuser. Translated by Michael Howard and Peter Paret. New York: Oxford University Press, 2006. Clayton, Mark. “Ukraine Election Narrowly Avoided Wanton Destruction’ from Hackers (+Video).” Christian Science Monitor, June 2014. http://www.csmonitor.com/World/ Passcode/2014/0617/Ukraine-election-narrowly-avoided-wanton-destruction-fromhackers-video. Cohen, Fred. “Computer Viruses: Theory and Experiments.” Computers Security 6, no. 1 (1987): 22-35. Committee on Foreign Relations. “Chain Reaction: Avoiding a Nuclear Arms Race in the Middle East.” Report to the US Senate Committee on Foreign Relations, February 2008. https://www.govinfo.gov/content/pkg/CPRT-110SPRT39674/html/CPRT110SPRT39674.htm. Connolly, Helen, and Kate Womack. “Previously Unseen Photos Depict Drama of 1968 Soviet Invasion of Prague.” The Observer, August 17, 2008, sec. World News, https:// www.theguardian.com/world/2008/aug/17/1968theyearofrevolt.russia. Corke, Sarah-Jane. US Covert Operations and Cold War Strategy: Truman, Secret Warfare, and the CIA, 1945-1953, Studies in Intelligence Series.
New York: Routledge, 2008. Cormac, Rory. “Coordinating Covert Action: The Case of the Yemen Civil War and the South Arabian Insurgency.” Journal of Strategic Studies 36, no. 5 (October 2013): 692717. https://doi.org/10.1080/01402390.2011.651534. Cormac, Rory, and Richard J. Aldrich. “Grey Is the New Black: Covert Action and Implausible Deniability.” International Affairs 94, no. 3 (May 2018): 477-494. https:// doi.org/10.1093/ia/iiy067. Coser, Lewis A. Functions ofSocial Conflict. New York, NY: Simon and Schuster, 1964. Crete-Nishihata, Masashi, Jakub Dalek, Ronald Deibert, Seth Hardy, Katherine Kleemola, Sarah McKune, Irene Poetranto, et al. “Communities @Risk: Targeted Digital Threats against Civil Society.” Citizen Lab, November 2014. https://targetedthreats.net/ . “Crimea Power Cut ‘Caused by Blast.’” BBC News, December 2015, sec. Europe, http:// www.bbc.com/news/world-europe-35204304. Crowdstrike. “Fancy Bear Tracking of Ukrainian Field Artillery Units.” December 2016. http://web.archive.Org/web/20161223065425/https://www.crowdstrike.com/wp-cont ent/brochures/Fan cyBearTracksUkrainianArtillery.pdf. Crowdstrike. “Fancy Bear Tracking of Ukrainian Field Artillery Units.” March 2017. https://www.crowdstrike.com/wp-content/brochures/FancyBearTracksUkrainianAr tillery.pdf. Crowdstrike. “Technical Analysis of the WhisperGate Malicious Bootloader | Crowdstrike.” January 2022. https://www.crowdstrike.com/blog/technical-analysisof-whispergate-malware/. Crypto-cypher. “Fortinet Victim List—‘Hackers Leak Passwords for 500,000 Fortinet VPN Accounts’ #TrackThePlanet.” Gist, 2021.
https://gist.github.com/crypto-cypher/ f216d6fa4816ffa93c5270b001 dc4bdc.
BIBLIOGRAPHY 297 CSIS. "The Ukraine Crisis Timeline.” Accessed April 12, 2019. http://ukraine.csis. org/#478. Cyber Berkut. “Cyber Berkut: Кибер Беркут.” May 2014. http://www.cyber-berkut.ru/ en/index_02.php. CysCentrum. "Киберугроза BlackEnergy2/3.” 2016. https://cys-centrum.com/ru/news/ black_energy_2_3. Dahl, Robert A. “The Concept of Power.” Behavioral Science 2, no. 3 (1957): 201-215. Dak, Pavlo. “Як Βίκτορ Медведчук Причетний До В1йни в ykpa'ÏHi: Вщповщь Буданова.” 1нформацшне Агентство Вголос/Vgolos, October 1, 2022 edition. Accessed January 16, 2023. https://vgolos.ua/news/yak-viktor-medvedchuk-prichet niy-do-viyni-v-ukrayini-vidpovid-budanova_1428157.html. Dawisha, Karen. The Kremlin and the Prague Spring, International Crisis Behavior Series. Vol. 4. Berkeley: University of California Press, 1984. “Deadly Ambush Ends Lull in Ukraine.” BBCNews, September 2015, sec. Europe, https:// www.bbc.com/news/world-europe-34128085. “Deadly Clashes in Ukraine Despite Truce.” Radio Free Europe/Radio Liberty, December 2015. https://www.rferl.Org/a/deadly-clashes-in-ukraine-despite-holiday-truce/27452 015.html. Dear, Ian. Sabotage Subversion: Storiesfrom the Files ofthe SOE and OSS. London: Arms and Armour, 1996. Deibert, Ronald. Parchment, Printing and Hypermedia: Communication in World Order Transformation. New York: Columbia University Press, 1997. Deibert, Ronald. Reset: Reclaiming the Internet for Civil Society. Toronto, Canada: House ofAnansi Press, 2020. Deibert, Ronald. “Subversion Inc: The Age of Private Espionage.” Journal of Democracy 33, no. 2 (April 2022): 28-44.
Deibert, Ronald, Rafal Rohozinski, and Masashi Crete-Nishihata. “Cyclones in Cyberspace: Information Shaping and Denial in the 2008 Russia-Georgia War.” Security Dialogue 43, no. 1 (2012): 3-24. https://doi.org/10.1177/0967010611431079. DeNardis, Laura. Protocol Politics: The Globalization of Internet Governance. Cambridge, MA: MIT Press, 2009. http://myaccess.library.utoronto.ca/login?url=http://site.ebrary. сот/lib/utoronto/Doc?id= 10326187. DeVine, Michael E., and Heidi Μ. Peters. Covert Action and Clandestine Activities of the Intelligence Community: Selected Definitions in Brief. Washington, DC: US Congressional Research Service, July 2019. Dix, Robert H. “The Breakdown of Authoritarian Regimes.” Western Political Quarterly 35, no. 4 (December 1982): 554-573. https://doi.Org/10.l 177/106591298203500407. Doman, Chris. “Technical Analysis of the DdoS Attacks against Ukrainian Websites.” Cado Security: Cloud Investigation, February 2022. https://www.cadosecurity.com/ technical-analysis-of-the-ddos-attacks-against-ukrainian-websites/. Madory, Doug (@DougMadory). Twitter, “Large outages today in #Ukraine.” March 2022. https://twitter.com/DougMadory/status/1501910709734678529 . Douthit, Howard, III. “The Use and Effectiveness of Sabotage as a Means of Unconventional Warfare.” Master’s Thesis: Air University, 1987. Downes, Alexander B., and Mary Lauren Lilley. “Overt Peace, Covert War?: Covert Intervention and the Democratic Peace.” Security Studies 19, no. 2 (May 2010): 266306. https://doi.org/10.1080/09636411003795756 .
298 BIBLIOGRAPHY Dragos. “CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations.” 2017. https://dragos.com/blog/crashoverride/CrashOverride-01.pdf. Dragos. “CRASHOVERRIDE: Reassessing the 2016 Ukraine Electric Power Event as a Protection-Focused Attack.” 2019. https://dragos.com/wp-content/uploads/CRASHO VERRIDE.pdf. Drezner, Daniel W. “Why Vladimir Putins Strategic Genius Scares the Heck Out of Me.” Washington Post, July 30, 2014, sec. PostEverything. https://www.washingtonpost . com/posteverything/wp/2014/07/30/why-vladimir-putins-strategic-genius-scaresthe-heck-out-of-me/. Dubcek, Alexander. Hope Dies Last: The Autobiography of Alexander Dubcek. Edited by Jiri Hochman. New York: Kodansha USA, 1993. Dullien, Thomas. “Weird Machines, Exploitability, and Provable Unexploitability.” IEEE Transactions on Emerging Topics in Computings, no. 2 (April 2020): 391-403. https:// doi.org/10.1109/TETC.2017.2785299. Dunn Cavelty, Myriam. “From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse.” International Studies Review 15, no. 1 (2013): 105-122. https://doi.org/10.llll/misr.12023. Egloff, Florian J. “Contested Public Attributions of Cyber Incidents and the Role of Academia.” Contemporary Security Policy 41, no. 1 (January 2020): 55-81. https://doi. org/10.1080/13523260.2019.1677324. Egloff, Florian J. Semi-State Actors in Cybersecurity. New York: Oxford University Press, 2022. Eidlin, Fred H. The Logic of “Normalization": The Soviet Intervention in Czechoslovakia of 21 August 1968 and the Czechoslovak Response.
Boulder, Colorado: Eastern European Monographs, Fred Eidlin, 1980. “Enercon: Thousands of Wind Turbines Need New Hardware.” Energate Messenger, March 2022. https://www.energate-messenger.com/news/220914/enercon-thousa nds-of-wind-turbines-need-new-hardware. Erickson, Jon. Hacking: The Art ofExploitation. San Francisco: No Starch Press, 2003. Erlanger, Steven. "Putin, at NATO Meeting, Curbs Combative Rhetoric.” New York Times, April 5, 2008, sec. Europe, https://www.nytimes.com/2008/04/05/world/europe/05n ato.html. ESET. “Analysis of TeleBots’ Cunning Backdoor.” We Live Security (blog), July 2017. https://www.welivesecurity.com/2017/07/04/analysis-of-telebots-cunning-backdoor/. ESET. “Bad Rabbit: Not-Petya Is Back with Improved Ransomware.” We Live Security (blog), October 2017. https://www.welivesecurity.com/2017/10/24/bad-rabbit-notpetya-back/. ESET. “BlackEnergy by the SSHBearDoor: Attacks against Ukrainian News Media and Electric Industry.” We Live Security (blog), January 2016. https://www.welivesecurity. com/2016/01/03/blackenergy-sshbeardoor-details-2015-attacks-ukrainian-newsmedia-electric-industry/. ESET. “CaddyWiper: New Wiper Malware Discovered in Ukraine.” We Live Security (blog), March 2022. https://www.welivesecurity.eom/2022/03/15/caddywiper-newwiper-malware-discovered-ukraine/. ESET. “GREYENERGY.” We Live Security (blog), October 2018. https://www.welivesecur ity.com/wp-content/uploads/2018/10/ESET_GreyEnergy.pdf. ESET. “Kiev Metro Hit with a New Variant of the Infamous Diskcoder Ransomware.” We Live Security (blog), October 2017.
https://www.welivesecurity.eom/2017/10/24/kievmetro-hit-new-variant-infamous-diskcoder-ransomware/ .
BIBLIOGRAPHY 299 ESET. “New TeleBots Backdoor: First Evidence Linking Industroyer to NotPetya.” We Live Security (blog), October 2018. https://www.welivesecurity.com/2018/10/ll/new-teleb ots-backdoor-linking-industroyer-notpetya/. ESET. “RansomBoggs: New Ransomware Targeting Ukraine.” We Live Security (blog), November 2022. https://www.welivesecurity.eom/2022/l 1/28/ransomboggs-new-ran somware-ukraine/. ESET. “The Rise of TeleBots: Analyzing Disruptive KillDisk Attacks.” We Live Security (blog), December 2016. https://www.welivesecurity.com/2016/12/13/rise-telebotsanalyzing-disruptive-killdisk-attacks/. ESET. “Sandworm Uses a New Version of ArguePatch to Attack Targets in Ukraine.” We Live Security (blog), May 2022. https://www.welivesecurity.com/2022/05/20/sandw drm-ukraine-new-version-arguepatch-malware-loader/. ESET. “TeleBots Are Back: Supply-Chain Attacks against Ukraine.” We Live Security (blog), June 2017. https://www.welivesecurity.com/2017/06/30/telebots-back-supplychain-attacks-against-ukraine/. ESET. “Win32/Industroyer.” We Live Security (blog), 2017. https://www.welivesecurity . com/wp-content/uploads/2017/06/Win32_Industroyer.pdf. ESET. “XData Ransomware Making Rounds amid Global WannaCryptor Scare.” We Live Security (blog), May 2017. https://www.welivesecurity.com/2017/05/23/xdata-ran somware-making-rounds-amid-global-wannacryptor-scare/. ESET Research. “IsaacWiper and HermeticWizard: New Wiper and Worm Targeting Ukraine.” We Live Security (blog), March 2022. https://www.welivesecurity.com/2022/ ОЗ/01/isaacwiper-hermeticwizard-wiper-worm-targeting-ukraine/.
ESET Research (@ESETresearch). “CaddyWiper Does Not Share Дпу Significant Code Similarity with #HermeticWiper, #IsaacWiper or Any Other Malware Known to Us. The Sample We Analyzed Was Not Digitally Signed. 3/7 Https://T.Co/EGp9NnctD9.” Twitter, March 2022. https://twitter.com/ESETresearch/status/1503436425676705807 . ESET Research (@ESETresearch). “Interestingly, CaddyWiper Avoids Destroying Data on Domain Controllers. This Is Probably a Way for the Attackers to Keep Their Access inside the Organization While Still Disturbing Operations. 5/7 Https://T.Co/ XiXgOMe5wr.” Twitter, March 2022. https://twitter.com/ESETresearch/status/I503 436433134129158. ESET Research (@ESETresearch). “Breaking. #ESETResearch discovered a new data wiper malware used in Ukraine today. ESET telemetry shows that it was installed on hundreds of machines in the country. This follows the DDoS attacks against several Ukrainian websites earlier today 1/n”, Twitter, February 2022. https://twitter.com/ ESETresearch/status/1496581903205511181. ESET Research (@ESETresearch). “We observed the first sample today around 14h52 UTC / 16h52 local time. The PE compilation timestamp of one of the sample is 202112-28, suggesting that the attack might have been in preparation for almost two months. 2/n”, Twitter, February 2022. https://twitter.com/ESETresearch/status/I496 581904916754435. ESET Research (@ESETresearch). “This new malware erases user data and partition in formation from attached drives. #ESET telemetry shows that it was seen on a few dozen systems in a limited number of organizations. 2/7,” Twitter,
March 2022. https://twitter. com/ESETresearch/status/1503436423818534915. ESET Research (@ESETresearch). “Similarly to HermeticWiper deployments, we observed CaddyWiper being deployed via GPO, indicating the attackers had prior
300 BIBLIOGRAPHY control of the target's network beforehand. 4/7,” Twitter, March 2022. https://twitter. com/ESETresearch/status/1503436428096716800. Espreso.tv. "Вибухи в Калишвщ: Майора, Який Пропустив Сторонни На Вшськов: Склади, Оштрафували На 2,5 Тисячк” November 2017. https://espreso.tv/news/ 2017/11 /22/vybukhy_v_kalynivci_mayora_yakyy_propustyv_storonnikh_osib_na_ viyskovi_sklady_oshtrafuvaly_na_2_5_tysyachi. Espreso.tv. “У Рос1йських Диверсантов Могли Бути Сшльники На Складах у Калишвщ,—Генерал Розвщки.” September 2017. https://espreso.tv/news/2017/09/ 27/u_rosiyskykh_dyversantiv_mogly_buty_spilnyky_na_skladakh_u_kalynivci_g eneral_rozvidky. Esterle, Lukas, and Radu Grosu. “Cyber-Physical Systems: Challenge of the 21st Century.” E i Elektrotechnik Und Informationstechnik 133, no. 7 (2016): 299-303. https://doi. org/10.1007/s00502-016-0426-6. “The EU-Ukraine Association Agreement Enters into Force on 1 September 2017.” EEAS—European External Action Service, European Commission. Accessed April 16, 2019. https://eeas.europa.eu/delegations/ukraine/30478/eu-ukraine-associationagreement-enters-force-1 -September-2017_en. Euromaidan Press. “30% of Ukrainian SBU Officers Were Russian FSB and GRU Agents.” Euromaidan Press (blog), April 2014. http://euromaidanpress.com/2014/04/24/30-ofukrainian-sbu-officers-were-russian-fsb-and-gru-agents/. Euromaidan Press. “Glazyev Tapes, Continued: New Details of Russian Occupation of Crimea and Attempts to Dismember Ukraine.” Euromaidan Press (blog), May 2019. http://euromaidanpress.com/2019/05/16/glazyev-tapes-continued-ukraine-
presentsnew-details-of-russian-takeover-of-crimea-and-financing-of-separatism/. Euromaidan Press. “Ukraine Publishes Video Proving Kremlin Directed Separatism in Eastern Ukraine and Crimea.” Euromaidan Press (blog), August 2016. http://euromaid anpress.eom/2016/08/23/ukraine-publishes-video-proving-kremlin-directed-separat ism-in-ukraine/. “EuroMaidan Rallies in Ukraine—Nov. 21-23 Coverage.” Kyiv Post, November 2013. https://www.kyivpost.com/post/7612. European Council. “EU Imposes the First Ever Sanctions against Cyber-Attacks.” July 2020. https://www.consilium.europa.eu/en/press/press-releases/2020/07/30/eu-impo ses-the-first-ever-sanctions-against-cyber-attacks/. Evanson, Robert K. “Political Repression in Czechoslovakia, 1948-1984.” Canadian Slavonic Papers /Revue Canadienne Des Slavistes 28, no. 1 (1986): 1-21. Eversden, Andrew, and Jaspreet Gill. “Why Hasn’t Russia Used Its ‘Full Scope’ of Electronic Warfare?” Breaking Defense (blog), March 2022. https://breakingdefense.sites.breaki ngmedia.com/2022/03/why-hasnt-russia-used-its-full-scope-of-electronic-warfare/. “EXCLUSIVE: Rounding up a Cyber Posse for Ukraine.” The Record by Recorded Future (blog), November 2022. https://therecord.media/exclusive-rounding-up-a-cyberposse-for-ukraine/. Fakty.ua. “Причиной обесточивания части Киева может быть атака хакеров.” December 2016. https://fakty.ua/227538-prichinoj-obestochivaniya-chasti-kieva-moz het-byt-ataka-hakerov. Farwell, J. P„ and R. Rohozinski. “Stuxnet and the Future of Cyber War.” Survival 53, no. 1 (2011): 23-40. https://doi.org/10.1080/00396338.2011.555586 . Fawn,
Rick, and Jiri Hochman. Historical Dictionary of the Czech State. Lanham, MD: Scarecrow Press, 2010).
BIBLIOGRAPHY 301 Fearon, James D. “Rationalist Explanations for War.” International Organization 49, no. 3 (1995): 379-414. Feiner, Lauren. “Cyberattack Hits Ukrainian Banks and Government Websites.” CNBC, February 2022. https://www.cnbc.com/2022/02/23/cyberattack-hits-ukrainianbanks-and-government-websites.html. Filitov, Alexsei. “The USSR, the Federal Republic of Germany, and the Czechoslovak Crisis of 1968.” In The Prague Spring and the Warsaw Pact Invasion of Czechoslovakia in 1968, Harvard Cold War Studies Book Series, edited by Günter Bischof, Stefan Karner, and Peter Ruggenthaler, 319-340. Lanham, MD: Lexington Books, 2010. FireEye. “Attackers Deploy New ICS Attack Framework ‘TRITON’ and Cause Operational Disruption to Critical Infrastructure.” FireEye (blog), December 2017. https://www.fire eye.com/blog/ threat-research/2017/12/attackers-deploy-new-ics-attack-frameworktriton.html. FireEye. “M-Trends.” 2020. https://content.fireeye.com/m-trends/rpt-m-trends-2020 . FireEye. “SMB Exploited: WannaCry Use of 'EternalBlue' « SMB Exploited: WannaCry Use of‘EternalBlue.’” May 2017. https://www.fireeye.com/blog/threat-research/2017/ 05/smb-exploited-wannacry-use-of-eternalblue.html. Fischerkeller, Michael P„ Emily O. Goldman, and Richard J. Harknett. Cyber Persistence Theory: RedefiningNational Security in Cyberspace, Bridging the Gap. New York: Oxford University Press, 2022. Fischerkeller, Michael P., and Richard J. Harknett. “Deterrence Is Not a Credible Strategy for Cyberspace.” Orbis 61, no. 3 (January 2017): 381-393. https://doi.org/10.1016/ j.orbis.2017.05.003. Fitton,
Oliver. “Cyber Operations and Gray Zones: Challenges for NATO.” Connections 15, no. 2 (2016): 109-119. Foreign Broadcast Information Service. “FBIS Special Report on Communist Propaganda—The I. Aleksandrov Article.” July 1968. Franceschi-Bicchierai, Lorenzo. “How Hackers Broke into John Podesta and Colin Powell’s Gmail Accounts.” Motherboard, October 2016. https://motherboard.vice. com/en_us/article/how-hackers-broke-into-john-podesta-and-colin-powells-gmailaccounts. Frolik, Josef, John Bok, and Pfemysl Vachalovsky. Spion vypovidà II: jasnâ zprâva о konci jednoho svêta. Praha: J. W. Hill, 2000. Galeotti, Mark. “Controlling Chaos: How Russia Manages Its Political War in Europe.” August 2017. http://www.ecfr.eu/publications/summary/controlling_chaos_how_ russia_manages_its_political_war_in_europe. Galeotti, Mark. “The ‘Gerasimov Doctrine’ and Russian Non-Linear War.” In Moscow’s Shadows (blog), July 2014. https://inmoscowsshadows.wordpress.com/2014/07/06/ the-gerasimov-doctrine-and-russian-non-linear-war/. Galeotti, Mark. “Putin’s Hydra: Inside Russia’s Intelligence Services.” European Council on Foreign Relations, May 2016. http://www.ecfr.eu/page/-/ECFR_169_-_PUTINS_ HYDRA_INSIDE_THE_RUSSIAN_INTELLIGENCE_SERVICES_1513.pdf. Ganssle, Jack. The Firmware Handbook. Orlando, FL: Elsevier, 2004. Gartzke, Erik, and Jon R. Lindsay. “Thermonuclear Cyberwar.” Journal of Cybersecurity 3, no. 1 (2017): 37-48. https://doi.org/10.1093/cybsec/tyw017. Gartzke, Erik, and Jon R. Lindsay. “Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace.” Security Studies 24, no. 2 (April
2015): 316-348. https://doi. org/10.1080/09636412.2015. 1038188,
302 BIBLIOGRAPHY George, Alexander L, and Andrew Bennett. Case Studies and Theory Development in the Social Sciences. Cambridge, MA: MIT Press, 2005. GfK Ukraine. “Public Opinion Survey in Crimea.” March 2014. https://avaazpress. s3.amazonaws.com/558_Crimea.Referendum.Poll.GfK.pdf. Gibney, Elizabeth. “Where Is Russia’s Cyberwar? Researchers Decipher Its Strategy.” Nature 603, no. 7903 (March 2022): 775-776. https://doi.org/10.1038/d41 586-022-00753-9. Giles, Keir. “Putin Does Not Need to Invade Ukraine to Get His Way.” Chatham HouseInternational Affairs Think Tank (blog), December 2021. https://www.chathamhouse. org/2021/12/putin-does-not-need-invade-ukraine-get-his-way. Gill, Jaspreet. “Russia May Be Holding Cyber Capabilities in Reserve, so US Must Keep Its Shields Up: Experts.” Breaking Defense (blog), March 2022. https://breakingdefense. sites.breakingmedia.com/2022/03/russia-may-be-holding-cyber-capabilities-in-rese rve-so-us-must-keep-its-shields-up-experts/. Gilli, Andrea, and Mauro Gilli. “Why China Has Not Caught Up Yet: MilitaryTechnological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage.” International Security 43, no. 3 (February 2019): 141-189. https://doi.org/ 10.1162/isec_a_00337. “Global Cyber Attack Could Spur $53 Billion in Losses: Lloyd’s Of.” Reuters, July 2017. https://www.reuters.com/article/us-cyber-lloyds-report/global-cyber-attack-couldspur-53-billion-in-losses-lloyds-of-london-idUSKBNlA20AB . Gomez, Miguel Alberto, and Eula Bianca Villar. “Fear, Uncertainty, and Dread: Cognitive Heuristics and Cyber Threats.”
Politics and Governance 6, no. 2 (June 2018): 61-72. https://doi.org/10.17645/pag.v6i2.1279 . Goodin, Dan. “Tuesday’s Massive Ransomware Outbreak Was, in Fact, Something Much Worse.” Ars Technica, June 2017. https://arstechnica.com/information-technol ogy/2017/06/petya-outbreak-was-a-chaos-sowing-
wiper-not-profit-seeking-ran somware/. Google TAG. “Fog of War: How the Ukraine Conflict Transformed the Cyber Threat Landscape.” Google, February 2023. https://services.google.com/fh/files/blogs/google _fog_of_war_research_report.pdf. Gorchinskaya, Katya, and Darina Marchak. “Russia Gives Ukraine
Cheap Gas, $ 15 Billion in Loans.” Kyiv Post, December 17, 2013. https://www.kyivpost.com/article/content/ ukraine-politics/russia-gives-ukraine-cheap-gas-15-billion-in-loans-333852.html. Gorchinskaya, Katya, Olga Rudenko, and William Schreiber. “Authorities: Hackers Foiled in Bid to Rig Ukraine
Presidential Election Results.” Kyiv Post, May 25, 2014. https:// www.kyivpost.com/article/content/may-25-presidential-election/authorities-hack ers-foiled-in-bid-to-rig-ukraine-presidential-election-results-349288.html. Gordiichuk, Dana. “Юбератака за мыьйони долар1в: за нападом може стояти РФ.”
ΕκοΗΟΜίηηα правда, February 2022. https://www.epravda.com.ua/news/2022/02/16/ 682428/. Gordon, Carol, and Asher Arian. “Threat and Decision Making.” Journal of Conflict Resolution 45, no. 2 (April 2001): 196-215. https://doi.org/10.1177/002200270104 5002003. Gordon.ua. “СБУ Задержала Российских
Агентов, Которые Корректировали Обстрелы Николаевской Области. Ими Оказались Местные Жители / ВОЙНА В УКРАИНЕ /
Новости.” July 2022. https://gordonua.com/amp/news/war/sbu-zaderzh ala-rossiyskih-agentov-kotorye-korrektirovali-obstrely-nikolaevskoy-oblasti-imiokazalis-mestnye-zhiteli-1617219.html.
BIBLIOGRAPHY 303 Gorst, Isabel. “Russians Invading, Says Ukraine Leader; Tanks Reported Crossing Border.” Latimes.com, August 2014. https://www.latimes.com/world/europe/la-fg-ukrainepresident-russian-forces-20140828-story.html. Gorwa, Robert, and Max Smeets. “Cyber Conflict in Political Science: A Review of Methods and Literature.” Preprint, SocArXiv, July 2019. https://doi.org/10.31235/osf. io/fc6sg. Götz, Elias. “Russia, the West, and the Ukraine Crisis: Three Contending Perspectives.” Contemporary Politics 22, no. 3 (2016): 249-266. https://doi.org/10.1080/13569 775.2016.1201313. Grabo, Cynthia R. “Soviet Deception in the Czechoslovak Crisis.” Studies in Intelligence 45th Anniversary Issue: Special Unclassified Edition, special issue (Fall 2000): 71-86. Graham, David A. “Rumsfelds Knowns and Unknowns: The Intellectual History of a Quip.” The Atlantic, March 2014. http://www.theatlantic.com/politics/archive/2014/ 03/rumsfelds-knowns-and-unknowns-the-intellectual-history-of-a-quip/359719/. Greenberg, Andy. “How An Entire Nation Became Russia’s Test Lab for Cyberwar.” Wired, June 2017. https://www.wired.com/story/russian-hackers-attack-ukraine/. Greenberg, Andy. Sandworm: A New Era of Cyberwar and the Huntfor the Kremlins Most Dangerous Hackers. New York: Doubleday, 2019. Greenberg, Andy. “The Untold Story of NotPetya, the Most Devastating Cyberattack in History.” Wired, August 2018. https://www.wired.com/story/notpetya-cyberattackukraine-russia-code-crashed-the-world/ . Greenberg, Andy. “The US Sanctions Russians for Potentially ‘Fatal’ Triton Malware.” October 2020.
https://www.wired.com/story/russia-sanctions-triton-malware/. Greig, Ian. Subversion: Propaganda, Agitation and the Spread ofPeoples War. London: Tom Stacey, 1973. Grey, Stephen. The New Spymasters: Inside the Modern World of Espionage from the Cold War to Global Terror. New York: St. Martin’s Press, 2015. Groll, Elias. “Did Russia Knock Out Ukraine’s Power Grid?” Foreign Policy (blog), January 2016. https://foreignpolicy.com/2016/01/08/did-russia-knock-out-ukraines-powergrid/. Groll, Elias. “In a Hacked Ukrainian App, a Picture of the Future of War.” Foreign Policy (blog), December 2016. https://foreignpolicy.com/2016/12/22/in-a-hacked-ukrain ian-app-a-picture-of-the-future-of-war/. The Grugq. "Day 2 Keynote: A Short Course in Cyber Warfare.” April 2018. https://www. youtube.com/watch?v=gvS4efEakpY. The Grugq. “Foghorn: Signals through the Fog of War.” Substack newsletter. Info Op (blog), June 2022. https://grugq.substack.com/p/foghorn-signals-through-the-fogof?utm_campaign=post_embed. The Grugq. “Towards an Analysis of Russian Cyber Warfare in Ukraine Feb 2022-Dec 2022.” Kings College London, forthcoming. Grytsenko, Oksana, and Ian Traynor. “Ukraine U-Turn on Europe Pact Was Agreed with Vladimir Putin.” The Guardian, November 26, 2013, sec. World news. https://www. theguardian.com/world/2013/nov/26/ukraine-u-turn-eu-pact-putin. Guerrero-Saade, Juan Andrés. “AcidRain: A Modem Wiper Rains Down on Europe.” SentinelOne (blog), March 2022. https://www.sentinelone.com/labs/acidrain-amodem-wiper-rains-down-on-europe/.
304 BIBLIOGRAPHY Guerrero-Saade, Juan Andres. "HermeticWiper: New Destructive Malware Used in Cyber Attacks on Ukraine.” SentinelOne (blog). Accessed February 28, 2022. https:// www.sentinelone.com/labs/hermetic-wiper-ukraine-under-attack/. Guerrero-Saade, J. A. (@juanandres_gs). Ok, Folks, We’re Clearly Missing the *MOST* Important Part of All of This. Seeing as Neither @threatintel nor @ESETresearch Have Named This Monster, Let’s Call This #HermeticWiper.” Twitter, February 2022. https:// twitter.com/juanandres_gs/status/1496607141888724997. Guerrero-Saade, J. A. (@juanandres_gs). “Ok. This Isn’t a Bullshit Wiper like the Last Time. This Thing Is Meant to Be Devastating. Https://T.Co/EvP0g3jjvU.” Twitter, February 2022. https://twitter.com/juanandres_gs/status/1496599932966510600. Guzzini, Stefano. “The Concept of Power: A Constructivist Analysis.” MillenniumJournal ofInternational Studies 33, no. 3 (June 2005): 495-521. Habermas, Jürgen. The Theory of Communicative Action. Boston: Beacon Press, 1984. Hafner, Katie, and John Markoff. Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon Schuster, 1991. Harding, Luke. “Demoralised Russian Soldiers Tell of Anger at Being ‘Duped’ into War.” The Guardian, March 4,2022, sec. World News, https://www.theguardian.com/world/ 2022/mar/04/russian-soldiers-ukraine-anger-duped-into-war. Harding, Luke. “Ukraine Hit by ‘Massive’ Cyber-Attack on Government Websites.” The Guardian, January 14, 2022, sec. World News, https://www.theguardian.com/world/ 2022/jan/14/ukraine-massive-cyber-attack-government-websites-
suspected-russianhackers. Harknett, Richard J., and Max Smeets. “Cyber Campaigns and Strategic Outcomes.” Journal of Strategic Studies 45, no. 4 (March 2020): 534-567. https://doi.org/10.1080/ 01402390.2020.1732354. Hasherezade. “BadRabbit: A Closer Look at the New Version of Petya/NotPetya.” Malwarebytes Labs, October 2017. https://blog.malwarebytes.com/threat-analysis/ 2017/10/badrabbit-closer-look-new-version-petyanotpetya/. Haynes, John Earl. Spies: The Rise and Fall of the KGB in America. New Haven, CT: Yale University Press, 2009. “The Head of the Ukrainian Intelligence Service DENIED CULPABILITY! Tried to Transfer Huge Money and Emeralds across the Border, Arrested at the Presevo Crossing!” Republika.rs, Srpski telegraf, June 2022. https://www.republika.rs/topnews/serbia-news/366730/andriy-naumov-arrest-serbia. Heale, Μ. J. “Controlling Communist Subversion, 1948-1956.” In McCarthy’s Americans: Red Scare Politics in State and Nation, 1935-1965, American History in Depth, edited by Μ. J. Heale, 234-253. London: Macmillan Education UK, 1998. https://doi.org/10.1007/978-l-349-14546-l_ll. Healey, Jason. “Preparing for Inevitable Cyber Surprise.” War on the Rocks (blog), January 2022. https://warontherocks.com/2022/01/preparing-for-inevitable-cyber-surprise/ . Healey, Jason, and Karl Grindal, eds. A Fierce Domain: Conflict in Cyberspace, 1986 to 2012. Vienna, VA: Cyber Conflict Studies Association, 2013. Healey, Jason, and Robert Jervis. “The Escalation Inversion and Other Oddities of Situational Cyber Stability.” 2020. https://doi.org/10.26153/tsw/10962. Herd, Graeme P.
“Russia and the Orange Revolution’: Response, Rhetoric, Reality?” Connections 4, no. 2 (2005): 15-28. Herman, Michael. Intelligence Power in Peace and War. Cambridge: Cambridge University Press, 1996.
BIBLIOGRAPHY 305 Hern, Alex. “Hackers Who Targeted Ukraine Clean out Bitcoin Ransom Wallet.” The Guardian, July 5, 2017, sec. Technology, https://www.theguardian.com/technology/ 2017/jul/05/notpetya-ransomware-hackers-ukraine-bitcoin-ransom-wallet-motives. Hern, Alex. “Ukrainian Blackout Caused by Hackers That Attacked Media Company, Researchers Say” The Guardian, January 7, 2016, sec. Technology, https://www.theg uardian.com/technology/201 б/jan/ 07/ukrainian-blackout-hackers- attacked- media company. Herszenhorn, David Μ., and Andrew E. Kramer. “Ukraine Plans to Withdraw Troops from Russia-Occupied Crimea.” New York Times, March 20, 2014, sec. World, https:// www.nytimes.com/2014/03/20/world/europe/crimea.html. Hertling, Mark, and Molly K. Mckew. “Putins Attack on the U.S. Is Our Pearl Harbor.” Politico Magazine, 2018. https://politi.co/2LlgYOS. Hill, Patrice. “Monitor Says Ukraine Cease-Fire, Weapons Withdrawal Not Being Honored.” Radio Free Europe/Radio Liberty. Accessed August 31, 2020. https://www. rferl.org/a/monitor-osce-says-ukraine-cease-fire-heavy-weapons-withdrawal-nothonored/28324012.html. Hoffman, Frank G. “The Contemporary Spectrum of Conflict: Protracted, Gray Zone, Ambiguous, and Hybrid Modes of War.” 2016. https://www.heritage.org/sites/default/ files/2019-08/2016_Index_of_US_Military_Strength_ESSAYS_ALL.pdf. Holmes, Linda. “The Sports Riot: First We Lose (or Win), Then We Set This Sucker on Fire.” NPR., 2011. https://www.npr.org/2011/06/16/137219581/the-sports-riot-firstwe-lose-or-win-then-we-set-this-sucker-on-fire. Holubeva, Olena. “How Much Do
Ukrainian Soldiers Earn?” March 2019. https://112.international/opinion/how-much-do-ukrainian-soldiers-earn-38268.html . Hosaka, Sanshiro. “The Kremlins ‘Active Measures’ Failed in 2013: That’s When Russia Remembered Its Last Resort-Crimea.” Demokratizatsiya; Washington 26, no. 3 (Summer
2018):321-364. Howard, Philip N. Lie Machines: How to Save Democracy from Troll Armies, Deceitful Robots, Junk News Operations, and Political Operatives. New Haven, CT: Yale University Press, 2020. Howard, Philip N. Pax Technica: How the Internet of Things May Set Us Free or Lock Us Up. New Haven,
CT: Yale University Press, 2015. Hromadske.ua. “Terrorism or Negligence? Inside the Investigation into Ukraine’s Exploding Military Warehouses.” October 2017. https://en.hromadske.ua/posts/terror ism-or-negligence-inside-the-investigation-into-ukraines-exploding-military-war ehouses. Hromadske.ua.
“Выключения Електроенергн в УкраШ Було Хакерською Атакою— Експерти.” January 2017. https://hromadske.ua/posts/vidkliuchennia-elektroenerhiiv-ukraini-bulo-khakerskoiu-atakoiu. Hromadske.ua. “Слвдч! розглядають 4 верен вибух1в на склад! боеприпаав пщ Вшницею.” September 2017.
https://hromadske.ua/posts/slidchi-rozhliadaiut-4-ver sii-vybukhiv-na-skladi-boieprypasiv-pid-vinnytseiu. Hromadske.ua. “Тероризм чи недбалють: як в УкраМ розсладуються вибухи на вшськових складах.” October 2018. https://hromadske.ua/posts/iak-v-ukraini-roz sliduiutsia-vybukhy-na-viiskovykh-
skladakh. Hromadske.ua. “У Hin На 24 Лютого На Украшу Була Здшснена Кибератака— Федоров.” Громадське Padio, February 2022.
https://hromadske.radio/news/2022/02/ 24/u-nich-na-24-liutoho-na-ukrainu-bula-zdiysnena-kiberataka-fedorov.
306 BIBLIOGRAPHY Hulcoop, Adam, John Scott-Railton, Peter Tanchak, Matt Brooks, and Ron Deibert. “Tainted Leaks: Disinformation and Phishing with a Russian Nexus.” May 2017. https://citizenlab.ca/2017/05/tainted-leaks-disinformation-phish/. Hulnick, Arthur S. “What’s Wrong with the Intelligence Cycle?” In Strategic Intelligence, Vol. 2: The Intelligence Cycle, edited by Loch K. Johnson, 959-979. Westport, CT: Praeger Security International, 2007. “Industroyer2: Industroyer Reloaded.” We Live Security (blog), April 2022. https://www. welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/ . Inform Napalm. "FrolovLeaks: Church-Going Kremlin Influence Expert in Ukraine. Episode 1.” Inform Napalm. (English) (blog), January 2017. https://informnapalm.org/ en/frolovleaks-church-going-kremlin-influence-expert-in-ukraine-episode-1/. Inform Napalm. “Why Surkov Needs Private Army: Union of Donbas Volunteers (UDV) as Reserve of National Guard of Russia.” Inform Napalm. (English) (blog), April 2017. https://informnapalm.org/en/surkov-needs-private-army-union-donbas-volunteersreserve-russian-guard/. “Information on the Possible Provocation.” Accessed February 3,2022. https://cip.gov.ua/ en/news/informaciya-shodo-imovirnoyi-provokaciyi. Interfax. “Kakhovka-Titan Power Transmission Line Feeding Crimea Fixed.” Russia Beyond, January 2016. https://www.rbth.com/news/2016/01/02/kakhovka-titanpower-transmission-line-feeding-crimea-fixed_557037. Interfax-Ukraine. “Kolesnichenko Denies Combining His Parliamentary Work with Advocac.” Kyiv Post, March 5,2013.
https://www.kyivpost.com/article/content/verkho vna-rada/kolesnichenko-denies-combining-his-parliamentary-work-with-advocacy321307.html. Interfax-Ukraine. “Minsk Contact Group Reaches Agreement on Complete Ceasefire in Donbas, Starting from Easter.” April 2016. https://en.interfax.com.ua/news/general/ 340994.html. International Energy Agency. “Statistics: World—Total Primary Energy Supply (TPES) by Source (Chart).” Accessed May 11, 2019. https://www.iea.org/statistics/?coun try=WORLD year=2016 category=Energy%20supply indicator=TPESbySou rce mode=chart dataTable=BALANCES. iSight. “ISIGHT Discovers Zero-Day Vulnerability CVE-2014-4114 Used in Russian Cyber-Espionage Campaign.” October 2014. https://web.archive.org/web/2014101 5001101/https://www.isightpartners.com/2014/10/cve-2014-4114/. Jamieson, Kathleen Hall. Cyberwar: How Russian Hackers and Trolls Helped Elect a President What We Don’t, Can’t, and Do Know. New York: Oxford University Press, 2018. Jensen, Benjamin, and J. D. Work. “Cyber Civil-Military Relations: Balancing Interests on the Digital Frontier.” War on the Rocks, September 2018. https://warontherocks.com/ 2018/09/cyber-civil-military-relations-balancing-interests-on-the-digital-frontier/. Jervis, Robert. Perception and Misperception in International Politics: New Edition. Princeton, NJ: Princeton University Press, 2017. https://doi.Org/10.2307/j.ctvc77bx3 . Johnson, Loch K. On Drawing a Bright Line for Covert Operations.” American Journal of International Law 86, no. 2 (1992): 284-309. https://doi.org/10.2307/2203235. Johnson, Loch K., and James J. Wirtz,
eds. Intelligence: The Secret World of Spies: An Anthology. 4th ed. Oxford: Oxford University Press, 2015.
