REFERENCES
- Army Techniques Publication 3-05.1. (2013). Unconventional warfare. Washington, DC: U.S. Department of Defense.
- Chenoweth, E., Stephan, M., & Stephan, M. (2011). Why civil resistance works: The strategic logic of nonviolent conflict. New York: Columbia University Press.
- Darczewska, Jolanta. (2014). The anatomy of Russian information warfare. The Crimean operation,a case study. Ośrodek Studiów Wschodnich im. Marka Karpia.
- Duggan, P. (2014a, March). UW in cyberspace. Special Warfare, 27(1), 68–70.
- Duggan, P. (2014b, January). Man, computer, and special warfare. Retrieved from https://smallwarsjournal.com/jrnl/art/man-computer-and-special-warfare
- Duggan, P. (2016, January). Why special operations forces in US cyber-warfare? Cyber Defense Review, 1(2), 3–79.
- Galeotti, M. (2015). “Hybrid war” and “little green men”: How it works, and how it doesn’t. In Ukraine and Russia: People, politics, propaganda and perspectives. Bristol, U.K.: E-International Relations Publishing. https://www.e-ir.info/2015/04/16/hybrid-war-and-little-green-men-how-it-works-and-how-it-doesnt/
- Hancock, J. T. (2007). Digital deception: why, when, and how people lie online. In Adam N. Joinson, Katelyn Y. A. McKenna, Tom Postmes, and Ulf-Dietrich Reips. (Ed.), The oxford handbook of internet psychology, pp. 287-301. Oxford: Oxford University Press.
- Harrison, T. (2014). Chaos and uncertainty: The FY2014 defense budget and beyond. Washington, DC: U.S. Center for Strategic and Budgetary Assessment.
- Irwin, W. (2009). The Jedburghs: The secret history of the allied special forces, France 1944. New York, NY: PublicAffairs.
- Kofman, M., Migacheva, K., Nichiporuk, B., Radin, A., & Oberholtzer, J. (2017). Lessons from Russia’s operations in crimea and Eastern Ukraine. Santa Monica, CA: Rand Corporation.
- Lange-Lonatamishvili, E. (2014). New face of war: Lessons for Georgia. Riga, Latvia: NATO StratCom Center of Excellence.
- McRaven, W. H. (1996). Spec ops: Case studies in special operations warfare theory and practice. New York, NY: Presidio Press.
- Meadows, D. (2014, September). Understanding Russia’s proxy war in Eastern Ukraine Retrieved from http://euromaidanpress.com/2014/09/14/understanding-russias-proxy-war-in-eastern-ukraine/
- Namestnikov, Y. (2009). The economics of botnets. Analysis on Viruslist. Com, Kapersky Lab
- Ottis, R. (2008). Analysis of the 2007 cyber attacks against Estonia from the information warfare perspective. In Proceedings of the 7th European Conference on Information Warfare (p. 163). Plymouth, United Kingdom.
- Pascoli, S., & Grzegorzewski, M. (2021). Technology adoption in unconventional warfare. Cyber Defense Review. forthcoming.
- Robinson, G. (2004). Islamic activism: A social movement theory approach. Monterrey, CA: Naval Post Graduate School.
- Rõigas, H., & Geers, K. (2015). The Ukraine crisis as a test for proposed cyber norms. In T. K. Geers (Ed.), Cyber war in perspective: Russian aggression against Ukraine, pp. 135-144. : NATO CCD COE Publications.
- Scott, J. (2018). Information warfare: The meme is the embryo of the narrative illusion. Washington, DC: Institute for Critical Infrastructure Technology Press.
- Singer, P. W., & Brooking, E. T. (2018). LikeWar. New York, NY: Houghton Mifflin Harcourt.
- Swinhoe, D. (2020). How much does it cost to launch a cyberattack? Retrieved from https://www.csoonline.com/article/3340049/how-much-does-it-cost-to-launch-a-cyberattack.html
- U.S. Senate, 116th Congress. (2020). Russian active measure’s campaigns and interference in the 2016 U.S. Election. Washington, DC: Library of Congress.
- US Army Special Operations Command. (2019). A Resistance Manual. Fort Bragg, NC: The United States Army Special Operations Command Press.
- Volz, D. (2016, February 25). US government concludes cyber attack caused Ukraine power outage. Reuters.