ABCDEFGHIJKLMNOPQRSTUVWXYZ
1
PaperAuthorLinkGradeDA CommentsReview Links
ADD YOURSELF HERE
5
Rapid capabilities generation and prompt effects in offensive cyber operationsJD WorkTechnology and The Cyber Domain: Implications for Intelligence. International Studies Association Annual Conference. Las Vegas. April 2021.AExplains the ops against bot networks from USCC
6
Successful counter-cyber operations secure US electionJD WorkJanes Intelligence Review | March 2021APoints out a subtle area of PE in terms of judging success and failure...
7
Early intelligence assessments of COMBLOC computingJD WorkJD Work (2021) Early intelligence assessments of COMBLOC computing, Journal of Intelligence History, DOI: 10.1080/16161262.2021.1884791AVery much worth a read. Not just about the past.
13
Troubled vision: Understanding recent Israeli–Iranian offensive cyber exchangesJD Work, Richard Harknetthttps://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/troubled-vision-understanding-israeli-iranian-offensive-cyber-exchanges/ABest starter paper on PE
15
Public attribution of cyber intrusionsFlorian J Egloffdoi: 10.1093/cybsec/tyaa012A
17
Who Hath Measured the (Proving) Ground: Variation in Offensive Capabilities Test and EvaluationJD Workhttps://osf.io/preprints/socarxiv/p92tn/AThere was some stuff in here I didn't know about how history played out (i.e. this is a paper where public facts get reinterpreted in a way that surprises you).
19
Offensive Cyber Operations and Future Littoral Operating ConceptsJD Workhttps://digitalcommons.usf.edu/mca/vol5/iss1/3/AI need to do a second big readthrough but the argument is this: Lots of 0day exists in the systems people rely on for military operations. Finding and using this 0day is possible over long time periods. This can produce important military effects on the battlefield. When you don't see effects happening , it can be mean several things - one of which is that you didn't prepare properly and one is that you didn't see it. (Came out the day that USUKEU announced the russian attack on VIASAT)
39
Daniel Moorehttps://ccdcoe.org/uploads/2018/10/Art-05-Targeting-Technology.-Mapping-Military-Offensive-Network-Operations.pdfBThis is a taxonomy, mostly, which is a good overview but does not push too far into the wacky corners. I feel like it sets the ground for a future paper (which is probably already written and sitting in an email queue somewhere).
42
In Defense of Pure Sovereignty in CyberspaceKevin Jon Hellerhttps://digital-commons.usnwc.edu/ils/vol97/iss1/50/BLots of weird logical flaws. I need to do a whole video on it (DONE). He write a big twitter thread response here: https://twitter.com/kevinjonheller/status/1455938399400079362?s=20https://www.youtube.com/watch?v=uzqKRk87dTI&t=1255s&ab_channel=DaveAitel
49
Cyber Arms Transfer: Meaning, Limits and ImplicationsMax Smeetshttps://papers.ssrn.com/sol3/papers.cfm?abstract_id=3913529U
50
51
52
53
MAX SMEETS SECTION
https://twitter.com/Maxwsmeets/status/1434813510895210497?s=20
https://twitter.com/Maxwsmeets/status/1434816398585475072?s=20
54
"What's in a Name? Metaphors and Cybersecurity" 2021 - On the cyber domain as a foundational metaphor.@Prof_J_Branchhttps://www.cambridge.org/core/journals/international-organization/article/abs/whats-in-a-name-metaphors-and-cybersecurity/563998100A2FAF1E5DFDB5C52EC68569
55
"The ontological politics of cyber security: Emerging agencies, actors, sites, and spaces" 2021 - on complex and transformative dynamics of ICT and new actors -
@TobiasLiebetrau & Christensenhttps://www.cambridge.org/core/journals/european-journal-of-international-security/article/abs/ontological-politics-of-cyber-security-emerging-agencies-actors-sites-and-spaces/C716686BE6E4D753D80414F7824A0BAD
56
"Redefining deterrence in cyberspace: Private sector contribution to national strategies of cyber deterrence," 2021 - on desirability of private sector contribution to cyber deterrence
Lillihttps://www.tandfonline.com/doi/full/10.1080/13523260.2021.1882812
57
"Cyber offense in NATO: Challenges and opportunities", 2021 On NATO's role in the cyber domain and ways to adapt.@jeppeteglskovhttps://academic.oup.com/ia/article-abstract/97/3/703/6205395?redirectedFrom=fulltext
58
"Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy" 2021, on international diplomacy on cyber terrorism based on UN dynamics
@DennisBroeders @cristiano_fabhttps://www.tandfonline.com/doi/full/10.1080/1057610X.2021.1928887
59
"State-industry relations and cybersecurity governance in Europe" 2021, focuses on role private sector companies in Europe (UK & FR focus)
Calcara & Marchettihttps://www.tandfonline.com/doi/abs/10.1080/09692290.2021.1913438?journalCode=rrip20
60
"Publicly attributing cyber attacks: a framework", 2021, Provides (policy) framework for state-level public attribution,@egflo @Maxwsmeetshttps://www.tandfonline.com/doi/full/10.1080/01402390.2021.1895117
61
"The Case for Cyber ‘Disarmament’ in the European Union" 2021, On the importance of arms control treaties (for the EU).Benincasahttps://www.tandfonline.com/doi/abs/10.1080/03932729.2021.1872200?journalCode=rspe20
62
"International trade and cyber conflict: Decomposing the effect of trade on state-sponsored cyber attacks" 2021, relationship between cyber ops and trade.