BIBLIOGRAPHY 307 Jönsson, Christopher. “Diplomacy, Bargaining and Negotiation.” In Handbook of International Relations, 2nd ed., edited by Walter Carlsnaes, Thomas Risse-Kappen, and Beth A. Simmons, 212-234. Los Angeles: Sage, 2013. Kalugin, Oleg. Spymaster: My Thirty-Two Years in Intelligence and Espionage against the West. New York: Basic Books, 2009. Kapsamun, Ivan. “СБУ Проти ФСБ.” April 2015. https://day.kyiv.ua/uk/article/podrob yci/sbu-proty-fsb. Kaspersky. “Bad Rabbit Ransomware.” October 2017. https://securelist.com/bad-rabbitransomware/82851/. Kaspersky. “BE2 Custom Plugins, Router Abuse, and Target Profiles.” November 2014. https://securelist.com/be2-custom-plugins-router-abuse-and-target-profiles/67353/. Kello, Lucas. “The Meaning of the Cyber Revolution: Perils to Theory and Statecraft.” International Security 38, no. 2 (2013): 7-40. Kello, Lucas. The Virtual Weapon and International Order. New Haven, CT: Yale University Press, 2017. KGB Ukrainian SSR. “F.16.0p.01-Spr.0974-0338.” July 1968. Archive Department of the Security Service of Ukraine—Former KGB Archive. KGB Ukrainian SSR. "F.16-Op.01-Spr.0976-0244.” July 1968. Archive Department of the Security Service of Ukraine—Former KGB Archive. KGB Ukrainian SSR. “F.16-Op.01-Spr.0979-0056." October 1968. Archive Department of the Security Service of Ukraine—Former KGB Archive. KGB Ukrainian SSR. “F.16-Op.01-Spr.0979-0079.” September 1968. Archive Department of the Security Service of Ukraine—Former KGB Archive. KGB Ukrainian SSR. “F.16 0p.01-Spr.0979-0267.” October 1968. Archive Department of the Security Service
of Ukraine—Former KGB Archive. KGB Ukrainian SSR. “F.16-Op.01-Spr.0981-0350.” December 1968. Archive Department of the Security Service of Ukraine-Former KGB Archive. KGB Ukrainian SSR. “F.16-Op.01-Spr.0982-0410.” January 1969. Archive Department of the Security Service of Ukraine—Former KGB Archive. Kiepova, Darya. “Потужна Юбератака На Укртелеком Вивела з Ладу 1нтернет.” Зеркало недели: Дзеркало тижня, Mirror Weekly, March 2022. https://zn.ua/ukr/ TECHNOLOGIES/potuzhna-kiberataka-na-ukrtelekom-vivela-z-ladu-internet.html. KIIS. “Press Releases and Reports—Consequences of Ukraine’s Accession to Integration Associations.” November 2013. http://kiis.com.ua/?lang=eng cat=reports8dd= 206 page=318rt=3. KIIS. “Press Releases and Reports—‘The European Union’ and ‘the Customs Union.’” March 2013. http://kiis.com.ua/?lang=eng cat=reports id=1868rpage=32 t=3. KIIS. “Press Releases and Reports—Trust in Social Institutions and Parties.” December 2020.https://kiis.com.ua/?lang=eng cat=reports id=1005. KIIS. “Press Releases and Reports—Trust in Social Institutions and Social Groups.” 2015. https://kiis.com.ua/?lang=eng cat=reports8dd=579. KIIS. “Press Releases and Reports—Trust to Social Institutes.” December 2018. https:// www.kiis.com.ua/?lang=eng cat=reports id=817 page=2. KIIS. “Press Releases and Reports—Trust to Social Institutions.” 2016. https://www.kiis. com.ua/?lang=eng cat=reports id=678. Kissinger, Henry. Diplomacy. New York: Simon Schuster, 1995. Kitson, Frank. Low Intensity Operations: Subversion, Insurgency, Peacekeeping. London: Faber, 1971.
308 BIBLIOGRAPHY Klimkovetsky, Markiyan. "СБУ Разоблачила Еще Одного Агента Спецслужб Рф: Планировал Подрывную Деятельность Во Львовской Области.” Мау 2022. https://hromadske.ua/ru/posts/sbu-razoblachila-eshe-odnogo-agenta-specsluzhb-rfplaniroval-podryvnuyu-deyatelnost-vo-lvovskoj-oblasti. KMU. “Кабшет MiHÎCTpÎB Украши—Щодо роботи шформащйнотелекомушкащйно! системи Казначейства.” December 2016. https://www.kmu.gov. ua/ua/news/249559690. Kofman, Michael, Kltya Migacheva, Brian Nichiporuk, Andrew Radin, Olseya Tkacheva, and Jenny Oberholtzer. Lessons from Russia’s Operations in Crimea and Eastern Ukraine. Santa Monica, CA: RAND, 2017. Kofman, Michael, and Matthew Rojansky. “A Closer Look at Russia’s ‘Hybrid War.’” Kennan Cable 7 (2015). https://www.wilsoncenter.org/sites/default/files/media/ documents/publication/7-KENNAN%20CABLE-ROJANSKY%20KOFMAN.pdf Koremenos, Barbara, Charles Lipson, and Duncan Snidal. “The Rational Design of International Institutions.” International Organization 55, no. 4 (Autumn 2001): 761-799. Kostyuk, Nadiya, and Yuri Μ. Zhukov. “Invisible Digital Front: Can Cyber Attacks Shape Battlefield Events?” Journal ofConflict Resolution 63, no. 2 (2017): 317-347. https://doi. org/10.1177/0022002717737138. Kott, Alexander, and Ethan Stump. “Intelligent Autonomous Things on the Battlefield.” In Artificial Intelligence for the Internet of Everything, edited by William Lawless, Ranjeev Mittu, Donald Sofge, Ira S. Moskowitz, and Stephen Russell, 47-65. London, UK: Academic Press, 2019. https://doi.org/10.1016/B978-0-12-817636-8.00003-X . Kovacs, Eduard. “Files
Encrypted by Bad Rabbit Recoverable without Paying Ransom.” Security Week, October 2017. https://www.securityweek.com/files-encrypted-bad-rab bit-recoverable-without-paying-ransom. Koval, Nikolay. “Revolution Hacking.” In Cyber War in Perspective: Russian Aggression against Ukraine, edited by Kenneth Geers, 55-58. Tallinn, Estonia: NATO Cooperative Cyber Defence Centre of Excellence, 2015. https://ccdcoe.org/sites/default/files/mul timedia/pdf/CyberWarinPerspective_full_book.pdf. Kovalchuk, Vsevolod. “L(ieï Ночг На Шдстанцп ‘Швшчна’ В1дбувся Збш.—Vsevolod Kovalchuk.” December 2016. https://www.facebook.com/permalink.php?story_fbid= 1798082313797621 id=100007876094707. Kramer, Andrew E. “Bomb Kills Pro-Russian Rebel Commander in Eastern Ukraine.” New York Times, 17 October 2016, sec. World, https://www.nytimes.com/2016/10/18/ world/europe/ukraine-rebel-arsen-pavlov-motorola-killed.html. Krämer, Bernd J. “Evolution of Cyber-Physical Systems: A Brief Review.” In Applied Cyber-Physical Systems, edited by Sang C. Suh, U. John Tanik, John N. Carbone, and Abdullah Eroglu, 1-4. New York: Springer New York, 2014. https://doi.org/10.1007/ 978-1-4614-7336-7. Kraminska, Margarita. “Рос1я не погоджуеться укласти догов1р на постачання електроенергн до Криму через формулювання—М.Джемшев.” UNN. Accessed November 24, 2022. https://www.unn.com.ua/uk/news/1537754-rosiya-ne-pogodzh uyetsya-uklasti-dogovir-na-postachannya-elektroenergiyi-do-krimu-cherez-formuly uvannya-m-dzhemilyev. Kraus, Jürgen. “Selbstreproduktion Bei Programmen.” Diploma thesis, Universität Dortmund, 1980.
http://83.133.184.251/virensimulation.org/lib/mjk00.html.
BIBLIOGRAPHY 309 Kremlin. “Address by President of the Russian Federation.” President of Russia, March 2014. http://en.kremlin.ru/events/president/news/20603. Kremlin. “Подписан Указ о Признании Республики Крым.” Президент России, March 2014. http://kremlin.ru/events/president/news/20596. Kuehl,
Daniel Т. “From Cyberspace to Cyberpower: Defining the Problem.” In Cyberpower and National Security, edited by Franklin D. Kramer, Stuart H. Starr, Larry K. Wentz, 24-42. Washington, DC: Potomac Books, 2009. Kun, Miklos. Prague Spring, Prague Fall: Blank Spots of 1968. Budapest: Akadémiai Kiadô,
1999. Kusin, Vladimir V. Prom Dubcek to Charter 77: A Study of “Normalization'’ in Czechoslovakia, 1968-1978. New York: St. Martin’s Press, 1978. Kuzmenko, Oleksiy. “Think Tank: Cyber Firm at Center of Russian Hacking Charges Misread Data.” VOA, 2017. https://www.voanews.com/a/crowdstrike-comey-
russiahack-dnc-clinton-trump/3776067.html . Kuznetsova, Katerina. “‘ПриватБанк’ Та ‘Ощадбанк’ Повшстю Вщновили Роботу Hicл я Друго'1 Потужно! Юбератаки.” TCH.Ua, February 2022. https://tsn.ua/ukray ina/privatbank-ta-oschadbank-povnistyu-vidnovili-robotu-pislya-drugoyi-potuzhn oyi-
kiberataki-1979029.html. Kuznetsova, Kateryna. “Найпотужшша Кибератака За Всю IcTopiio Украши: Ц1ль Хакер1в, Кого П1дозрюють i Як1 Насл1дки Для Держави.” ТСН. Ua, February 2022. https://tsn.ua/ukrayina/naypotuzhnisha-kiberataka-za-vsyu-istoriyu-ukrayini-cilhakeriv-kogo-pidozryuyut-i-yaki-naslidki-
dlya-derzhavi-1979239.html . Lally, Kathy, Will Englund, and William Booth. “Russian Parliament Approves Use of Troops in
Ukraine.” Washington Post, March 1,2014, sec. Europe. https://www.washing tonpost.com/world/europe/russian-parliament-approves-use-of-troops-in-crimea/ 2014/03/01/dl775f70-al51-lle3-a050-dc3322a94fa7_story.html. Landau, Susan. “Russia’s Hybrid Warriors Got the White House. Now They’re Coming for America’s Town Halls.” Foreign Policy (blog), 2017. https://foreignpolicy.com/2017/09/ 26/russias-hybrid-warriors-are-coming-for-american-civil-society-hacking-trumpclinton/. Langner, Ralph. “To Kill a Centrifuge.” November 2013. https://www.langner.com/wpcontent/uploads/2017/03/to-kill-a-centrifuge.pdf. Lanoszka, Alexander. "Russian Hybrid Warfare and Extended Deterrence in Eastern Europe.” International Affairs 92, no. 1 (January 2016): 175-195. https://doi.org/ 10.1111/1468-2346.12509. Lawson, Sean. “Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats.” Journal of Information Technology Politics 10, no. 1 (2013): 86-103. https://doi.org/10.1080/19331681.2012.759059. Lawson, Sean, and Michael K. Middleton. “Cyber Pearl Harbor: Analogy, Fear, and the Framing of Cyber Security Threats in the United States, 1991-2016.” First Monday, March 2019. https://doi.org/10.5210/fm.v24i3.9623. Lee, Melissa Μ. Crippling Leviathan: How Foreign Subversion Weakens the State. Ithaca, NY: Cornell University Press, 2020. Lessig, Lawrence. “Code Is Law.” January 2000. http://harvardmagazine.com/2000/01/ code-is-law-html. “Lessons from Russia’s Cyber-War in Ukraine.” The Economist, November 30, 2022. https://www.economist.com/science-and-
technology/2022/ll/30/lessons-from-russ ias-cyber-war-in-ukraine.
310 BIBLIOGRAPHY Levin, Dov H. Meddling in the Ballot Box: The Causes and Effects of Partisan Electoral Interventions. New York: Oxford University Press, 2020. Levy, Jack S. “The Causes of War and the Conditions of Peace.” Annual Review ofPolitical Science 1, no. 1 (1998): 139-165. https://doi.Org/10.1146/annurev.polisci.l.l.139 . Leyden, John. “FedEx: TNT NotPetya Infection Blew a $300m Hole in Our Numbers.” September 2017. https://www.theregister.co.uk/2017/09/20/fedex_notpe tya_damages/. Leyden, John. “Hop on, Average Rabbit: Latest Extortionware Menace Flopped.” October 2017. https://www.theregister.co.uk/2017/10/26/bad_rabbit_post_mortem/. Libicki, Martin C. Cyberdeterrence and Cyberwar. Santa Monica, CA: Rand, 2009. Libiseller, Chiara. “‘Hybrid Warfare’ as an Academic Fashion.” Journal of Strategic Studies 46, no. 4 (February 2023): 858-880. https://doi.org/10.1080/01402390.2023.2177987. Liff, Adam P. “Cyberwar: A New Absolute Weapon ? The Proliferation of Cyberwarfare Capabilities and Interstate War.” Journal ofStrategic Studies 35, no. 3 (June 2012) : 401 428. https://doi.org/10.1080/01402390.2012.663252. Lindsay, Jon R. “The Impact of China on Cybersecurity: Fiction and Friction.” International Security 39, no. 3 (2014): 7-47. Lindsay, Jon R. “Restrained by Design: The Political Economy of Cybersecurity.” Digital Policy, Regulation and Governance 19, no. 6 (July 2017): 493-514. https://doi.org/ 10.1108/DPRG-05-2017-0023. Lindsay, Jon R. “Stuxnet and the Limits of Cyber Warfare.” Security Studies 22, no. 3 (2013): 365-404.
https://doi.org/10.1080/09636412.2013.816122 . Lindsay, Jon R., and Erik Gartzke. “Coercion through Cyberspace: The Stability-Instability Paradox Revisited.” In The Power to Hurt: Coercion in Theory and in Practice, edited by Peter Krause, 179-203. New York: Oxford University Press, 2018. Lipsky, Andrei. “«Представляется Правильным Инициировать Присоединение Восточных Областей Украины к России».” Новая Газета—Novayagazeta.Ru, February 2015. https://www.novayagazeta.ru/articles/2015/02/24/63168-171-preds tavlyaetsya-pravilnym-initsiirovat-prisoedinenie-vostochnyh-oblastey-ukrainy-k-ros sii-187. Littell, Robert, ed. The Czech Black Book. Westport, CT: Praeger, 1968. Loiko, Sergei L. “Ukraine Cracks' down on Demonstrators; Russia Issues Warning.” Latimes.com, 2014. https://www.latimes.com/world/worldnow/la-fg-wn-ukraineraid-russia-supporters-20140408-story.html. Losh, Jack. “Ukrainian Rebel Leaders Divided by Bitter Purge.” Washington Post. 3 October 2016. https://www.washingtonpost.com/world/europe/ukrainian-rebel-lead ers-divided-by-bitter-purge/2016/10/03/2e0076ac-8429-lle6-b57d-dd49277af02f_st ory.html. Low, A. Maurice. “The Vice of Secret Diplomacy.” North American Review 207, no. 747 (1918): 209-220. Lukes, Steven. Power: A Radical View. 2nd ed. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan, 2004. Lynn, William J., III. “Defending a New Domain.” Foreign Affairs, 2010. https://www.for eignaffairs.com/articles/united-states/2010-09-01/defending-new-domain. Mahoney, James, and Kathleen Ann Thelen, eds. Explaining Institutional Change: Ambiguity, Agency, and Power.
Cambridge: Cambridge University Press, 2010. Malwarebytes. “Keeping Up with the Petyas: Demystifying the Malware Family.” Malwarebytes Labs, July 2017. https://blog.malwarebytes.com/cybercrime/2017/07/ keeping-up-with-the-petyas-demystifying-the-malware-family/.
BIBLIOGRAPHY 311 MalwareHunterTeam (@malwrhunterteam). “XData Is Still Going, Even Closer to Cerber’s 24 Hours Numbers . . . Pic.Twitter.Com/YqOAODhoyq.” Twitter, May 2017. https://twitter.com/malwrhunterteam/status/865618366412849157. Mandiant. “UNC1151 Assessed with High Confidence to Have Links to Belarus, Ghostwriter Campaign Aligned with Belarusian Government Interests.” November 2021. https://www.mandiant.com/resources/uncll51-linked-to-belarus-government. March, James G., and Johan P. Olsen. “The Institutional Dynamics of International Political Orders.” International Organization 52, no. 4 (1998): 943-969. Marczak, Bill, and John Scott-Railton. “The Million Dollar Dissident: NSO Groups iPhone Zero-Days Used against a UAE Human Rights Defender.” Citizen Lab (blog), August 2016. https://citizenlab.org/2016/08/million-dollar-dissident-iphone-zeroday-nso-group-uae/. Mark, Melvin Μ., Fred B. Bryant, and Darrin R. Lehman. “Perceived Injustice and Sports Violence.” In Sports Violence, Springer Series in Social Psychology, edited by Jeffrey H. Goldstein, 83-109. New York: Springer New York, 1983. https://doi.org/10.1007/978l-4612-5530-7_6. Martin, David. “Russian Hacking Proves Lethal after Ukrainian Military App Hijacked.” December 2016. https://www.cbsnews.com/news/russian-hacking-proves-lethalafter-ukrainian-military-app-compromised/ . Martynets, Sergey. “США шдозрюють Pociro у причетносй до к1бератак на украшсью електромереж!.” Шформацшне агентство Украшсью Нацюнальш Новини (УНН). Bei онлайн новини дня в Украпл за сьогодш—найсв1жшп, останш, Головин January 2016.
https://www.unn.com.ua/uk/news/1536191-ssha-pidozryu yut-rosiyu-u-prichetnosti-do-kiberatak-na-ukrayinski-elektromerezhi. Maschmeyer, Lennart. “A New and Better Quiet Option? Strategies of Subversion and Cyber Conflict.” Journal of Strategic Studies 46, no. 3 (2023): 570-594. https://doi.org/ 10.1080/01402390.2022.2104253. Maschmeyer, Lennart. “Subversion, Cyber Operations, and Reverse Structural Power in World Politics.” European Journal ofInternational Relations 29, no. 1 (March 2023) : 79ЮЗ. https://doi.org/10.! 177/13540661221117051. Maschmeyer, Lennart. “The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations.” International Security 46, no. 2 (October 2021): 51-90. https://doi.org/ 10.1162/isec_a_00418. Maschmeyer, Lennart. “Subverting Skynet: The Strategic Promise of Lethal Autonomous Weapons and the Perils of Exploitation.” In 202214th International Conference on Cyber Conflict: Keep Moving! (CyCon), vol. 700, 2022, 155-171. https://doi.org/10.23919/ CyCon55549.2022.9811008. Maschmeyer, Lennart, Alexei Abrahams, Peter Pomerantsev, and Volodymyr Yermolenko. “Donetsk Don’t Tell—‘Hybrid War’ in Ukraine and the Limits of Social Media Influence Operations.” Journal of Information Technology and Politics (2023). https://doi.org/10.1080/19331681.2023.2211969 . Maschmeyer, Lennart, Ronald J. Deibert, and Jon R. Lindsay. “A Tale of Two Cybers— How Threat Reporting by Cybersecurity Firms Systematically Underrepresents Threats to Civil Society.” Journal ofInformation Technology Politics 18, no. 1 (January 2021): 1-20.
https://doi'org/10.1080/19331681.2020.1776658. “Massive Power Outage Hits Crimea.” Radio Free Europe/Radio Liberty, 2018. https:// www.rferl.org/a/massive-power-outages-hit-crimea-cause-unclear/2928882I.html.
312 BIBLIOGRAPHY Matveeva, Anna. Through Times of Trouble: Conflict in Southeastern Ukraine Explained from Within, Russian, Eurasian, and Eastern European Politics. Lanham, MD: Lexington Books, 2018. Matyash, Tanya. "Зеленський В1дсторонив Венед1ктову Та Усунув Баканова.” LB.ua, July 2022. https://lb.ua/news/2022/07/17/523439_zelenskiy_vidstoroniv_venedikt ovu.html. Maundrill, Beth. “Why Russia Has Refrained from a Major Cyber-Attack against the West.” Cyber Security Hub, June 2022. https://www.cshub.com/attacks/articles/whyrussia-has-refrained-from-a-cyber-attack-against-the-west . Maymi, Fernando, and Scott Lathrop. “AI in Cyberspace: Beyond the Hype.” Cyber Defense Review 3, no. 3 (2018): 71-82. Mazarr, Michael J. “Mastering the Gray Zone: Understanding a Changing Era of Conflict.” 2015. https://apps.dtic.mil/sti/citations/AD 1000186. McCarthy, Tom, and Alan Yuhas. “Ukraine Crisis: Kiev Launches ‘Anti-Terror Operation’ in East—Live Updates.” The Guardian, April 15, 2014. https://www.theguardian.com/ world/2014/apr/15/ukraine-military-forces-russia-live-blog. McClain, Dylan Loeb. “Ludek Pachman, 78, Chess Star Imprisoned after ‘Prague Spring.”’ New York Times, March 13, 2003, sec. World, https://www.nytimes.com/2003/03/13/ world/ludek-pachman-78-chess-star-imprisoned-after-prague-spring.html. McKinsey. “Insider Threat: The Human Element of Cyberrisk.” 2019. https://www.mckin sey.com/business-functions/risk/our-insights/insider-threat-the-human-element-ofcyberrisk. McKune, Sarah, Ronald Deibert, Bill Marczak, Geoffrey Alexander, and John ScottRailton. “Commercial Spyware:
The Multibillion Dollar Industry Built on an Ethical and Legal Quagmire.” Citizen Lab, December 2017. https://citizenlab.ca/2017/12/ legal-overview-ethiopian-dissidents-targeted-spyware/. McSherry, J. Patrice. Predatory States: Operation Condor and Covert War in Latin America. Lanham, MD: Rowman Littlefield Publishers, 2012. Mearsheimer, John J. “The False Promise of International Institutions.” International Security 19, no. 3 (1994): 5-49. https://doi.org/10.2307/2539078. Mendel, luliia. ‘Tn Ukraine, a Huge Ammunition Depot Catches Fire.” New York Times, 27 September 2017, sec. World, https://www.nytimes.com/2017/09/27/world/europe/ ukraine-ammunition-depot-explosion.html. Menon, Rajan, and Eugene B. Rumer. Conflict in Ukraine: The Unwinding of the Post-Cold War Order, Boston Review Originals. Cambridge, MA: MIT Press, 2015. Michels, Eckard. Guillaume, Der Spion: Eine Deutsch-Deutsche Karriere. Berlin: Ch. Links Verlag, 2013. Microsoft. “Destructive Malware Targeting Ukrainian Organizations.” Microsoft Security Blog (blog), January 2022. https://www.microsoft.com/security/blog/2022/01/15/dest ructive-malware-targeting-ukrainian-organizations/. Miller, Greg, and Catherine Belton. “Russia’s Spies Misread Ukraine and Misled Kremlin as War Loomed.” Washington Post, August 2022. https://www.washingtonpost.com/ world/interactive/2022/russia-fsb-intelligence-ukraine-war/. Miller, Maggie. “Russian Invasion of Ukraine Could Redefine Cyber Warfare.” Politico, January 2022. https://www.politico.com/news/2022/01/28/russia-cyber-army-ukra ine-00003051. Min, Byungho, and Vijay
Varadharajan. “A Novel Malware for Subversion of Self- Protection in Anti-Virus.” Software: Practice and Experience 46, no. 3 (2016): 361-379. https://doi.org/10.1002/spe.2317.
BIBLIOGRAPHY 313 Mingas, Melanie. “Ukrtelecom Restores 85% of Services after ‘Powerful Cyberattack.’” Capacity Media (blog), March 2022. https://www.capacitymedia.com/article/29wch9 71qqy0z3dyifx8g/ukrtelecom-restores-85-of-services-after-powerful-cyberattack. MKA Cyber. “Maersk Replaces IT Infrastructure After NotPetya Ransomware Infection.” MKACyber, Inc. (blog), January 2018. https://mkacyber.io/news/maersk-shipping-rein stalled-entire-infrastructure-after-notpetya-ransomware/. Morgenthau, Hans J. Politics among Nations: The Struggle for Power and Peace. New York: Alfred A. Knopf, 1948. Motyl, Alexander J. “The Weakness of Eastern Ukraine’s pro-Russian Separatists.” Al Jazeera, April 2014. http://america.aljazeera.com/opinions/2014/4/eastern-ukraineprorussianseparatistsdonetskdonbas.html. Mueller, Robert S., III. “Report on the Investigation into Russian Interference in the 2016 Presidential Election.” March 2019. https://www.justice.gov/storage/report.pdf . Myers, Philip A. “Subversion: The Neglected Aspect of Computer Security.” Master’s thesis, Naval Postgraduate School, 1980. Nakasone, Paul Μ. “A Cyber Force for Persistent Operations.” Joint Force Quarterly 92 (2019): 10-14. “Natanz Enrichment Complex.” Nuclear Threat Initiative (blog). Accessed January 7, 2022. https://www.nti.org/education-center/facilities/natanz-enrichment-complex/. National Cyber Security Centre. “Reckless Campaign of Cyber Attacks by Russian Military Intelligence Service Exposed.” October 2018. https://www.ncsc.gov.uk/news/ reckless-campaign-cyber-attacks-russian-military-intelligence-service-
exposed. NATO. “Closing Press Conference by NATO Secretary General Jens Stoltenberg Following the Meetings of NATO Foreign Ministers in Antalya, Turkey.” May 2015. http://www.nato.int/cps/en/natohq/opinions_l 19432.htm. NATO. “Keynote Address by NATO Secretary General at the NATO Cyber Defence Pledge Conference.” November 2022. https://www.nato.int/cps/en/natohq/opinions_ 208925.htm. Navratil, Jaromir. The Prague Spring 1968: A National Security Archive Documents Reader. Budapest: Central European University Press, 1998. Nechepurenko, Ivan. “Crimea to Face Power Shortages for Months, Officials Say.” New York Times, 8 January 2016, sec. World, https://www.nytimes.com/2016/01/09/ world/europe/crimea-power-ukraine-russia.html. Nechepurenko, Ivan, and Neil MacFarquhar. “As Sabotage Blacks Out Crimea, Tatars Prevent Repairs.” New York Times, November 24, 2015, sec. Europe, https://www.nyti mes.com/2015/11 /24/world/ europe/crimea-tatar-power-lines-ukraine.html. Nekrasov, Vsevolod. “Украина Проигрывает Кибервойну. Хакеры Наносят Удар По Минфину.” Экономическая правда, December 2016. http://www.epravda.com.ua/ rus/ publications/2016/12/9/613957/. NetBlocks (@netblocks). Twitter, February 2022. “i Commercial satellite operator Viasat is investigating a suspected cyberattack that caused a partial outage of its KA-SAT net work in Europe. Network data indicate that the incident began on 24 February ~4 a.m. UTC and is cur rently ongoing |H”, https://twitter.com/netblocks/status/1498365220107997191. NetBlocks (@netblocks). Twitter, March 2022. “Д Confirmed: A major internet dis
ruption has been registered across #Ukraine on national provider #Ukrtelecom; real time network data show connectivity collapsing to 13% of pre-war levels; the provider reports issues assigning new sessions fi Background: https://netblocks.org/reports/
314 BIBLIOGRAPHY internet-disruptions-registered-as-russia-moves-in-on-ukraine-W80p4k8K,” https:// twitter.com/netblocks/status/1508453511176065033. NetBlocks (@netblocks). Twitter, March 2022. “A Update: Ukraine's national internet provider Ukrtelecom has confirmed a cyberattack on its core infrastructure. Real-time network data show an ongoing and intensifying nation-scale disruption to service, which is the most severe registered since the invasion by Russia.” https://twitter.com/ netblocks/status/1508465391244304389. New Voice of Ukraine. “Why Zelenskyy Removed the Heads of the SBU and PGO.” July 2022. https://english.nv.ua/nation/why-zelenskyy-sacked-the-prosecutor-generaland-sbu-chief-ukraine-news-50257409.html . NIKCENTER. “Веб-сайты Кабмина не открываются—Минцифры сообщают о массовой DDoS-атаке.” February 2022. https://nikcenter.org/newsItem/65950. NPR. “Ukrainian Servicemen Reported Shot by Masked Soldiers In Crimea.” NPR, March 2014. https://www.npr.org/sections/thetwo-way/2014/03/18/291148781/ukrainianservicemen-reported-shot-by-masked-soldiers-in-crimea . Nye, Joseph S. “Deterrence and Dissuasion in Cyberspace.” International Security 41, no. 3 (January 2017): 44-71. https://doi.Org/10.l 162/ISEC_a_00266. Nye, Joseph S. The Future ofPower. New York: PublicAffairs, 2011. Nye, Joseph S. “Soft Power.” Foreign Policy, no. 80 (Autumn 1990): 153-171. https://doi. org/10.2307/1148580. Obozrevatel. “ГНсля кибератаки на ‘Прикарпаттяобленерго’ в США переглянуть захист енергомереж.” Политика, January 2016. https://www.obozrevatel.com/ukr/ news/58420-pislya-kiberataki-na-
prikarpattyaoblenergo-v-ssha-pereglyanut-zahistenergomerezh.htm. Oksamytna, Ksenya. “Ukraine: Russian Attitudes to Ukrainians Can Help to Explain the Atrocities.” King’s College London, June 2022. https://www.kcl.ac.uk/ukraine-russianattitudes-fo-ukrainians-can-help-to-explain-the-atrocities . Oliphant, Roland, and Charlotte Krol. “Huge Explosion at Ukraine Ammunition Depot Prompts Mass Evacuation.” The Telegraph, September 2017. https://www.telegraph. co.uk/news/2017/09/27/fire-ukraine-ammunition-depot-prompts-mass-evacuation/ . Oliveria, Paul. “New ‘Prestige’ Ransomware Impacts Organizations in Ukraine and Poland.” Microsoft Security Blog (blog), October 2022. https://www.microsoft.com/ en-us/security/blog/2022/Ю/ 14/new-prestige-ransomware- impacts-organizationsin-ukraine-and-poland/. O’Rourke, Lindsey A. Covert Regime Change: America’s Secret Cold War, Cornell Studies in Security Affairs. Ithaca, NY: Cornell University Press, 2018. Osborn, Andrew, Polina Nikolskaya, and Polina Nikolskaya. “Russia’s Putin Authorises ‘Special Military Operation’ against Ukraine.” Reuters, February 2022, sec. Europe. https://www.reuters.com/world/europe/russias-putin-authorises-military-operati ons-donbass-domestic-media-2022-02-24/. OSCE. “International Election Observation Mission.” May 2014. https://www.osce.org/ odihr/elections/ukraine/119078?download=true. Office of Strategic Services. “Simple Sabotage Field Manual.” 17 January 1944, Washington D.C. https://www.cia.gov/static/5c875f3ec660e092cf893f60b4a288df/SimpleSabot age.pdf Ouimet, Matthew J. “Reconsidering the Soviet Role.” In
The Prague Spring and the Warsaw Pact Invasion of Czechoslovakia, 1968: Forty Years Later, edited by Μ. Mark Stolarik, 19-29. Mundelein, IL: Bolchazy-Carducci Publishers, 2010.
BIBLIOGRAPHY 315 Pagliery, Jose, “Scary Questions in Ukraine Energy Grid Hack.” CNNMoney, January 18, 2016. https://money.cnn.com/2016/01/18/technology/ukraine-hack-russia/ index.html. Pape, Robert A. Bombing-to Win: Air Power and Coercion in War. Ithaca and London: Cornell University Press, 1996. Peisakhin, Leonid, and Arturas Rozenas. “Electoral Effects of Biased Media: Russian Television in Ukraine.” American Journal ofPolitical Science 62, no. 3 (2018): 535-550. https://doi.org/10.! 11 l/ajps.12355. Perlroth, Nicole, and David E. Sanger. “Cyberattacks Put Russian Fingers on the Switch at Power Plants, U.S. Says.” New York Times, March 15,2018, sec.'U.S. https://www.nyti mes.com/2018/03/15/us/politics/russia-cyberattacks.html. Peterson, Dale. Offensive Cyber Weapons: Construction, Development, and Employment.” Journal of Strategic Studies 36, no. 1 (2013): 120-124. https://doi.org/ 10.1080/01402390.2012.742014. Petrov, Nikita. “The KGB and the Czechoslovak Crisis of 1968.” In The Prague Spring and the Warsaw Pact Invasion of Czechoslovakia in 1968, Harvard Cold War Studies Book Series, edited by Günter Bischof, Stefan Karner, and Peter Ruggenthaler, 145-164. Lanham, MD: Lexington Books, 2010. Polityuk, Pavel. “EXCLUSIVE: Ukraine Suspects Group Linked to Belarus Intelligence over Cyberattack.” Reuters, January 2022, sec. Europe, https://www.reuters.com/ world/europe/exclusive-ukraine-suspects-group-linked-belarus-intelligence-overcyberattack-2022-01 -15/. Polityuk, Pavel. “Massive Cyberattack Hits Ukrainian Government Websites as West Warns on Russia Conflict.” Reuters,
January 2022, sec. Technology, https://www.reuf ers.com/technology/massive-cyberattack-hits-ukrainian-government-websitesamid-russia-tensions-2022-01-14/. Pool, Ithiel De Sola. “Public Opinion in Czechoslovakia.” Public Opinion Quarterly 34, no. 1 (1970): 10-25. Poznansky, Michael. “Feigning Compliance: Covert Action and International Law.” International Studies Quarterly 63, no. 1 (March 2019): 72-84. https://doi.org/10.1093/ isq/sqy054. Poznansky, Michael. In the Shadow ofInternational Law: Secrecy and Regime Change in the Postwar World. Oxford: Oxford University Press, 2020. Prados, John. Safefor Democracy: The Secret Wars ofthe CIA. (Chicago: Ivan R. Dee, 2006). PResident.gov.ua. “Стратепчш Об’екти Мають Бути Захищен1, а Винт у Вибухах На Вшськових Складах Притягнут! До Вщповвдальносп—Президент Щодо Ситуаци Шд Калишвкою.” Офщшне штернет-представництво Президента Украши, September 2017. https://www.president.gov.ua/news/strategichni-obyektimayut-buti-zahisheni-vinni-u-vibuhah-na-43610. ProofPoint. “What Is Bad Rabbit Ransomware?” Proofpoint (blog), February 2021. https:// www.proofpoint.com/us/threat-reference/bad-rabbit . “Pro-Russia Forces Enter Ukraine Naval Base.” Al Jazeera, March 2014. https://www. . aljazeera.com/news/europe/2014/03/pro-russia-forces-enter-Ukraine-naval-base- 20143198741233396.html. Prozumenshchikov, Mikhail. “Politburo Decision-Making on the Czechoslovak Crisis in 1968.” In The Prague Spring and the Warsaw Pact Invasion of Czechoslovakia in 1968, Harvard Cold War Studies Book Series, edited by Günter Bischof, Stefan Karner, and Peter
Ruggenthaler, 103-144. Lanham, MD: Lexington Books, 2010.
316 BIBLIOGRAPHY ‘‘Putin Says Crimea Now Free of Reliance on Kiev for Its Power.” Reuters, May 2016. https://www.reuters.com/article/us-russia-crimea-power-idUSKCN0Y21K5 . “Putin Says Russia, Ukraine Torn Apart to Prevent Major Rival from Emerging.” TASS. Accessed March 1,2021. https://tass.com/politics/1122727. Racz, Andras. “Russia’s Hybrid War in Ukraine.” Finnish Institute of International Affairs, June 2015. https://www.fiia.fi/en/publication/russias-hybrid-war-in-ukraine. Radkovets, Yuriy. “Lessons of Russia’s ‘Hybrid War’ against Ukraine.” Accessed March 23, 2020. http://bintel.com.ua/en/article/10-13-lessons/. Rajivan, Prashanth, and Cleotilde Gonzalez. “Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks.” Frontiers in Psychology 9 (February 2018), 1-14. https://doi.org/10.3389/fpsyg.2018.00135. “Rebels Declare Victory in East Ukraine Vote on Self-Rule.” Reuters, May 2014. https:// www.reuters.com/article/us-ukraine-crisis-idUSBREA400LI20140511. Reliaquest. “Threat Advisory: HermeticWiper.” Legacy (blog), February 2022. https:// www.reliaquest.eom/i/blog/threat-advisory-hermeticwiper/. Reuters Staff. “Ukraine, Separatists to Strive for Full Ceasefire from September 1.” Reuters, August 2015. https://www.reuters.com/article/us-ukraine-crisis-ceasefire/ ukraine-separatists-to-strive-for-full-ceasefire-from-september-l-idUSKCNOQV 29A20150826. ReverseMode. “VIASAT Incident: From Speculation to Technical Details.” March 2022. https://www.reversemode.com/2022/03/viasat-incident-from-speculation-to.html. Rezabek, J. “Let Us Pay
Attention.” MladaFronta, July 23,1968. Richelson, Jeffrey. A Century of. Spies: Intelligence in the Twentieth Century. New York: Oxford University Press, 1995. Rid, Thomas. Active Measures: The Secret History ofDisinformation and Political Warfare. New York: Farrar, Straus and Giroux, 2020. Rid, Thomas. Cyber War Will Not Take Place. Oxford: Oxford University Press, 2013. RisklQ. “Tracking the BadRabbit Ransomware to an Ongoing Campaign of Target Selection.” October 2017. https://www.riskiq.com/blog/labs/badrabbit/. Risse, Thomas. “‘Let’s Argue!’: Communicative Action in World Politics.” International Organization 54, no. 1 (2000): 1-39. Romanosky, Sasha, and Benjamin Boudreaux. “Private-Sector Attribution of Cyber Incidents: Benefits and Risks to the U.S. Government.” International Journal of Intelligence and Counterintelligence 34, no. 0 (2021): 463-493. https://doi.org/10.1080/ 08850607.2020.1783877. Rosen, Kenneth R. “The Man at the Center of the New Cyber World War.” Politico, July 2022. https://www.politico.com/news/magazine/2022/07/14/russia-cyberattacksukraine-cybersecurity-00045486. Ross, Stephen A. “The Economic Theory of Agency: The Principal’s Problem.” American Economic Review 63, no. 2 (1973): 134-139. Roth, Florian, Pasquale Stirparo, David Bizeul, Brian Bell, Ziv Chang, Joel Esler, Kristopher Bleich, et al. “APT Groups and Operations.” Accessed July 3, 2022. https:// docs.google.com/spreadsheets/d/lH9_xaxQHpWaa4O_Son4Gx0YOIzlcBWMsdveP FX68EKU/edit?usp=embed_facebook. Rovner, Joshua. “Cyber War as an Intelligence Contest.” War on the Rocks, September 2019.
https://warontherocks.com/2019/09/cyber-war-as-an-intelligence-contest/. Rovner, Joshua. Fixing the Facts: National Security and the Politics of Intelligence. Ithaca and New York: Cornell University Press, 2011.
BIBLIOGRAPHY 317 RSA. “Kingslayer—A Supply Chain Attack.” 2017. http://www.rsa.com/en-us/blog/201702/kingslayer-a-supply-chain-attack. Rudenko, Olga. “Separatist Crisis Flares Again Today in Ukraine’s Eastern Regions.” Kyiv Post, April 7, 2014. https://www.kyivpost.com/article/content/war-against-ukraine/ separatist-crisis-flares-again-today-in-ukraines-eastern-regions-342351.html. “Russia Accuses U.S. of Increasing Subversion.” Irish Times, May 1968. “Russia Decides to Impose Food Embargo against Ukraine—Minister.” TASS, November 2015. http://tass.com/economy/837503 . “Russia Not Seeking Regime Change in Ukraine, People Should Have Freedom of Choice— Lavrov.” TASS, April 2022. https://tass.com/politics/1439823. “Russia Provided 5 Tons of Explosives and Weapons to Yanukovych in January to Disperse the Maidan.” Ukrainian Week, April 2014. https://ukrainianweek.com/News/106701. “Russia Says It Wants to End Ukraine’s ‘Unacceptable Regime.’” AP News, July 2022. https://apnews.com/article/russia-ukraine-zelenskyy-kyiv-black-sea-arab-leagueb5c583e8d057897cfdef6b407el 13339. “Russia Takes Control of Chernobyl Nuclear Power Plant.” USA TODAY, 25 February 2022.https://www.youtube.com/watch?v=lpYoxBTyRec. “Russia: The FSB Branches Out.” Stratfor (blog), 2008. https://worldview.stratfor.com/arti cle/russia-fsb-branches-out. Russia Today. “95.7% of Crimeans in Referendum Voted to Join Russia—Preliminary Results.” RT International, March 2014. https://www.rt.com/news/crimea-vote-joinrussia-210/. Russia Today. “Bad Rabbit Cryptoware Attack: New Virus Hits Companies in Russia, Turkey,
Germany Ukraine.” RT International, October 2017. https://www.rt.com/ news/407655-bad-rabbit-cryptoware-attack/. Russia Today. “US Blames Moscow for NotPetya Malware, Which Hit Russia Too.” RT International, February 2018. https://www.rt.com/news/418955-us-blames-russianotpetya-cyber-attack/. “Russians Twice Tried to Storm Zelensky’s Compound in Early Hours of War, Aide Says.” Times of Israel, April 2022. https://www.timesofisrael.com/russians-twice-tried-tostorm-zelensky-compound-in-early-hours-of-war-report/. “Russophone Identity in Ukraine.” Ukraine Center for Independent Political Research, 2017. http://www.ucipr.org.ua/publicdocs/RussophoneIdentity_EN.pdf. Saito, Mari, and Maria Tsvetkova. “How Russia Spread a Secret Web of Agents across Ukraine.” Reuters. Accessed July 29, 2022. https://www.reuters.com/investigates/spec ial-report/ukraine-crisis-russia-saboteurs/. Salem, Harriet. “Kiev Hits Back at Pro-Russia Rebels as Ukraine Moves towards Civil War.” The Observer, May 3, 2014, sec. World News, https://www.theguardian.com/ world/2014/may/03/ukraine-civil-war-kiev-russia-slavyansk. Sanger, David. Confront and Conceal: Obama’s Secret Wars and Surprising Use ofAmerican Power. New York: Broadway Paperbacks, 2012. Sanger, David E. The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. New York: Broadway Books, 2019. SANS. “Analysis of the Cyber Attack on the Ukrainian Power Grid.” March 2016. “Satellite Outage Knocks out Thousands of Enercon’s Wind Turbines.” Reuters, February 2022, sec. Energy: https://www.reuters.com/business/energy/satellite-outage-knocksout-
control-enercon-wind-turbines-2022-02-28/.
318 BIBLIOGRAPHY Viasat Surfbeam 2+ KA-SAT Modem inkl. WLAN Router”, Sat_Speed+, accessed January 13, 2023, https://web.archive.org/web/20200921120922/https://www.satspeed.com/ internet-via-satellit/satellitemodem-tria-antenna/viasat-surfbeam-2plus-toowaykasat-modem.html. Satter, Raphael. “Satellite
Outage Caused ‘Huge Loss in Communications’ at War’s Outset—Ukrainian Official.” Reuters, March 2022, sec. World. https://www.reuters. com/world/satellite-outage-caused-huge-loss-communications-wars-outset-ukrain ian-official-2022-03-15/. Satter, Raphael, and James Pearson. “Recent Ukraine Outage
Caused by Modest Cyberattack, Data Shows.” Reuters, February 2022, sec. Technology, https://www.reut ers.com/technology/recent-ukraine-outage-caused-by-modest-cyberattack-datashows-2022-02-17/. SBU. “СБУ Викрила Агентурну Мережу ГРУ Рф, До Яко1 Входив Народний Депутат Украши (Вщео).” SSU, June 2022.
https://ssu.gov.ua/novyny/sbu-vykryla-ahenturnumerezhu-hru-rf-do-yakoi-vkhodyv-narodnyi-deputat-ukrainy-video . SBU. “СБУ Попередила Спробу Росшських Спецслужб Вивести з Ладу Об’екти Енергетики Украши.” December 2015. https://web.archive.org/web/20160103175
824/http://www.sbu.gov.ua/sbu/control/uk/publish/article?art_id=170951 cat_id= 39574. SBU. “СБУ Припинила Д1яльшсть Агентурно! Мереж: Феб Рф, Яка Д1яла в Декшькох Областях Украши (Вщео).” SSU, August 2022. https://ssu.gov.ua/novyny/ sbu-prypynyla-diialnist-ahenturnoi-merezhi-fsb-rf-yaka-diiala-v-
dekilkokh-oblasti akh-ukrainy-video. Schelling, Thomas C. Arms and Influence. New Haven, CT: Yale University Press, 2008. Schneider, Jacquelyn.
“A World without Trust.” Foreign Affairs, December 2021. https:// www.foreignaffairs.com/articles/world/2021-12- 14/world-without-trust. Schwirtz, Michael. “Top Secret Russian Unit Seeks to Destabilize Europe, Security Officials Say.” New York Times, October 8,2019, sec. World, https://www.nytimes.com/ 2019/10/08/world/europe/unit-29155-russia-gru.html. Sebenius, Alyza. “Will Ukraine Be Hit by Yet Another Holiday Power-Grid Hack?” The Atlantic, December 2017. https://www.theatlantic.com/technology/archive/2017/12/ ukraine-power-grid-hack/548285/. Secureworks. “Disruptive HermeticWiper Attacks Targeting Ukrainian Organizations.” February 2022. https://www.secureworks.com/blog/disruptive-hermeticwiper-atta cks-targeting-ukrainian-organizations. Secureworks. “WhisperGate: Not NotPetya.” January 2022. https://www.secureworks. com/blog/whispergate-not-notpetya. Segodnya. “В ‘Зачистке’ Майдана Участвовали Сотрудники ФСБ России—СБУ” April 2014. https://www.segodnya.ua/criminal/v-zachistke-maydana-uchastvovalisotrudniki-fsb-rossii-sbu-509753.html. Senko, Ulyana. “Росшсью Хакери Здшснюють Юбератаки На Лопстичш Компани Украши Та Полыщ.” LVIV.MEDIA, December 2022. https://lviv.media/viyna/62344rosijski-hakeri-zdijsnyuyut-kiberataki-na-logistichni-kompaniyi-ukrayini-ta-polshi/. Shandler, Ryan, Michael L. Gross, and Daphna Canetti. “Cyberattacks, Psychological Distress, and Military Escalation: An Internal Meta-Analysis,” Journal of Global Security Studies 8, no. 1 (2023): 1-19. Shevchenko, Vitaly. “‘Little Green Men or ‘Russian Invaders’?” BBC News, March 2014, sec. Europe,
https://www.bbc.com/news/world-europe-26532154 .
BIBLIOGRAPHY 319 Shturba, E., and Μ. Makhalkina. "Territorial’nyye Anklavy Byvshego SSSR v Kontekste Natsional’noy Bezopasnosti Sovremennoy Rossii.” Istoricheskaya i Sotsial’noObrazovatel’naya Mysl 2, no. 1C (2016): 26-38. Shultz, Richard H., and Roy Godson. Dezinformatsia: Active Measures in Soviet Strategy. Washington, DC: Pergamon-Brassey’s, 1984. Siddique, Haroon, Tom McCarthy, and Alan Yuhas. “Crimean Parliament Seizure Inflames Russian-Ukrainian Tensions—Live.” The Guardian, February 27, 2014, sec. World News, https://www.theguardian.com/world/2014/feb/27/ukraine-pro-russiangunmen-seize-crimea-parliament-live-updates. Silina, Yulia. “Fears of New Flareup in Ukraine as Violence Grows on Frontline.” November 2015. http://news.yahoo.com/fears-flareup-ukraine-violence-grows-frontl ine-080945741.html. Silina, Yulia. “Ukraine, Pro-Russia Rebels Begin Donetsk Arms Withdrawal.” October 2015. http://news.yahoo.com/ukraine-pro-russia-rebels-begin-donetsk-arms-withdra wal-152455026.html. Simes, Dimitri K. “The Soviet Invasion ofCzechoslovakia and the Limits ofKremlinology." Studies in Comparative Communism 8, no. 1-2 (1975): 174-180. https://doi.org/ 10.1016/0039-3592(75)90026-5. Simons, Jake Wallis. “EXCLUSIVE: Mossad Recruited Top Iranian Scientists to Blow Up Key Nuclear Facility.” December 2021. https://www.thejc.com/news/world/exclusivemossad-recruited-top-iranian-scientists-to-blow-up-key-nuclear-facility-1. 523163. Slayton, Rebecca. “What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment.” International Security 41, no. 3 (January 2017): 72-109.
https://doi. org/10.1162/ISEC_a_00267. Slayton, Rebecca, and Brian Clarke. “Trusting Infrastructure: The Emergence of Computer Security Incident Response, 1989-2005.” Technology and Culture 61, no. 1 (2020): 173-206. https://doi.org/10.1353/tech.2020.0036. Smale, Alison, and Andrew Roth. “Ukraine Says That Militants Won the East.” New York Times, 1 May 2015, sec. World, https://www.nytimes.com/2014/05/01/world/europe/ ukraine.html. Smeets, Max. NO SHORTCUTS: Why States Struggle to Develop a Military Cyber-Force. S.I.: Hurst Company, 2022. Smeets, Max. “The Strategic Promise of Offensive Cyber Operations.” Strategic Studies Quarterly 12, no. 3 (2018): 90-113. Smith, Rebecca. “Cyberattacks Raise Alarm for U.S. Power Grid.” Wall Street Journal, December 2016, sec. US. https://www.wsj.com/articles/cyberattacks-raise-alarms-for; u-s-power-grid-1483120708. Sohn, Roman. “Opinion: Ukraine: The Empire Strikes Back.” EUobserver (blog), September 2014. https://euobserver.com/opinion/123339 . “Soldier Killed in E. Ukraine Clashes.” VOA, November 2015. https://www.voanews.com/ a/soldier-killed-in-clashes-in-eastern-ukraine/3058960.html. Solomon, Erika, Steven Erlanger, and Christopher F. Schuetze. “Scrounging for Tanks for Ukraine, Europe’s Armies Come Up Short.” New York Times, February 28, 2023, sec. World, https://www.nytimes.com/2023/02/28/world/europe/ukraine-tanks.html. Solonya, Levhen. “Russia’s Plan for Ukraine: Purported Leaked Strategy Document Raises Alarm.” Radio Free Europe/Radio Liberty, August 2013. https://www.rferl.org/ a/russia-ukraine-leaked-strategy-
docUment/25081053.html.
320 BIBLIOGRAPHY Sonne, Paul, Isabelle Khurshudyan, Serhiy Morgunov, and Kostiantyn Khudov. “Battle for Kyiv: Ukrainian Valor, Russian Blunders Combined to Save the Capital.” Washington Post. 24 August 2022. https://www.washingtonpost.com/national-security/interactive/ 2022/kyiv-battle-ukraine-survival/. Sopova, Alisa, and Neil MacFarquhar. “Russia and Ukraine in a Standoff over Crimea Power Outage.” New York Times25 November 2015, sec. World, https://www.nyti mes.com/2015/ll/26/world/europe/russia-and-ukraine-in-a-standoff-over-crimeapower-outage.html. Spiegel Staff. “Putin’s Gambit: How the EU Lost Ukraine.” Spiegel Online, November 2013, sec. International. https://www.spiegel.de/international/europe/how-the-eu 2lost-torussia-in-negotiations-over-ukraine-trade-deal-a-935476.html. SSCIP. “Cyberattack against Ukrtelecom on March 28: The Details.” April 2022. https:// cip.gov.ua/en/news/kiberataka-na-ukrtelekom-28-bereznya-detali. SSCIP. “Державна Служба Спещального Зв’язку Та Захисту 1нформацн Украши.” January 2022. https://cip.gov.ua/ua/news/informaciya-shodo-imovirnoyi-prov okaciyi. SSSCIP Ukraine (@dsszzi). Twitter, March 2022. “Today, the enemy launched a powerful cyberattack against #Ukrtelecom ’s IT-infrastructure. According to Yurii Shchyhol, the Chairman of the @dsszzi at the moment massive cyberattack against #Ukrtelecom is neutralized. Resuming services is under way. #Ukraine #CyberAttack #war”, https:// twitter.com/dsszzi/status/1508528209075257347. SSU. “СБУ Викрила Спробу Феб Встановити «жучки» в Кулуарах Верховно!' Ради (В1део).” SSU, August 2022.
https://ssu.gov.ua/novyny/sbu-vykryla-sprobu-fsb-vst anovyty-zhuchky-v-kuluarakh-verkhovnoi-rady-video. Stokel-Walker, Chris. “Will Russia’s Invasion of Ukraine Trigger a Massive Cyberwar?” New Scientist, February 2022. https://www.newscientist.com/article/2309369-willrussias-invasion-of-ukraine-trigger-a-massive-cyberwar/ . Stolarik, Μ. Mark, ed. The Prague Spring and the Warsaw Pact Invasion of Czechoslovakia, 1968: Forty Years Later. Mundelein, IL: Bolchazy-Carducci Publishers, 2010. Strange, Susan. States and Markets. 2nd rev. ed. London: Bloomsbury Academic, 1998. “Stuxnet Malware Is ‘Weapon’ Out to Destroy. Iran’s Bushehr Nuclear Plant?” Christian Science Monitor, September 2010. https://www.csmonitor.com/USA/2010/0921/Stux net-malware-is-weapon-out-to-destroy-Iran-s-Bushehr-nuclear-plant. Sudduth, Andy. “The Morris Internet Worm.” 1988. https://snowplow.org/tom/worm/ worm.html. sw@materik.ru. “Re: Nedeli Opublikovalo Tekst, Pokhozhe Na Utechku.” August 2013. Sych, Oleg. “Zillya! Антивирус провела анализ кибератак на инфраструктурные объекта Украины.” February 2016. https://zillya.ua/ru/zillya-antivirus-provela-ana liz-kiberatak-na-infrastrukturnye-obekti-ukrainy. Symantec. “Dragonfly: Western Energy Companies Under Sabotage Threat.” Symantec Security Response (blog). Accessed August 23, 2017. http://www.symantec.com/conn ect/blogs/dragonfly-western-energy-companies-under-sabotage-threat. Symantec. “Stuxnet 0.5: The Missing Link.” 2013. McDonald, Geoff, Liam O. Murchu, Stephen Doherty, and Eric Chien. “Stuxnet 0.5: The Missing Link” (Symantec, February 2013).
https://web.archive.org/web/20150112172930/http://www.symantec.com/cont ent/en/us/enterprise/media/security_response/whitepapers/stuxnet_0_5_the_missi ng_link.pdf.
BIBLIOGRAPHY 321 Symantec. “W32.Stuxnet Dossier.” 2011. Falliere, Nicolas, Liam O. Murchu, and Eric Chien. “W32.Stuxnet Dossier” (Symantec, 2011). http://www.symantec.com/security_ response/writeup.jsp?docid=2010-071400-3123-99. Tantzscher, Monika. “Maßnahme »Donau« und Einsatz »Genesung«. Die Niederschlagung Des Prager Frühlings 1968/69 Im Spiegel Der Mß-Akten.” Analysen Und Berichte, Reihe В (BStU, 1998). https://d-nb.info/103633225X/34. Technopedia. “Source Code Definition.” n.d. Accessed July 20,2017. Thomson, Iain. “So You’ve Got a Zero-Day—Do You Sell to Black, Grey or White Markets?” April 2018. https://www.theregister.co.uk/2018/04/15/mature_bug_bou nty_market_bsidessf/. Thornton, Mary. ‘“Hackers’ Ignore Consequences of Their High-Tech Joy Rides.” Washington Post, May 21, 1984. https://www.washingtonpost.com/archive/politics/ 1984/05/21/hackers-ignore-consequences-of- their-high-tech-Joy-rides/6ab0d2fa68dd-44af-89fe-7dd30927133b/. Thornton, Rod. “The Changing Nature of Modern Warfare.” RUSI Journal 160, no. 4 (July 2015) : 40-48. https://d0i.0rg/l 0.1080/03071847.2015.1079047. Tigrid, Pavel. Why Dubcek Fell. London: Macdonald and Co, 1971. “Timing and Performance | Nmap Network Scanning.” Accessed March 29,2023. https:// nmap.org/book/man-performance.html. Townsend, Sean. “FrolovLeaks VI: Tomorrow Was the War.” Inform Napalm (English) (blog), November 2018. https://informnapalm.org/en/frolovleaks-vi-tomorrow-wasthe-war/. Traynor, Ian. “Ukraine Protests: End Nears for Viktor Yanukovych despite Concessions.” The Guardian, February 21, 2014, sec. World News,
https://www.theguardian.com/ world/2014/feb/21 /ukraine-protests-viktor-yanukovych-election. TrendMicro. “Sandworm to Blacken: The SCADA Connection.” TrendLabs Security Intelligence (blog), October 2014. https://blog.trendmicro.com/trendlabs-securityintelligence/sandworm-to-blacken-the-scada-connection/. Trenin, Dmitri. “The Putin Doctrine.” Carnegie Moscow Center, February 2013. https:// carnegie.ru/2013/02/01 /putin-doctrine-pub-51085. Treverton, Gregory F. Covert Action: The Limits of Intervention in the Postwar World. New York, NY: Basic Books, 1987. https://doi.org/10.5040/9780755612529. Trifonov, Denis. “Russian Intelligence Presence in the CIS.” CACI Analyst, December 2003. http://www.cacianalyst.org/publications/analytical-articles/item/8615-analyti cal-articles-caci-analyst-2003-12-17-art-8615.html. Tsagourias, Nicholas. “Cyber Attacks, Self-Defence and the Problem of Attribution.” Journal of Conflict and Security Law 17, no. 2 (2012), 229-244. Tsarev, Oleg. “О Комплексе Мер По Вовлечению Украины в Евразийский Интеграционный Процесс.” LB.Ua (blog). Accessed August 16, 2021. https://lb.ua/ blog/oleg_tsarev/220762_komplekse_mer_vovlecheniyu_ukraini.html. TSN. “Очыьник СБУ Розпов1в Про Мотив Хакер1в, Яю Атакували Украшу BipycoM Petya.” TCH.ua, July 2017. https://tsn.ua/ukrayina/ochilnik-sbu-rozpoviv-pro-motivhakeriv-yaki-atakuvali-ukrayinu-virusom-petya-955817.html . Tucker, Maxim. “Coal Cutoff Escalates Russia-Ukraine Tensions.” Politico, November 2015. https://www.politico.eu/article/coal-russia-ukraine-crimea-sanctions-putinturkey/.
322 BIBLIOGRAPHY Tucker, Patrick, “DNC Hackers Linked to Russian Activity against Ukraine Two Years Ago.” Defense One (blog), December 2016. https://www.defenseone.com/technology/ 2016/12/dnc-hackers-linked-russian-hacks-ukraine-two-years-ago/134098/. Tuma, Oldrich, Mikhail Prozumenshchikov, John Soares, and Mark Kramer. “The (Inter Communist) Cold War on Ice: Soviet-Czechoslovak Ice Hockey Politics, 1967-1969.” CWIHP Working Paper #69 12, February 2014. Tversky, Amos, and Daniel Kahneman. “The Framing of Decisions and the Psychology of Choice.” Science 211 (1981): 453. “Two Servicemen Killed in Past 24 Hours in East Ukraine: Kiev Military.” Reuters, April 2015. https://www.reuters.com/article/us-ukraine-crisis-casualties/two-servicemenkilled-in-past-24-hours-in-east-ukraine-kiev-military-idUSKBN0MZ0UN20150408. Tyson, Laura, and Susan Lund. “The Promise of Digital Finance.” European Financial Review, 2017. http.7/www.europeanfinancialreview.com/?p=16598. UK Foreign Office. “Kremlin Plan to Install Pro-Russian Leadership in Ukraine Exposed.” January 2022. https://www.gov.uk/government/news/kremlin-plan-to-install-pro- russian-leadership-in-ukraine-exposed. UK NCSC. “Russia behind Cyber Attack with Europe-Wide Impact an Hour before Ukraine Invasion.” May 2022. https.7/www.ncsc.gov.uk/news/russia-behind-cyber-att ack-with-europe-wide-impact-hour-before-ukraine-invasion. “Ukraine Cyber Police Chief Says Ukraine Hit by ‘Badrabbit’ Malware.” Reuters, October 2017. https://www.reuters.com/article/us-ukraine-cyber-police-idUSKBN 1CT27G. “Ukraine Power Company Says It Was Hit by a
Second Cyber Attack.” Fortune, June 30, 2017. http://fortune.com/2017/06/30/ukraine-power-station-cyber-attack/ . “Ukraine Provides Evidence of Russian Military in Civil Unrest.” New York Times, April 20,2014, sec. World, https://www.nytimes.com/interactive/2014/04/20/world/europe/ ukraine-provides-evidence-of-russian-military-in-civil-unrest.html, https://www.nyti mes.com/interactive/2014/04/20/world/europe/ukraine-provides-evidence-of-russ ian-military-in-civil-unrest.html. “Ukraine Resumes Power Supply to Crimea.” December 2015. https://www.euractiv.com/ section/energy/news/ukraine-resumes-power-supply-to-crimea/. “Ukraine Says Ammo Depot Explosions Huge Blow to Combat Capability.” Reuters, September 2017. https://www.reuters.com/article/us-ukraine-explosions-idUSKC N1C316Z. “Ukraine Sees First Direct Combat in Two Months Before EU Meeting.” November 2015. https://www.bloomberg.com/news/articles/2015-ll-09/ukraine-sees-first-direct-com bat-in-two-months-before-eu-meeting. “Ukraine Tensions: US Sources Say Russia 70% Ready to Invade.” BBC News, February 2022, BBC https://www.bbc.com/news/world-europe-60276342 . “Ukraine War: Putin Signs Ukraine Annexation Laws amid Military Setbacks.” BBC News, October 2022, sec. Europe, https://www.bbc.com/news/world-europe-63149156 . “Ukraine’s Party of Regions Expels Presidential Hopefuls Tigipko, Tsariov and Boiko.” Interfax-Ukraine. 7 April 2014. https://en.interfax.com.ua/news/general/199490.html. “Ukrainian Clashes with Pro-Russian Separatists Turn Deadly.” Denver Post, April 13, 2014.
https://www.denverpost.com/2014/04/13/ukrainian-clashes-with-pro-russian- separatists-turn-deadly/. “Ukrainian Leaders Blame ‘Sabotage’ for Huge Blast at Munitions Depot.” Radio Free Europe/Radio Liberty, September 2017. https://www.rferl.org/a/artillery-warehousesexplode-evacuations-ordered-around-vinnitsa-ukraine-kaIinovka-evacuated/28759 382.html.
BIBLIOGRAPHY 323 Ukrinform. “Украшсью Урядов: Сайти Знову Зазнали Юбератаки.” February 2022. https://www.ukrinform.ua/rubric-technology/3410832-ukrainski-uradovi-sajtiznovu-zaznali-kiberataki.html. Ukrop News. “In the Kherson Region, the Military Stole and Tried to Sell Anti-Tank Mines with TNT.”
Ukrop News 24 (blog), February 2017. https://ukropnews24.com/inthe-kherson-region-the-military-stole-and-tried-to-sell-anti-tank-mines-with-tnt/. “Uncorrected Design Flaws, Cyber-Vulnerabilities, and Unreliability Plague the F-35 Program.” Project on Government Oversight. Accessed October 10, 2021.
https:// www.pogo.org/analysis/2020/03/uncorrected-design-flaws-cyber-vulnerabilitiesand-unreliability-plague-the-f-35-program/ . UNIAN. “Novaya Gazeta’s ‘Kremlin Papers’ Article: Full Text in English.” February 2015. https://www.unian.info/politics/1048525-novaya-gazetas-kremlin-papers-articlefull-
text-in-english.html. UNN. “В ‘Укренерго’ не виключають к1бератаку на шдстанщю ТНвшчна’, через яку частику Киеву було знеструмлено.” 1нформацшне агентство Украйгсьга Нацюнальш Новини (УНН). Bei онлайн новини дня в Украли за сьогодш— найсв1ЖШ1, останш, головы, December 2016.
https://www.unn.com.ua/uk/news/ 1628435-v-ukrenergo-ne-viklyuchayut-kiberataku-na-pidstantsiyu-pivnichna-che rez-yaku-chastinu-kiyevu-bulo-znestrumleno. “Unsubstantiated Reports.” Zemidélské Noviny, July 1968. US CYBERCOM. “Achieve and Maintain Cyberspace Superiority—Command Vision for US Cyber
Command.” April 2018. https://www.cybercom.mil/Portals/56/Documents/ .
USCYBERCOM%20Vision%20April%202018.pdf?ver=2018-06-14-152556-010. US Department of State. “Soviet‘Active Measures’ Report No. 88 Forgery, Disinformation, Political Operations.” 1981. https://www.cia.gov/library/readingroom/docs/CIARDP84B00049R001303150031 -O.pdf. US Treasury. “Treasury Sanctions Russian Cyber Actors for Interference with the 2016 U.S. Elections and Malicious Cyber-Attacks.” US Department of the Treasury, March 2018. https://home.treasury.gov/news/press-releases/sm0312 . Vaas, Lisa. “How Hackers Broke into John Podesta, DNC Gmail Accounts.” Naked Security (blog), October 2016. https://nakedsecurity.sophos.com/2016/10/25/how-hackersbroke-into-john-podesta-dnc-gmail-accounts/ . Valenta, Jiri. “The Bureaucratic Politics Paradigm and the Soviet Invasion of Czechoslovakia.” Political Science Quarterly 94, no. 1 (1979): 55-76. https://doi.org/ 10.2307/2150156. Valenta, Jiri. Soviet Intervention in Czechoslovakia, 1968: Anatomy of a Decision. 2nd rev. and expanded ed. Baltimore, MD: Johns Hopkins University Press, 1991. Valeriano, Brandon, Benjamin Jensen, and Ryan C. Maness. Cyber Strategy: The Evolving Character ofPower and Coercion. New York: Oxford University Press, 2018. Valeriano, Brandon, Ryan C. Maness, and Benjamin Jensen. “Analysis: Cyberwarfare Has Taken a New Turn. Yes, It’s Time to Worry.” Washington Post, July 13, 2017. https:// www.washingtonpost.com/news/monkey-cage/wp/2017/07/13/cyber-warfare-hastaken-a-new-turn-yes-its-time-to-worry/. Vandiver, John. “SACEUR: Allies Must Prepare for Russia ‘Hybrid War.”’ Stars and Stripes. Accessed December 14,
2020. https://www.stripes.com/news/saceur-allies-must-prep are-for-russia-hybrid-war-1.301464. Vasovic, Alexander. “Ukraine Rebels Speak of Heavy Losses in Battle against Government Troops.” Reuters, June 2014. https://www.reUters.com/article/us-ukraine-crisis-fight
324 BIBLIOGRAPHY ing/ukraine-rebels-speak-of-heavy-losses-in-battle-against-government-troopsidUSKBN0EU0K320140619. Verbyany, Volodymyr, Elena Mazneva, and Eduard Gismatullin. “Twin Ukraine Power Cable Blasts Leave Crimeans in the Dark.” November 2015. https://www.bloomberg. com/news/articles/2015-ll-22/crimea-declares-emergency-as-l-9-million-peoplelose-electricity. Viasat. “KA-SAT Network Cyber Attack Overview.” March 2022. https://news.viasat. com/blog/corporate/ka-sat-network-cyber-attack-overview. Victor Zhora (@VZhora). “@lukasmaeder @LenMaschmeyer @lukOlejnik Huge Loss in Communications!= Huge Loss in Coordination. The Impact Was Direct, but the Goal Wasn’t Reached.” Twitter, June 2022. https://twitter.com/VZhora/status/153427962434 7230208. Volz, Dustin. “Russian Hackers Tracked Ukrainian Artillery Units Using Android Implant: Report.” Reuters, December 2016. https://www.reuters.com/article/us-cyberukraine-idUKKBN 14B0CU. Voo, Julia, Irfan Hemani, Simon Jones, Winnona DeSombre, Dan Cassidy, and Annina Schwarzenbach. “National Cyber Power Index.” Belfer Center of International Affairs, 2020. https://www.belfercenter.org/publication/national-cyber-power-index-2020. V. V. Shtol. “Geopoliticheskiye Zadachi Rossii Na Postsovetskom Prostranstve.” Vestnik Moskovskogo Gosudarstvennogo Oblastnogo Universiteta, no. 3S (2014): 171-180. Walker, Shaun. “Ukraine’s EU Trade Deal Will Be Catastrophic, Says Russia.” The Guardian, September 22, 2013, sec. World News, https://www.theguardian.com/ world/2013/sep/22/ukraine-european-union-trade-russia. Walker, Shaun, and Ian Traynor.
“Ukraine Crisis: Crimea Now Part of Russia, Local Parliament Declares.” The Guardian, March 6, 2014, sec. World News. https://www. theguardian.com/world/2014/mar/06/ukraine-crisis-crimea-part-of-russia-local-par liament-declares. Waltz, Kenneth N. Theory ofInternational Politics. Reissue ed. Long Grove, IL: Waveland Press, 2010. Warner, Michael. “A Matter of Trust: Covert Action Reconsidered.” Studies in Intelligence 63, no. 4 (2019), 33-41. https://web.archive.Org/web/20201016162622/https://www. cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/stud ies/vol-63-no-4/pdfs/Covert-Action-Reconsidered.pdf. Warner, Michael. “Wanted: A Definition of “Intelligence.” Studies in Intelligence 46, no. 3 (2002). https://web.archive.Org/web/20080611153835/https://www.cia.gov/library/ center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vo!46no3/ article02.html. Watling, Jack, and Nick Reynolds. “Ukraine at War: Paving the Road from Survival to Victory.” RUSI, July 2022. https://www.rusi.org/explore-our-research/publications/ special-resources/ukraine-war-paving-road-survival-victory. Watson, Adrienne. Twitter, @NSC_Spox, “The U.S. has technical information linking Russian GRU to this week’s distributed denial of service attacks in Ukraine. Known GRU infrastructure has been noted transmitting high volumes of communications to Ukraine-based IP addresses and associated banking-related domains.” February 2022. https://twitter.com/NSC_Spox/status/1494796573959725057 . Weber, Max. Max Weber: The Theory of Social and Economic Organization.
Edited by A. Μ Henderson and Talcott Parsons. New York; London: Free Press; Collier Macmillan, 1964.
BIBLIOGRAPHY 325 Wesolowsky, Tony. “Ukraine’s Exploding Munition Depots Give Ammunition to Security Concerns.” Radio Free Europe/Radio Liberty, 6 October 2017. https://www.rferl.Org/a/ ukraine-exploding-munitions-security-concerns-russia/28777991.html. “The West Is Struggling to Forge a New Arsenal of Democracy.” The Economist. 19 February 2023. https://www.economist.com/briefing/2023/02/19/the-west-is-struggl ing-to-forge-a-new-arsenal-of-democracy. “WhisperGate Malware Corrupts Computers in Ukraine.” Recorded Future (blog), January 2022. https://www.recfut.com/whispergate-malware-corrupts-computers-ukraine/. Wiener, Norbert. Cybernetics or Control and Communication in the Animal and the Machine. 2nd ed. Cambridge, MA: MIT Press, 2000. Wilde, Gavin. “Cyber Operations in Ukraine: Russia’s Unmet Expectations.” Carnegie Endowment for International Peace. 12 December 2022. https://carnegieendowment. org/files/202212-Wilde_RussiaHypotheses-v2.pdf. Williams, Brad D. “How Russia Adapted KGB Active Measures’ to Cyber Operations, Part I.” Fifth Domain: Cyber, March 2017. http://fifthdomain.com/2017/03/19/how-russiaadapted-kgb-active-measures-to-cyber-operations-part-i/. Williams, Holly. “Russian Hacks into Ukraine Power Grids a Sign of Things to Come for U.S.?” December 2016. https://www.cbsnews.com/news/russian-hacks-into-ukrainepower-grids-may-be-a-sign-of-things-to-come/. Williams, Kieran. “New Sources on Soviet Decision Making during the 1968 Czechoslovak Crisis.” Europe-Asia Studies 48, no. 3 (May 1996): 457. Williams, Kieran. Prague Spring and Its Aftermath: Czechoslovak
Politics, 1968-1970. Cambridge: Cambridge University Press, 2011. http://public.eblib.com/choice/publi cfullrecord.aspx?p=4641036. Windsor, Philip, and Adam Roberts. Czechoslovakia, 1968: Reform, Repression, and Resistance. London: Columbia University Press, for the Institute for Strategic Studies, 1969. Winner, Langdon. The Whale and the Reactor. Chicago: University of Chicago Press, 1986. Withnall, Adam. “Ukraine Crisis: Donetsk ‘Declares Independence from Kiev’ and Sets Date for Referendum on Joining Russia.” The Independent, April 2014. https.7/www. independent.co.uk/news/world/europe/ukraine-crisis-officials-in-eastern-city-ofdonetsk-proclaim-independence-from-kiev-and-set-date-for-9243750.html. Wohlforth, William C. “Realism and Great Power Subversion.” International Relations 34, no. 4 (December 2020): 459-481. https://doi.0rg/lO.l 177/0047117820968858. Womack, Helen, ed. Undercover Lives: Soviet Spies in the Cities of the World. London: Weidenfeld Nicolson, 1998. Work, J. D. “Burned and Blinded: Escalation Risks of Intelligence Loss from Countercyber Operations in Crisis,” International Journal of Intelligence and Counterintelligence 35, no. 4 (2 October 2022): 806-833. https://doi.org/10.1080/08850607.2022.2081904 Work, J. D. “Evaluating Commercial Cyber Intelligence Activity,” International Journal of Intelligence and Counterintelligence 33, no. 2 (2 April 2020): 278-308. https://doi.org/ 10.1080/08850607.2019.1690877. World Bank. “GDP (Current US$)—Ukraine: Data.” 2023. https://data.worldbank.org/ indicator/NY.GDP.MKTP.CD?locations=UA. Wylie, J. C„ and John B.
Hattendorf. Military Strategy: A General Theory ofPower Control, Classics of Sea Power. Annapolis, MA: Navel Institute Press, 2014.
326 BIBLIOGRAPHY Yagofarov, Timur. “Юбератака на енергосектор розвивалася повтора ьпсящ.” Computernoe Obozrenie, April 2022. https://ko.com.ua/kiberataka_na_energosektor_ rozvivalasya_pivtora_misyaci_140789. Yana. “Opinion: ‘We Were Trapped’: Eyewitness to the Massacre in Kiev.” CNN. Accessed August 18, 2021. https://edition.cnn.com/2014/02/24/opinion/yana-ukraine-eyewitn ess/index.html. Yasinskiy, Aleksey. "BlackEnergy Phase 2: From Media and Electric Companies to Darknet and TTPs.” SOC Prime (blog), January 2016. https://socprime.com/en/blog/ blackenergy-phase-2-from-media-and-electric-companies-to-darknet-and-ttps/. Yasinskiy, Aleksey. “DISMANTLING BLACKENERGY, PART 2—‘THE MARK.”’ SOC Prime (blog), March 2016. https://socprime.com/en/blog/dismantling-blackenergypart2-the-mark/. Yasinskiy, Aleksey. “DISMANTLING BLACKENERGY, PART 3—ALL ABOARD!” SOC Prime (blog), March 2016. https://socprime.com/blog/dismantling-blackenergy-part3-all-aboard/. Yasinskiy, Aleksey. “Dismantling KillDisk: Reverse of the BlackEnergy Destructive Component.” SOC Prime (blog), February 2016. https://socprime.com/en/blog/dism antling-killdisk-reverse-of-the-blackenergy-destructive-component/. Young, Susan, and Dave Aitel. The Hacker’s Handbook: The Strategy behind Breaking into and Defending Networks. Boca Raton, FL: CRC Press, 2004. ZA, Sekretariat des Ministers (SdM) 1469. “Information Nr. 942/69 Der ZAIG Über Die Ereignisse in Der CSSR Anläßlich Des Ersten Jahrestages Der Militärischen Hilfsaktion Der Sozialistischen Länder.” n.d. BStU. Zäcek, Pavel. “The KGB and the Czechoslovak State Security
Apparatus in August 1968.” Journal of Slavic Military Studies 29, no. 4 (2016): 626-657. https://doi.org/10.1080/ 13518046.2016.1232561. Zarudnia, Natalia. “Росшська Програма-Вимагач RansomBoggs Нащлилася На Юлька Украшських Оргашзацш.” November 2022. https://cybercalm.org/novyny/ rosijska-programa-vymagach-ransomboggs-natsilylasya-na-kilka-ukrayinskyhorganizatsij/. “Zelensky Says Two Generals Stripped of Their Rank Due to Treason.” Kyiv Independent, March 2022. https://kyivindependent.com/uncategorized/zelensky-says-two-gener als-stripped-of-their-rank-due-to-treason. Zeman, Z. A. B. Prague Spring. New York: Hill and Wang, 1969. Zetter, Kim. “Everything We Know about Ukraine’s Power Plant Hack.” Wired, January 2016. https://www.wired.com/2016/01 /everything-we-know-about-ukraines-powerplant-hack/. ■ Zetter, Kim. “Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid.” Wired, March 2016. https://www.wired.com/2016/03/inside-cunning-unprecedented-hackukraines-power-grid/. Zetter, Kim. "Second Wiper Attack Strikes Systems in Ukraine and Two Neighboring Countries.” Substack newsletter. Zero Day (blog), February 2022. https://zetter.subst ack.com/p/second-wiper-attack-strikes-systems . Zetter, Kim. “So What This Means Is That Now They Have to Send a Farmer out to Look at the Turbines and Report Back: ‘Yep, They’re Still Working.”’ Twitter, @KimZetter. March 2022. https://twitter.com/KimZetter/status/1507389719411236871. Zetter, Kim. “An Unprecedented Look at Stuxnet, the World’s First Digital Weapon.” Wired, March 2014. http://www.wired.eom/2014/l 1/countdown-to-zero-
day-stuxnet/.
BIBLIOGRAPHY 327 Zetter, Kim. “Viasat Hack ‘Did Not’ Have Huge Impact on Ukrainian Military Communications, Official Says.” Substack newsletter. Zero Day (blog), September 2022. https://zetter.substack.eom/p/viasat-hack-did-not-have-huge-impact. Zetter, Kim. “What We Know and Don’t Know about the
Cyberattacks Against Ukraine (Updated).” Substack newsletter. Zero Day (blog), January 2022. https://zetter.substack. com/p/what-we-know-and-dont-know-about. Zetter, Kim. Twitter, April 2022. https://twitter.com/KimZetter/status/151450873390 8348930. Zhong, Ray Y., Xun Xu, Eberhard Klotz, and
Stephen T. Newman. “Intelligent Manufacturing in the Context of Industry 4.0: A Review.” Engineering 3, no. 5 (October 2017): 616-630. https://doi.Org/10.1016/J.ENG.2017.05.015. “О Комплексе Мер По Вовлечению Украины в Евразийский Интеграционный Процесс.” ZN. Ua, 16 August 2013.
https://zn.ua/internal/o-komplekse-mer-po-vovle cheniyu-ukrainy-v-evraziyskiy-integracionnyy-process-_.html. “Бывший Офицер КГБ Попов: Агентов в Украине Россия Выращивала. Это ‘Парничок’. Завербовать Человека, Когда Он Уже На Самом Верху, Намного Сложнее / ПОЛИТИКА / Новости.” 25 November 2022.
https://gordonua.com/amp/ news/politics/byvshij-ofitser-kgb-popov-agentov-v-ukraine-rossija-vyrashchivalaeto-parnichok-zaverbovat-cheloveka-kogda-on-uzhe-na-samom-verhu-namnogoslozhnee-1637706.html. Егошина, Валергя. “Таемний Кадр СБУ: Alter Ego Головного «контролера Порядносп» Спецслужби Андр!я
Наумова (Розелщування).” Padio Свобода, 29 October 2020, sec. ПолНика. https://www.radiosvoboda.Org/a/schemes/30919 292.html. “Из-За
Кибератаки Минфин и Госказначейство Потеряли 3 Терабайта Информации.” Accessed October 13,2021. https://biz.nv.ua/economics/iz-za-kiberat aki-minfin-i-goskaznachejstvo-poterjali-3-terabajta-informatsii-330784.html. Красномовець, Павло. “Росшськ! Хакери 1з ГРУ Спробували Залишити Без СвНла В1нницьку
Область, Як у 2017 Кшв. Чому Ïm Не Вдалося—Forbes.Ua.” 12 April 2022. https://forbes.ua/innovations/rosiyski-khakeri-namagalis-zalishiti-bez-svitlavinnitsku-oblast-atatsi-vdalos-zapobigti-12042022-5409. ОЛЕНА БУРКАЛО. “На Сумщине Мэра Бурыни и Его Пособников Задержали За
Коллаборационизм—Korrespondent.Net.” 1 Мау 2022. https://korrespondent.net/ amp/4473984-na-sumschyne-mera-buryny-y-eho-posobnykov-zaderzhaly-za-kollab oratsyonyzm. “СБУ тдозрюе старосту села Сумського району в колаборацюшзмь” 28 June 2022. https://debaty.sumy.ua/news/sbu-pidozryuye-starostu-sela-
sumskogo-rajonu-vkolaboratsionizmi. Свобода, Радю. “Ексначальник з СБУ Наумов Mir Передавати Спецслужбам РФ Секретш Данг Щодо Чорнобильсько! АЕС—«Схеми».” Padio Свобода, 17 June 2022, sec. Новини | Пол пика. https://www.radiosvoboda.org/a/news-skhemy-sbunaumov-chaes/31902729.html. Свобода, Радю. “У
Сербн Офщшно Пщтвердили Затримання Ексначальника в СБУ Який Ф1гурував у Розслщуванш «Схем».” Padio Свобода, 11 June 2022, sec. Новини: Сустльство. https://www.radiosvoboda.org/a/nws-serbia-zatrymannianaumova/31893820.html. Станиславович, Шабловский Владислав. “Отношения России и Нато в Контексте
Кризиса На Украине.” Постсоветские Исследования 2, по. 2 (2019): 1032-1041.
328 BIBLIOGRAPHY СУМСЬКА ОБЛАСТЬ. “Xotîb ‘Здати’ Micro Роаянам: Голова Громади в Сумськш Облает! ГИде Шд Суд.” РБК-Украина. 26 August 2022 https://www.rbc.ua/ukr/news/ hotel-sdat-selo-rossiyanam-glava-obshchiny-1661518671 .html. “У Донецьку 1деГ Сепаратизму Неспод1вано Виявилися Непопулярними.” Украшська Правда, 9 April 2014. https://www.pravda.com.Ua/news/2014/04/9/ 7021883/. “Хакери Атакували Транспорты! Та Лопстичн! Компани в Украйй й Полыц!, Microsoft—Delo.Ua.” 15 October 2022. https://delo.ua/telecom/xakeri-atakuvali-tran sportni-ta-logisticni-kompaniyi-v-ukrayini-i-polshhi-microsoft-405412/. Юрш ЩигольЯк Вдалося Зберегти Зв'язок, Кибератаки На Украшу,В1дключеш BiücbKoei Супутники. 2022. https://www.youtube.com/watch?v=-K9OyhGWDRI.