@william_akotohttps://journals.sagepub.com/doi/abs/10.1177/0022343320964549?journalCode=jpra
63
"A fragile public preference for cyber strikes: Evidence from survey experiments in the United States, United Kingdom, and Israel" 2021,
Schandler, Gross and Canettihttps://www.tandfonline.com/doi/abs/10.1080/13523260.2020.1868836?journalCode=fcsp20
64
"Hyper-Securitization, Everyday Security Practice and Technification: Cyber-Security Logics in Switzerland," 2021, case study of Swiss cyber security 'construction'
@CyberMyri @egflohttps://onlinelibrary.wiley.com/doi/abs/10.1111/spsr.12433
65
"Contested public attributions of cyber incidents and the role of academia" , 2020, On role academia in relation to (public) attribution through 3 cases - Sony Pictures, DNC & NotPetya
@egflohttps://www.tandfonline.com/doi/full/10.1080/13523260.2019.1677324
66
"Against sovereignty in cyberspace," `2020, on distinct characteristics of cyberspace, its relationship with to territoriality and sovereignty.
@miltonmuellerhttps://academic.oup.com/isr/article-abstract/22/4/779/5572338?redirectedFrom=PDF
67
"US cyber deterrence: Practice guiding theory," 2020, Implementation of US deterrence,Wilnerhttps://www.tandfonline.com/doi/abs/10.1080/01402390.2018.1563779?journalCode=fjss20
68
"Cyber security meets security politics: Complex technology, fragmented politics, and networked science" 2021, On the study of cyber security politics (and its future)
@CyberMyri & Wengerhttps://www.tandfonline.com/doi/full/10.1080/13523260.2019.1678855
69
"Cyber campaigns and strategic outcomes," 2020, on cyber campaigns below the threshold of armed attack,@harknett_uc @Maxwsmeetshttps://www.tandfonline.com/doi/full/10.1080/01402390.2020.1732354
70
The unexpected norm-setters: Intelligence agencies in cyberspace, 2020, On the intelligence agencies' role as norm setters in the cyber domain
@Ilina_Gvahttps://www.tandfonline.com/doi/full/10.1080/13523260.2019.1677389
71
"Beyond Naming and Shaming: Accusations and International Law in Cybersecurity", 2020, On how accusations offer actors a range of strategic options@DuncanHollis
& Finnemore,
https://academic.oup.com/ejil/article/31/3/969/5904502
72
"At Home and Abroad: The Use of Denial-of-service Attacks during Elections in Nondemocratic Regimes" 2020, on how elections increase the number of DoS attacks in authoritarian countries
@philutschttps://journals.sagepub.com/doi/full/10.1177/0022002719861676
73
"Demystifying the Quantum Threat: Infrastructure, Institutions, and Intelligence Advantage," 2020, On the promise of quantum computing,
@jonrlindsayhttps://www.tandfonline.com/doi/abs/10.1080/09636412.2020.1722853?journalCode=fsst20
74
"Cyber Terrorism and Public Support for Retaliation - A Multi-Country Survey Experiment," 2020, On whether exposure to cyber terrorism prompt calls for retaliatory military strikes
Schandler, Gross, Blackhouse, Canenttihttps://www.cambridge.org/core/journals/british-journal-of-political-science/article/cyber-terrorism-and-public-support-for-retaliation-a-multicountry-survey-experiment/179C0560441076100DB4A4E5BBCB992F
75
"Bipolar Rivalry in the Early Digital Age," 2020, on the future of US -China rivalry, including the role of cyber opsYanhttps://academic.oup.com/cjip/article/13/3/313/5854839
76
"Lacan in the US cyber defence: Between public discourse and transgressive practice," 2020, on the constitutive role of transgressive practices for security communities
@jeppeteglskovhttps://www.cambridge.org/core/journals/review-of-international-studies/article/abs/lacan-in-the-us-cyber-defence-between-public-discourse-and-transgressive-practice/38646AE140D77651862DCD1683BFBF35
77
"Beyond tit-for-tat in cyberspace: Political warfare and lateral sources of escalation online” 2020, On escalation as second-order effect (through US 2016 case study)
Whytehttps://www.cambridge.org/core/journals/european-journal-of-international-security/article/abs/beyond-titfortat-in-cyberspace-political-warfare-and-lateral-sources-of-escalation-online/AAA1261224FBFB43826B42ADF5BCC4B8
78
“Research Note: More Bucks, Still No Bangs? Why a Cost-Benefit Analysis of Cyberterrorism Still Holds True,” 2020, review last 15 years in cyberterrorism research,
Giacomellohttps://www.tandfonline.com/doi/abs/10.1080/1057610X.2020.1822591?journalCode=uter20
79
“Cyber-noir: Cybersecurity and popular culture, 2020, on the incorporation of noir elements in cybersecurity expert discourses,@jamessshireshttps://www.tandfonline.com/doi/full/10.1080/13523260.2019.1670006
80
“Power and diplomacy in the post-liberal cyberspace.” 2020, On the geopolitics of cyberspace, 2020,Barrinha and Renardhttps://academic.oup.com/ia/article/96/3/749/5722299
81
"50 shades of hacking: How IT and cybersecurity industry actors perceive good, bad, and former hackers," 2020, on the identities, practices, and behaviors of hackers
@leotanczthttps://www.tandfonline.com/doi/abs/10.1080/13523260.2019.1669336?journalCode=fcsp20
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138