Index For the benefit of digital users, indexed terms that span two pages (e.g., 52-53) may, on occasion, appear on only one of those pages. Tables and figures are indicated by t and ffollowing the page number AcidRain malware, 191 AES-NI cybercrime tool, 161 Aksyonov, Sergey, 127 ALLA, illegal agent, 102-3 Andropov, Yuri, 66,67-68,82,85,87,91 Arbuzov, Serhiy, 187-88 ARTYMOVA, illegal agent, 102-3 Azarov, Mykola, 187-88 BadRabbit ransomware, 164-67 balancing trilemma, 164-67 effects, 165-66 strategic role, 165 targets, 165 Bakanov, Ivan, 194-95,196 Bilak, Vasil, 65-66,84-85 BlackEnergy malware, 134,135 2015 Blackout (Ukraine), 136-41 development time, 137 GE CIMPLICITY HMI (Human Machine Interface) systems, 138 role of luck 137,138-39 trilemma trade-offs 139-40 Effects 139-41 SCADA systems, 138 Bogdan, Vasily, 151-52 BootPatch malware, 179-80 Borzov, Gennadi, 71 botnet, 181-82 Brandt, Willy, 26 ‘Brezhnev Doctrine,' 63,69 Brezhnev, Leonid, 64,65-67,68,78-79, 81,84-86,89,91,92,94-95, 104,111 Brusov, Georgiy, 128-29 CaddyWiper malware, 185-86,200 Cerny, Vaclav, 72-73,74 Chaliy, Aleksei, 125-26 “Charter 77,” 113 Chernovtsoblenergo, 137 from Cold War to hybrid war, 208-11 “Complex of Measures” document, 11920,122,125,188 computer code, 44 contingency planning, failure and fallback to, 86-92 control, in subversive trilemma, 4,12,13/, 13-14,35-38,40-41,42-43,55, 56,57-58 BadRabbit operation, 172,180-81 in cyber conflicts, 57-58 in fulfilling strategic promise, 99-100 HermeticWiper, 183-84 as key determinant of strategic value, 36-37 KHODOKI operations, 61,114 NotPetya and the
limits of control, 157-64 power grid sabotage attempt in April 2022,202 in PROGRESS operations, 61 Soviet Union over Czechoslovakia, 92-93 speed and intensity and, inverse correlation between, 36,76-77,95, 100-1,179,224-25 when intensity increases, 55 control over targets, 34-38 covert operations, 68,117 definition 7-8 advantages of, 29-30
330 INDEX covert operations (cont.) assassination plots, 74-75 clandestine mode versus, 7-8 covert warfare secrecy lowering escalation risks in, 3-4,29 cyber operations as, 2-3 cyber operations versus, 9,13-14,45, 48-50,51-52 effects, 9,10,13-14,24,27,48-49,5152,72,117 “escalation ladder’ for, 72 as independent tools of statecraft, 8 information technology aiding, 10 strategic value of, 9 subversive operations versus, 22-23 traditional subversion and, 24 use of force, 214 -15 Crimea Blackout (2015), 137,141-44 Crimean power grid sabotage, 137, 141-44 critical infrastructure sabotage, 115-16, 175-76,196-201 CaddyWiper malware, 200 Crimea Blackout (2015), 137,141-44 enabled by territorial conquest, 197-98 INDUSTROYER and energy sector sabotage, 150,200 Kyiv Blackout (2016), 144-50 operations in Ukraine, 196-201 attempt to disrupt the power grid, 196-97 disrupting Ukrtelecom, 196-97 Russia against Ukraine, 118 Sandworm hacking group strikes back, 196-201 Sandworm I (2015 Blackout), 136-41 (see also 2015 Blackout [Ukraine]) Sandworm II (2016 Kyiv Blackout), 144-50 (see also Kyiv Blackout, 2016) Sandworm strikes back in Ukraine, 196-201 through cyber means, 119 CyberBerkut hacker group, 132-33 cyber-enabled subversion, 117-73. See also “hybrid war,” Russia against Ukraine (2013-2018) cyber operations, 42-43 “attack surface” for, 49 comparison to traditional subversion, 42-43,55-56 in degrading material capabilities, 51 in disrupting the economy, 51 effects, 47-48 scope and scale of, 48,53 challenges, 42-43,49-50 for long-term “erosion” strategies, 50 (see also erosion
strategies) manipulating government policy, 51 in manipulating public opinion, 50-51 relative advantages, 42-43,48-50 strategic role and promise of, 48-52 subversive nature, 3-4 scalability, 48-49 cyber power, subversive nature of, 43-48 phishing, 44 social vulnerabilities targeted, 43-44 technical vulnerabilities targeted, 43-44 “Cyberpunk” hacker group, 43-44 Czechoslovakia, 15 Andropov’s strategy on, 68,87 anti-Soviet nationalism” in, 116 armed force, 67-68 KGB’s illegals in, 14-15,61, 111, 192 (see also KHODOKI campaign; PROGRESS campaign) Kremlin perception and strategic goals, 63-70 Prague Spring and, 60 (see also Prague Spring (1968-1973), crushing the) Soviet strategic goals at, 98-99,101,102 Soviets’ subversion failure in, 61,17677,208 as a “testing ground” for subversion use, 14-15 Danyliuk, Oleksandr, 160-61 Derkach, Andriy, 193 diplomacy definition, 19 interaction with use of force, 19,25,117 interaction with subversion, 1 -2,64,70, 92-93,121-22 interaction with warfare, 1-2,17-18, 19,21
INDEX distributed denial of service (DDoS), 178-87,201 Dobrynin, Anatolii, 69-70 Donbass failure and escalation, 129-31 Dubcek, Alexander, 60,62,64,65,66-67, 81,84-87,91,92-93,104,105, 106-7,109,110,114 Dubov, Dmitry, 128-29,155 economic and psychological (cyber) warfare, 178-88 erosion strategies, 28,30-31,50 causing collateral cognitive damage, 223-24 cyber operations as, 50,56-57 effects of, 28 long-term campaigns effects on the balance of power, 219-20,223 by Russia in Ukraine, 118—19 2014,118-19 2022,174,178 strategic role, 57 strategic value of, 39-40 in subversive campaigns, 42-43 to undermine trust, 223-24 to weaken the adversary, 28 escalation, 56-57 in Czechoslovakia, role of subversion, 90-91,93-94,113-14,216-17 in the Donbass region, 129-31 “escalation ladder’ for covert operations, 72,74-75,76,95,117-18,136-37, 143,146,151,194,198-99 KHODOKI campaign in, 62-63 Kremlin decision to invade Czechoslovakia, 176-77,208 lowered risks in covert warfare, 3-4, 7-8,29 military escalation, 10,213,214-15, 218 subversion lowering the risk of, 29-30, 37-39 time pressure as the cause, 213 in Ukraine, 174,210-11 exploitation analysis of the mechanism of, 75,11112,224-25 challenges in the process of, 40-41 331 of computer systems, 46,48 as distinguishing feature of subversion, 23-24 failure of, 203 force use to facilitate, 23-24 immaterial means of, 46-47 indirect and secret nature of, 25 by IsaacWiper, 184-85 prevention of, 226-27 of psychological and sociological vulnerabilities, 7,21 secret mode of operation, 22-23, 30,31,38 spies using the technique of, 26,103-4 by
subversion, in practice, 17-18 subversion speed limited by, 3132,35,37 subversion’s reliance on, 3-4,7,11-12, 21,23-24,207 as subversive nature of cyber power, 43 traditional subversion and, 5152,55, 57 of Ukrtelecom’s network, 197 using unpatched VPN device, 191,199 of vulnerabilities in ICTs, 43-44, 45,48,57 Fedorov, Mykhailo, 182 firmware, 44,190,191 force, 24-25,69 and diplomacy, 19-20 military force, 67-68,75,84-85,105, 116,126-27 spies using, 23-24 subjugation by, 69-70 subversion in the service of, 188-96 subversion versus, 7,17-18,25,28-31, 38-39,174-75 Frolov, Kirill, 14,120-21,122-23,126-27, 130 FYODOROV illegal agent, 102-3,111-12 GE CIMPLICITY HMI (Human Machine Interface) systems, 138 German Stasi Records Agency, 14 Glazyev, Sergey Yuryevich, 122-23,126,127 government policy, subversion influencing, 26
332 INDEX Granovski, Vladimir, 123 Grechko, Marshal, 109 GreenPetya ransomware, 159,160 GreyEnergy group, 141 Groysman, Volodymyr, 151-52 Guillaume, Günther, 26 hacking, 11-12,134 APT28,132 cyber operations as, 43-44 CyberBerkut, 132 “Cyberpunk” hacker group, 43-44 hack-and-leak operations, 50-51 KillDisk module, 137,156-57 over industrial control systems, 53,139 Russian sponsored, in Ukraine, 118, 120-21,131-32 Sean Townsend, 160 stealth in, 45 subversive nature of, 45,46 target systems for, 55,138 Ukrainian hacktivists, 127 Viasat hack, 189-90,191,211,217 vulnerabilities targeted, 43-44 “HermeticWiper” malware, 183-85 Husak, Gustav, 62-63,110 “hybrid war,” Russian strategy against Ukraine (2013-2018), 117-73. See also Russia’s invasion of Ukraine “Complex of Measures” document, . 119-20,122 Donbass failure and escalation, 129-31 economic warfare, Sandworms pivot to scale, 153-67 Euromaidan movement, 122 Kremlin perception and strategic goals, 119-22 new technology, old limitations, 169-73 public trust in the government, 170,171/ Russia turning to subversion, 118 sabotage, cyber versus traditional subversion, 135-53 GE CIMPLICITY HMI systems, 138 KillDisk module, 137 learning requirement, 139 Sandworm I: The 2015 Blackout, 136-41 SCADA systems, 138 Sandworm II, The 2016 Kyiv Blackout, 144-50 Sandworm III, The 2016 compromise of the Ministry of Finance 154-57 Sandworm IV, NotPetya and the limits of control, 157-64 Sandworm V, BadRabbit, 164-67 (see also BadRabbit ransomware) shadow forces take Crimea, 124-29 Euromaidan crisis, 127 “pro-Russian demonstrators,” 126 subversion
falters for Russia, 122-24 constraints posed by the trilemma, 124 Ukraine Cyber Alliance, 123 subversive election interference, 2014-2015,131-35 traditional sabotage 1,2015 Crimea Blackout, 141-44 operation and cyber sabotage, difference between, 143 traditional sabotage II, arms depot explosion in Kalynivka, 150-53 Ukrainian D-30 artillery and the tactical sabotage, 167-69 illegal agents, 15,67-68. See also KHODOKI campaign; PROGRESS campaign advantage of, 80-81 Aleksandr Alekseev, 71 ALLA, 102-3 ARTYMOVA, 102-3 in Czechoslovakia, sent by Andropov, 67-68 during Prague Spring, 71 FYODOROV, 102-3,111-12 Gennadi Borzov, 71 Georgii Fedyashin, 71 of KGB, infiltrating Western societies, 23,61 KRAVCHENKO, 110 Mikhail Sagatelyan, 84 near the West German border, 76,80-81 Vladimir Surzhaninov, 71 V. Umnov, 71
INDEX Indra, Alois, 84-85 industrial control system (ICS), 48,55, 138,139,145-46,149-50 GE CIMPLICITY HMI (Human Machine Interface) systems, 138 SCADA (Supervisory Control and Data Acquisition) systems, 138 TRITON malware, 53 INDUSTROYER, 145,146-48,149, 150,200 information communications and technologies (ICTs), 43-44 information technology and subversion, 42-59. See also cyber operations insider threats, 197-98,199 in cybersecurity, 220 intelligence, 5-6,7 artificial intelligence, 226-27 collection activity, 65,71,82-84,192-93 byKSC.84,86 ' by Ukrainian KGB, 85 CyberBerkut, 132 Israel’s intelligence service, 219 by KGB agent(s) in Czechoslovakia, 7273,74,76-77,108 open-source intelligence, 4-5,14 operations, 7-8 in Greece, 27-28 Russian intelligence services in Ukraine, 151-52,162 GRU, 163,181-82 Russian intelligence services to Chernobyl, 195-96 slanted intelligence, 82,91,17677,187-88 theory, 1-2 “threat intelligence” providers, 54 Ukrainian intelligence services, 14144,193 WhisperGate, 179-80 intensity, in subversive trilemma, 4,12, 13/, 13-14,35-38,40-41,42-43, 55,56,57-58 BadRabbit operation, 172,180-81 control and speed and, inverse correlation between, 36,76-77,95, 100-1,179,224-25 in cyber conflicts, 57-58 333 as determinant of strategic value, 36-37 in fulfilling strategic promise, 99-100 HermeticWiper, 183-84 KHODOKI operations, 61,114 NotPetya and the limits of control, 157-64 power grid sabotage attempt in April 2022,202 in PROGRESS operations, 61 Soviet Union over Czechoslovakia, 92-93 international relations theory, 7 IsaacWiper, 184-85 Kalugin, Oleg, 91
Kalynivka, arms depot explosion in, 150-53 Katana malware, 182 KHODOKI campaign, 61,62-63,70-92, 208 major subversive operations, 72 exploitation mechanism, 75 fake arms caches influence, 77,79 KGB, errors by, 76-77 kidnapping leading intellectuals, 72 planting false flag “evidence,” 76 using GROMOV, 73,74 using GURYEV, 73,74 weakening the liberalization movement, 72 KHODOKI Redux, 104-10 “Aeroflot Incident,” 104-10 Dubceks “conspiracy theory” flaws, 107 Vltava radio station, 104-5 Zpravy magazine, 104-5 Kievoblenergors, 137 KillDisk malware, 139,154,156-57 Kluyev, Andriy, 187-88 Kolder, Drahomir, 84-85 Kolesnichenko, Vadim, 124 Kovalchuk, Vsevolod, 146 Koval, Nikolay, 133,148-49,163-64 KRAVCHENKO illegal agent, 110 Kremlin Brezhnev doctrine and, 69 “Complex of Measures” document, 119-20,122
334 INDEX Kremlin (cent.) cyber-enabled subversion against Ukraine by, 119-22 Euromaidan movement, 122 leaked documents and emails, 4-5 “loss” of Czechoslovakia, prevention plans, 67,98-99,109 Prague Spring and, 60,63-70 Prozumenshchikov’s analysis of, 68,116 reliance on diplomacy, force, and subversion, 64 subversive activities by, 101-2,117-18 taking Crimea, contingency plan, 124-29 in Ukraine invasion, 2022,176-78 economic and psychological (cyber) warfare, 178,187-88 subversion in the service of force, 188-96 Krivosheev, Vladlen, 78 Kryvoruchko, Serhiy, 194-95 Kyiv Blackout, 2016 (Ukraine), 144-50 destructive potential of malware, 146 development time, 145-46 effects and strategic value, 150 failure of malware, 148-50 INDUSTROYER developed, 145,14648,149,150 Severyana power substation de energized, 145 signaling interpretations and problems, 146-49 Lappi, Leo, 102-3,111-12 Lavrov, Sergej, 177 Lenin, Vladimir, 8 Makhalkina, Μ., 121 Malofeev, Konstantin, 123 Markovets, Sergiy, 163-64 Medvedchuk, Viktor, 196 Medvedev, Dmitry, 142 military escalation, 10,213,214-15,218 Ministry of Finance compromise, 2016,154-57 development time, 154-55 effects and strategic value, 155 KillDisk malware, 154 vulnerabilities exploited, 156-57 Mirai malware, 182 Moonraker worm, 159 Morris, Robert Tappan, 54-55 “Morris worm,” 54-55 Naftogaz, 197-98 Nalivaychenko, Valentin, 127-28 Narozhnyy, Pavlo, 168-69 Naumov, Andriy, 195-96 nonintervention principle, 29-30 NotPetya malware, 157-64 AES-NI cybercrime tool, 161 collateral damage and loss of control, 157-64 data and computers, disabled, 157-58
development time, 159 disk wiping functionality 158-59 effects and strategic value, 153,160-61 163,172 supply-chain mechanism, 159-60,162 XData., 159,161 Novikov, Andrey, 126-27,130 Novotny, Antonin, 64 Nye, Joseph, 20,140-41 October CMS exploited, 178-79,180-81 Ohryzko, Volodymyr, 120-21 Pachman, Ludek, 110 Parubiy, Andriy, 151-52 persistent engagement, 6 and erosion, 219-20 limitations, 50 phishing, 47-48,137 exploitation by, 44 to exploit software vulnerabilities, 46 by Sandworm, 134,154-55 Podesta, John, 44 Poroshenko, Petro, 158 power as an essential contested concept, 18 diplomacy as an instrument of, 19 force as an instrument of, 19-20 and subversion, 17-41 in world politics, 18-20 power grid sabotage operation, 154,157, 159,172
INDEX Prague Spring (1968-1973), crushing the, 60-116. See also KHODOKI Redux “armed counterrevolution,” 62 contingency planning, failure and fallback to, 86-92 KHODOKI failure, 90-91 PROGRESS failure, 90-91 failed coup and tanks in Prague, 92-99 ambitious operational design, 98-99 constraints posed by the trilemma, 95 Czechoslovak radio stations continued operation, 96 lack of adequate preparation, 97 military invasion, 93 public resistance, 98 regime change failure, 93,94-95 subversive actors influence, 93-94 "illegal" spying activities, 67-68 intelligence collection activity, 65 KHODOKI campaign, 61,62-63,70-92 Kremlin perception and strategic goals, 63-70 “normalization” and permanent occupation, 99-113 illegal agents role deepened, 102-3 KHODOKI operations, scaled down, 100-1 “massive interference,” 101-2 PROGRESS, lack of impact from, 103-4 PROGRESS and a normalization incomplete, 110-13 disillusionment with the reformist leaders, 112-13 economic recovery from 1972,112-13 PROGRESS campaign, 61,62-63, 70-92 “Silent Invasion,” commencing, 70-92 operational timelines, 71 training, 71 subversion and military force, 67 Prochizka, Jan, 72-73,74 PROGRESS campaign, 61,62-63,70-92, 208 and a normalization incomplete, 110-13 335 subverting government and civil society, 81-86 established network of spies and informers, 82-83 GROMOV agent, 81-82 GURYEV agent, 81-82 HUMINT collection, 84 KGB records on Czechoslovakia, 83/ SADKO agent, 81-82 YEFRAT agent, 81-82 YEVDOKIMOV agent, 81-82 Prykarpattyaoblenergo, 137 psychological vulnerability, 7,21 public opinion, subversion
influencing, 26 Putin, Vladimir, 121,146-47,177,196 Python/TeleBot.A malware, 159 quality of subversion, 38-41,57-59 continuity over change in, 57-59 independent and a complementary strategic role, 57 secret exploitation and manipulation, 57 subversive trilemma persisting, 57-58 defining, 38-41 operational trilemma, 39 significant strategic value, 38-39 quantity over quality, 207-27 regime change, subversion in, 27 Russia’s invasion of Ukraine, 2022,174206. See also “hybrid war,” Russia against Ukraine (2013-2018) BootPatch malware, 179-80 botched coup, 187-88 botnet operation, 181-82 CaddyWiper malware, 185-86 critical infrastructure sabotage, 196-201 attack enabled by territorial conquest, 197-98 defacements, 178-87 distributed denial of service (DDoS), 178-87 DNSs targeted, 182 economic and psychological (cyber) warfare, 178-87
336 INDEX Russia’s invasion of Ukraine, 2022 (cont.) "HermeticWiper" malware, 183-84 IsaacWiper, 184-85 Katana malware, 182 Kremlin perception and goals, 176-78 October CMS exploited, 178-79,180-81 subversion in the service of force, 188-96 AcidRain malware, 191 KA-SAT disruption, 190,191-92 WhisperGate malware, 179,180,181 Whisper-Kill malware, 179 WhiteBlackCrypt, 179-80 wipers, 178-87 sabotage. See also critical infrastructure sabotage curious case of the artillery, 167-69 cyber operations best suited for, 46 cyber versus traditional subversion, 135-53,1361,209-10,219 Kalynivka, arms depot explosion in,150-53 KGB operation in Greece, 27-28 of a power substation in Germany, by a KGB agent, 23 Russian-sponsored cyber operations against Ukraine in, 118 Stuxnet operation, 10 as subversive operations goal, 8,26 Ukraine’s Ministry of Finance compromise (2016), 154-57 Ukraine’s power grid, 2-3 Ukrtelecom disruption, 201 “unknown unknowns” risk in, 34 Viasat compromise, 201 Sagatelyan, Mikhail, 84-86,87 Sandworm hacking group, 133-34 economic warfare, Sandworm’s pivot to scale, 153-67 Sandworm I (2015 Blackout), 136-41 (see also 2015 Blackout) Sandworm II (2016 Kyiv Blackout), 144-50 (see also Kyiv Blackout, 2016) Sandworm III, (Ministry of Finance compromise, 2016), 154-57 (see also Ministry of Finance compromise, 2016) Sandworm IV (NotPetya and the limits of control), 157-64 (see also NotPetya malware) Sandworm V (BadRabbit), 164-67 (see also BadRabbit ransomware) SCADA (Supervisory Control and Data Acquisition) systems, 138. See also industrial control system (ICS) GE
CIMPLICITY HMI (Human Machine Interface) systems, 138 Sivkovich, Vladimir, 187-88 Smrkovsky, Josef, 84-86,104-5 “social engineering,” 44 social vulnerabilities, 7,11 -12,21,44,5253,134,137 speed, in subversive trilemma, 4,12,13/ 13-14,35-38,40-41,42-43,55, 56,57-58 BadRabbit operation, 172,180-81 control and intensity and, inverse correlation between, 36,76-77,95, 100-1,179,224-25 in cyber conflicts, 57-58 in fulfilling strategic promise, 99-100 HermeticWiper, 183-84 as key determinant of strategic value, 36-37 KHODOKI operations, 61,114 NotPetya and the limits of control, 157-64 power grid sabotage attempt in April 2022,202 in PROGRESS operations, 61 Soviet Union over Czechoslovakia, 92-93 spies, 53 advantages, 17-18 cautions to follow, 33 exploiting flawed security rules and practices, 23 exploiting individual-level vulnerabilities, 23 force and coercion use by, 23-24,33 illegals, definition, 67-68 in PROGRESS, 102-4 risks, 37 as subversion key tool, 17-18,23 traditional subversion using, 11-12 undercover spies, 26-28,225
INDEX stability and subversion, 207,213 Stoltenberg, Jens, 190 Stuxnet, 10-11,47-48,52-53,56,14647,219 subversion. See also quality of subversion alternate explanations and limitations, 221-27 basic conditions of, 31-34 available target with suitable vulnerabilities, 31-32 exploiting vulnerability without being discovered, 34-36 subversive agent with suitable abilities, 32-33 falters for Russia, 122-24 force and warfare versus, 7 influencing government policy, 26 influencing public opinion, 26 influencing target state’s material capabilities, 26 as an instrument of power, 5,7 limits of, 113-16 constraints and trade-offs predicted by trilemma, 114 dependence on vulnerabilities in societies, 116 reliance on illegal agents, 113-14 use of force, 114 new possibilities and new perils, 207 nonmilitary options as, 7-8 offering strategic potential, 29 and power, 17-41 power through exploitation and manipulation, 21-25 reduces cost of escalation, 29 reduces follow-on costs, 30 in regime change, 27 in the service of force, 188-96 speed, intensity, and control variables and, 35-37 spies as key tools of, 23 strategic potential in scholarship and strategy, 5-6 strategic role and promise of, 25-31 targeting systems, 22 technological change changing, 5 trilemma and strategic value, 31-38 types of effects, 50 337 undermining institutional effectiveness, 26-27 use in invasion, 211 in war, 174-206 (see also Russia’s invasion of Ukraine) subversive election interference, 20142015,131-35 subversive trilemma, 11,12-13,13/, 16,52-58 limiting strategic value, 31-38,90 control over effects, 34,104
intensity of effects, 32-33 in speed, 31-32 Surkov, Vladislav, 14,123,126 Surzhaninov, Vladimir, 71 Svoboda, Ludvik, 93-94,105 tactical sabotage, 167-69 Ukrainian D-30 artillery, 168 tactics, techniques, and procedures (TTPs), 54 technical vulnerability, 43,44,45, 52-53 TeleBots group, 141 Townsend, Sean, 148-49,168 traditional sabotage 1,2015 Crimea Blackout, 141-44 traditional subversion, 3-4,5-6,8,24,5556,60-116. See also Prague Spring (1968-1973), crushing the vis-a-vis cyber-enabled subversion, 4-5 traditional versus cyber sabotage, 13553,136t TRITON malware, 53,55 Turchynov, Oleksandr, 152-53 Ukraine Cyber Alliance, 123 Ukraine’s Ministry of Finance compromise (2016), 154-57 power grid sabotage operation 2015,157,159,172 2022,202 Ukraine’s State Service of Special Communications and Information Protection (SSSCIP), 179-80, 186,189,197-99 Ukrainian D-30 artillery and the tactical sabotage, 168 Ukrenergo, 143-44
338 INDEX Ukrtelecom disruption, 201 Umnov, V., 71 Vaculik, Ludvik, 81-82 Venediktova, Irina, 194-95 Viasat compromise, 201 Vltava radio station, 104-5 vulnerability in adversary systems, 41 agents using, 24 cyber operations exploiting, 43-44 identifying, 12,21,31-32, 52-53,80-81 in information communications and technologies (ICTs), 43-44,48,49 individual-level vulnerabilities, 23 INDUSTROYER exploiting, 149 NotPetya malware exploiting, 157-58 in October CMS, 178-79 psychological, 7,21 social, 44, 52-53,134,137 sociological, 7,11-12,21 software vulnerabilities, 46 spies exploiting, 23-24 subversion depends on, 31,116,129-30, 210,226 subversive operations using, 26,39,42 technical, 43,44,45,52-53 ofUkraine, 140-41,146,156 ofVPN devices, 191 zero-day, 138 warfare and diplomacy, 1-2,19,21 website defacements (Ukraine), 178-87 WhisperGate malware, 179,180,181 WhisperKill malware, 179 WhiteBlackCrypt, 179-80 world politics, power in, 18-20 world politics, subversion implications for, 211-21 balance of power remains unaffected, 212-13 destabilizing mass effects and systemic disruption risk, 215-16 increases the risk of unintended/ inadvertent escalation, 216-19 stabilizes world politics, 213 state-society and states-nonstate actors relations impacted, 221 traditional subversion still more relevantin, 219-20 XData malware, 159,161 , Yakovlev, Aleksandr, 96 Yanukovych, Viktor, 117-18,121-22, 124-26,130 Yuryevich, Sergey, 123 Zatulin, Konstantin, 126 Zelenskiy, Volodymyr, 187,194-95 zero-dayvulnerability, 138 Zhivkov, 84-85 Zhora, Victor, 132,133,134,148-49,180, 186,189,202-205
Zpravy magazine, 104-5 Bayerische Staatsbibliothek München
Contents List ofFigures Preface vii ix Introduction 1 1. Subversion and Power 17 2. Information Technology and Subversion 42 3. Traditional Subversion: Crushing the Prague Spring, 1968-1973 60 4. Cyber-Enabled Subversion: Russia’s “Hybrid War” against Ukraine, 2013-2022 117 5. Subversion in War: Russia’s full-scale Invasion of Ukraine since February 2022 174 Conclusion: New Possibilities and New Perils Notes Bibliography Index 207 229 291 329
Bibliography “2 Ukrainian Border Guards Killed in Mine Explosion; Military Prosecutor Finds ‘No ■ Saboteurs’ at Ammo Depot.” The Interpreter, September 2017. http://www.interpreter mag.com/day-1319/. 5.ua. “Масова Хакерська Атака: Шд Удар Потрапив Навггь Кабиш—5 Канал.” June 2017.
https://www.5.ua/suspilstvo/masova-khakerska-ataka-pid-udar-potrapyv-kab min-metropoliten-nyzka-bankiv-ta-pidpryiemstv-148971.html. 24tv.ua. “Пщсумки 2017 Року: Найгучннш Вбивства в УкрашЕ” 24 Канал. Accessed Мау 13,2019. https://24tv.ua/news/showNews.doJpidsumki_2017_roku_v_ukrayini_ vbivstva_2017
objectld=895499. 112.ua. “СБУ Предупредила Хакерскую Атаку Российских Спецслужб На Энергообъекты Украины—112 Украина.” 112.Ua, December 2015. https://112.ua/ kriminal/sbu-predupredila-hakerskuyu-ataku-rossiyskih-specsluzhb-na-energoobe kty-ukrainy-281811 .html. Ablon, Lillian, and Andy Bogart. “Zero
Days, Thousands of Nights.” Rand, 2017. https:// www.rand.org/pubs/research_reports/RRl 751 .html. Adams, Lawrence. "AES-NI Ransomware Dev Releases Decryption Keys amid Fears of Being Framed for XData Outbreak.” Bleeping Computer, May 2017. https.7/www.bleep ingcomputer.com/news/security/aes-ni-
ransomware-dev-releases-decryption-keysamid-fears-of-being-framed-for-xdata-outbreak/. AIVD and MIVD. “De Russische Aanval Op Oekraïne: Een Keerpunt in de Geschiedenis.” February 2023. https://www.defensie.nl/binaries/defensie/documenten/publicaties/ 2023/02/20/publicatie-aivd-en-
mivd-24-2/Brochure_24-2+De+Russiche+aanval+ op-i-Oekraine_TG_web.pdf. Alexander, Keith. “Cyber Warfare in Ukraine Poses a Threat to the
Global System.” Financial Times, February 2022. https://www.ft.com/content/8ele8176-2279-45969c0f-98629b4db5a6. Allen, Cassandra. “Mapping Media Freedom: Ukrainian Journalists Subjected to Malicious Cyber-Attacks.” Index on Censorship (blog), July 2017. https://www.indexo ncensorship.org/2017/07/journalists-ukraine-cyber-attacks/. Àlperovitch, Dmitri. “Perhaps the Most Strategically Impactful Cyber Operation in Wartime History.” Twitter, @DAlperovitch. August 2022. https://twitter.com/DAlpe rovitch/status/1562560980105584640. Amos, Howard. “Ukraine: Sevastopol Installs Pro-Russian Mayor as Separatism Fears Grow.” The Guardian, February 25, 2014, sec. World News. https://www.theguardian. com/world/2014/feb/25/ukraine-sevastopol-installs-pro-russian-mayor. Anderson, James P. “Computer Security Technology Planning Study (Volume II)” October 1972. https://csrc.nist.rip/publications/history/ande72.pdf. Anderson, R. “Why Information Security Is Hard-An Economic Perspective.” In Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC Ό1), 358. Washington, DC: IEEE Computer Society, 2001. http://dl.acm.org/citation . cfm?id=872016.872155.
292 BIBLIOGRAPHY Andrew, Christopher Μ. The Mitrokhin Archive: The KGB in Europe and the West. . London: Allen Lane, 2000. Andrew, Christopher Μ., and Oleg Gordlevsky. KGB: The inside Story of Its Foreign Operationsfrom Lenin to Gorbachev. New York: Harper Collins Publishers, 1990. Andrew, Christopher Μ., and Vasili Mitrokhin. The Sword and the Shield: The Mitrokhin Archive and the Secret History of the KGB. New York: Basic Books, 1999. Anti-Virus .by. “News: VirusBlokAda.” 2010. http://www.anti-virus.by/en/tempo.shtml. Arghire, lonut. “NotPetya Connected to BlackEnergy/KillDisk: Researchers.” Security Week, July 2017. https://www.securityweek.com/notpetya-connected-blackenergyk illdisk-researchers. ASERT Team. “The Anatomy of the DDoS Attack Campaign Targeting Organizations in Ukraine.” NETSCOUT (blog), February 2022. https://www.netscout.com/blog/asert/ ddos-attack-campaign-targeting-multiple-organizations-ukraine. “Assessment of Ukraine’s Economic Losses from the Temporary Occupation of the Crimean Peninsula.” Center for Economic Strategy, July 2021. https://ces.org.ua/ass essment-of-ukraines-economic-losses-from-crimea/. Bainbridge, David I. “Hacking. The Unauthorised Access of Computer Systems: The Legal Implications.” Modern Law Review 52, no. 2 (1989): 236-245. Baldwin, David A. “Power Analysis and World Politics: New Trends versus Old Tendencies.” World Politics 31, no. 2 (1979): 161-194. Baldwin, David A. Power and International Relations: A Conceptual Approach. Princeton, NJ: Princeton University Press, 2016. Balzacq, Thierry, and Myriam Dunn Cavelty. “A Theory of
Actor-Network for Cyber Security.” European Journal of International Security 1, no. 2 (July 2016): 176-198. https://doi.Org/10.1017/eis.2016.8. Barnett, Michael, and Raymond Duvall. “Power in International Politics.” International Organization 59, no. 1 (2005): 39-75. Bateman, Jon. “Russia’s Wartime Cyber Operations in Ukraine: Military Impacts, Influences, and Implications.” December 2022. https://carnegieendowment.org/files/ Bateman_Cyber-FINAL21 .pdf. Batvinis, Raymond J. “The Future of FBI Counterintelligence through the Lens of the Past Hundred Years.” In The Oxford Handbook of National Security Intelligence, Oxford Handbooks, edited by Loch K. Johnson, 505-517. Oxford: Oxford University Press, 2010. Baumgartner, Kurt. “BE2 Extraordinary Plugins, Siemens Targeting, Dev Fails.” February 2015. https://securelist.com/be2-extraordinary-plugins-siemens-targeting-dev-fails/ 68838/. BBC. "Crimea Blackout ‘Sabotage by Ukraine.”’ BBC News, November 2015, sec. Europe. https://www.bbc.com/news/world-europe-34967093. BBC. “Nato to Counter ‘Hybrid Warfare’ from Russia.” BBC News, May 2015, sec. Europe. https://www.bbc.com/news/world-europe-32741688. BBC. “Putin Strategist Returns to Kremlin.” BBC News, September 2013, sec. Europe. https://www.bbc.com/news/world-europe-24178947. BBC. “Ukraine Power Cut ‘Was Cyber-Attack.’ ” BBC News, January 2017, sec. Technology. https://www.bbc.com/news/technology-38573074. Behr, Roy L., and Shanto Iyengar. “Television News, Real-World Cues, and Changes in the Public Agenda.” Public Opinion Quarterly 49, no. 1 (Januàry 1985): 38-57. https://doi.
org/10.1086/268900.
BIBLIOGRAPHY 293 Beilenson, Lawrence W. Power through Subversion. Washington, DC: Public Affairs Press, 1972. Benkler, Yochai, Robert Faris, and Hal Roberts. Network Propaganda: Manipulation, Disinformation, and Radicalization in American Politics. New York, NY: Oxford University Press, 2018. https://www.oxfordscholarship.com/view/10.1093/oso/978019 0923624.001.0001/oso-9780190923624. Bennett, W. Lance, and Steven Livingston. “The Disinformation Order: Disruptive Communication and the Decline of Democratic Institutions” European Journal of Communication, 33, no. 2 (April 2018). https://doi.org/10.1177/0267323118760317. Bergman, Ronen, Rick Gladstone, and Farnaz Fassihi. “Blackout Hits Iran Nuclear Site in What Appears to Be Israeli Sabotage.” New York Times, April 2021, sec. World, https:// www.nytimes.com/2021/04/ll/world/middleeast/iran-nuclear-natanz.html. Betts, Richard K. Enemies of Intelligence: Knowledge and Power in American National Security. New York: Columbia University Press, 2007. Biddle, Stephen. Military Power: Explaining Victory and Defeat in Modern Battle. Princeton, NJ: Princeton University Press, 2010. Bijker, Wiebe E„ and John Law, eds. Shaping Technology/Building Society: Studies in Sociotechnical Change, Inside Technology, repr. Cambridge, MA: MIT Press, 2010. “The Birth of the Web.” CERN. Accessed January 18,2023. https://home.web.cern.ch/scie nce/computing/birth-web. Bischof, Günter, Stefan Karner, and Peter Ruggenthaler, eds. The Prague Spring and the Warsaw Pact Invasion of Czechoslovakia in 1968, Harvard Cold War Studies Book Series. Lanham, MD:
Lexington Books, 2010. Bittman, Ladislav. The Deception Game. New York: Ballantine Books, 1981. Bittman, Ladislav. The KGB and Soviet Disinformation: An Insider’s View. Washington, DC: Pergamon-Brassey’s, 1985. Bjola, Corneliu, and Stuart Murray. Secret Diplomacy: Concepts, Contexts and Cases. London, UK: Routledge, 2016. Blackstock, Paul W. The Strategy ofSubversion: Manipulating the Politics of Other Nations. Chicago: Quadrangle Books, 1964. “Blasts at Ukrainian Munitions Depot Let $800 Mln of Weapons Go Up in Smoke.” TASS, September 2017. http://tass.com/world/967814. Bloomberg. “Ukraine Protesters Urge Yanukovych’s Return at Rally in Donetsk.” March 2014. https://www.bloomberg.com/news/articles/2014-03-22/ukraine-protestersurge-yanukovych-s-return-at-rally-in-donetsk. Blunden, Bill, and Violet Cheung. Behold a Pale Farce: Cyberwar, Threat Inflation, the Malware Industrial Complex. Waterville, OR: Trine Day, 2014. BND. “Dokumente Des Bundesnachrichtendienstes Zum Prager Frühling 1968.” Mitteilungen Der Forschungs-Und Arbeitsgruppe „Geschichte Des BND,»2016. http:// uzsi.cz/files/spolkova-zpravodajska-sluzba-prazske-jaro-1968.pdf. Boyes, Hugh, Bil Hallaq, Joe Cunningham, and Tim Watson. “The Industrial Internet of Things (IIoT): An Analysis Framework.” Computers in Industry 101 (October 2018): 112. https://doi.Org/10.1016/j.compind.2018.04.015. Brandy, Aaron F., Nerea Μ. Cal, and Devlin P. Winkelstein. “Defending the Borderland.” Army Cyber Institute, December 2017. https://vtechworks.lib.vt.edu/handle/10919/ 81979. Brandy, Aaron Franklin. The Decision to Attack: Military
and Intelligence Cyber DecisionMaking. Athens, Georgia: University of Georgia Press, 2016. http://muse.jhu.edu/ book/45365.
294 BIBLIOGRAPHY Brewster, Thomas. ‘“Most Severe’ Cyberattack Since Russian Invasion Crashes Ukraine Internet Provider.” Forbes, March 2022, sec. Cybersecurity, https://www.forbes.com/ sites/thomasbrewster/2022/03/28/huge-cyberattack-on-ukrtelecom-biggest-sincerussian-invasion-crashes-ukraine-telecom/. Buchanan, Ben. The Cybersecurity Dilemma Hacking, Trust and Fear between Nations. Oxford: Oxford University Press, 2017. Buchanan, Ben. The Hacker and the State: Cyber Attacks and theNewNormal ofGeopolitics. Cambridge, MA: Harvard University Press, 2020. Buchanan, Ben. “The Legend of Sophistication in Cyber Operations.” Belfer Center for Science and International Affairs (blog), 2017. https://www.belfercenter.org/publicat ion/legend-sophistication-cyber-operations. Bull, Hedley. The AnarchicalSociety:AStudy ofOrderin World Politics. New York: Columbia University Press, 1977. Bumiller, Elisabeth, and Thom Shanker. “Panetta Warns of Dire Threat of Cyberattack on U.S.” New York Times, October 12, 2012, sec. World, https://www.nytimes.com/2012/ 10/12/world/panetta-warns-of-dire-threat-of-cyberattack.html. Burdiga, Igor. “«Чорний ΒίΒτοροκ» украшського IT: яких збитк1в завдала юбератака, та хто ïï вчинив.” July 2017. https://hromadske.ua/posts/naslidki-kiberataki. Burt, Jeff. “Sandworm Gärig Launches Monster Ransomware Attacks on Ukraine.” November 2022. https://www.theregister.eom/2022/l l/29/russia_ransomboggs_ran somware_ukraine/. Butchenko, Maksym. “Ukraine’s Territorial Defence on a War Footing.” ICDS (blog), April 2022. https://icds.ee/en/ukraines-territorial-defence-on-a-
war-footing/. Butusov, Yuri. “День кризи: 6 kbîthh 2014 року росгйськг спецслужби атакували органи влади на твденному сход! Украши.” Цензор.НЕТ, April 2017. https:// censor.net.ua/ua/resonance/435372/den_kryzy_6_kvitnya_2014_roku_rosiyiski_ spetsslujby_atakuvaly_organy_vlady_na_pivdennomu_shodi_ukrayiny. California Energy Commission. “California ISO Glossary.” n.d. https://www.energy. ca.gov/glossary/ISO_GLOSSARY.PDE Callanan, James.' Covert Action in the Cold War: US Policy, Intelligence and CIA Operations. London: I. B. Tauris, 2009. Cameron, Dell. “In WannaCry’s Wake, a New Rapidly Spreading Ransomware Attack Appeared Today.” Gizmodo, May 2017. https://gizmodo.com/in-wannacrys-wake-anew-rapidly-spreading-ransomware-a-1795385418. Cappelli, Dawn, Andrew Moore, and Randall Trzeciak. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud), Sei Series in Software Engineering. Upper Saddle River, NJ: AddisonWesley, 2012. Carr, Jeffrey. “The GRU-Ukraine Artillery Hack That May Never Have Happened.” Medium (blog), January 2017. https://medium.com/@jeffreyscarr/the-gru-ukraineartillery-hack-that-may-never-have-happened-820960bbb02d. Carson, Austin. “Facing Off and Saving Face: Covert Intervention and Escalation Management in the Korean War.” International Organization 70, no. 1 (2016): 103-131. https://d0i.0rg/l 0.1017/S0020818315000284. Carson, Austin. Secret Wars: Covert Conflict in International Politics, Princeton Studies in International History and Politics. Princeton, NJ: Princeton University Press,
2018. CBC. “Riots Erupt in Vancouver after Canucks Loss.” CBC News, June 2011. https://www. cbc.ca/news/canada/british-columbia/riots-erupt-in-vancouver-after-canucks-loss1.993707.
BIBLIOGRAPHY 295 Censor.net. “Начальника пожежно! охорони арсеналу в Калишвщ не було покарано за недбал1Сть через закшчення терм!Н1в притягнення до адмшввдповщальноси.” Цензор.НЕТ, October 2018. https://censor.net.ua/ua/news/3091002/nachalnyka_
pojejnoyi_ohorony_arsenalu_v_kalynivtsi_ne_bulo_pokarano_za_nedbalist_cher ez_zakinchennya. CERT-UA. “Cyber Attack on Websites of State Bodies.” January 2022. https://cert.gov.ua/. CERT-UA. “A Fragment of the Research on Cyber Attacks 01.14.2022.” January 2022. https://cert.gov.ua/article/18101.
CERT-UA. “Heavy Cyberattack on Ukraine’s Energy Sector Prevented.” April 2022. https://cip.gov.ua/en/news/poperedzhena-masshtabna-kiberataka-na-energetichniisektor-ukrayini. CERT-UA. “Information on Cyber Attacks on February 15, 2022.” Accessed January 12, 2023. https://cert.gov.ua/. CERT-UA.
“Ukrainian Media Are Attacked with Black Energy.” January 2016. https:// web.archive.org/web/20160116110418/http://cert.gov.ua/?p=2370. CERT-UA. “Юбератака Групи Sandworm (UAC-0082) На Об’екти Енергетики Украши з Використанням Шюдливих Програм INDUSTROYER2 Та CADDYWIPER (CERT-UA#4435).” April 2022.
https://cert.gov.ua/. Cerulus, Laurens. “How Ukraine Became a Test Bed for Cyberweaponry” Politico, February 2019. https://www.politico.eu/article/ukraine-cyber-war-frontline-russiamalware-attacks/. Chappell, Bill. “‘Petya’ Ransomware Hits at Least 65 Countries; Microsoft Traces It to Tax Software.”
NPR, June 2017. https://www.npr.org/sections/thetwo-way/2017/06/28/ 534679950/petya-ransomware-hits-at-least-65-countries-microsoft-traces-it-to-taxsoftware.
Cherkasets, Olena. “Медведчук Отримав В1д ФСБ Мыьярд На П1дготовку Вшни.” July 2022. https://umoloda.kyiv.Ua/number/0/2006/168191. Chiwis, Christopher S. “Hybrid War: Russian Contemporary Political Warfare.” Bulletin of the Atomic Scientists: How Dangerous Is Hybrid War? 73, no. 5 (2017): 316-321. https://doi.org/10.1080/00963402.2017.1362903 . Chulov, Martin. “Israel Appears to Confirm It Carried Out Cyberattack on Iran Nuclear Facility.” The Guardian, April 11, 2021, sec. World News, https://www.theguardian.com/world/2021/apr/ll/israel-appe ars-confirm-cyberattack-iran-nuclear-facility. CIA. “The Crisis in Czechoslovakia.” July 1968. CIA. “Eastern Europe and the USSR in the Aftermath of the Invasion of Czechoslovakia.” November 1968. CIA. “Intelligence Memorandum: Czechoslovakia in Transition.” April 1968. CIA. “Intelligence Memorandum: The Soviet Decision to Intervene in Czechoslovakia.” August 1968. CIA. “National Intelligence Survey 18; Czechoslovakia; The Society.” 1974. https://www. cia.gov/library/readingroom/docs/CIA-RDP01-00707R000200110015-7.pdf. CIA. “The Situation in Czechoslovakia 10/5/1968,10am.” May 1968. CIA Office of National Estimates. “Czechoslovakia: A New Direction.” Special Memorandum, CIA, January 1968. Cimpanu, Catalin. “M.E.Doc Software Was Backdoored 3 Times, Servers Left without Updates Since 2013.” Bleeping Computer, 2017. https://www.bleepingcomputer.com/ news/security/m-e-doc-software-was-backdoored-3-times-servers-left-without-upda tes-since-2013/.
296 BIBLIOGRAPHY Cisco Taios. “The MeDoc Connection.” 2017. http://blog.talosintelligence.coni/2017/07/ the-medoc-connection.html. Cisco Talos. “Threat Spotlight: Follow the Bad Rabbit.” 2017. http://blog.talosintelligence. com/2017/10/bad- rabbit.html. Cisco Talos. “Ukraine Campaign Delivers Defacement and Wipers, in Continued Escalation.” Cisco Talos (blog), January 2022. https://blog.talosintelligence.com/ukra ine-campaign-delivers-defacement/. Clausewitz, Carl von. On War, Oxford Worlds Classics. Edited by Beatrice Heuser. Translated by Michael Howard and Peter Paret. New York: Oxford University Press, 2006. Clayton, Mark. “Ukraine Election Narrowly Avoided Wanton Destruction’ from Hackers (+Video).” Christian Science Monitor, June 2014. http://www.csmonitor.com/World/ Passcode/2014/0617/Ukraine-election-narrowly-avoided-wanton-destruction-fromhackers-video. Cohen, Fred. “Computer Viruses: Theory and Experiments.” Computers Security 6, no. 1 (1987): 22-35. Committee on Foreign Relations. “Chain Reaction: Avoiding a Nuclear Arms Race in the Middle East.” Report to the US Senate Committee on Foreign Relations, February 2008. https://www.govinfo.gov/content/pkg/CPRT-110SPRT39674/html/CPRT110SPRT39674.htm. Connolly, Helen, and Kate Womack. “Previously Unseen Photos Depict Drama of 1968 Soviet Invasion of Prague.” The Observer, August 17, 2008, sec. World News, https:// www.theguardian.com/world/2008/aug/17/1968theyearofrevolt.russia. Corke, Sarah-Jane. US Covert Operations and Cold War Strategy: Truman, Secret Warfare, and the CIA, 1945-1953, Studies in Intelligence Series.
New York: Routledge, 2008. Cormac, Rory. “Coordinating Covert Action: The Case of the Yemen Civil War and the South Arabian Insurgency.” Journal of Strategic Studies 36, no. 5 (October 2013): 692717. https://doi.org/10.1080/01402390.2011.651534. Cormac, Rory, and Richard J. Aldrich. “Grey Is the New Black: Covert Action and Implausible Deniability.” International Affairs 94, no. 3 (May 2018): 477-494. https:// doi.org/10.1093/ia/iiy067. Coser, Lewis A. Functions ofSocial Conflict. New York, NY: Simon and Schuster, 1964. Crete-Nishihata, Masashi, Jakub Dalek, Ronald Deibert, Seth Hardy, Katherine Kleemola, Sarah McKune, Irene Poetranto, et al. “Communities @Risk: Targeted Digital Threats against Civil Society.” Citizen Lab, November 2014. https://targetedthreats.net/ . “Crimea Power Cut ‘Caused by Blast.’” BBC News, December 2015, sec. Europe, http:// www.bbc.com/news/world-europe-35204304. Crowdstrike. “Fancy Bear Tracking of Ukrainian Field Artillery Units.” December 2016. http://web.archive.Org/web/20161223065425/https://www.crowdstrike.com/wp-cont ent/brochures/Fan cyBearTracksUkrainianArtillery.pdf. Crowdstrike. “Fancy Bear Tracking of Ukrainian Field Artillery Units.” March 2017. https://www.crowdstrike.com/wp-content/brochures/FancyBearTracksUkrainianAr tillery.pdf. Crowdstrike. “Technical Analysis of the WhisperGate Malicious Bootloader | Crowdstrike.” January 2022. https://www.crowdstrike.com/blog/technical-analysisof-whispergate-malware/. Crypto-cypher. “Fortinet Victim List—‘Hackers Leak Passwords for 500,000 Fortinet VPN Accounts’ #TrackThePlanet.” Gist, 2021.
https://gist.github.com/crypto-cypher/ f216d6fa4816ffa93c5270b001 dc4bdc.
BIBLIOGRAPHY 297 CSIS. "The Ukraine Crisis Timeline.” Accessed April 12, 2019. http://ukraine.csis. org/#478. Cyber Berkut. “Cyber Berkut: Кибер Беркут.” May 2014. http://www.cyber-berkut.ru/ en/index_02.php. CysCentrum. "Киберугроза BlackEnergy2/3.” 2016. https://cys-centrum.com/ru/news/ black_energy_2_3. Dahl, Robert A. “The Concept of Power.” Behavioral Science 2, no. 3 (1957): 201-215. Dak, Pavlo. “Як Βίκτορ Медведчук Причетний До В1йни в ykpa'ÏHi: Вщповщь Буданова.” 1нформацшне Агентство Вголос/Vgolos, October 1, 2022 edition. Accessed January 16, 2023. https://vgolos.ua/news/yak-viktor-medvedchuk-prichet niy-do-viyni-v-ukrayini-vidpovid-budanova_1428157.html. Dawisha, Karen. The Kremlin and the Prague Spring, International Crisis Behavior Series. Vol. 4. Berkeley: University of California Press, 1984. “Deadly Ambush Ends Lull in Ukraine.” BBCNews, September 2015, sec. Europe, https:// www.bbc.com/news/world-europe-34128085. “Deadly Clashes in Ukraine Despite Truce.” Radio Free Europe/Radio Liberty, December 2015. https://www.rferl.Org/a/deadly-clashes-in-ukraine-despite-holiday-truce/27452 015.html. Dear, Ian. Sabotage Subversion: Storiesfrom the Files ofthe SOE and OSS. London: Arms and Armour, 1996. Deibert, Ronald. Parchment, Printing and Hypermedia: Communication in World Order Transformation. New York: Columbia University Press, 1997. Deibert, Ronald. Reset: Reclaiming the Internet for Civil Society. Toronto, Canada: House ofAnansi Press, 2020. Deibert, Ronald. “Subversion Inc: The Age of Private Espionage.” Journal of Democracy 33, no. 2 (April 2022): 28-44.
Deibert, Ronald, Rafal Rohozinski, and Masashi Crete-Nishihata. “Cyclones in Cyberspace: Information Shaping and Denial in the 2008 Russia-Georgia War.” Security Dialogue 43, no. 1 (2012): 3-24. https://doi.org/10.1177/0967010611431079. DeNardis, Laura. Protocol Politics: The Globalization of Internet Governance. Cambridge, MA: MIT Press, 2009. http://myaccess.library.utoronto.ca/login?url=http://site.ebrary. сот/lib/utoronto/Doc?id= 10326187. DeVine, Michael E., and Heidi Μ. Peters. Covert Action and Clandestine Activities of the Intelligence Community: Selected Definitions in Brief. Washington, DC: US Congressional Research Service, July 2019. Dix, Robert H. “The Breakdown of Authoritarian Regimes.” Western Political Quarterly 35, no. 4 (December 1982): 554-573. https://doi.Org/10.l 177/106591298203500407. Doman, Chris. “Technical Analysis of the DdoS Attacks against Ukrainian Websites.” Cado Security: Cloud Investigation, February 2022. https://www.cadosecurity.com/ technical-analysis-of-the-ddos-attacks-against-ukrainian-websites/. Madory, Doug (@DougMadory). Twitter, “Large outages today in #Ukraine.” March 2022. https://twitter.com/DougMadory/status/1501910709734678529 . Douthit, Howard, III. “The Use and Effectiveness of Sabotage as a Means of Unconventional Warfare.” Master’s Thesis: Air University, 1987. Downes, Alexander B., and Mary Lauren Lilley. “Overt Peace, Covert War?: Covert Intervention and the Democratic Peace.” Security Studies 19, no. 2 (May 2010): 266306. https://doi.org/10.1080/09636411003795756 .
298 BIBLIOGRAPHY Dragos. “CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations.” 2017. https://dragos.com/blog/crashoverride/CrashOverride-01.pdf. Dragos. “CRASHOVERRIDE: Reassessing the 2016 Ukraine Electric Power Event as a Protection-Focused Attack.” 2019. https://dragos.com/wp-content/uploads/CRASHO VERRIDE.pdf. Drezner, Daniel W. “Why Vladimir Putins Strategic Genius Scares the Heck Out of Me.” Washington Post, July 30, 2014, sec. PostEverything. https://www.washingtonpost . com/posteverything/wp/2014/07/30/why-vladimir-putins-strategic-genius-scaresthe-heck-out-of-me/. Dubcek, Alexander. Hope Dies Last: The Autobiography of Alexander Dubcek. Edited by Jiri Hochman. New York: Kodansha USA, 1993. Dullien, Thomas. “Weird Machines, Exploitability, and Provable Unexploitability.” IEEE Transactions on Emerging Topics in Computings, no. 2 (April 2020): 391-403. https:// doi.org/10.1109/TETC.2017.2785299. Dunn Cavelty, Myriam. “From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse.” International Studies Review 15, no. 1 (2013): 105-122. https://doi.org/10.llll/misr.12023. Egloff, Florian J. “Contested Public Attributions of Cyber Incidents and the Role of Academia.” Contemporary Security Policy 41, no. 1 (January 2020): 55-81. https://doi. org/10.1080/13523260.2019.1677324. Egloff, Florian J. Semi-State Actors in Cybersecurity. New York: Oxford University Press, 2022. Eidlin, Fred H. The Logic of “Normalization": The Soviet Intervention in Czechoslovakia of 21 August 1968 and the Czechoslovak Response.
Boulder, Colorado: Eastern European Monographs, Fred Eidlin, 1980. “Enercon: Thousands of Wind Turbines Need New Hardware.” Energate Messenger, March 2022. https://www.energate-messenger.com/news/220914/enercon-thousa nds-of-wind-turbines-need-new-hardware. Erickson, Jon. Hacking: The Art ofExploitation. San Francisco: No Starch Press, 2003. Erlanger, Steven. "Putin, at NATO Meeting, Curbs Combative Rhetoric.” New York Times, April 5, 2008, sec. Europe, https://www.nytimes.com/2008/04/05/world/europe/05n ato.html. ESET. “Analysis of TeleBots’ Cunning Backdoor.” We Live Security (blog), July 2017. https://www.welivesecurity.com/2017/07/04/analysis-of-telebots-cunning-backdoor/. ESET. “Bad Rabbit: Not-Petya Is Back with Improved Ransomware.” We Live Security (blog), October 2017. https://www.welivesecurity.com/2017/10/24/bad-rabbit-notpetya-back/. ESET. “BlackEnergy by the SSHBearDoor: Attacks against Ukrainian News Media and Electric Industry.” We Live Security (blog), January 2016. https://www.welivesecurity. com/2016/01/03/blackenergy-sshbeardoor-details-2015-attacks-ukrainian-newsmedia-electric-industry/. ESET. “CaddyWiper: New Wiper Malware Discovered in Ukraine.” We Live Security (blog), March 2022. https://www.welivesecurity.eom/2022/03/15/caddywiper-newwiper-malware-discovered-ukraine/. ESET. “GREYENERGY.” We Live Security (blog), October 2018. https://www.welivesecur ity.com/wp-content/uploads/2018/10/ESET_GreyEnergy.pdf. ESET. “Kiev Metro Hit with a New Variant of the Infamous Diskcoder Ransomware.” We Live Security (blog), October 2017.
https://www.welivesecurity.eom/2017/10/24/kievmetro-hit-new-variant-infamous-diskcoder-ransomware/ .
BIBLIOGRAPHY 299 ESET. “New TeleBots Backdoor: First Evidence Linking Industroyer to NotPetya.” We Live Security (blog), October 2018. https://www.welivesecurity.com/2018/10/ll/new-teleb ots-backdoor-linking-industroyer-notpetya/. ESET. “RansomBoggs: New Ransomware Targeting Ukraine.” We Live Security (blog), November 2022. https://www.welivesecurity.eom/2022/l 1/28/ransomboggs-new-ran somware-ukraine/. ESET. “The Rise of TeleBots: Analyzing Disruptive KillDisk Attacks.” We Live Security (blog), December 2016. https://www.welivesecurity.com/2016/12/13/rise-telebotsanalyzing-disruptive-killdisk-attacks/. ESET. “Sandworm Uses a New Version of ArguePatch to Attack Targets in Ukraine.” We Live Security (blog), May 2022. https://www.welivesecurity.com/2022/05/20/sandw drm-ukraine-new-version-arguepatch-malware-loader/. ESET. “TeleBots Are Back: Supply-Chain Attacks against Ukraine.” We Live Security (blog), June 2017. https://www.welivesecurity.com/2017/06/30/telebots-back-supplychain-attacks-against-ukraine/. ESET. “Win32/Industroyer.” We Live Security (blog), 2017. https://www.welivesecurity . com/wp-content/uploads/2017/06/Win32_Industroyer.pdf. ESET. “XData Ransomware Making Rounds amid Global WannaCryptor Scare.” We Live Security (blog), May 2017. https://www.welivesecurity.com/2017/05/23/xdata-ran somware-making-rounds-amid-global-wannacryptor-scare/. ESET Research. “IsaacWiper and HermeticWizard: New Wiper and Worm Targeting Ukraine.” We Live Security (blog), March 2022. https://www.welivesecurity.com/2022/ ОЗ/01/isaacwiper-hermeticwizard-wiper-worm-targeting-ukraine/.
ESET Research (@ESETresearch). “CaddyWiper Does Not Share Дпу Significant Code Similarity with #HermeticWiper, #IsaacWiper or Any Other Malware Known to Us. The Sample We Analyzed Was Not Digitally Signed. 3/7 Https://T.Co/EGp9NnctD9.” Twitter, March 2022. https://twitter.com/ESETresearch/status/1503436425676705807 . ESET Research (@ESETresearch). “Interestingly, CaddyWiper Avoids Destroying Data on Domain Controllers. This Is Probably a Way for the Attackers to Keep Their Access inside the Organization While Still Disturbing Operations. 5/7 Https://T.Co/ XiXgOMe5wr.” Twitter, March 2022. https://twitter.com/ESETresearch/status/I503 436433134129158. ESET Research (@ESETresearch). “Breaking. #ESETResearch discovered a new data wiper malware used in Ukraine today. ESET telemetry shows that it was installed on hundreds of machines in the country. This follows the DDoS attacks against several Ukrainian websites earlier today 1/n”, Twitter, February 2022. https://twitter.com/ ESETresearch/status/1496581903205511181. ESET Research (@ESETresearch). “We observed the first sample today around 14h52 UTC / 16h52 local time. The PE compilation timestamp of one of the sample is 202112-28, suggesting that the attack might have been in preparation for almost two months. 2/n”, Twitter, February 2022. https://twitter.com/ESETresearch/status/I496 581904916754435. ESET Research (@ESETresearch). “This new malware erases user data and partition in formation from attached drives. #ESET telemetry shows that it was seen on a few dozen systems in a limited number of organizations. 2/7,” Twitter,
March 2022. https://twitter. com/ESETresearch/status/1503436423818534915. ESET Research (@ESETresearch). “Similarly to HermeticWiper deployments, we observed CaddyWiper being deployed via GPO, indicating the attackers had prior
300 BIBLIOGRAPHY control of the target's network beforehand. 4/7,” Twitter, March 2022. https://twitter. com/ESETresearch/status/1503436428096716800. Espreso.tv. "Вибухи в Калишвщ: Майора, Який Пропустив Сторонни На Вшськов: Склади, Оштрафували На 2,5 Тисячк” November 2017. https://espreso.tv/news/ 2017/11 /22/vybukhy_v_kalynivci_mayora_yakyy_propustyv_storonnikh_osib_na_ viyskovi_sklady_oshtrafuvaly_na_2_5_tysyachi. Espreso.tv. “У Рос1йських Диверсантов Могли Бути Сшльники На Складах у Калишвщ,—Генерал Розвщки.” September 2017. https://espreso.tv/news/2017/09/ 27/u_rosiyskykh_dyversantiv_mogly_buty_spilnyky_na_skladakh_u_kalynivci_g eneral_rozvidky. Esterle, Lukas, and Radu Grosu. “Cyber-Physical Systems: Challenge of the 21st Century.” E i Elektrotechnik Und Informationstechnik 133, no. 7 (2016): 299-303. https://doi. org/10.1007/s00502-016-0426-6. “The EU-Ukraine Association Agreement Enters into Force on 1 September 2017.” EEAS—European External Action Service, European Commission. Accessed April 16, 2019. https://eeas.europa.eu/delegations/ukraine/30478/eu-ukraine-associationagreement-enters-force-1 -September-2017_en. Euromaidan Press. “30% of Ukrainian SBU Officers Were Russian FSB and GRU Agents.” Euromaidan Press (blog), April 2014. http://euromaidanpress.com/2014/04/24/30-ofukrainian-sbu-officers-were-russian-fsb-and-gru-agents/. Euromaidan Press. “Glazyev Tapes, Continued: New Details of Russian Occupation of Crimea and Attempts to Dismember Ukraine.” Euromaidan Press (blog), May 2019. http://euromaidanpress.com/2019/05/16/glazyev-tapes-continued-ukraine-
presentsnew-details-of-russian-takeover-of-crimea-and-financing-of-separatism/. Euromaidan Press. “Ukraine Publishes Video Proving Kremlin Directed Separatism in Eastern Ukraine and Crimea.” Euromaidan Press (blog), August 2016. http://euromaid anpress.eom/2016/08/23/ukraine-publishes-video-proving-kremlin-directed-separat ism-in-ukraine/. “EuroMaidan Rallies in Ukraine—Nov. 21-23 Coverage.” Kyiv Post, November 2013. https://www.kyivpost.com/post/7612. European Council. “EU Imposes the First Ever Sanctions against Cyber-Attacks.” July 2020. https://www.consilium.europa.eu/en/press/press-releases/2020/07/30/eu-impo ses-the-first-ever-sanctions-against-cyber-attacks/. Evanson, Robert K. “Political Repression in Czechoslovakia, 1948-1984.” Canadian Slavonic Papers /Revue Canadienne Des Slavistes 28, no. 1 (1986): 1-21. Eversden, Andrew, and Jaspreet Gill. “Why Hasn’t Russia Used Its ‘Full Scope’ of Electronic Warfare?” Breaking Defense (blog), March 2022. https://breakingdefense.sites.breaki ngmedia.com/2022/03/why-hasnt-russia-used-its-full-scope-of-electronic-warfare/. “EXCLUSIVE: Rounding up a Cyber Posse for Ukraine.” The Record by Recorded Future (blog), November 2022. https://therecord.media/exclusive-rounding-up-a-cyberposse-for-ukraine/. Fakty.ua. “Причиной обесточивания части Киева может быть атака хакеров.” December 2016. https://fakty.ua/227538-prichinoj-obestochivaniya-chasti-kieva-moz het-byt-ataka-hakerov. Farwell, J. P„ and R. Rohozinski. “Stuxnet and the Future of Cyber War.” Survival 53, no. 1 (2011): 23-40. https://doi.org/10.1080/00396338.2011.555586 . Fawn,
Rick, and Jiri Hochman. Historical Dictionary of the Czech State. Lanham, MD: Scarecrow Press, 2010).
BIBLIOGRAPHY 301 Fearon, James D. “Rationalist Explanations for War.” International Organization 49, no. 3 (1995): 379-414. Feiner, Lauren. “Cyberattack Hits Ukrainian Banks and Government Websites.” CNBC, February 2022. https://www.cnbc.com/2022/02/23/cyberattack-hits-ukrainianbanks-and-government-websites.html. Filitov, Alexsei. “The USSR, the Federal Republic of Germany, and the Czechoslovak Crisis of 1968.” In The Prague Spring and the Warsaw Pact Invasion of Czechoslovakia in 1968, Harvard Cold War Studies Book Series, edited by Günter Bischof, Stefan Karner, and Peter Ruggenthaler, 319-340. Lanham, MD: Lexington Books, 2010. FireEye. “Attackers Deploy New ICS Attack Framework ‘TRITON’ and Cause Operational Disruption to Critical Infrastructure.” FireEye (blog), December 2017. https://www.fire eye.com/blog/ threat-research/2017/12/attackers-deploy-new-ics-attack-frameworktriton.html. FireEye. “M-Trends.” 2020. https://content.fireeye.com/m-trends/rpt-m-trends-2020 . FireEye. “SMB Exploited: WannaCry Use of 'EternalBlue' « SMB Exploited: WannaCry Use of‘EternalBlue.’” May 2017. https://www.fireeye.com/blog/threat-research/2017/ 05/smb-exploited-wannacry-use-of-eternalblue.html. Fischerkeller, Michael P„ Emily O. Goldman, and Richard J. Harknett. Cyber Persistence Theory: RedefiningNational Security in Cyberspace, Bridging the Gap. New York: Oxford University Press, 2022. Fischerkeller, Michael P., and Richard J. Harknett. “Deterrence Is Not a Credible Strategy for Cyberspace.” Orbis 61, no. 3 (January 2017): 381-393. https://doi.org/10.1016/ j.orbis.2017.05.003. Fitton,
Oliver. “Cyber Operations and Gray Zones: Challenges for NATO.” Connections 15, no. 2 (2016): 109-119. Foreign Broadcast Information Service. “FBIS Special Report on Communist Propaganda—The I. Aleksandrov Article.” July 1968. Franceschi-Bicchierai, Lorenzo. “How Hackers Broke into John Podesta and Colin Powell’s Gmail Accounts.” Motherboard, October 2016. https://motherboard.vice. com/en_us/article/how-hackers-broke-into-john-podesta-and-colin-powells-gmailaccounts. Frolik, Josef, John Bok, and Pfemysl Vachalovsky. Spion vypovidà II: jasnâ zprâva о konci jednoho svêta. Praha: J. W. Hill, 2000. Galeotti, Mark. “Controlling Chaos: How Russia Manages Its Political War in Europe.” August 2017. http://www.ecfr.eu/publications/summary/controlling_chaos_how_ russia_manages_its_political_war_in_europe. Galeotti, Mark. “The ‘Gerasimov Doctrine’ and Russian Non-Linear War.” In Moscow’s Shadows (blog), July 2014. https://inmoscowsshadows.wordpress.com/2014/07/06/ the-gerasimov-doctrine-and-russian-non-linear-war/. Galeotti, Mark. “Putin’s Hydra: Inside Russia’s Intelligence Services.” European Council on Foreign Relations, May 2016. http://www.ecfr.eu/page/-/ECFR_169_-_PUTINS_ HYDRA_INSIDE_THE_RUSSIAN_INTELLIGENCE_SERVICES_1513.pdf. Ganssle, Jack. The Firmware Handbook. Orlando, FL: Elsevier, 2004. Gartzke, Erik, and Jon R. Lindsay. “Thermonuclear Cyberwar.” Journal of Cybersecurity 3, no. 1 (2017): 37-48. https://doi.org/10.1093/cybsec/tyw017. Gartzke, Erik, and Jon R. Lindsay. “Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace.” Security Studies 24, no. 2 (April
2015): 316-348. https://doi. org/10.1080/09636412.2015. 1038188,
302 BIBLIOGRAPHY George, Alexander L, and Andrew Bennett. Case Studies and Theory Development in the Social Sciences. Cambridge, MA: MIT Press, 2005. GfK Ukraine. “Public Opinion Survey in Crimea.” March 2014. https://avaazpress. s3.amazonaws.com/558_Crimea.Referendum.Poll.GfK.pdf. Gibney, Elizabeth. “Where Is Russia’s Cyberwar? Researchers Decipher Its Strategy.” Nature 603, no. 7903 (March 2022): 775-776. https://doi.org/10.1038/d41 586-022-00753-9. Giles, Keir. “Putin Does Not Need to Invade Ukraine to Get His Way.” Chatham HouseInternational Affairs Think Tank (blog), December 2021. https://www.chathamhouse. org/2021/12/putin-does-not-need-invade-ukraine-get-his-way. Gill, Jaspreet. “Russia May Be Holding Cyber Capabilities in Reserve, so US Must Keep Its Shields Up: Experts.” Breaking Defense (blog), March 2022. https://breakingdefense. sites.breakingmedia.com/2022/03/russia-may-be-holding-cyber-capabilities-in-rese rve-so-us-must-keep-its-shields-up-experts/. Gilli, Andrea, and Mauro Gilli. “Why China Has Not Caught Up Yet: MilitaryTechnological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage.” International Security 43, no. 3 (February 2019): 141-189. https://doi.org/ 10.1162/isec_a_00337. “Global Cyber Attack Could Spur $53 Billion in Losses: Lloyd’s Of.” Reuters, July 2017. https://www.reuters.com/article/us-cyber-lloyds-report/global-cyber-attack-couldspur-53-billion-in-losses-lloyds-of-london-idUSKBNlA20AB . Gomez, Miguel Alberto, and Eula Bianca Villar. “Fear, Uncertainty, and Dread: Cognitive Heuristics and Cyber Threats.”
Politics and Governance 6, no. 2 (June 2018): 61-72. https://doi.org/10.17645/pag.v6i2.1279 . Goodin, Dan. “Tuesday’s Massive Ransomware Outbreak Was, in Fact, Something Much Worse.” Ars Technica, June 2017. https://arstechnica.com/information-technol ogy/2017/06/petya-outbreak-was-a-chaos-sowing-
wiper-not-profit-seeking-ran somware/. Google TAG. “Fog of War: How the Ukraine Conflict Transformed the Cyber Threat Landscape.” Google, February 2023. https://services.google.com/fh/files/blogs/google _fog_of_war_research_report.pdf. Gorchinskaya, Katya, and Darina Marchak. “Russia Gives Ukraine
Cheap Gas, $ 15 Billion in Loans.” Kyiv Post, December 17, 2013. https://www.kyivpost.com/article/content/ ukraine-politics/russia-gives-ukraine-cheap-gas-15-billion-in-loans-333852.html. Gorchinskaya, Katya, Olga Rudenko, and William Schreiber. “Authorities: Hackers Foiled in Bid to Rig Ukraine
Presidential Election Results.” Kyiv Post, May 25, 2014. https:// www.kyivpost.com/article/content/may-25-presidential-election/authorities-hack ers-foiled-in-bid-to-rig-ukraine-presidential-election-results-349288.html. Gordiichuk, Dana. “Юбератака за мыьйони долар1в: за нападом може стояти РФ.”
ΕκοΗΟΜίηηα правда, February 2022. https://www.epravda.com.ua/news/2022/02/16/ 682428/. Gordon, Carol, and Asher Arian. “Threat and Decision Making.” Journal of Conflict Resolution 45, no. 2 (April 2001): 196-215. https://doi.org/10.1177/002200270104 5002003. Gordon.ua. “СБУ Задержала Российских
Агентов, Которые Корректировали Обстрелы Николаевской Области. Ими Оказались Местные Жители / ВОЙНА В УКРАИНЕ /
Новости.” July 2022. https://gordonua.com/amp/news/war/sbu-zaderzh ala-rossiyskih-agentov-kotorye-korrektirovali-obstrely-nikolaevskoy-oblasti-imiokazalis-mestnye-zhiteli-1617219.html.
BIBLIOGRAPHY 303 Gorst, Isabel. “Russians Invading, Says Ukraine Leader; Tanks Reported Crossing Border.” Latimes.com, August 2014. https://www.latimes.com/world/europe/la-fg-ukrainepresident-russian-forces-20140828-story.html. Gorwa, Robert, and Max Smeets. “Cyber Conflict in Political Science: A Review of Methods and Literature.” Preprint, SocArXiv, July 2019. https://doi.org/10.31235/osf. io/fc6sg. Götz, Elias. “Russia, the West, and the Ukraine Crisis: Three Contending Perspectives.” Contemporary Politics 22, no. 3 (2016): 249-266. https://doi.org/10.1080/13569 775.2016.1201313. Grabo, Cynthia R. “Soviet Deception in the Czechoslovak Crisis.” Studies in Intelligence 45th Anniversary Issue: Special Unclassified Edition, special issue (Fall 2000): 71-86. Graham, David A. “Rumsfelds Knowns and Unknowns: The Intellectual History of a Quip.” The Atlantic, March 2014. http://www.theatlantic.com/politics/archive/2014/ 03/rumsfelds-knowns-and-unknowns-the-intellectual-history-of-a-quip/359719/. Greenberg, Andy. “How An Entire Nation Became Russia’s Test Lab for Cyberwar.” Wired, June 2017. https://www.wired.com/story/russian-hackers-attack-ukraine/. Greenberg, Andy. Sandworm: A New Era of Cyberwar and the Huntfor the Kremlins Most Dangerous Hackers. New York: Doubleday, 2019. Greenberg, Andy. “The Untold Story of NotPetya, the Most Devastating Cyberattack in History.” Wired, August 2018. https://www.wired.com/story/notpetya-cyberattackukraine-russia-code-crashed-the-world/ . Greenberg, Andy. “The US Sanctions Russians for Potentially ‘Fatal’ Triton Malware.” October 2020.
https://www.wired.com/story/russia-sanctions-triton-malware/. Greig, Ian. Subversion: Propaganda, Agitation and the Spread ofPeoples War. London: Tom Stacey, 1973. Grey, Stephen. The New Spymasters: Inside the Modern World of Espionage from the Cold War to Global Terror. New York: St. Martin’s Press, 2015. Groll, Elias. “Did Russia Knock Out Ukraine’s Power Grid?” Foreign Policy (blog), January 2016. https://foreignpolicy.com/2016/01/08/did-russia-knock-out-ukraines-powergrid/. Groll, Elias. “In a Hacked Ukrainian App, a Picture of the Future of War.” Foreign Policy (blog), December 2016. https://foreignpolicy.com/2016/12/22/in-a-hacked-ukrain ian-app-a-picture-of-the-future-of-war/. The Grugq. "Day 2 Keynote: A Short Course in Cyber Warfare.” April 2018. https://www. youtube.com/watch?v=gvS4efEakpY. The Grugq. “Foghorn: Signals through the Fog of War.” Substack newsletter. Info Op (blog), June 2022. https://grugq.substack.com/p/foghorn-signals-through-the-fogof?utm_campaign=post_embed. The Grugq. “Towards an Analysis of Russian Cyber Warfare in Ukraine Feb 2022-Dec 2022.” Kings College London, forthcoming. Grytsenko, Oksana, and Ian Traynor. “Ukraine U-Turn on Europe Pact Was Agreed with Vladimir Putin.” The Guardian, November 26, 2013, sec. World news. https://www. theguardian.com/world/2013/nov/26/ukraine-u-turn-eu-pact-putin. Guerrero-Saade, Juan Andrés. “AcidRain: A Modem Wiper Rains Down on Europe.” SentinelOne (blog), March 2022. https://www.sentinelone.com/labs/acidrain-amodem-wiper-rains-down-on-europe/.
304 BIBLIOGRAPHY Guerrero-Saade, Juan Andres. "HermeticWiper: New Destructive Malware Used in Cyber Attacks on Ukraine.” SentinelOne (blog). Accessed February 28, 2022. https:// www.sentinelone.com/labs/hermetic-wiper-ukraine-under-attack/. Guerrero-Saade, J. A. (@juanandres_gs). Ok, Folks, We’re Clearly Missing the *MOST* Important Part of All of This. Seeing as Neither @threatintel nor @ESETresearch Have Named This Monster, Let’s Call This #HermeticWiper.” Twitter, February 2022. https:// twitter.com/juanandres_gs/status/1496607141888724997. Guerrero-Saade, J. A. (@juanandres_gs). “Ok. This Isn’t a Bullshit Wiper like the Last Time. This Thing Is Meant to Be Devastating. Https://T.Co/EvP0g3jjvU.” Twitter, February 2022. https://twitter.com/juanandres_gs/status/1496599932966510600. Guzzini, Stefano. “The Concept of Power: A Constructivist Analysis.” MillenniumJournal ofInternational Studies 33, no. 3 (June 2005): 495-521. Habermas, Jürgen. The Theory of Communicative Action. Boston: Beacon Press, 1984. Hafner, Katie, and John Markoff. Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon Schuster, 1991. Harding, Luke. “Demoralised Russian Soldiers Tell of Anger at Being ‘Duped’ into War.” The Guardian, March 4,2022, sec. World News, https://www.theguardian.com/world/ 2022/mar/04/russian-soldiers-ukraine-anger-duped-into-war. Harding, Luke. “Ukraine Hit by ‘Massive’ Cyber-Attack on Government Websites.” The Guardian, January 14, 2022, sec. World News, https://www.theguardian.com/world/ 2022/jan/14/ukraine-massive-cyber-attack-government-websites-
suspected-russianhackers. Harknett, Richard J., and Max Smeets. “Cyber Campaigns and Strategic Outcomes.” Journal of Strategic Studies 45, no. 4 (March 2020): 534-567. https://doi.org/10.1080/ 01402390.2020.1732354. Hasherezade. “BadRabbit: A Closer Look at the New Version of Petya/NotPetya.” Malwarebytes Labs, October 2017. https://blog.malwarebytes.com/threat-analysis/ 2017/10/badrabbit-closer-look-new-version-petyanotpetya/. Haynes, John Earl. Spies: The Rise and Fall of the KGB in America. New Haven, CT: Yale University Press, 2009. “The Head of the Ukrainian Intelligence Service DENIED CULPABILITY! Tried to Transfer Huge Money and Emeralds across the Border, Arrested at the Presevo Crossing!” Republika.rs, Srpski telegraf, June 2022. https://www.republika.rs/topnews/serbia-news/366730/andriy-naumov-arrest-serbia. Heale, Μ. J. “Controlling Communist Subversion, 1948-1956.” In McCarthy’s Americans: Red Scare Politics in State and Nation, 1935-1965, American History in Depth, edited by Μ. J. Heale, 234-253. London: Macmillan Education UK, 1998. https://doi.org/10.1007/978-l-349-14546-l_ll. Healey, Jason. “Preparing for Inevitable Cyber Surprise.” War on the Rocks (blog), January 2022. https://warontherocks.com/2022/01/preparing-for-inevitable-cyber-surprise/ . Healey, Jason, and Karl Grindal, eds. A Fierce Domain: Conflict in Cyberspace, 1986 to 2012. Vienna, VA: Cyber Conflict Studies Association, 2013. Healey, Jason, and Robert Jervis. “The Escalation Inversion and Other Oddities of Situational Cyber Stability.” 2020. https://doi.org/10.26153/tsw/10962. Herd, Graeme P.
“Russia and the Orange Revolution’: Response, Rhetoric, Reality?” Connections 4, no. 2 (2005): 15-28. Herman, Michael. Intelligence Power in Peace and War. Cambridge: Cambridge University Press, 1996.
BIBLIOGRAPHY 305 Hern, Alex. “Hackers Who Targeted Ukraine Clean out Bitcoin Ransom Wallet.” The Guardian, July 5, 2017, sec. Technology, https://www.theguardian.com/technology/ 2017/jul/05/notpetya-ransomware-hackers-ukraine-bitcoin-ransom-wallet-motives. Hern, Alex. “Ukrainian Blackout Caused by Hackers That Attacked Media Company, Researchers Say” The Guardian, January 7, 2016, sec. Technology, https://www.theg uardian.com/technology/201 б/jan/ 07/ukrainian-blackout-hackers- attacked- media company. Herszenhorn, David Μ., and Andrew E. Kramer. “Ukraine Plans to Withdraw Troops from Russia-Occupied Crimea.” New York Times, March 20, 2014, sec. World, https:// www.nytimes.com/2014/03/20/world/europe/crimea.html. Hertling, Mark, and Molly K. Mckew. “Putins Attack on the U.S. Is Our Pearl Harbor.” Politico Magazine, 2018. https://politi.co/2LlgYOS. Hill, Patrice. “Monitor Says Ukraine Cease-Fire, Weapons Withdrawal Not Being Honored.” Radio Free Europe/Radio Liberty. Accessed August 31, 2020. https://www. rferl.org/a/monitor-osce-says-ukraine-cease-fire-heavy-weapons-withdrawal-nothonored/28324012.html. Hoffman, Frank G. “The Contemporary Spectrum of Conflict: Protracted, Gray Zone, Ambiguous, and Hybrid Modes of War.” 2016. https://www.heritage.org/sites/default/ files/2019-08/2016_Index_of_US_Military_Strength_ESSAYS_ALL.pdf. Holmes, Linda. “The Sports Riot: First We Lose (or Win), Then We Set This Sucker on Fire.” NPR., 2011. https://www.npr.org/2011/06/16/137219581/the-sports-riot-firstwe-lose-or-win-then-we-set-this-sucker-on-fire. Holubeva, Olena. “How Much Do
Ukrainian Soldiers Earn?” March 2019. https://112.international/opinion/how-much-do-ukrainian-soldiers-earn-38268.html . Hosaka, Sanshiro. “The Kremlins ‘Active Measures’ Failed in 2013: That’s When Russia Remembered Its Last Resort-Crimea.” Demokratizatsiya; Washington 26, no. 3 (Summer
2018):321-364. Howard, Philip N. Lie Machines: How to Save Democracy from Troll Armies, Deceitful Robots, Junk News Operations, and Political Operatives. New Haven, CT: Yale University Press, 2020. Howard, Philip N. Pax Technica: How the Internet of Things May Set Us Free or Lock Us Up. New Haven,
CT: Yale University Press, 2015. Hromadske.ua. “Terrorism or Negligence? Inside the Investigation into Ukraine’s Exploding Military Warehouses.” October 2017. https://en.hromadske.ua/posts/terror ism-or-negligence-inside-the-investigation-into-ukraines-exploding-military-war ehouses. Hromadske.ua.
“Выключения Електроенергн в УкраШ Було Хакерською Атакою— Експерти.” January 2017. https://hromadske.ua/posts/vidkliuchennia-elektroenerhiiv-ukraini-bulo-khakerskoiu-atakoiu. Hromadske.ua. “Слвдч! розглядають 4 верен вибух1в на склад! боеприпаав пщ Вшницею.” September 2017.
https://hromadske.ua/posts/slidchi-rozhliadaiut-4-ver sii-vybukhiv-na-skladi-boieprypasiv-pid-vinnytseiu. Hromadske.ua. “Тероризм чи недбалють: як в УкраМ розсладуються вибухи на вшськових складах.” October 2018. https://hromadske.ua/posts/iak-v-ukraini-roz sliduiutsia-vybukhy-na-viiskovykh-
skladakh. Hromadske.ua. “У Hin На 24 Лютого На Украшу Була Здшснена Кибератака— Федоров.” Громадське Padio, February 2022.
https://hromadske.radio/news/2022/02/ 24/u-nich-na-24-liutoho-na-ukrainu-bula-zdiysnena-kiberataka-fedorov.
306 BIBLIOGRAPHY Hulcoop, Adam, John Scott-Railton, Peter Tanchak, Matt Brooks, and Ron Deibert. “Tainted Leaks: Disinformation and Phishing with a Russian Nexus.” May 2017. https://citizenlab.ca/2017/05/tainted-leaks-disinformation-phish/. Hulnick, Arthur S. “What’s Wrong with the Intelligence Cycle?” In Strategic Intelligence, Vol. 2: The Intelligence Cycle, edited by Loch K. Johnson, 959-979. Westport, CT: Praeger Security International, 2007. “Industroyer2: Industroyer Reloaded.” We Live Security (blog), April 2022. https://www. welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/ . Inform Napalm. "FrolovLeaks: Church-Going Kremlin Influence Expert in Ukraine. Episode 1.” Inform Napalm. (English) (blog), January 2017. https://informnapalm.org/ en/frolovleaks-church-going-kremlin-influence-expert-in-ukraine-episode-1/. Inform Napalm. “Why Surkov Needs Private Army: Union of Donbas Volunteers (UDV) as Reserve of National Guard of Russia.” Inform Napalm. (English) (blog), April 2017. https://informnapalm.org/en/surkov-needs-private-army-union-donbas-volunteersreserve-russian-guard/. “Information on the Possible Provocation.” Accessed February 3,2022. https://cip.gov.ua/ en/news/informaciya-shodo-imovirnoyi-provokaciyi. Interfax. “Kakhovka-Titan Power Transmission Line Feeding Crimea Fixed.” Russia Beyond, January 2016. https://www.rbth.com/news/2016/01/02/kakhovka-titanpower-transmission-line-feeding-crimea-fixed_557037. Interfax-Ukraine. “Kolesnichenko Denies Combining His Parliamentary Work with Advocac.” Kyiv Post, March 5,2013.
https://www.kyivpost.com/article/content/verkho vna-rada/kolesnichenko-denies-combining-his-parliamentary-work-with-advocacy321307.html. Interfax-Ukraine. “Minsk Contact Group Reaches Agreement on Complete Ceasefire in Donbas, Starting from Easter.” April 2016. https://en.interfax.com.ua/news/general/ 340994.html. International Energy Agency. “Statistics: World—Total Primary Energy Supply (TPES) by Source (Chart).” Accessed May 11, 2019. https://www.iea.org/statistics/?coun try=WORLD year=2016 category=Energy%20supply indicator=TPESbySou rce mode=chart dataTable=BALANCES. iSight. “ISIGHT Discovers Zero-Day Vulnerability CVE-2014-4114 Used in Russian Cyber-Espionage Campaign.” October 2014. https://web.archive.org/web/2014101 5001101/https://www.isightpartners.com/2014/10/cve-2014-4114/. Jamieson, Kathleen Hall. Cyberwar: How Russian Hackers and Trolls Helped Elect a President What We Don’t, Can’t, and Do Know. New York: Oxford University Press, 2018. Jensen, Benjamin, and J. D. Work. “Cyber Civil-Military Relations: Balancing Interests on the Digital Frontier.” War on the Rocks, September 2018. https://warontherocks.com/ 2018/09/cyber-civil-military-relations-balancing-interests-on-the-digital-frontier/. Jervis, Robert. Perception and Misperception in International Politics: New Edition. Princeton, NJ: Princeton University Press, 2017. https://doi.Org/10.2307/j.ctvc77bx3 . Johnson, Loch K. On Drawing a Bright Line for Covert Operations.” American Journal of International Law 86, no. 2 (1992): 284-309. https://doi.org/10.2307/2203235. Johnson, Loch K., and James J. Wirtz,
eds. Intelligence: The Secret World of Spies: An Anthology. 4th ed. Oxford: Oxford University Press, 2015.
BIBLIOGRAPHY 307 Jönsson, Christopher. “Diplomacy, Bargaining and Negotiation.” In Handbook of International Relations, 2nd ed., edited by Walter Carlsnaes, Thomas Risse-Kappen, and Beth A. Simmons, 212-234. Los Angeles: Sage, 2013. Kalugin, Oleg. Spymaster: My Thirty-Two Years in Intelligence and Espionage against the West. New York: Basic Books, 2009. Kapsamun, Ivan. “СБУ Проти ФСБ.” April 2015. https://day.kyiv.ua/uk/article/podrob yci/sbu-proty-fsb. Kaspersky. “Bad Rabbit Ransomware.” October 2017. https://securelist.com/bad-rabbitransomware/82851/. Kaspersky. “BE2 Custom Plugins, Router Abuse, and Target Profiles.” November 2014. https://securelist.com/be2-custom-plugins-router-abuse-and-target-profiles/67353/. Kello, Lucas. “The Meaning of the Cyber Revolution: Perils to Theory and Statecraft.” International Security 38, no. 2 (2013): 7-40. Kello, Lucas. The Virtual Weapon and International Order. New Haven, CT: Yale University Press, 2017. KGB Ukrainian SSR. “F.16.0p.01-Spr.0974-0338.” July 1968. Archive Department of the Security Service of Ukraine—Former KGB Archive. KGB Ukrainian SSR. "F.16-Op.01-Spr.0976-0244.” July 1968. Archive Department of the Security Service of Ukraine—Former KGB Archive. KGB Ukrainian SSR. “F.16-Op.01-Spr.0979-0056." October 1968. Archive Department of the Security Service of Ukraine—Former KGB Archive. KGB Ukrainian SSR. “F.16-Op.01-Spr.0979-0079.” September 1968. Archive Department of the Security Service of Ukraine—Former KGB Archive. KGB Ukrainian SSR. “F.16 0p.01-Spr.0979-0267.” October 1968. Archive Department of the Security Service
of Ukraine—Former KGB Archive. KGB Ukrainian SSR. “F.16-Op.01-Spr.0981-0350.” December 1968. Archive Department of the Security Service of Ukraine-Former KGB Archive. KGB Ukrainian SSR. “F.16-Op.01-Spr.0982-0410.” January 1969. Archive Department of the Security Service of Ukraine—Former KGB Archive. Kiepova, Darya. “Потужна Юбератака На Укртелеком Вивела з Ладу 1нтернет.” Зеркало недели: Дзеркало тижня, Mirror Weekly, March 2022. https://zn.ua/ukr/ TECHNOLOGIES/potuzhna-kiberataka-na-ukrtelekom-vivela-z-ladu-internet.html. KIIS. “Press Releases and Reports—Consequences of Ukraine’s Accession to Integration Associations.” November 2013. http://kiis.com.ua/?lang=eng cat=reports8dd= 206 page=318rt=3. KIIS. “Press Releases and Reports—‘The European Union’ and ‘the Customs Union.’” March 2013. http://kiis.com.ua/?lang=eng cat=reports id=1868rpage=32 t=3. KIIS. “Press Releases and Reports—Trust in Social Institutions and Parties.” December 2020.https://kiis.com.ua/?lang=eng cat=reports id=1005. KIIS. “Press Releases and Reports—Trust in Social Institutions and Social Groups.” 2015. https://kiis.com.ua/?lang=eng cat=reports8dd=579. KIIS. “Press Releases and Reports—Trust to Social Institutes.” December 2018. https:// www.kiis.com.ua/?lang=eng cat=reports id=817 page=2. KIIS. “Press Releases and Reports—Trust to Social Institutions.” 2016. https://www.kiis. com.ua/?lang=eng cat=reports id=678. Kissinger, Henry. Diplomacy. New York: Simon Schuster, 1995. Kitson, Frank. Low Intensity Operations: Subversion, Insurgency, Peacekeeping. London: Faber, 1971.
308 BIBLIOGRAPHY Klimkovetsky, Markiyan. "СБУ Разоблачила Еще Одного Агента Спецслужб Рф: Планировал Подрывную Деятельность Во Львовской Области.” Мау 2022. https://hromadske.ua/ru/posts/sbu-razoblachila-eshe-odnogo-agenta-specsluzhb-rfplaniroval-podryvnuyu-deyatelnost-vo-lvovskoj-oblasti. KMU. “Кабшет MiHÎCTpÎB Украши—Щодо роботи шформащйнотелекомушкащйно! системи Казначейства.” December 2016. https://www.kmu.gov. ua/ua/news/249559690. Kofman, Michael, Kltya Migacheva, Brian Nichiporuk, Andrew Radin, Olseya Tkacheva, and Jenny Oberholtzer. Lessons from Russia’s Operations in Crimea and Eastern Ukraine. Santa Monica, CA: RAND, 2017. Kofman, Michael, and Matthew Rojansky. “A Closer Look at Russia’s ‘Hybrid War.’” Kennan Cable 7 (2015). https://www.wilsoncenter.org/sites/default/files/media/ documents/publication/7-KENNAN%20CABLE-ROJANSKY%20KOFMAN.pdf Koremenos, Barbara, Charles Lipson, and Duncan Snidal. “The Rational Design of International Institutions.” International Organization 55, no. 4 (Autumn 2001): 761-799. Kostyuk, Nadiya, and Yuri Μ. Zhukov. “Invisible Digital Front: Can Cyber Attacks Shape Battlefield Events?” Journal ofConflict Resolution 63, no. 2 (2017): 317-347. https://doi. org/10.1177/0022002717737138. Kott, Alexander, and Ethan Stump. “Intelligent Autonomous Things on the Battlefield.” In Artificial Intelligence for the Internet of Everything, edited by William Lawless, Ranjeev Mittu, Donald Sofge, Ira S. Moskowitz, and Stephen Russell, 47-65. London, UK: Academic Press, 2019. https://doi.org/10.1016/B978-0-12-817636-8.00003-X . Kovacs, Eduard. “Files
Encrypted by Bad Rabbit Recoverable without Paying Ransom.” Security Week, October 2017. https://www.securityweek.com/files-encrypted-bad-rab bit-recoverable-without-paying-ransom. Koval, Nikolay. “Revolution Hacking.” In Cyber War in Perspective: Russian Aggression against Ukraine, edited by Kenneth Geers, 55-58. Tallinn, Estonia: NATO Cooperative Cyber Defence Centre of Excellence, 2015. https://ccdcoe.org/sites/default/files/mul timedia/pdf/CyberWarinPerspective_full_book.pdf. Kovalchuk, Vsevolod. “L(ieï Ночг На Шдстанцп ‘Швшчна’ В1дбувся Збш.—Vsevolod Kovalchuk.” December 2016. https://www.facebook.com/permalink.php?story_fbid= 1798082313797621 id=100007876094707. Kramer, Andrew E. “Bomb Kills Pro-Russian Rebel Commander in Eastern Ukraine.” New York Times, 17 October 2016, sec. World, https://www.nytimes.com/2016/10/18/ world/europe/ukraine-rebel-arsen-pavlov-motorola-killed.html. Krämer, Bernd J. “Evolution of Cyber-Physical Systems: A Brief Review.” In Applied Cyber-Physical Systems, edited by Sang C. Suh, U. John Tanik, John N. Carbone, and Abdullah Eroglu, 1-4. New York: Springer New York, 2014. https://doi.org/10.1007/ 978-1-4614-7336-7. Kraminska, Margarita. “Рос1я не погоджуеться укласти догов1р на постачання електроенергн до Криму через формулювання—М.Джемшев.” UNN. Accessed November 24, 2022. https://www.unn.com.ua/uk/news/1537754-rosiya-ne-pogodzh uyetsya-uklasti-dogovir-na-postachannya-elektroenergiyi-do-krimu-cherez-formuly uvannya-m-dzhemilyev. Kraus, Jürgen. “Selbstreproduktion Bei Programmen.” Diploma thesis, Universität Dortmund, 1980.
http://83.133.184.251/virensimulation.org/lib/mjk00.html.
BIBLIOGRAPHY 309 Kremlin. “Address by President of the Russian Federation.” President of Russia, March 2014. http://en.kremlin.ru/events/president/news/20603. Kremlin. “Подписан Указ о Признании Республики Крым.” Президент России, March 2014. http://kremlin.ru/events/president/news/20596. Kuehl,
Daniel Т. “From Cyberspace to Cyberpower: Defining the Problem.” In Cyberpower and National Security, edited by Franklin D. Kramer, Stuart H. Starr, Larry K. Wentz, 24-42. Washington, DC: Potomac Books, 2009. Kun, Miklos. Prague Spring, Prague Fall: Blank Spots of 1968. Budapest: Akadémiai Kiadô,
1999. Kusin, Vladimir V. Prom Dubcek to Charter 77: A Study of “Normalization'’ in Czechoslovakia, 1968-1978. New York: St. Martin’s Press, 1978. Kuzmenko, Oleksiy. “Think Tank: Cyber Firm at Center of Russian Hacking Charges Misread Data.” VOA, 2017. https://www.voanews.com/a/crowdstrike-comey-
russiahack-dnc-clinton-trump/3776067.html . Kuznetsova, Katerina. “‘ПриватБанк’ Та ‘Ощадбанк’ Повшстю Вщновили Роботу Hicл я Друго'1 Потужно! Юбератаки.” TCH.Ua, February 2022. https://tsn.ua/ukray ina/privatbank-ta-oschadbank-povnistyu-vidnovili-robotu-pislya-drugoyi-potuzhn oyi-
kiberataki-1979029.html. Kuznetsova, Kateryna. “Найпотужшша Кибератака За Всю IcTopiio Украши: Ц1ль Хакер1в, Кого П1дозрюють i Як1 Насл1дки Для Держави.” ТСН. Ua, February 2022. https://tsn.ua/ukrayina/naypotuzhnisha-kiberataka-za-vsyu-istoriyu-ukrayini-cilhakeriv-kogo-pidozryuyut-i-yaki-naslidki-
dlya-derzhavi-1979239.html . Lally, Kathy, Will Englund, and William Booth. “Russian Parliament Approves Use of Troops in
Ukraine.” Washington Post, March 1,2014, sec. Europe. https://www.washing tonpost.com/world/europe/russian-parliament-approves-use-of-troops-in-crimea/ 2014/03/01/dl775f70-al51-lle3-a050-dc3322a94fa7_story.html. Landau, Susan. “Russia’s Hybrid Warriors Got the White House. Now They’re Coming for America’s Town Halls.” Foreign Policy (blog), 2017. https://foreignpolicy.com/2017/09/ 26/russias-hybrid-warriors-are-coming-for-american-civil-society-hacking-trumpclinton/. Langner, Ralph. “To Kill a Centrifuge.” November 2013. https://www.langner.com/wpcontent/uploads/2017/03/to-kill-a-centrifuge.pdf. Lanoszka, Alexander. "Russian Hybrid Warfare and Extended Deterrence in Eastern Europe.” International Affairs 92, no. 1 (January 2016): 175-195. https://doi.org/ 10.1111/1468-2346.12509. Lawson, Sean. “Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats.” Journal of Information Technology Politics 10, no. 1 (2013): 86-103. https://doi.org/10.1080/19331681.2012.759059. Lawson, Sean, and Michael K. Middleton. “Cyber Pearl Harbor: Analogy, Fear, and the Framing of Cyber Security Threats in the United States, 1991-2016.” First Monday, March 2019. https://doi.org/10.5210/fm.v24i3.9623. Lee, Melissa Μ. Crippling Leviathan: How Foreign Subversion Weakens the State. Ithaca, NY: Cornell University Press, 2020. Lessig, Lawrence. “Code Is Law.” January 2000. http://harvardmagazine.com/2000/01/ code-is-law-html. “Lessons from Russia’s Cyber-War in Ukraine.” The Economist, November 30, 2022. https://www.economist.com/science-and-
technology/2022/ll/30/lessons-from-russ ias-cyber-war-in-ukraine.
310 BIBLIOGRAPHY Levin, Dov H. Meddling in the Ballot Box: The Causes and Effects of Partisan Electoral Interventions. New York: Oxford University Press, 2020. Levy, Jack S. “The Causes of War and the Conditions of Peace.” Annual Review ofPolitical Science 1, no. 1 (1998): 139-165. https://doi.Org/10.1146/annurev.polisci.l.l.139 . Leyden, John. “FedEx: TNT NotPetya Infection Blew a $300m Hole in Our Numbers.” September 2017. https://www.theregister.co.uk/2017/09/20/fedex_notpe tya_damages/. Leyden, John. “Hop on, Average Rabbit: Latest Extortionware Menace Flopped.” October 2017. https://www.theregister.co.uk/2017/10/26/bad_rabbit_post_mortem/. Libicki, Martin C. Cyberdeterrence and Cyberwar. Santa Monica, CA: Rand, 2009. Libiseller, Chiara. “‘Hybrid Warfare’ as an Academic Fashion.” Journal of Strategic Studies 46, no. 4 (February 2023): 858-880. https://doi.org/10.1080/01402390.2023.2177987. Liff, Adam P. “Cyberwar: A New Absolute Weapon ? The Proliferation of Cyberwarfare Capabilities and Interstate War.” Journal ofStrategic Studies 35, no. 3 (June 2012) : 401 428. https://doi.org/10.1080/01402390.2012.663252. Lindsay, Jon R. “The Impact of China on Cybersecurity: Fiction and Friction.” International Security 39, no. 3 (2014): 7-47. Lindsay, Jon R. “Restrained by Design: The Political Economy of Cybersecurity.” Digital Policy, Regulation and Governance 19, no. 6 (July 2017): 493-514. https://doi.org/ 10.1108/DPRG-05-2017-0023. Lindsay, Jon R. “Stuxnet and the Limits of Cyber Warfare.” Security Studies 22, no. 3 (2013): 365-404.
https://doi.org/10.1080/09636412.2013.816122 . Lindsay, Jon R., and Erik Gartzke. “Coercion through Cyberspace: The Stability-Instability Paradox Revisited.” In The Power to Hurt: Coercion in Theory and in Practice, edited by Peter Krause, 179-203. New York: Oxford University Press, 2018. Lipsky, Andrei. “«Представляется Правильным Инициировать Присоединение Восточных Областей Украины к России».” Новая Газета—Novayagazeta.Ru, February 2015. https://www.novayagazeta.ru/articles/2015/02/24/63168-171-preds tavlyaetsya-pravilnym-initsiirovat-prisoedinenie-vostochnyh-oblastey-ukrainy-k-ros sii-187. Littell, Robert, ed. The Czech Black Book. Westport, CT: Praeger, 1968. Loiko, Sergei L. “Ukraine Cracks' down on Demonstrators; Russia Issues Warning.” Latimes.com, 2014. https://www.latimes.com/world/worldnow/la-fg-wn-ukraineraid-russia-supporters-20140408-story.html. Losh, Jack. “Ukrainian Rebel Leaders Divided by Bitter Purge.” Washington Post. 3 October 2016. https://www.washingtonpost.com/world/europe/ukrainian-rebel-lead ers-divided-by-bitter-purge/2016/10/03/2e0076ac-8429-lle6-b57d-dd49277af02f_st ory.html. Low, A. Maurice. “The Vice of Secret Diplomacy.” North American Review 207, no. 747 (1918): 209-220. Lukes, Steven. Power: A Radical View. 2nd ed. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan, 2004. Lynn, William J., III. “Defending a New Domain.” Foreign Affairs, 2010. https://www.for eignaffairs.com/articles/united-states/2010-09-01/defending-new-domain. Mahoney, James, and Kathleen Ann Thelen, eds. Explaining Institutional Change: Ambiguity, Agency, and Power.
Cambridge: Cambridge University Press, 2010. Malwarebytes. “Keeping Up with the Petyas: Demystifying the Malware Family.” Malwarebytes Labs, July 2017. https://blog.malwarebytes.com/cybercrime/2017/07/ keeping-up-with-the-petyas-demystifying-the-malware-family/.
BIBLIOGRAPHY 311 MalwareHunterTeam (@malwrhunterteam). “XData Is Still Going, Even Closer to Cerber’s 24 Hours Numbers . . . Pic.Twitter.Com/YqOAODhoyq.” Twitter, May 2017. https://twitter.com/malwrhunterteam/status/865618366412849157. Mandiant. “UNC1151 Assessed with High Confidence to Have Links to Belarus, Ghostwriter Campaign Aligned with Belarusian Government Interests.” November 2021. https://www.mandiant.com/resources/uncll51-linked-to-belarus-government. March, James G., and Johan P. Olsen. “The Institutional Dynamics of International Political Orders.” International Organization 52, no. 4 (1998): 943-969. Marczak, Bill, and John Scott-Railton. “The Million Dollar Dissident: NSO Groups iPhone Zero-Days Used against a UAE Human Rights Defender.” Citizen Lab (blog), August 2016. https://citizenlab.org/2016/08/million-dollar-dissident-iphone-zeroday-nso-group-uae/. Mark, Melvin Μ., Fred B. Bryant, and Darrin R. Lehman. “Perceived Injustice and Sports Violence.” In Sports Violence, Springer Series in Social Psychology, edited by Jeffrey H. Goldstein, 83-109. New York: Springer New York, 1983. https://doi.org/10.1007/978l-4612-5530-7_6. Martin, David. “Russian Hacking Proves Lethal after Ukrainian Military App Hijacked.” December 2016. https://www.cbsnews.com/news/russian-hacking-proves-lethalafter-ukrainian-military-app-compromised/ . Martynets, Sergey. “США шдозрюють Pociro у причетносй до к1бератак на украшсью електромереж!.” Шформацшне агентство Украшсью Нацюнальш Новини (УНН). Bei онлайн новини дня в Украпл за сьогодш—найсв1жшп, останш, Головин January 2016.
https://www.unn.com.ua/uk/news/1536191-ssha-pidozryu yut-rosiyu-u-prichetnosti-do-kiberatak-na-ukrayinski-elektromerezhi. Maschmeyer, Lennart. “A New and Better Quiet Option? Strategies of Subversion and Cyber Conflict.” Journal of Strategic Studies 46, no. 3 (2023): 570-594. https://doi.org/ 10.1080/01402390.2022.2104253. Maschmeyer, Lennart. “Subversion, Cyber Operations, and Reverse Structural Power in World Politics.” European Journal ofInternational Relations 29, no. 1 (March 2023) : 79ЮЗ. https://doi.org/10.! 177/13540661221117051. Maschmeyer, Lennart. “The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations.” International Security 46, no. 2 (October 2021): 51-90. https://doi.org/ 10.1162/isec_a_00418. Maschmeyer, Lennart. “Subverting Skynet: The Strategic Promise of Lethal Autonomous Weapons and the Perils of Exploitation.” In 202214th International Conference on Cyber Conflict: Keep Moving! (CyCon), vol. 700, 2022, 155-171. https://doi.org/10.23919/ CyCon55549.2022.9811008. Maschmeyer, Lennart, Alexei Abrahams, Peter Pomerantsev, and Volodymyr Yermolenko. “Donetsk Don’t Tell—‘Hybrid War’ in Ukraine and the Limits of Social Media Influence Operations.” Journal of Information Technology and Politics (2023). https://doi.org/10.1080/19331681.2023.2211969 . Maschmeyer, Lennart, Ronald J. Deibert, and Jon R. Lindsay. “A Tale of Two Cybers— How Threat Reporting by Cybersecurity Firms Systematically Underrepresents Threats to Civil Society.” Journal ofInformation Technology Politics 18, no. 1 (January 2021): 1-20.
https://doi'org/10.1080/19331681.2020.1776658. “Massive Power Outage Hits Crimea.” Radio Free Europe/Radio Liberty, 2018. https:// www.rferl.org/a/massive-power-outages-hit-crimea-cause-unclear/2928882I.html.
312 BIBLIOGRAPHY Matveeva, Anna. Through Times of Trouble: Conflict in Southeastern Ukraine Explained from Within, Russian, Eurasian, and Eastern European Politics. Lanham, MD: Lexington Books, 2018. Matyash, Tanya. "Зеленський В1дсторонив Венед1ктову Та Усунув Баканова.” LB.ua, July 2022. https://lb.ua/news/2022/07/17/523439_zelenskiy_vidstoroniv_venedikt ovu.html. Maundrill, Beth. “Why Russia Has Refrained from a Major Cyber-Attack against the West.” Cyber Security Hub, June 2022. https://www.cshub.com/attacks/articles/whyrussia-has-refrained-from-a-cyber-attack-against-the-west . Maymi, Fernando, and Scott Lathrop. “AI in Cyberspace: Beyond the Hype.” Cyber Defense Review 3, no. 3 (2018): 71-82. Mazarr, Michael J. “Mastering the Gray Zone: Understanding a Changing Era of Conflict.” 2015. https://apps.dtic.mil/sti/citations/AD 1000186. McCarthy, Tom, and Alan Yuhas. “Ukraine Crisis: Kiev Launches ‘Anti-Terror Operation’ in East—Live Updates.” The Guardian, April 15, 2014. https://www.theguardian.com/ world/2014/apr/15/ukraine-military-forces-russia-live-blog. McClain, Dylan Loeb. “Ludek Pachman, 78, Chess Star Imprisoned after ‘Prague Spring.”’ New York Times, March 13, 2003, sec. World, https://www.nytimes.com/2003/03/13/ world/ludek-pachman-78-chess-star-imprisoned-after-prague-spring.html. McKinsey. “Insider Threat: The Human Element of Cyberrisk.” 2019. https://www.mckin sey.com/business-functions/risk/our-insights/insider-threat-the-human-element-ofcyberrisk. McKune, Sarah, Ronald Deibert, Bill Marczak, Geoffrey Alexander, and John ScottRailton. “Commercial Spyware:
The Multibillion Dollar Industry Built on an Ethical and Legal Quagmire.” Citizen Lab, December 2017. https://citizenlab.ca/2017/12/ legal-overview-ethiopian-dissidents-targeted-spyware/. McSherry, J. Patrice. Predatory States: Operation Condor and Covert War in Latin America. Lanham, MD: Rowman Littlefield Publishers, 2012. Mearsheimer, John J. “The False Promise of International Institutions.” International Security 19, no. 3 (1994): 5-49. https://doi.org/10.2307/2539078. Mendel, luliia. ‘Tn Ukraine, a Huge Ammunition Depot Catches Fire.” New York Times, 27 September 2017, sec. World, https://www.nytimes.com/2017/09/27/world/europe/ ukraine-ammunition-depot-explosion.html. Menon, Rajan, and Eugene B. Rumer. Conflict in Ukraine: The Unwinding of the Post-Cold War Order, Boston Review Originals. Cambridge, MA: MIT Press, 2015. Michels, Eckard. Guillaume, Der Spion: Eine Deutsch-Deutsche Karriere. Berlin: Ch. Links Verlag, 2013. Microsoft. “Destructive Malware Targeting Ukrainian Organizations.” Microsoft Security Blog (blog), January 2022. https://www.microsoft.com/security/blog/2022/01/15/dest ructive-malware-targeting-ukrainian-organizations/. Miller, Greg, and Catherine Belton. “Russia’s Spies Misread Ukraine and Misled Kremlin as War Loomed.” Washington Post, August 2022. https://www.washingtonpost.com/ world/interactive/2022/russia-fsb-intelligence-ukraine-war/. Miller, Maggie. “Russian Invasion of Ukraine Could Redefine Cyber Warfare.” Politico, January 2022. https://www.politico.com/news/2022/01/28/russia-cyber-army-ukra ine-00003051. Min, Byungho, and Vijay
Varadharajan. “A Novel Malware for Subversion of Self- Protection in Anti-Virus.” Software: Practice and Experience 46, no. 3 (2016): 361-379. https://doi.org/10.1002/spe.2317.
BIBLIOGRAPHY 313 Mingas, Melanie. “Ukrtelecom Restores 85% of Services after ‘Powerful Cyberattack.’” Capacity Media (blog), March 2022. https://www.capacitymedia.com/article/29wch9 71qqy0z3dyifx8g/ukrtelecom-restores-85-of-services-after-powerful-cyberattack. MKA Cyber. “Maersk Replaces IT Infrastructure After NotPetya Ransomware Infection.” MKACyber, Inc. (blog), January 2018. https://mkacyber.io/news/maersk-shipping-rein stalled-entire-infrastructure-after-notpetya-ransomware/. Morgenthau, Hans J. Politics among Nations: The Struggle for Power and Peace. New York: Alfred A. Knopf, 1948. Motyl, Alexander J. “The Weakness of Eastern Ukraine’s pro-Russian Separatists.” Al Jazeera, April 2014. http://america.aljazeera.com/opinions/2014/4/eastern-ukraineprorussianseparatistsdonetskdonbas.html. Mueller, Robert S., III. “Report on the Investigation into Russian Interference in the 2016 Presidential Election.” March 2019. https://www.justice.gov/storage/report.pdf . Myers, Philip A. “Subversion: The Neglected Aspect of Computer Security.” Master’s thesis, Naval Postgraduate School, 1980. Nakasone, Paul Μ. “A Cyber Force for Persistent Operations.” Joint Force Quarterly 92 (2019): 10-14. “Natanz Enrichment Complex.” Nuclear Threat Initiative (blog). Accessed January 7, 2022. https://www.nti.org/education-center/facilities/natanz-enrichment-complex/. National Cyber Security Centre. “Reckless Campaign of Cyber Attacks by Russian Military Intelligence Service Exposed.” October 2018. https://www.ncsc.gov.uk/news/ reckless-campaign-cyber-attacks-russian-military-intelligence-service-
exposed. NATO. “Closing Press Conference by NATO Secretary General Jens Stoltenberg Following the Meetings of NATO Foreign Ministers in Antalya, Turkey.” May 2015. http://www.nato.int/cps/en/natohq/opinions_l 19432.htm. NATO. “Keynote Address by NATO Secretary General at the NATO Cyber Defence Pledge Conference.” November 2022. https://www.nato.int/cps/en/natohq/opinions_ 208925.htm. Navratil, Jaromir. The Prague Spring 1968: A National Security Archive Documents Reader. Budapest: Central European University Press, 1998. Nechepurenko, Ivan. “Crimea to Face Power Shortages for Months, Officials Say.” New York Times, 8 January 2016, sec. World, https://www.nytimes.com/2016/01/09/ world/europe/crimea-power-ukraine-russia.html. Nechepurenko, Ivan, and Neil MacFarquhar. “As Sabotage Blacks Out Crimea, Tatars Prevent Repairs.” New York Times, November 24, 2015, sec. Europe, https://www.nyti mes.com/2015/11 /24/world/ europe/crimea-tatar-power-lines-ukraine.html. Nekrasov, Vsevolod. “Украина Проигрывает Кибервойну. Хакеры Наносят Удар По Минфину.” Экономическая правда, December 2016. http://www.epravda.com.ua/ rus/ publications/2016/12/9/613957/. NetBlocks (@netblocks). Twitter, February 2022. “i Commercial satellite operator Viasat is investigating a suspected cyberattack that caused a partial outage of its KA-SAT net work in Europe. Network data indicate that the incident began on 24 February ~4 a.m. UTC and is cur rently ongoing |H”, https://twitter.com/netblocks/status/1498365220107997191. NetBlocks (@netblocks). Twitter, March 2022. “Д Confirmed: A major internet dis
ruption has been registered across #Ukraine on national provider #Ukrtelecom; real time network data show connectivity collapsing to 13% of pre-war levels; the provider reports issues assigning new sessions fi Background: https://netblocks.org/reports/
314 BIBLIOGRAPHY internet-disruptions-registered-as-russia-moves-in-on-ukraine-W80p4k8K,” https:// twitter.com/netblocks/status/1508453511176065033. NetBlocks (@netblocks). Twitter, March 2022. “A Update: Ukraine's national internet provider Ukrtelecom has confirmed a cyberattack on its core infrastructure. Real-time network data show an ongoing and intensifying nation-scale disruption to service, which is the most severe registered since the invasion by Russia.” https://twitter.com/ netblocks/status/1508465391244304389. New Voice of Ukraine. “Why Zelenskyy Removed the Heads of the SBU and PGO.” July 2022. https://english.nv.ua/nation/why-zelenskyy-sacked-the-prosecutor-generaland-sbu-chief-ukraine-news-50257409.html . NIKCENTER. “Веб-сайты Кабмина не открываются—Минцифры сообщают о массовой DDoS-атаке.” February 2022. https://nikcenter.org/newsItem/65950. NPR. “Ukrainian Servicemen Reported Shot by Masked Soldiers In Crimea.” NPR, March 2014. https://www.npr.org/sections/thetwo-way/2014/03/18/291148781/ukrainianservicemen-reported-shot-by-masked-soldiers-in-crimea . Nye, Joseph S. “Deterrence and Dissuasion in Cyberspace.” International Security 41, no. 3 (January 2017): 44-71. https://doi.Org/10.l 162/ISEC_a_00266. Nye, Joseph S. The Future ofPower. New York: PublicAffairs, 2011. Nye, Joseph S. “Soft Power.” Foreign Policy, no. 80 (Autumn 1990): 153-171. https://doi. org/10.2307/1148580. Obozrevatel. “ГНсля кибератаки на ‘Прикарпаттяобленерго’ в США переглянуть захист енергомереж.” Политика, January 2016. https://www.obozrevatel.com/ukr/ news/58420-pislya-kiberataki-na-
prikarpattyaoblenergo-v-ssha-pereglyanut-zahistenergomerezh.htm. Oksamytna, Ksenya. “Ukraine: Russian Attitudes to Ukrainians Can Help to Explain the Atrocities.” King’s College London, June 2022. https://www.kcl.ac.uk/ukraine-russianattitudes-fo-ukrainians-can-help-to-explain-the-atrocities . Oliphant, Roland, and Charlotte Krol. “Huge Explosion at Ukraine Ammunition Depot Prompts Mass Evacuation.” The Telegraph, September 2017. https://www.telegraph. co.uk/news/2017/09/27/fire-ukraine-ammunition-depot-prompts-mass-evacuation/ . Oliveria, Paul. “New ‘Prestige’ Ransomware Impacts Organizations in Ukraine and Poland.” Microsoft Security Blog (blog), October 2022. https://www.microsoft.com/ en-us/security/blog/2022/Ю/ 14/new-prestige-ransomware- impacts-organizationsin-ukraine-and-poland/. O’Rourke, Lindsey A. Covert Regime Change: America’s Secret Cold War, Cornell Studies in Security Affairs. Ithaca, NY: Cornell University Press, 2018. Osborn, Andrew, Polina Nikolskaya, and Polina Nikolskaya. “Russia’s Putin Authorises ‘Special Military Operation’ against Ukraine.” Reuters, February 2022, sec. Europe. https://www.reuters.com/world/europe/russias-putin-authorises-military-operati ons-donbass-domestic-media-2022-02-24/. OSCE. “International Election Observation Mission.” May 2014. https://www.osce.org/ odihr/elections/ukraine/119078?download=true. Office of Strategic Services. “Simple Sabotage Field Manual.” 17 January 1944, Washington D.C. https://www.cia.gov/static/5c875f3ec660e092cf893f60b4a288df/SimpleSabot age.pdf Ouimet, Matthew J. “Reconsidering the Soviet Role.” In
The Prague Spring and the Warsaw Pact Invasion of Czechoslovakia, 1968: Forty Years Later, edited by Μ. Mark Stolarik, 19-29. Mundelein, IL: Bolchazy-Carducci Publishers, 2010.
BIBLIOGRAPHY 315 Pagliery, Jose, “Scary Questions in Ukraine Energy Grid Hack.” CNNMoney, January 18, 2016. https://money.cnn.com/2016/01/18/technology/ukraine-hack-russia/ index.html. Pape, Robert A. Bombing-to Win: Air Power and Coercion in War. Ithaca and London: Cornell University Press, 1996. Peisakhin, Leonid, and Arturas Rozenas. “Electoral Effects of Biased Media: Russian Television in Ukraine.” American Journal ofPolitical Science 62, no. 3 (2018): 535-550. https://doi.org/10.! 11 l/ajps.12355. Perlroth, Nicole, and David E. Sanger. “Cyberattacks Put Russian Fingers on the Switch at Power Plants, U.S. Says.” New York Times, March 15,2018, sec.'U.S. https://www.nyti mes.com/2018/03/15/us/politics/russia-cyberattacks.html. Peterson, Dale. Offensive Cyber Weapons: Construction, Development, and Employment.” Journal of Strategic Studies 36, no. 1 (2013): 120-124. https://doi.org/ 10.1080/01402390.2012.742014. Petrov, Nikita. “The KGB and the Czechoslovak Crisis of 1968.” In The Prague Spring and the Warsaw Pact Invasion of Czechoslovakia in 1968, Harvard Cold War Studies Book Series, edited by Günter Bischof, Stefan Karner, and Peter Ruggenthaler, 145-164. Lanham, MD: Lexington Books, 2010. Polityuk, Pavel. “EXCLUSIVE: Ukraine Suspects Group Linked to Belarus Intelligence over Cyberattack.” Reuters, January 2022, sec. Europe, https://www.reuters.com/ world/europe/exclusive-ukraine-suspects-group-linked-belarus-intelligence-overcyberattack-2022-01 -15/. Polityuk, Pavel. “Massive Cyberattack Hits Ukrainian Government Websites as West Warns on Russia Conflict.” Reuters,
January 2022, sec. Technology, https://www.reuf ers.com/technology/massive-cyberattack-hits-ukrainian-government-websitesamid-russia-tensions-2022-01-14/. Pool, Ithiel De Sola. “Public Opinion in Czechoslovakia.” Public Opinion Quarterly 34, no. 1 (1970): 10-25. Poznansky, Michael. “Feigning Compliance: Covert Action and International Law.” International Studies Quarterly 63, no. 1 (March 2019): 72-84. https://doi.org/10.1093/ isq/sqy054. Poznansky, Michael. In the Shadow ofInternational Law: Secrecy and Regime Change in the Postwar World. Oxford: Oxford University Press, 2020. Prados, John. Safefor Democracy: The Secret Wars ofthe CIA. (Chicago: Ivan R. Dee, 2006). PResident.gov.ua. “Стратепчш Об’екти Мають Бути Захищен1, а Винт у Вибухах На Вшськових Складах Притягнут! До Вщповвдальносп—Президент Щодо Ситуаци Шд Калишвкою.” Офщшне штернет-представництво Президента Украши, September 2017. https://www.president.gov.ua/news/strategichni-obyektimayut-buti-zahisheni-vinni-u-vibuhah-na-43610. ProofPoint. “What Is Bad Rabbit Ransomware?” Proofpoint (blog), February 2021. https:// www.proofpoint.com/us/threat-reference/bad-rabbit . “Pro-Russia Forces Enter Ukraine Naval Base.” Al Jazeera, March 2014. https://www. . aljazeera.com/news/europe/2014/03/pro-russia-forces-enter-Ukraine-naval-base- 20143198741233396.html. Prozumenshchikov, Mikhail. “Politburo Decision-Making on the Czechoslovak Crisis in 1968.” In The Prague Spring and the Warsaw Pact Invasion of Czechoslovakia in 1968, Harvard Cold War Studies Book Series, edited by Günter Bischof, Stefan Karner, and Peter
Ruggenthaler, 103-144. Lanham, MD: Lexington Books, 2010.
316 BIBLIOGRAPHY ‘‘Putin Says Crimea Now Free of Reliance on Kiev for Its Power.” Reuters, May 2016. https://www.reuters.com/article/us-russia-crimea-power-idUSKCN0Y21K5 . “Putin Says Russia, Ukraine Torn Apart to Prevent Major Rival from Emerging.” TASS. Accessed March 1,2021. https://tass.com/politics/1122727. Racz, Andras. “Russia’s Hybrid War in Ukraine.” Finnish Institute of International Affairs, June 2015. https://www.fiia.fi/en/publication/russias-hybrid-war-in-ukraine. Radkovets, Yuriy. “Lessons of Russia’s ‘Hybrid War’ against Ukraine.” Accessed March 23, 2020. http://bintel.com.ua/en/article/10-13-lessons/. Rajivan, Prashanth, and Cleotilde Gonzalez. “Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks.” Frontiers in Psychology 9 (February 2018), 1-14. https://doi.org/10.3389/fpsyg.2018.00135. “Rebels Declare Victory in East Ukraine Vote on Self-Rule.” Reuters, May 2014. https:// www.reuters.com/article/us-ukraine-crisis-idUSBREA400LI20140511. Reliaquest. “Threat Advisory: HermeticWiper.” Legacy (blog), February 2022. https:// www.reliaquest.eom/i/blog/threat-advisory-hermeticwiper/. Reuters Staff. “Ukraine, Separatists to Strive for Full Ceasefire from September 1.” Reuters, August 2015. https://www.reuters.com/article/us-ukraine-crisis-ceasefire/ ukraine-separatists-to-strive-for-full-ceasefire-from-september-l-idUSKCNOQV 29A20150826. ReverseMode. “VIASAT Incident: From Speculation to Technical Details.” March 2022. https://www.reversemode.com/2022/03/viasat-incident-from-speculation-to.html. Rezabek, J. “Let Us Pay
Attention.” MladaFronta, July 23,1968. Richelson, Jeffrey. A Century of. Spies: Intelligence in the Twentieth Century. New York: Oxford University Press, 1995. Rid, Thomas. Active Measures: The Secret History ofDisinformation and Political Warfare. New York: Farrar, Straus and Giroux, 2020. Rid, Thomas. Cyber War Will Not Take Place. Oxford: Oxford University Press, 2013. RisklQ. “Tracking the BadRabbit Ransomware to an Ongoing Campaign of Target Selection.” October 2017. https://www.riskiq.com/blog/labs/badrabbit/. Risse, Thomas. “‘Let’s Argue!’: Communicative Action in World Politics.” International Organization 54, no. 1 (2000): 1-39. Romanosky, Sasha, and Benjamin Boudreaux. “Private-Sector Attribution of Cyber Incidents: Benefits and Risks to the U.S. Government.” International Journal of Intelligence and Counterintelligence 34, no. 0 (2021): 463-493. https://doi.org/10.1080/ 08850607.2020.1783877. Rosen, Kenneth R. “The Man at the Center of the New Cyber World War.” Politico, July 2022. https://www.politico.com/news/magazine/2022/07/14/russia-cyberattacksukraine-cybersecurity-00045486. Ross, Stephen A. “The Economic Theory of Agency: The Principal’s Problem.” American Economic Review 63, no. 2 (1973): 134-139. Roth, Florian, Pasquale Stirparo, David Bizeul, Brian Bell, Ziv Chang, Joel Esler, Kristopher Bleich, et al. “APT Groups and Operations.” Accessed July 3, 2022. https:// docs.google.com/spreadsheets/d/lH9_xaxQHpWaa4O_Son4Gx0YOIzlcBWMsdveP FX68EKU/edit?usp=embed_facebook. Rovner, Joshua. “Cyber War as an Intelligence Contest.” War on the Rocks, September 2019.
https://warontherocks.com/2019/09/cyber-war-as-an-intelligence-contest/. Rovner, Joshua. Fixing the Facts: National Security and the Politics of Intelligence. Ithaca and New York: Cornell University Press, 2011.
BIBLIOGRAPHY 317 RSA. “Kingslayer—A Supply Chain Attack.” 2017. http://www.rsa.com/en-us/blog/201702/kingslayer-a-supply-chain-attack. Rudenko, Olga. “Separatist Crisis Flares Again Today in Ukraine’s Eastern Regions.” Kyiv Post, April 7, 2014. https://www.kyivpost.com/article/content/war-against-ukraine/ separatist-crisis-flares-again-today-in-ukraines-eastern-regions-342351.html. “Russia Accuses U.S. of Increasing Subversion.” Irish Times, May 1968. “Russia Decides to Impose Food Embargo against Ukraine—Minister.” TASS, November 2015. http://tass.com/economy/837503 . “Russia Not Seeking Regime Change in Ukraine, People Should Have Freedom of Choice— Lavrov.” TASS, April 2022. https://tass.com/politics/1439823. “Russia Provided 5 Tons of Explosives and Weapons to Yanukovych in January to Disperse the Maidan.” Ukrainian Week, April 2014. https://ukrainianweek.com/News/106701. “Russia Says It Wants to End Ukraine’s ‘Unacceptable Regime.’” AP News, July 2022. https://apnews.com/article/russia-ukraine-zelenskyy-kyiv-black-sea-arab-leagueb5c583e8d057897cfdef6b407el 13339. “Russia Takes Control of Chernobyl Nuclear Power Plant.” USA TODAY, 25 February 2022.https://www.youtube.com/watch?v=lpYoxBTyRec. “Russia: The FSB Branches Out.” Stratfor (blog), 2008. https://worldview.stratfor.com/arti cle/russia-fsb-branches-out. Russia Today. “95.7% of Crimeans in Referendum Voted to Join Russia—Preliminary Results.” RT International, March 2014. https://www.rt.com/news/crimea-vote-joinrussia-210/. Russia Today. “Bad Rabbit Cryptoware Attack: New Virus Hits Companies in Russia, Turkey,
Germany Ukraine.” RT International, October 2017. https://www.rt.com/ news/407655-bad-rabbit-cryptoware-attack/. Russia Today. “US Blames Moscow for NotPetya Malware, Which Hit Russia Too.” RT International, February 2018. https://www.rt.com/news/418955-us-blames-russianotpetya-cyber-attack/. “Russians Twice Tried to Storm Zelensky’s Compound in Early Hours of War, Aide Says.” Times of Israel, April 2022. https://www.timesofisrael.com/russians-twice-tried-tostorm-zelensky-compound-in-early-hours-of-war-report/. “Russophone Identity in Ukraine.” Ukraine Center for Independent Political Research, 2017. http://www.ucipr.org.ua/publicdocs/RussophoneIdentity_EN.pdf. Saito, Mari, and Maria Tsvetkova. “How Russia Spread a Secret Web of Agents across Ukraine.” Reuters. Accessed July 29, 2022. https://www.reuters.com/investigates/spec ial-report/ukraine-crisis-russia-saboteurs/. Salem, Harriet. “Kiev Hits Back at Pro-Russia Rebels as Ukraine Moves towards Civil War.” The Observer, May 3, 2014, sec. World News, https://www.theguardian.com/ world/2014/may/03/ukraine-civil-war-kiev-russia-slavyansk. Sanger, David. Confront and Conceal: Obama’s Secret Wars and Surprising Use ofAmerican Power. New York: Broadway Paperbacks, 2012. Sanger, David E. The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. New York: Broadway Books, 2019. SANS. “Analysis of the Cyber Attack on the Ukrainian Power Grid.” March 2016. “Satellite Outage Knocks out Thousands of Enercon’s Wind Turbines.” Reuters, February 2022, sec. Energy: https://www.reuters.com/business/energy/satellite-outage-knocksout-
control-enercon-wind-turbines-2022-02-28/.
318 BIBLIOGRAPHY Viasat Surfbeam 2+ KA-SAT Modem inkl. WLAN Router”, Sat_Speed+, accessed January 13, 2023, https://web.archive.org/web/20200921120922/https://www.satspeed.com/ internet-via-satellit/satellitemodem-tria-antenna/viasat-surfbeam-2plus-toowaykasat-modem.html. Satter, Raphael. “Satellite
Outage Caused ‘Huge Loss in Communications’ at War’s Outset—Ukrainian Official.” Reuters, March 2022, sec. World. https://www.reuters. com/world/satellite-outage-caused-huge-loss-communications-wars-outset-ukrain ian-official-2022-03-15/. Satter, Raphael, and James Pearson. “Recent Ukraine Outage
Caused by Modest Cyberattack, Data Shows.” Reuters, February 2022, sec. Technology, https://www.reut ers.com/technology/recent-ukraine-outage-caused-by-modest-cyberattack-datashows-2022-02-17/. SBU. “СБУ Викрила Агентурну Мережу ГРУ Рф, До Яко1 Входив Народний Депутат Украши (Вщео).” SSU, June 2022.
https://ssu.gov.ua/novyny/sbu-vykryla-ahenturnumerezhu-hru-rf-do-yakoi-vkhodyv-narodnyi-deputat-ukrainy-video . SBU. “СБУ Попередила Спробу Росшських Спецслужб Вивести з Ладу Об’екти Енергетики Украши.” December 2015. https://web.archive.org/web/20160103175
824/http://www.sbu.gov.ua/sbu/control/uk/publish/article?art_id=170951 cat_id= 39574. SBU. “СБУ Припинила Д1яльшсть Агентурно! Мереж: Феб Рф, Яка Д1яла в Декшькох Областях Украши (Вщео).” SSU, August 2022. https://ssu.gov.ua/novyny/ sbu-prypynyla-diialnist-ahenturnoi-merezhi-fsb-rf-yaka-diiala-v-
dekilkokh-oblasti akh-ukrainy-video. Schelling, Thomas C. Arms and Influence. New Haven, CT: Yale University Press, 2008. Schneider, Jacquelyn.
“A World without Trust.” Foreign Affairs, December 2021. https:// www.foreignaffairs.com/articles/world/2021-12- 14/world-without-trust. Schwirtz, Michael. “Top Secret Russian Unit Seeks to Destabilize Europe, Security Officials Say.” New York Times, October 8,2019, sec. World, https://www.nytimes.com/ 2019/10/08/world/europe/unit-29155-russia-gru.html. Sebenius, Alyza. “Will Ukraine Be Hit by Yet Another Holiday Power-Grid Hack?” The Atlantic, December 2017. https://www.theatlantic.com/technology/archive/2017/12/ ukraine-power-grid-hack/548285/. Secureworks. “Disruptive HermeticWiper Attacks Targeting Ukrainian Organizations.” February 2022. https://www.secureworks.com/blog/disruptive-hermeticwiper-atta cks-targeting-ukrainian-organizations. Secureworks. “WhisperGate: Not NotPetya.” January 2022. https://www.secureworks. com/blog/whispergate-not-notpetya. Segodnya. “В ‘Зачистке’ Майдана Участвовали Сотрудники ФСБ России—СБУ” April 2014. https://www.segodnya.ua/criminal/v-zachistke-maydana-uchastvovalisotrudniki-fsb-rossii-sbu-509753.html. Senko, Ulyana. “Росшсью Хакери Здшснюють Юбератаки На Лопстичш Компани Украши Та Полыщ.” LVIV.MEDIA, December 2022. https://lviv.media/viyna/62344rosijski-hakeri-zdijsnyuyut-kiberataki-na-logistichni-kompaniyi-ukrayini-ta-polshi/. Shandler, Ryan, Michael L. Gross, and Daphna Canetti. “Cyberattacks, Psychological Distress, and Military Escalation: An Internal Meta-Analysis,” Journal of Global Security Studies 8, no. 1 (2023): 1-19. Shevchenko, Vitaly. “‘Little Green Men or ‘Russian Invaders’?” BBC News, March 2014, sec. Europe,
https://www.bbc.com/news/world-europe-26532154 .
BIBLIOGRAPHY 319 Shturba, E., and Μ. Makhalkina. "Territorial’nyye Anklavy Byvshego SSSR v Kontekste Natsional’noy Bezopasnosti Sovremennoy Rossii.” Istoricheskaya i Sotsial’noObrazovatel’naya Mysl 2, no. 1C (2016): 26-38. Shultz, Richard H., and Roy Godson. Dezinformatsia: Active Measures in Soviet Strategy. Washington, DC: Pergamon-Brassey’s, 1984. Siddique, Haroon, Tom McCarthy, and Alan Yuhas. “Crimean Parliament Seizure Inflames Russian-Ukrainian Tensions—Live.” The Guardian, February 27, 2014, sec. World News, https://www.theguardian.com/world/2014/feb/27/ukraine-pro-russiangunmen-seize-crimea-parliament-live-updates. Silina, Yulia. “Fears of New Flareup in Ukraine as Violence Grows on Frontline.” November 2015. http://news.yahoo.com/fears-flareup-ukraine-violence-grows-frontl ine-080945741.html. Silina, Yulia. “Ukraine, Pro-Russia Rebels Begin Donetsk Arms Withdrawal.” October 2015. http://news.yahoo.com/ukraine-pro-russia-rebels-begin-donetsk-arms-withdra wal-152455026.html. Simes, Dimitri K. “The Soviet Invasion ofCzechoslovakia and the Limits ofKremlinology." Studies in Comparative Communism 8, no. 1-2 (1975): 174-180. https://doi.org/ 10.1016/0039-3592(75)90026-5. Simons, Jake Wallis. “EXCLUSIVE: Mossad Recruited Top Iranian Scientists to Blow Up Key Nuclear Facility.” December 2021. https://www.thejc.com/news/world/exclusivemossad-recruited-top-iranian-scientists-to-blow-up-key-nuclear-facility-1. 523163. Slayton, Rebecca. “What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment.” International Security 41, no. 3 (January 2017): 72-109.
https://doi. org/10.1162/ISEC_a_00267. Slayton, Rebecca, and Brian Clarke. “Trusting Infrastructure: The Emergence of Computer Security Incident Response, 1989-2005.” Technology and Culture 61, no. 1 (2020): 173-206. https://doi.org/10.1353/tech.2020.0036. Smale, Alison, and Andrew Roth. “Ukraine Says That Militants Won the East.” New York Times, 1 May 2015, sec. World, https://www.nytimes.com/2014/05/01/world/europe/ ukraine.html. Smeets, Max. NO SHORTCUTS: Why States Struggle to Develop a Military Cyber-Force. S.I.: Hurst Company, 2022. Smeets, Max. “The Strategic Promise of Offensive Cyber Operations.” Strategic Studies Quarterly 12, no. 3 (2018): 90-113. Smith, Rebecca. “Cyberattacks Raise Alarm for U.S. Power Grid.” Wall Street Journal, December 2016, sec. US. https://www.wsj.com/articles/cyberattacks-raise-alarms-for; u-s-power-grid-1483120708. Sohn, Roman. “Opinion: Ukraine: The Empire Strikes Back.” EUobserver (blog), September 2014. https://euobserver.com/opinion/123339 . “Soldier Killed in E. Ukraine Clashes.” VOA, November 2015. https://www.voanews.com/ a/soldier-killed-in-clashes-in-eastern-ukraine/3058960.html. Solomon, Erika, Steven Erlanger, and Christopher F. Schuetze. “Scrounging for Tanks for Ukraine, Europe’s Armies Come Up Short.” New York Times, February 28, 2023, sec. World, https://www.nytimes.com/2023/02/28/world/europe/ukraine-tanks.html. Solonya, Levhen. “Russia’s Plan for Ukraine: Purported Leaked Strategy Document Raises Alarm.” Radio Free Europe/Radio Liberty, August 2013. https://www.rferl.org/ a/russia-ukraine-leaked-strategy-
docUment/25081053.html.
320 BIBLIOGRAPHY Sonne, Paul, Isabelle Khurshudyan, Serhiy Morgunov, and Kostiantyn Khudov. “Battle for Kyiv: Ukrainian Valor, Russian Blunders Combined to Save the Capital.” Washington Post. 24 August 2022. https://www.washingtonpost.com/national-security/interactive/ 2022/kyiv-battle-ukraine-survival/. Sopova, Alisa, and Neil MacFarquhar. “Russia and Ukraine in a Standoff over Crimea Power Outage.” New York Times25 November 2015, sec. World, https://www.nyti mes.com/2015/ll/26/world/europe/russia-and-ukraine-in-a-standoff-over-crimeapower-outage.html. Spiegel Staff. “Putin’s Gambit: How the EU Lost Ukraine.” Spiegel Online, November 2013, sec. International. https://www.spiegel.de/international/europe/how-the-eu 2lost-torussia-in-negotiations-over-ukraine-trade-deal-a-935476.html. SSCIP. “Cyberattack against Ukrtelecom on March 28: The Details.” April 2022. https:// cip.gov.ua/en/news/kiberataka-na-ukrtelekom-28-bereznya-detali. SSCIP. “Державна Служба Спещального Зв’язку Та Захисту 1нформацн Украши.” January 2022. https://cip.gov.ua/ua/news/informaciya-shodo-imovirnoyi-prov okaciyi. SSSCIP Ukraine (@dsszzi). Twitter, March 2022. “Today, the enemy launched a powerful cyberattack against #Ukrtelecom ’s IT-infrastructure. According to Yurii Shchyhol, the Chairman of the @dsszzi at the moment massive cyberattack against #Ukrtelecom is neutralized. Resuming services is under way. #Ukraine #CyberAttack #war”, https:// twitter.com/dsszzi/status/1508528209075257347. SSU. “СБУ Викрила Спробу Феб Встановити «жучки» в Кулуарах Верховно!' Ради (В1део).” SSU, August 2022.
https://ssu.gov.ua/novyny/sbu-vykryla-sprobu-fsb-vst anovyty-zhuchky-v-kuluarakh-verkhovnoi-rady-video. Stokel-Walker, Chris. “Will Russia’s Invasion of Ukraine Trigger a Massive Cyberwar?” New Scientist, February 2022. https://www.newscientist.com/article/2309369-willrussias-invasion-of-ukraine-trigger-a-massive-cyberwar/ . Stolarik, Μ. Mark, ed. The Prague Spring and the Warsaw Pact Invasion of Czechoslovakia, 1968: Forty Years Later. Mundelein, IL: Bolchazy-Carducci Publishers, 2010. Strange, Susan. States and Markets. 2nd rev. ed. London: Bloomsbury Academic, 1998. “Stuxnet Malware Is ‘Weapon’ Out to Destroy. Iran’s Bushehr Nuclear Plant?” Christian Science Monitor, September 2010. https://www.csmonitor.com/USA/2010/0921/Stux net-malware-is-weapon-out-to-destroy-Iran-s-Bushehr-nuclear-plant. Sudduth, Andy. “The Morris Internet Worm.” 1988. https://snowplow.org/tom/worm/ worm.html. sw@materik.ru. “Re: Nedeli Opublikovalo Tekst, Pokhozhe Na Utechku.” August 2013. Sych, Oleg. “Zillya! Антивирус провела анализ кибератак на инфраструктурные объекта Украины.” February 2016. https://zillya.ua/ru/zillya-antivirus-provela-ana liz-kiberatak-na-infrastrukturnye-obekti-ukrainy. Symantec. “Dragonfly: Western Energy Companies Under Sabotage Threat.” Symantec Security Response (blog). Accessed August 23, 2017. http://www.symantec.com/conn ect/blogs/dragonfly-western-energy-companies-under-sabotage-threat. Symantec. “Stuxnet 0.5: The Missing Link.” 2013. McDonald, Geoff, Liam O. Murchu, Stephen Doherty, and Eric Chien. “Stuxnet 0.5: The Missing Link” (Symantec, February 2013).
https://web.archive.org/web/20150112172930/http://www.symantec.com/cont ent/en/us/enterprise/media/security_response/whitepapers/stuxnet_0_5_the_missi ng_link.pdf.
BIBLIOGRAPHY 321 Symantec. “W32.Stuxnet Dossier.” 2011. Falliere, Nicolas, Liam O. Murchu, and Eric Chien. “W32.Stuxnet Dossier” (Symantec, 2011). http://www.symantec.com/security_ response/writeup.jsp?docid=2010-071400-3123-99. Tantzscher, Monika. “Maßnahme »Donau« und Einsatz »Genesung«. Die Niederschlagung Des Prager Frühlings 1968/69 Im Spiegel Der Mß-Akten.” Analysen Und Berichte, Reihe В (BStU, 1998). https://d-nb.info/103633225X/34. Technopedia. “Source Code Definition.” n.d. Accessed July 20,2017. Thomson, Iain. “So You’ve Got a Zero-Day—Do You Sell to Black, Grey or White Markets?” April 2018. https://www.theregister.co.uk/2018/04/15/mature_bug_bou nty_market_bsidessf/. Thornton, Mary. ‘“Hackers’ Ignore Consequences of Their High-Tech Joy Rides.” Washington Post, May 21, 1984. https://www.washingtonpost.com/archive/politics/ 1984/05/21/hackers-ignore-consequences-of- their-high-tech-Joy-rides/6ab0d2fa68dd-44af-89fe-7dd30927133b/. Thornton, Rod. “The Changing Nature of Modern Warfare.” RUSI Journal 160, no. 4 (July 2015) : 40-48. https://d0i.0rg/l 0.1080/03071847.2015.1079047. Tigrid, Pavel. Why Dubcek Fell. London: Macdonald and Co, 1971. “Timing and Performance | Nmap Network Scanning.” Accessed March 29,2023. https:// nmap.org/book/man-performance.html. Townsend, Sean. “FrolovLeaks VI: Tomorrow Was the War.” Inform Napalm (English) (blog), November 2018. https://informnapalm.org/en/frolovleaks-vi-tomorrow-wasthe-war/. Traynor, Ian. “Ukraine Protests: End Nears for Viktor Yanukovych despite Concessions.” The Guardian, February 21, 2014, sec. World News,
https://www.theguardian.com/ world/2014/feb/21 /ukraine-protests-viktor-yanukovych-election. TrendMicro. “Sandworm to Blacken: The SCADA Connection.” TrendLabs Security Intelligence (blog), October 2014. https://blog.trendmicro.com/trendlabs-securityintelligence/sandworm-to-blacken-the-scada-connection/. Trenin, Dmitri. “The Putin Doctrine.” Carnegie Moscow Center, February 2013. https:// carnegie.ru/2013/02/01 /putin-doctrine-pub-51085. Treverton, Gregory F. Covert Action: The Limits of Intervention in the Postwar World. New York, NY: Basic Books, 1987. https://doi.org/10.5040/9780755612529. Trifonov, Denis. “Russian Intelligence Presence in the CIS.” CACI Analyst, December 2003. http://www.cacianalyst.org/publications/analytical-articles/item/8615-analyti cal-articles-caci-analyst-2003-12-17-art-8615.html. Tsagourias, Nicholas. “Cyber Attacks, Self-Defence and the Problem of Attribution.” Journal of Conflict and Security Law 17, no. 2 (2012), 229-244. Tsarev, Oleg. “О Комплексе Мер По Вовлечению Украины в Евразийский Интеграционный Процесс.” LB.Ua (blog). Accessed August 16, 2021. https://lb.ua/ blog/oleg_tsarev/220762_komplekse_mer_vovlecheniyu_ukraini.html. TSN. “Очыьник СБУ Розпов1в Про Мотив Хакер1в, Яю Атакували Украшу BipycoM Petya.” TCH.ua, July 2017. https://tsn.ua/ukrayina/ochilnik-sbu-rozpoviv-pro-motivhakeriv-yaki-atakuvali-ukrayinu-virusom-petya-955817.html . Tucker, Maxim. “Coal Cutoff Escalates Russia-Ukraine Tensions.” Politico, November 2015. https://www.politico.eu/article/coal-russia-ukraine-crimea-sanctions-putinturkey/.
322 BIBLIOGRAPHY Tucker, Patrick, “DNC Hackers Linked to Russian Activity against Ukraine Two Years Ago.” Defense One (blog), December 2016. https://www.defenseone.com/technology/ 2016/12/dnc-hackers-linked-russian-hacks-ukraine-two-years-ago/134098/. Tuma, Oldrich, Mikhail Prozumenshchikov, John Soares, and Mark Kramer. “The (Inter Communist) Cold War on Ice: Soviet-Czechoslovak Ice Hockey Politics, 1967-1969.” CWIHP Working Paper #69 12, February 2014. Tversky, Amos, and Daniel Kahneman. “The Framing of Decisions and the Psychology of Choice.” Science 211 (1981): 453. “Two Servicemen Killed in Past 24 Hours in East Ukraine: Kiev Military.” Reuters, April 2015. https://www.reuters.com/article/us-ukraine-crisis-casualties/two-servicemenkilled-in-past-24-hours-in-east-ukraine-kiev-military-idUSKBN0MZ0UN20150408. Tyson, Laura, and Susan Lund. “The Promise of Digital Finance.” European Financial Review, 2017. http.7/www.europeanfinancialreview.com/?p=16598. UK Foreign Office. “Kremlin Plan to Install Pro-Russian Leadership in Ukraine Exposed.” January 2022. https://www.gov.uk/government/news/kremlin-plan-to-install-pro- russian-leadership-in-ukraine-exposed. UK NCSC. “Russia behind Cyber Attack with Europe-Wide Impact an Hour before Ukraine Invasion.” May 2022. https.7/www.ncsc.gov.uk/news/russia-behind-cyber-att ack-with-europe-wide-impact-hour-before-ukraine-invasion. “Ukraine Cyber Police Chief Says Ukraine Hit by ‘Badrabbit’ Malware.” Reuters, October 2017. https://www.reuters.com/article/us-ukraine-cyber-police-idUSKBN 1CT27G. “Ukraine Power Company Says It Was Hit by a
Second Cyber Attack.” Fortune, June 30, 2017. http://fortune.com/2017/06/30/ukraine-power-station-cyber-attack/ . “Ukraine Provides Evidence of Russian Military in Civil Unrest.” New York Times, April 20,2014, sec. World, https://www.nytimes.com/interactive/2014/04/20/world/europe/ ukraine-provides-evidence-of-russian-military-in-civil-unrest.html, https://www.nyti mes.com/interactive/2014/04/20/world/europe/ukraine-provides-evidence-of-russ ian-military-in-civil-unrest.html. “Ukraine Resumes Power Supply to Crimea.” December 2015. https://www.euractiv.com/ section/energy/news/ukraine-resumes-power-supply-to-crimea/. “Ukraine Says Ammo Depot Explosions Huge Blow to Combat Capability.” Reuters, September 2017. https://www.reuters.com/article/us-ukraine-explosions-idUSKC N1C316Z. “Ukraine Sees First Direct Combat in Two Months Before EU Meeting.” November 2015. https://www.bloomberg.com/news/articles/2015-ll-09/ukraine-sees-first-direct-com bat-in-two-months-before-eu-meeting. “Ukraine Tensions: US Sources Say Russia 70% Ready to Invade.” BBC News, February 2022, BBC https://www.bbc.com/news/world-europe-60276342 . “Ukraine War: Putin Signs Ukraine Annexation Laws amid Military Setbacks.” BBC News, October 2022, sec. Europe, https://www.bbc.com/news/world-europe-63149156 . “Ukraine’s Party of Regions Expels Presidential Hopefuls Tigipko, Tsariov and Boiko.” Interfax-Ukraine. 7 April 2014. https://en.interfax.com.ua/news/general/199490.html. “Ukrainian Clashes with Pro-Russian Separatists Turn Deadly.” Denver Post, April 13, 2014.
https://www.denverpost.com/2014/04/13/ukrainian-clashes-with-pro-russian- separatists-turn-deadly/. “Ukrainian Leaders Blame ‘Sabotage’ for Huge Blast at Munitions Depot.” Radio Free Europe/Radio Liberty, September 2017. https://www.rferl.org/a/artillery-warehousesexplode-evacuations-ordered-around-vinnitsa-ukraine-kaIinovka-evacuated/28759 382.html.
BIBLIOGRAPHY 323 Ukrinform. “Украшсью Урядов: Сайти Знову Зазнали Юбератаки.” February 2022. https://www.ukrinform.ua/rubric-technology/3410832-ukrainski-uradovi-sajtiznovu-zaznali-kiberataki.html. Ukrop News. “In the Kherson Region, the Military Stole and Tried to Sell Anti-Tank Mines with TNT.”
Ukrop News 24 (blog), February 2017. https://ukropnews24.com/inthe-kherson-region-the-military-stole-and-tried-to-sell-anti-tank-mines-with-tnt/. “Uncorrected Design Flaws, Cyber-Vulnerabilities, and Unreliability Plague the F-35 Program.” Project on Government Oversight. Accessed October 10, 2021.
https:// www.pogo.org/analysis/2020/03/uncorrected-design-flaws-cyber-vulnerabilitiesand-unreliability-plague-the-f-35-program/ . UNIAN. “Novaya Gazeta’s ‘Kremlin Papers’ Article: Full Text in English.” February 2015. https://www.unian.info/politics/1048525-novaya-gazetas-kremlin-papers-articlefull-
text-in-english.html. UNN. “В ‘Укренерго’ не виключають к1бератаку на шдстанщю ТНвшчна’, через яку частику Киеву було знеструмлено.” 1нформацшне агентство Украйгсьга Нацюнальш Новини (УНН). Bei онлайн новини дня в Украли за сьогодш— найсв1ЖШ1, останш, головы, December 2016.
https://www.unn.com.ua/uk/news/ 1628435-v-ukrenergo-ne-viklyuchayut-kiberataku-na-pidstantsiyu-pivnichna-che rez-yaku-chastinu-kiyevu-bulo-znestrumleno. “Unsubstantiated Reports.” Zemidélské Noviny, July 1968. US CYBERCOM. “Achieve and Maintain Cyberspace Superiority—Command Vision for US Cyber
Command.” April 2018. https://www.cybercom.mil/Portals/56/Documents/ .
USCYBERCOM%20Vision%20April%202018.pdf?ver=2018-06-14-152556-010. US Department of State. “Soviet‘Active Measures’ Report No. 88 Forgery, Disinformation, Political Operations.” 1981. https://www.cia.gov/library/readingroom/docs/CIARDP84B00049R001303150031 -O.pdf. US Treasury. “Treasury Sanctions Russian Cyber Actors for Interference with the 2016 U.S. Elections and Malicious Cyber-Attacks.” US Department of the Treasury, March 2018. https://home.treasury.gov/news/press-releases/sm0312 . Vaas, Lisa. “How Hackers Broke into John Podesta, DNC Gmail Accounts.” Naked Security (blog), October 2016. https://nakedsecurity.sophos.com/2016/10/25/how-hackersbroke-into-john-podesta-dnc-gmail-accounts/ . Valenta, Jiri. “The Bureaucratic Politics Paradigm and the Soviet Invasion of Czechoslovakia.” Political Science Quarterly 94, no. 1 (1979): 55-76. https://doi.org/ 10.2307/2150156. Valenta, Jiri. Soviet Intervention in Czechoslovakia, 1968: Anatomy of a Decision. 2nd rev. and expanded ed. Baltimore, MD: Johns Hopkins University Press, 1991. Valeriano, Brandon, Benjamin Jensen, and Ryan C. Maness. Cyber Strategy: The Evolving Character ofPower and Coercion. New York: Oxford University Press, 2018. Valeriano, Brandon, Ryan C. Maness, and Benjamin Jensen. “Analysis: Cyberwarfare Has Taken a New Turn. Yes, It’s Time to Worry.” Washington Post, July 13, 2017. https:// www.washingtonpost.com/news/monkey-cage/wp/2017/07/13/cyber-warfare-hastaken-a-new-turn-yes-its-time-to-worry/. Vandiver, John. “SACEUR: Allies Must Prepare for Russia ‘Hybrid War.”’ Stars and Stripes. Accessed December 14,
2020. https://www.stripes.com/news/saceur-allies-must-prep are-for-russia-hybrid-war-1.301464. Vasovic, Alexander. “Ukraine Rebels Speak of Heavy Losses in Battle against Government Troops.” Reuters, June 2014. https://www.reUters.com/article/us-ukraine-crisis-fight
324 BIBLIOGRAPHY ing/ukraine-rebels-speak-of-heavy-losses-in-battle-against-government-troopsidUSKBN0EU0K320140619. Verbyany, Volodymyr, Elena Mazneva, and Eduard Gismatullin. “Twin Ukraine Power Cable Blasts Leave Crimeans in the Dark.” November 2015. https://www.bloomberg. com/news/articles/2015-ll-22/crimea-declares-emergency-as-l-9-million-peoplelose-electricity. Viasat. “KA-SAT Network Cyber Attack Overview.” March 2022. https://news.viasat. com/blog/corporate/ka-sat-network-cyber-attack-overview. Victor Zhora (@VZhora). “@lukasmaeder @LenMaschmeyer @lukOlejnik Huge Loss in Communications!= Huge Loss in Coordination. The Impact Was Direct, but the Goal Wasn’t Reached.” Twitter, June 2022. https://twitter.com/VZhora/status/153427962434 7230208. Volz, Dustin. “Russian Hackers Tracked Ukrainian Artillery Units Using Android Implant: Report.” Reuters, December 2016. https://www.reuters.com/article/us-cyberukraine-idUKKBN 14B0CU. Voo, Julia, Irfan Hemani, Simon Jones, Winnona DeSombre, Dan Cassidy, and Annina Schwarzenbach. “National Cyber Power Index.” Belfer Center of International Affairs, 2020. https://www.belfercenter.org/publication/national-cyber-power-index-2020. V. V. Shtol. “Geopoliticheskiye Zadachi Rossii Na Postsovetskom Prostranstve.” Vestnik Moskovskogo Gosudarstvennogo Oblastnogo Universiteta, no. 3S (2014): 171-180. Walker, Shaun. “Ukraine’s EU Trade Deal Will Be Catastrophic, Says Russia.” The Guardian, September 22, 2013, sec. World News, https://www.theguardian.com/ world/2013/sep/22/ukraine-european-union-trade-russia. Walker, Shaun, and Ian Traynor.
“Ukraine Crisis: Crimea Now Part of Russia, Local Parliament Declares.” The Guardian, March 6, 2014, sec. World News. https://www. theguardian.com/world/2014/mar/06/ukraine-crisis-crimea-part-of-russia-local-par liament-declares. Waltz, Kenneth N. Theory ofInternational Politics. Reissue ed. Long Grove, IL: Waveland Press, 2010. Warner, Michael. “A Matter of Trust: Covert Action Reconsidered.” Studies in Intelligence 63, no. 4 (2019), 33-41. https://web.archive.Org/web/20201016162622/https://www. cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/stud ies/vol-63-no-4/pdfs/Covert-Action-Reconsidered.pdf. Warner, Michael. “Wanted: A Definition of “Intelligence.” Studies in Intelligence 46, no. 3 (2002). https://web.archive.Org/web/20080611153835/https://www.cia.gov/library/ center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vo!46no3/ article02.html. Watling, Jack, and Nick Reynolds. “Ukraine at War: Paving the Road from Survival to Victory.” RUSI, July 2022. https://www.rusi.org/explore-our-research/publications/ special-resources/ukraine-war-paving-road-survival-victory. Watson, Adrienne. Twitter, @NSC_Spox, “The U.S. has technical information linking Russian GRU to this week’s distributed denial of service attacks in Ukraine. Known GRU infrastructure has been noted transmitting high volumes of communications to Ukraine-based IP addresses and associated banking-related domains.” February 2022. https://twitter.com/NSC_Spox/status/1494796573959725057 . Weber, Max. Max Weber: The Theory of Social and Economic Organization.
Edited by A. Μ Henderson and Talcott Parsons. New York; London: Free Press; Collier Macmillan, 1964.
BIBLIOGRAPHY 325 Wesolowsky, Tony. “Ukraine’s Exploding Munition Depots Give Ammunition to Security Concerns.” Radio Free Europe/Radio Liberty, 6 October 2017. https://www.rferl.Org/a/ ukraine-exploding-munitions-security-concerns-russia/28777991.html. “The West Is Struggling to Forge a New Arsenal of Democracy.” The Economist. 19 February 2023. https://www.economist.com/briefing/2023/02/19/the-west-is-struggl ing-to-forge-a-new-arsenal-of-democracy. “WhisperGate Malware Corrupts Computers in Ukraine.” Recorded Future (blog), January 2022. https://www.recfut.com/whispergate-malware-corrupts-computers-ukraine/. Wiener, Norbert. Cybernetics or Control and Communication in the Animal and the Machine. 2nd ed. Cambridge, MA: MIT Press, 2000. Wilde, Gavin. “Cyber Operations in Ukraine: Russia’s Unmet Expectations.” Carnegie Endowment for International Peace. 12 December 2022. https://carnegieendowment. org/files/202212-Wilde_RussiaHypotheses-v2.pdf. Williams, Brad D. “How Russia Adapted KGB Active Measures’ to Cyber Operations, Part I.” Fifth Domain: Cyber, March 2017. http://fifthdomain.com/2017/03/19/how-russiaadapted-kgb-active-measures-to-cyber-operations-part-i/. Williams, Holly. “Russian Hacks into Ukraine Power Grids a Sign of Things to Come for U.S.?” December 2016. https://www.cbsnews.com/news/russian-hacks-into-ukrainepower-grids-may-be-a-sign-of-things-to-come/. Williams, Kieran. “New Sources on Soviet Decision Making during the 1968 Czechoslovak Crisis.” Europe-Asia Studies 48, no. 3 (May 1996): 457. Williams, Kieran. Prague Spring and Its Aftermath: Czechoslovak
Politics, 1968-1970. Cambridge: Cambridge University Press, 2011. http://public.eblib.com/choice/publi cfullrecord.aspx?p=4641036. Windsor, Philip, and Adam Roberts. Czechoslovakia, 1968: Reform, Repression, and Resistance. London: Columbia University Press, for the Institute for Strategic Studies, 1969. Winner, Langdon. The Whale and the Reactor. Chicago: University of Chicago Press, 1986. Withnall, Adam. “Ukraine Crisis: Donetsk ‘Declares Independence from Kiev’ and Sets Date for Referendum on Joining Russia.” The Independent, April 2014. https.7/www. independent.co.uk/news/world/europe/ukraine-crisis-officials-in-eastern-city-ofdonetsk-proclaim-independence-from-kiev-and-set-date-for-9243750.html. Wohlforth, William C. “Realism and Great Power Subversion.” International Relations 34, no. 4 (December 2020): 459-481. https://doi.0rg/lO.l 177/0047117820968858. Womack, Helen, ed. Undercover Lives: Soviet Spies in the Cities of the World. London: Weidenfeld Nicolson, 1998. Work, J. D. “Burned and Blinded: Escalation Risks of Intelligence Loss from Countercyber Operations in Crisis,” International Journal of Intelligence and Counterintelligence 35, no. 4 (2 October 2022): 806-833. https://doi.org/10.1080/08850607.2022.2081904 Work, J. D. “Evaluating Commercial Cyber Intelligence Activity,” International Journal of Intelligence and Counterintelligence 33, no. 2 (2 April 2020): 278-308. https://doi.org/ 10.1080/08850607.2019.1690877. World Bank. “GDP (Current US$)—Ukraine: Data.” 2023. https://data.worldbank.org/ indicator/NY.GDP.MKTP.CD?locations=UA. Wylie, J. C„ and John B.
Hattendorf. Military Strategy: A General Theory ofPower Control, Classics of Sea Power. Annapolis, MA: Navel Institute Press, 2014.
326 BIBLIOGRAPHY Yagofarov, Timur. “Юбератака на енергосектор розвивалася повтора ьпсящ.” Computernoe Obozrenie, April 2022. https://ko.com.ua/kiberataka_na_energosektor_ rozvivalasya_pivtora_misyaci_140789. Yana. “Opinion: ‘We Were Trapped’: Eyewitness to the Massacre in Kiev.” CNN. Accessed August 18, 2021. https://edition.cnn.com/2014/02/24/opinion/yana-ukraine-eyewitn ess/index.html. Yasinskiy, Aleksey. "BlackEnergy Phase 2: From Media and Electric Companies to Darknet and TTPs.” SOC Prime (blog), January 2016. https://socprime.com/en/blog/ blackenergy-phase-2-from-media-and-electric-companies-to-darknet-and-ttps/. Yasinskiy, Aleksey. “DISMANTLING BLACKENERGY, PART 2—‘THE MARK.”’ SOC Prime (blog), March 2016. https://socprime.com/en/blog/dismantling-blackenergypart2-the-mark/. Yasinskiy, Aleksey. “DISMANTLING BLACKENERGY, PART 3—ALL ABOARD!” SOC Prime (blog), March 2016. https://socprime.com/blog/dismantling-blackenergy-part3-all-aboard/. Yasinskiy, Aleksey. “Dismantling KillDisk: Reverse of the BlackEnergy Destructive Component.” SOC Prime (blog), February 2016. https://socprime.com/en/blog/dism antling-killdisk-reverse-of-the-blackenergy-destructive-component/. Young, Susan, and Dave Aitel. The Hacker’s Handbook: The Strategy behind Breaking into and Defending Networks. Boca Raton, FL: CRC Press, 2004. ZA, Sekretariat des Ministers (SdM) 1469. “Information Nr. 942/69 Der ZAIG Über Die Ereignisse in Der CSSR Anläßlich Des Ersten Jahrestages Der Militärischen Hilfsaktion Der Sozialistischen Länder.” n.d. BStU. Zäcek, Pavel. “The KGB and the Czechoslovak State Security
Apparatus in August 1968.” Journal of Slavic Military Studies 29, no. 4 (2016): 626-657. https://doi.org/10.1080/ 13518046.2016.1232561. Zarudnia, Natalia. “Росшська Програма-Вимагач RansomBoggs Нащлилася На Юлька Украшських Оргашзацш.” November 2022. https://cybercalm.org/novyny/ rosijska-programa-vymagach-ransomboggs-natsilylasya-na-kilka-ukrayinskyhorganizatsij/. “Zelensky Says Two Generals Stripped of Their Rank Due to Treason.” Kyiv Independent, March 2022. https://kyivindependent.com/uncategorized/zelensky-says-two-gener als-stripped-of-their-rank-due-to-treason. Zeman, Z. A. B. Prague Spring. New York: Hill and Wang, 1969. Zetter, Kim. “Everything We Know about Ukraine’s Power Plant Hack.” Wired, January 2016. https://www.wired.com/2016/01 /everything-we-know-about-ukraines-powerplant-hack/. ■ Zetter, Kim. “Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid.” Wired, March 2016. https://www.wired.com/2016/03/inside-cunning-unprecedented-hackukraines-power-grid/. Zetter, Kim. "Second Wiper Attack Strikes Systems in Ukraine and Two Neighboring Countries.” Substack newsletter. Zero Day (blog), February 2022. https://zetter.subst ack.com/p/second-wiper-attack-strikes-systems . Zetter, Kim. “So What This Means Is That Now They Have to Send a Farmer out to Look at the Turbines and Report Back: ‘Yep, They’re Still Working.”’ Twitter, @KimZetter. March 2022. https://twitter.com/KimZetter/status/1507389719411236871. Zetter, Kim. “An Unprecedented Look at Stuxnet, the World’s First Digital Weapon.” Wired, March 2014. http://www.wired.eom/2014/l 1/countdown-to-zero-
day-stuxnet/.
BIBLIOGRAPHY 327 Zetter, Kim. “Viasat Hack ‘Did Not’ Have Huge Impact on Ukrainian Military Communications, Official Says.” Substack newsletter. Zero Day (blog), September 2022. https://zetter.substack.eom/p/viasat-hack-did-not-have-huge-impact. Zetter, Kim. “What We Know and Don’t Know about the
Cyberattacks Against Ukraine (Updated).” Substack newsletter. Zero Day (blog), January 2022. https://zetter.substack. com/p/what-we-know-and-dont-know-about. Zetter, Kim. Twitter, April 2022. https://twitter.com/KimZetter/status/151450873390 8348930. Zhong, Ray Y., Xun Xu, Eberhard Klotz, and
Stephen T. Newman. “Intelligent Manufacturing in the Context of Industry 4.0: A Review.” Engineering 3, no. 5 (October 2017): 616-630. https://doi.Org/10.1016/J.ENG.2017.05.015. “О Комплексе Мер По Вовлечению Украины в Евразийский Интеграционный Процесс.” ZN. Ua, 16 August 2013.
https://zn.ua/internal/o-komplekse-mer-po-vovle cheniyu-ukrainy-v-evraziyskiy-integracionnyy-process-_.html. “Бывший Офицер КГБ Попов: Агентов в Украине Россия Выращивала. Это ‘Парничок’. Завербовать Человека, Когда Он Уже На Самом Верху, Намного Сложнее / ПОЛИТИКА / Новости.” 25 November 2022.
https://gordonua.com/amp/ news/politics/byvshij-ofitser-kgb-popov-agentov-v-ukraine-rossija-vyrashchivalaeto-parnichok-zaverbovat-cheloveka-kogda-on-uzhe-na-samom-verhu-namnogoslozhnee-1637706.html. Егошина, Валергя. “Таемний Кадр СБУ: Alter Ego Головного «контролера Порядносп» Спецслужби Андр!я
Наумова (Розелщування).” Padio Свобода, 29 October 2020, sec. ПолНика. https://www.radiosvoboda.Org/a/schemes/30919 292.html. “Из-За
Кибератаки Минфин и Госказначейство Потеряли 3 Терабайта Информации.” Accessed October 13,2021. https://biz.nv.ua/economics/iz-za-kiberat aki-minfin-i-goskaznachejstvo-poterjali-3-terabajta-informatsii-330784.html. Красномовець, Павло. “Росшськ! Хакери 1з ГРУ Спробували Залишити Без СвНла В1нницьку
Область, Як у 2017 Кшв. Чому Ïm Не Вдалося—Forbes.Ua.” 12 April 2022. https://forbes.ua/innovations/rosiyski-khakeri-namagalis-zalishiti-bez-svitlavinnitsku-oblast-atatsi-vdalos-zapobigti-12042022-5409. ОЛЕНА БУРКАЛО. “На Сумщине Мэра Бурыни и Его Пособников Задержали За
Коллаборационизм—Korrespondent.Net.” 1 Мау 2022. https://korrespondent.net/ amp/4473984-na-sumschyne-mera-buryny-y-eho-posobnykov-zaderzhaly-za-kollab oratsyonyzm. “СБУ тдозрюе старосту села Сумського району в колаборацюшзмь” 28 June 2022. https://debaty.sumy.ua/news/sbu-pidozryuye-starostu-sela-
sumskogo-rajonu-vkolaboratsionizmi. Свобода, Радю. “Ексначальник з СБУ Наумов Mir Передавати Спецслужбам РФ Секретш Данг Щодо Чорнобильсько! АЕС—«Схеми».” Padio Свобода, 17 June 2022, sec. Новини | Пол пика. https://www.radiosvoboda.org/a/news-skhemy-sbunaumov-chaes/31902729.html. Свобода, Радю. “У
Сербн Офщшно Пщтвердили Затримання Ексначальника в СБУ Який Ф1гурував у Розслщуванш «Схем».” Padio Свобода, 11 June 2022, sec. Новини: Сустльство. https://www.radiosvoboda.org/a/nws-serbia-zatrymannianaumova/31893820.html. Станиславович, Шабловский Владислав. “Отношения России и Нато в Контексте
Кризиса На Украине.” Постсоветские Исследования 2, по. 2 (2019): 1032-1041.
328 BIBLIOGRAPHY СУМСЬКА ОБЛАСТЬ. “Xotîb ‘Здати’ Micro Роаянам: Голова Громади в Сумськш Облает! ГИде Шд Суд.” РБК-Украина. 26 August 2022 https://www.rbc.ua/ukr/news/ hotel-sdat-selo-rossiyanam-glava-obshchiny-1661518671 .html. “У Донецьку 1деГ Сепаратизму Неспод1вано Виявилися Непопулярними.” Украшська Правда, 9 April 2014. https://www.pravda.com.Ua/news/2014/04/9/ 7021883/. “Хакери Атакували Транспорты! Та Лопстичн! Компани в Украйй й Полыц!, Microsoft—Delo.Ua.” 15 October 2022. https://delo.ua/telecom/xakeri-atakuvali-tran sportni-ta-logisticni-kompaniyi-v-ukrayini-i-polshhi-microsoft-405412/. Юрш ЩигольЯк Вдалося Зберегти Зв'язок, Кибератаки На Украшу,В1дключеш BiücbKoei Супутники. 2022. https://www.youtube.com/watch?v=-K9OyhGWDRI.
Index For the benefit of digital users, indexed terms that span two pages (e.g., 52-53) may, on occasion, appear on only one of those pages. Tables and figures are indicated by t and ffollowing the page number AcidRain malware, 191 AES-NI cybercrime tool, 161 Aksyonov, Sergey, 127 ALLA, illegal agent, 102-3 Andropov, Yuri, 66,67-68,82,85,87,91 Arbuzov, Serhiy, 187-88 ARTYMOVA, illegal agent, 102-3 Azarov, Mykola, 187-88 BadRabbit ransomware, 164-67 balancing trilemma, 164-67 effects, 165-66 strategic role, 165 targets, 165 Bakanov, Ivan, 194-95,196 Bilak, Vasil, 65-66,84-85 BlackEnergy malware, 134,135 2015 Blackout (Ukraine), 136-41 development time, 137 GE CIMPLICITY HMI (Human Machine Interface) systems, 138 role of luck 137,138-39 trilemma trade-offs 139-40 Effects 139-41 SCADA systems, 138 Bogdan, Vasily, 151-52 BootPatch malware, 179-80 Borzov, Gennadi, 71 botnet, 181-82 Brandt, Willy, 26 ‘Brezhnev Doctrine,' 63,69 Brezhnev, Leonid, 64,65-67,68,78-79, 81,84-86,89,91,92,94-95, 104,111 Brusov, Georgiy, 128-29 CaddyWiper malware, 185-86,200 Cerny, Vaclav, 72-73,74 Chaliy, Aleksei, 125-26 “Charter 77,” 113 Chernovtsoblenergo, 137 from Cold War to hybrid war, 208-11 “Complex of Measures” document, 11920,122,125,188 computer code, 44 contingency planning, failure and fallback to, 86-92 control, in subversive trilemma, 4,12,13/, 13-14,35-38,40-41,42-43,55, 56,57-58 BadRabbit operation, 172,180-81 in cyber conflicts, 57-58 in fulfilling strategic promise, 99-100 HermeticWiper, 183-84 as key determinant of strategic value, 36-37 KHODOKI operations, 61,114 NotPetya and the
limits of control, 157-64 power grid sabotage attempt in April 2022,202 in PROGRESS operations, 61 Soviet Union over Czechoslovakia, 92-93 speed and intensity and, inverse correlation between, 36,76-77,95, 100-1,179,224-25 when intensity increases, 55 control over targets, 34-38 covert operations, 68,117 definition 7-8 advantages of, 29-30
330 INDEX covert operations (cont.) assassination plots, 74-75 clandestine mode versus, 7-8 covert warfare secrecy lowering escalation risks in, 3-4,29 cyber operations as, 2-3 cyber operations versus, 9,13-14,45, 48-50,51-52 effects, 9,10,13-14,24,27,48-49,5152,72,117 “escalation ladder’ for, 72 as independent tools of statecraft, 8 information technology aiding, 10 strategic value of, 9 subversive operations versus, 22-23 traditional subversion and, 24 use of force, 214 -15 Crimea Blackout (2015), 137,141-44 Crimean power grid sabotage, 137, 141-44 critical infrastructure sabotage, 115-16, 175-76,196-201 CaddyWiper malware, 200 Crimea Blackout (2015), 137,141-44 enabled by territorial conquest, 197-98 INDUSTROYER and energy sector sabotage, 150,200 Kyiv Blackout (2016), 144-50 operations in Ukraine, 196-201 attempt to disrupt the power grid, 196-97 disrupting Ukrtelecom, 196-97 Russia against Ukraine, 118 Sandworm hacking group strikes back, 196-201 Sandworm I (2015 Blackout), 136-41 (see also 2015 Blackout [Ukraine]) Sandworm II (2016 Kyiv Blackout), 144-50 (see also Kyiv Blackout, 2016) Sandworm strikes back in Ukraine, 196-201 through cyber means, 119 CyberBerkut hacker group, 132-33 cyber-enabled subversion, 117-73. See also “hybrid war,” Russia against Ukraine (2013-2018) cyber operations, 42-43 “attack surface” for, 49 comparison to traditional subversion, 42-43,55-56 in degrading material capabilities, 51 in disrupting the economy, 51 effects, 47-48 scope and scale of, 48,53 challenges, 42-43,49-50 for long-term “erosion” strategies, 50 (see also erosion
strategies) manipulating government policy, 51 in manipulating public opinion, 50-51 relative advantages, 42-43,48-50 strategic role and promise of, 48-52 subversive nature, 3-4 scalability, 48-49 cyber power, subversive nature of, 43-48 phishing, 44 social vulnerabilities targeted, 43-44 technical vulnerabilities targeted, 43-44 “Cyberpunk” hacker group, 43-44 Czechoslovakia, 15 Andropov’s strategy on, 68,87 anti-Soviet nationalism” in, 116 armed force, 67-68 KGB’s illegals in, 14-15,61, 111, 192 (see also KHODOKI campaign; PROGRESS campaign) Kremlin perception and strategic goals, 63-70 Prague Spring and, 60 (see also Prague Spring (1968-1973), crushing the) Soviet strategic goals at, 98-99,101,102 Soviets’ subversion failure in, 61,17677,208 as a “testing ground” for subversion use, 14-15 Danyliuk, Oleksandr, 160-61 Derkach, Andriy, 193 diplomacy definition, 19 interaction with use of force, 19,25,117 interaction with subversion, 1 -2,64,70, 92-93,121-22 interaction with warfare, 1-2,17-18, 19,21
INDEX distributed denial of service (DDoS), 178-87,201 Dobrynin, Anatolii, 69-70 Donbass failure and escalation, 129-31 Dubcek, Alexander, 60,62,64,65,66-67, 81,84-87,91,92-93,104,105, 106-7,109,110,114 Dubov, Dmitry, 128-29,155 economic and psychological (cyber) warfare, 178-88 erosion strategies, 28,30-31,50 causing collateral cognitive damage, 223-24 cyber operations as, 50,56-57 effects of, 28 long-term campaigns effects on the balance of power, 219-20,223 by Russia in Ukraine, 118—19 2014,118-19 2022,174,178 strategic role, 57 strategic value of, 39-40 in subversive campaigns, 42-43 to undermine trust, 223-24 to weaken the adversary, 28 escalation, 56-57 in Czechoslovakia, role of subversion, 90-91,93-94,113-14,216-17 in the Donbass region, 129-31 “escalation ladder’ for covert operations, 72,74-75,76,95,117-18,136-37, 143,146,151,194,198-99 KHODOKI campaign in, 62-63 Kremlin decision to invade Czechoslovakia, 176-77,208 lowered risks in covert warfare, 3-4, 7-8,29 military escalation, 10,213,214-15, 218 subversion lowering the risk of, 29-30, 37-39 time pressure as the cause, 213 in Ukraine, 174,210-11 exploitation analysis of the mechanism of, 75,11112,224-25 challenges in the process of, 40-41 331 of computer systems, 46,48 as distinguishing feature of subversion, 23-24 failure of, 203 force use to facilitate, 23-24 immaterial means of, 46-47 indirect and secret nature of, 25 by IsaacWiper, 184-85 prevention of, 226-27 of psychological and sociological vulnerabilities, 7,21 secret mode of operation, 22-23, 30,31,38 spies using the technique of, 26,103-4 by
subversion, in practice, 17-18 subversion speed limited by, 3132,35,37 subversion’s reliance on, 3-4,7,11-12, 21,23-24,207 as subversive nature of cyber power, 43 traditional subversion and, 5152,55, 57 of Ukrtelecom’s network, 197 using unpatched VPN device, 191,199 of vulnerabilities in ICTs, 43-44, 45,48,57 Fedorov, Mykhailo, 182 firmware, 44,190,191 force, 24-25,69 and diplomacy, 19-20 military force, 67-68,75,84-85,105, 116,126-27 spies using, 23-24 subjugation by, 69-70 subversion in the service of, 188-96 subversion versus, 7,17-18,25,28-31, 38-39,174-75 Frolov, Kirill, 14,120-21,122-23,126-27, 130 FYODOROV illegal agent, 102-3,111-12 GE CIMPLICITY HMI (Human Machine Interface) systems, 138 German Stasi Records Agency, 14 Glazyev, Sergey Yuryevich, 122-23,126,127 government policy, subversion influencing, 26
332 INDEX Granovski, Vladimir, 123 Grechko, Marshal, 109 GreenPetya ransomware, 159,160 GreyEnergy group, 141 Groysman, Volodymyr, 151-52 Guillaume, Günther, 26 hacking, 11-12,134 APT28,132 cyber operations as, 43-44 CyberBerkut, 132 “Cyberpunk” hacker group, 43-44 hack-and-leak operations, 50-51 KillDisk module, 137,156-57 over industrial control systems, 53,139 Russian sponsored, in Ukraine, 118, 120-21,131-32 Sean Townsend, 160 stealth in, 45 subversive nature of, 45,46 target systems for, 55,138 Ukrainian hacktivists, 127 Viasat hack, 189-90,191,211,217 vulnerabilities targeted, 43-44 “HermeticWiper” malware, 183-85 Husak, Gustav, 62-63,110 “hybrid war,” Russian strategy against Ukraine (2013-2018), 117-73. See also Russia’s invasion of Ukraine “Complex of Measures” document, . 119-20,122 Donbass failure and escalation, 129-31 economic warfare, Sandworms pivot to scale, 153-67 Euromaidan movement, 122 Kremlin perception and strategic goals, 119-22 new technology, old limitations, 169-73 public trust in the government, 170,171/ Russia turning to subversion, 118 sabotage, cyber versus traditional subversion, 135-53 GE CIMPLICITY HMI systems, 138 KillDisk module, 137 learning requirement, 139 Sandworm I: The 2015 Blackout, 136-41 SCADA systems, 138 Sandworm II, The 2016 Kyiv Blackout, 144-50 Sandworm III, The 2016 compromise of the Ministry of Finance 154-57 Sandworm IV, NotPetya and the limits of control, 157-64 Sandworm V, BadRabbit, 164-67 (see also BadRabbit ransomware) shadow forces take Crimea, 124-29 Euromaidan crisis, 127 “pro-Russian demonstrators,” 126 subversion
falters for Russia, 122-24 constraints posed by the trilemma, 124 Ukraine Cyber Alliance, 123 subversive election interference, 2014-2015,131-35 traditional sabotage 1,2015 Crimea Blackout, 141-44 operation and cyber sabotage, difference between, 143 traditional sabotage II, arms depot explosion in Kalynivka, 150-53 Ukrainian D-30 artillery and the tactical sabotage, 167-69 illegal agents, 15,67-68. See also KHODOKI campaign; PROGRESS campaign advantage of, 80-81 Aleksandr Alekseev, 71 ALLA, 102-3 ARTYMOVA, 102-3 in Czechoslovakia, sent by Andropov, 67-68 during Prague Spring, 71 FYODOROV, 102-3,111-12 Gennadi Borzov, 71 Georgii Fedyashin, 71 of KGB, infiltrating Western societies, 23,61 KRAVCHENKO, 110 Mikhail Sagatelyan, 84 near the West German border, 76,80-81 Vladimir Surzhaninov, 71 V. Umnov, 71
INDEX Indra, Alois, 84-85 industrial control system (ICS), 48,55, 138,139,145-46,149-50 GE CIMPLICITY HMI (Human Machine Interface) systems, 138 SCADA (Supervisory Control and Data Acquisition) systems, 138 TRITON malware, 53 INDUSTROYER, 145,146-48,149, 150,200 information communications and technologies (ICTs), 43-44 information technology and subversion, 42-59. See also cyber operations insider threats, 197-98,199 in cybersecurity, 220 intelligence, 5-6,7 artificial intelligence, 226-27 collection activity, 65,71,82-84,192-93 byKSC.84,86 ' by Ukrainian KGB, 85 CyberBerkut, 132 Israel’s intelligence service, 219 by KGB agent(s) in Czechoslovakia, 7273,74,76-77,108 open-source intelligence, 4-5,14 operations, 7-8 in Greece, 27-28 Russian intelligence services in Ukraine, 151-52,162 GRU, 163,181-82 Russian intelligence services to Chernobyl, 195-96 slanted intelligence, 82,91,17677,187-88 theory, 1-2 “threat intelligence” providers, 54 Ukrainian intelligence services, 14144,193 WhisperGate, 179-80 intensity, in subversive trilemma, 4,12, 13/, 13-14,35-38,40-41,42-43, 55,56,57-58 BadRabbit operation, 172,180-81 control and speed and, inverse correlation between, 36,76-77,95, 100-1,179,224-25 in cyber conflicts, 57-58 333 as determinant of strategic value, 36-37 in fulfilling strategic promise, 99-100 HermeticWiper, 183-84 KHODOKI operations, 61,114 NotPetya and the limits of control, 157-64 power grid sabotage attempt in April 2022,202 in PROGRESS operations, 61 Soviet Union over Czechoslovakia, 92-93 international relations theory, 7 IsaacWiper, 184-85 Kalugin, Oleg, 91
Kalynivka, arms depot explosion in, 150-53 Katana malware, 182 KHODOKI campaign, 61,62-63,70-92, 208 major subversive operations, 72 exploitation mechanism, 75 fake arms caches influence, 77,79 KGB, errors by, 76-77 kidnapping leading intellectuals, 72 planting false flag “evidence,” 76 using GROMOV, 73,74 using GURYEV, 73,74 weakening the liberalization movement, 72 KHODOKI Redux, 104-10 “Aeroflot Incident,” 104-10 Dubceks “conspiracy theory” flaws, 107 Vltava radio station, 104-5 Zpravy magazine, 104-5 Kievoblenergors, 137 KillDisk malware, 139,154,156-57 Kluyev, Andriy, 187-88 Kolder, Drahomir, 84-85 Kolesnichenko, Vadim, 124 Kovalchuk, Vsevolod, 146 Koval, Nikolay, 133,148-49,163-64 KRAVCHENKO illegal agent, 110 Kremlin Brezhnev doctrine and, 69 “Complex of Measures” document, 119-20,122
334 INDEX Kremlin (cent.) cyber-enabled subversion against Ukraine by, 119-22 Euromaidan movement, 122 leaked documents and emails, 4-5 “loss” of Czechoslovakia, prevention plans, 67,98-99,109 Prague Spring and, 60,63-70 Prozumenshchikov’s analysis of, 68,116 reliance on diplomacy, force, and subversion, 64 subversive activities by, 101-2,117-18 taking Crimea, contingency plan, 124-29 in Ukraine invasion, 2022,176-78 economic and psychological (cyber) warfare, 178,187-88 subversion in the service of force, 188-96 Krivosheev, Vladlen, 78 Kryvoruchko, Serhiy, 194-95 Kyiv Blackout, 2016 (Ukraine), 144-50 destructive potential of malware, 146 development time, 145-46 effects and strategic value, 150 failure of malware, 148-50 INDUSTROYER developed, 145,14648,149,150 Severyana power substation de energized, 145 signaling interpretations and problems, 146-49 Lappi, Leo, 102-3,111-12 Lavrov, Sergej, 177 Lenin, Vladimir, 8 Makhalkina, Μ., 121 Malofeev, Konstantin, 123 Markovets, Sergiy, 163-64 Medvedchuk, Viktor, 196 Medvedev, Dmitry, 142 military escalation, 10,213,214-15,218 Ministry of Finance compromise, 2016,154-57 development time, 154-55 effects and strategic value, 155 KillDisk malware, 154 vulnerabilities exploited, 156-57 Mirai malware, 182 Moonraker worm, 159 Morris, Robert Tappan, 54-55 “Morris worm,” 54-55 Naftogaz, 197-98 Nalivaychenko, Valentin, 127-28 Narozhnyy, Pavlo, 168-69 Naumov, Andriy, 195-96 nonintervention principle, 29-30 NotPetya malware, 157-64 AES-NI cybercrime tool, 161 collateral damage and loss of control, 157-64 data and computers, disabled, 157-58
development time, 159 disk wiping functionality 158-59 effects and strategic value, 153,160-61 163,172 supply-chain mechanism, 159-60,162 XData., 159,161 Novikov, Andrey, 126-27,130 Novotny, Antonin, 64 Nye, Joseph, 20,140-41 October CMS exploited, 178-79,180-81 Ohryzko, Volodymyr, 120-21 Pachman, Ludek, 110 Parubiy, Andriy, 151-52 persistent engagement, 6 and erosion, 219-20 limitations, 50 phishing, 47-48,137 exploitation by, 44 to exploit software vulnerabilities, 46 by Sandworm, 134,154-55 Podesta, John, 44 Poroshenko, Petro, 158 power as an essential contested concept, 18 diplomacy as an instrument of, 19 force as an instrument of, 19-20 and subversion, 17-41 in world politics, 18-20 power grid sabotage operation, 154,157, 159,172
INDEX Prague Spring (1968-1973), crushing the, 60-116. See also KHODOKI Redux “armed counterrevolution,” 62 contingency planning, failure and fallback to, 86-92 KHODOKI failure, 90-91 PROGRESS failure, 90-91 failed coup and tanks in Prague, 92-99 ambitious operational design, 98-99 constraints posed by the trilemma, 95 Czechoslovak radio stations continued operation, 96 lack of adequate preparation, 97 military invasion, 93 public resistance, 98 regime change failure, 93,94-95 subversive actors influence, 93-94 "illegal" spying activities, 67-68 intelligence collection activity, 65 KHODOKI campaign, 61,62-63,70-92 Kremlin perception and strategic goals, 63-70 “normalization” and permanent occupation, 99-113 illegal agents role deepened, 102-3 KHODOKI operations, scaled down, 100-1 “massive interference,” 101-2 PROGRESS, lack of impact from, 103-4 PROGRESS and a normalization incomplete, 110-13 disillusionment with the reformist leaders, 112-13 economic recovery from 1972,112-13 PROGRESS campaign, 61,62-63, 70-92 “Silent Invasion,” commencing, 70-92 operational timelines, 71 training, 71 subversion and military force, 67 Prochizka, Jan, 72-73,74 PROGRESS campaign, 61,62-63,70-92, 208 and a normalization incomplete, 110-13 335 subverting government and civil society, 81-86 established network of spies and informers, 82-83 GROMOV agent, 81-82 GURYEV agent, 81-82 HUMINT collection, 84 KGB records on Czechoslovakia, 83/ SADKO agent, 81-82 YEFRAT agent, 81-82 YEVDOKIMOV agent, 81-82 Prykarpattyaoblenergo, 137 psychological vulnerability, 7,21 public opinion, subversion
influencing, 26 Putin, Vladimir, 121,146-47,177,196 Python/TeleBot.A malware, 159 quality of subversion, 38-41,57-59 continuity over change in, 57-59 independent and a complementary strategic role, 57 secret exploitation and manipulation, 57 subversive trilemma persisting, 57-58 defining, 38-41 operational trilemma, 39 significant strategic value, 38-39 quantity over quality, 207-27 regime change, subversion in, 27 Russia’s invasion of Ukraine, 2022,174206. See also “hybrid war,” Russia against Ukraine (2013-2018) BootPatch malware, 179-80 botched coup, 187-88 botnet operation, 181-82 CaddyWiper malware, 185-86 critical infrastructure sabotage, 196-201 attack enabled by territorial conquest, 197-98 defacements, 178-87 distributed denial of service (DDoS), 178-87 DNSs targeted, 182 economic and psychological (cyber) warfare, 178-87
336 INDEX Russia’s invasion of Ukraine, 2022 (cont.) "HermeticWiper" malware, 183-84 IsaacWiper, 184-85 Katana malware, 182 Kremlin perception and goals, 176-78 October CMS exploited, 178-79,180-81 subversion in the service of force, 188-96 AcidRain malware, 191 KA-SAT disruption, 190,191-92 WhisperGate malware, 179,180,181 Whisper-Kill malware, 179 WhiteBlackCrypt, 179-80 wipers, 178-87 sabotage. See also critical infrastructure sabotage curious case of the artillery, 167-69 cyber operations best suited for, 46 cyber versus traditional subversion, 135-53,1361,209-10,219 Kalynivka, arms depot explosion in,150-53 KGB operation in Greece, 27-28 of a power substation in Germany, by a KGB agent, 23 Russian-sponsored cyber operations against Ukraine in, 118 Stuxnet operation, 10 as subversive operations goal, 8,26 Ukraine’s Ministry of Finance compromise (2016), 154-57 Ukraine’s power grid, 2-3 Ukrtelecom disruption, 201 “unknown unknowns” risk in, 34 Viasat compromise, 201 Sagatelyan, Mikhail, 84-86,87 Sandworm hacking group, 133-34 economic warfare, Sandworm’s pivot to scale, 153-67 Sandworm I (2015 Blackout), 136-41 (see also 2015 Blackout) Sandworm II (2016 Kyiv Blackout), 144-50 (see also Kyiv Blackout, 2016) Sandworm III, (Ministry of Finance compromise, 2016), 154-57 (see also Ministry of Finance compromise, 2016) Sandworm IV (NotPetya and the limits of control), 157-64 (see also NotPetya malware) Sandworm V (BadRabbit), 164-67 (see also BadRabbit ransomware) SCADA (Supervisory Control and Data Acquisition) systems, 138. See also industrial control system (ICS) GE
CIMPLICITY HMI (Human Machine Interface) systems, 138 Sivkovich, Vladimir, 187-88 Smrkovsky, Josef, 84-86,104-5 “social engineering,” 44 social vulnerabilities, 7,11 -12,21,44,5253,134,137 speed, in subversive trilemma, 4,12,13/ 13-14,35-38,40-41,42-43,55, 56,57-58 BadRabbit operation, 172,180-81 control and intensity and, inverse correlation between, 36,76-77,95, 100-1,179,224-25 in cyber conflicts, 57-58 in fulfilling strategic promise, 99-100 HermeticWiper, 183-84 as key determinant of strategic value, 36-37 KHODOKI operations, 61,114 NotPetya and the limits of control, 157-64 power grid sabotage attempt in April 2022,202 in PROGRESS operations, 61 Soviet Union over Czechoslovakia, 92-93 spies, 53 advantages, 17-18 cautions to follow, 33 exploiting flawed security rules and practices, 23 exploiting individual-level vulnerabilities, 23 force and coercion use by, 23-24,33 illegals, definition, 67-68 in PROGRESS, 102-4 risks, 37 as subversion key tool, 17-18,23 traditional subversion using, 11-12 undercover spies, 26-28,225
INDEX stability and subversion, 207,213 Stoltenberg, Jens, 190 Stuxnet, 10-11,47-48,52-53,56,14647,219 subversion. See also quality of subversion alternate explanations and limitations, 221-27 basic conditions of, 31-34 available target with suitable vulnerabilities, 31-32 exploiting vulnerability without being discovered, 34-36 subversive agent with suitable abilities, 32-33 falters for Russia, 122-24 force and warfare versus, 7 influencing government policy, 26 influencing public opinion, 26 influencing target state’s material capabilities, 26 as an instrument of power, 5,7 limits of, 113-16 constraints and trade-offs predicted by trilemma, 114 dependence on vulnerabilities in societies, 116 reliance on illegal agents, 113-14 use of force, 114 new possibilities and new perils, 207 nonmilitary options as, 7-8 offering strategic potential, 29 and power, 17-41 power through exploitation and manipulation, 21-25 reduces cost of escalation, 29 reduces follow-on costs, 30 in regime change, 27 in the service of force, 188-96 speed, intensity, and control variables and, 35-37 spies as key tools of, 23 strategic potential in scholarship and strategy, 5-6 strategic role and promise of, 25-31 targeting systems, 22 technological change changing, 5 trilemma and strategic value, 31-38 types of effects, 50 337 undermining institutional effectiveness, 26-27 use in invasion, 211 in war, 174-206 (see also Russia’s invasion of Ukraine) subversive election interference, 20142015,131-35 subversive trilemma, 11,12-13,13/, 16,52-58 limiting strategic value, 31-38,90 control over effects, 34,104
intensity of effects, 32-33 in speed, 31-32 Surkov, Vladislav, 14,123,126 Surzhaninov, Vladimir, 71 Svoboda, Ludvik, 93-94,105 tactical sabotage, 167-69 Ukrainian D-30 artillery, 168 tactics, techniques, and procedures (TTPs), 54 technical vulnerability, 43,44,45, 52-53 TeleBots group, 141 Townsend, Sean, 148-49,168 traditional sabotage 1,2015 Crimea Blackout, 141-44 traditional subversion, 3-4,5-6,8,24,5556,60-116. See also Prague Spring (1968-1973), crushing the vis-a-vis cyber-enabled subversion, 4-5 traditional versus cyber sabotage, 13553,136t TRITON malware, 53,55 Turchynov, Oleksandr, 152-53 Ukraine Cyber Alliance, 123 Ukraine’s Ministry of Finance compromise (2016), 154-57 power grid sabotage operation 2015,157,159,172 2022,202 Ukraine’s State Service of Special Communications and Information Protection (SSSCIP), 179-80, 186,189,197-99 Ukrainian D-30 artillery and the tactical sabotage, 168 Ukrenergo, 143-44
338 INDEX Ukrtelecom disruption, 201 Umnov, V., 71 Vaculik, Ludvik, 81-82 Venediktova, Irina, 194-95 Viasat compromise, 201 Vltava radio station, 104-5 vulnerability in adversary systems, 41 agents using, 24 cyber operations exploiting, 43-44 identifying, 12,21,31-32, 52-53,80-81 in information communications and technologies (ICTs), 43-44,48,49 individual-level vulnerabilities, 23 INDUSTROYER exploiting, 149 NotPetya malware exploiting, 157-58 in October CMS, 178-79 psychological, 7,21 social, 44, 52-53,134,137 sociological, 7,11-12,21 software vulnerabilities, 46 spies exploiting, 23-24 subversion depends on, 31,116,129-30, 210,226 subversive operations using, 26,39,42 technical, 43,44,45,52-53 ofUkraine, 140-41,146,156 ofVPN devices, 191 zero-day, 138 warfare and diplomacy, 1-2,19,21 website defacements (Ukraine), 178-87 WhisperGate malware, 179,180,181 WhisperKill malware, 179 WhiteBlackCrypt, 179-80 world politics, power in, 18-20 world politics, subversion implications for, 211-21 balance of power remains unaffected, 212-13 destabilizing mass effects and systemic disruption risk, 215-16 increases the risk of unintended/ inadvertent escalation, 216-19 stabilizes world politics, 213 state-society and states-nonstate actors relations impacted, 221 traditional subversion still more relevantin, 219-20 XData malware, 159,161 , Yakovlev, Aleksandr, 96 Yanukovych, Viktor, 117-18,121-22, 124-26,130 Yuryevich, Sergey, 123 Zatulin, Konstantin, 126 Zelenskiy, Volodymyr, 187,194-95 zero-dayvulnerability, 138 Zhivkov, 84-85 Zhora, Victor, 132,133,134,148-49,180, 186,189,202-205
Zpravy magazine, 104-5 Bayerische Staatsbibliothek München |
any_adam_object | 1 |
author | Maschmeyer, Lennart |
author_GND | (DE-588)1228343632 |
author_facet | Maschmeyer, Lennart |
author_role | aut |
author_sort | Maschmeyer, Lennart |
author_variant | l m lm |
building | Verbundindex |
bvnumber | BV049699341 |
contents | Subversion and Power -- Information Technology and Subversion -- Traditional Subversion : Crushing the Prague Spring 1968-1973 -- Cyber-Enabled Subversion : Russia's 'Hybrid War' against Ukraine 2013-2018 -- Subversion in War : Russia's full-scale Invasion of Ukraine since February 2022 -- New possibilities and new perils |
ctrlnum | (OCoLC)1446252475 (DE-599)BVBBV049699341 |
era | Geschichte 1968- gnd |
era_facet | Geschichte 1968- |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049699341</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240828</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">240528s2024 a||| b||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780197745861</subfield><subfield code="c">paperback</subfield><subfield code="9">978-0-19-774586-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780197745854</subfield><subfield code="c">hardback</subfield><subfield code="9">978-0-19-774585-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1446252475</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049699341</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">OST</subfield><subfield code="q">DE-12</subfield><subfield code="2">fid</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Maschmeyer, Lennart</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1228343632</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Subversion</subfield><subfield code="b">from covert operations to cyber conflict</subfield><subfield code="c">Lennart Maschmeyer</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">From covert operations to cyber conflict</subfield></datafield><datafield tag="246" ind1="1" ind2="0"><subfield code="a">From covert operations to cyber conflict</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Oxford University Press</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">x, 338 Seiten</subfield><subfield code="b">Illustrationen</subfield><subfield code="c">23,5 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Subversion and Power -- Information Technology and Subversion -- Traditional Subversion : Crushing the Prague Spring 1968-1973 -- Cyber-Enabled Subversion : Russia's 'Hybrid War' against Ukraine 2013-2018 -- Subversion in War : Russia's full-scale Invasion of Ukraine since February 2022 -- New possibilities and new perils</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"In 2014, Russia launched a "Hybrid War" against Ukraine that, according to some, ushered in a revolution in conflict. The term is notoriously vague, referring to all measures short of war states use to attain strategic aims. States, of course, have long used measures in the "gray zone" between war and peace. Yet they did not always have the Internet."--</subfield></datafield><datafield tag="648" ind1=" " ind2="7"><subfield code="a">Geschichte 1968-</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hybridkrieg</subfield><subfield code="0">(DE-588)107366371X</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Subversion</subfield><subfield code="0">(DE-588)4213485-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Russland</subfield><subfield code="0">(DE-588)4076899-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Sowjetunion</subfield><subfield code="0">(DE-588)4077548-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Hybrid warfare / Russia (Federation)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science) / Russia (Federation)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Subversive activities / Russia (Federation)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Disinformation / Russia (Federation)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Psychological warfare / Russia (Federation)</subfield></datafield><datafield tag="653" ind1=" " ind2="2"><subfield code="a">Russia (Federation) / Foreign relations / Ukraine</subfield></datafield><datafield tag="653" ind1=" " ind2="2"><subfield code="a">Ukraine / Foreign relations / Russia (Federation)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Guerre hybride / Russie</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberguerre (Science militaire) / Russie</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Activités subversives / Russie</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Désinformation / Russie</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Guerre psychologique / Russie</subfield></datafield><datafield tag="653" ind1=" " ind2="2"><subfield code="a">Ukraine / Relations extérieures / Russie</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sowjetunion</subfield><subfield code="0">(DE-588)4077548-3</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Russland</subfield><subfield code="0">(DE-588)4076899-5</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Subversion</subfield><subfield code="0">(DE-588)4213485-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Hybridkrieg</subfield><subfield code="0">(DE-588)107366371X</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Geschichte 1968-</subfield><subfield code="A">z</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Online version</subfield><subfield code="a">Maschmeyer, Lennart, 1984-</subfield><subfield code="t">Subversion</subfield><subfield code="d">New York, NY : Oxford University Press, [2024]</subfield><subfield code="z">9780197745885</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSB München - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSB München - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Literaturverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSB München - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000005&line_number=0003&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Register // Gemischte Register</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSB München - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000007&line_number=0004&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSB München - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000009&line_number=0005&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Literaturverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSB München - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000011&line_number=0006&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Register // Gemischte Register</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="n">oe</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">BSB_NED_20240828</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090513</subfield><subfield code="g">471</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">909</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090513</subfield><subfield code="g">477</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">09046</subfield><subfield code="g">947.08</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">909</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield><subfield code="g">477</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">909</subfield><subfield code="e">22/bsb</subfield><subfield code="f">09046</subfield><subfield code="g">437</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield><subfield code="g">471</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">09047</subfield><subfield code="g">947.08</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035041778</subfield></datafield></record></collection> |
geographic | Russland (DE-588)4076899-5 gnd Sowjetunion (DE-588)4077548-3 gnd |
geographic_facet | Russland Sowjetunion |
id | DE-604.BV049699341 |
illustrated | Illustrated |
indexdate | 2024-11-11T09:06:55Z |
institution | BVB |
isbn | 9780197745861 9780197745854 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035041778 |
oclc_num | 1446252475 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | x, 338 Seiten Illustrationen 23,5 cm |
psigel | BSB_NED_20240828 |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Oxford University Press |
record_format | marc |
spelling | Maschmeyer, Lennart Verfasser (DE-588)1228343632 aut Subversion from covert operations to cyber conflict Lennart Maschmeyer From covert operations to cyber conflict New York, NY Oxford University Press [2024] x, 338 Seiten Illustrationen 23,5 cm txt rdacontent n rdamedia nc rdacarrier Subversion and Power -- Information Technology and Subversion -- Traditional Subversion : Crushing the Prague Spring 1968-1973 -- Cyber-Enabled Subversion : Russia's 'Hybrid War' against Ukraine 2013-2018 -- Subversion in War : Russia's full-scale Invasion of Ukraine since February 2022 -- New possibilities and new perils "In 2014, Russia launched a "Hybrid War" against Ukraine that, according to some, ushered in a revolution in conflict. The term is notoriously vague, referring to all measures short of war states use to attain strategic aims. States, of course, have long used measures in the "gray zone" between war and peace. Yet they did not always have the Internet."-- Geschichte 1968- gnd rswk-swf Hybridkrieg (DE-588)107366371X gnd rswk-swf Subversion (DE-588)4213485-7 gnd rswk-swf Russland (DE-588)4076899-5 gnd rswk-swf Sowjetunion (DE-588)4077548-3 gnd rswk-swf Hybrid warfare / Russia (Federation) Cyberspace operations (Military science) / Russia (Federation) Subversive activities / Russia (Federation) Disinformation / Russia (Federation) Psychological warfare / Russia (Federation) Russia (Federation) / Foreign relations / Ukraine Ukraine / Foreign relations / Russia (Federation) Guerre hybride / Russie Cyberguerre (Science militaire) / Russie Activités subversives / Russie Désinformation / Russie Guerre psychologique / Russie Ukraine / Relations extérieures / Russie Sowjetunion (DE-588)4077548-3 g Russland (DE-588)4076899-5 g Subversion (DE-588)4213485-7 s Hybridkrieg (DE-588)107366371X s Geschichte 1968- z DE-604 Online version Maschmeyer, Lennart, 1984- Subversion New York, NY : Oxford University Press, [2024] 9780197745885 Digitalisierung BSB München - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung BSB München - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Literaturverzeichnis Digitalisierung BSB München - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000005&line_number=0003&func_code=DB_RECORDS&service_type=MEDIA Register // Gemischte Register Digitalisierung BSB München - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000007&line_number=0004&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung BSB München - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000009&line_number=0005&func_code=DB_RECORDS&service_type=MEDIA Literaturverzeichnis Digitalisierung BSB München - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000011&line_number=0006&func_code=DB_RECORDS&service_type=MEDIA Register // Gemischte Register |
spellingShingle | Maschmeyer, Lennart Subversion from covert operations to cyber conflict Subversion and Power -- Information Technology and Subversion -- Traditional Subversion : Crushing the Prague Spring 1968-1973 -- Cyber-Enabled Subversion : Russia's 'Hybrid War' against Ukraine 2013-2018 -- Subversion in War : Russia's full-scale Invasion of Ukraine since February 2022 -- New possibilities and new perils Hybridkrieg (DE-588)107366371X gnd Subversion (DE-588)4213485-7 gnd |
subject_GND | (DE-588)107366371X (DE-588)4213485-7 (DE-588)4076899-5 (DE-588)4077548-3 |
title | Subversion from covert operations to cyber conflict |
title_alt | From covert operations to cyber conflict |
title_auth | Subversion from covert operations to cyber conflict |
title_exact_search | Subversion from covert operations to cyber conflict |
title_full | Subversion from covert operations to cyber conflict Lennart Maschmeyer |
title_fullStr | Subversion from covert operations to cyber conflict Lennart Maschmeyer |
title_full_unstemmed | Subversion from covert operations to cyber conflict Lennart Maschmeyer |
title_short | Subversion |
title_sort | subversion from covert operations to cyber conflict |
title_sub | from covert operations to cyber conflict |
topic | Hybridkrieg (DE-588)107366371X gnd Subversion (DE-588)4213485-7 gnd |
topic_facet | Hybridkrieg Subversion Russland Sowjetunion |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000005&line_number=0003&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000007&line_number=0004&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000009&line_number=0005&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035041778&sequence=000011&line_number=0006&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT maschmeyerlennart subversionfromcovertoperationstocyberconflict AT maschmeyerlennart fromcovertoperationstocyberconflict |
Es ist kein Print-Exemplar vorhanden.
Inhaltsverzeichnis