206
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Supporting Resistance Movements in Cyberspace

&

REFERENCES

  • Army Techniques Publication 3-05.1. (2013). Unconventional warfare. Washington, DC: U.S. Department of Defense.
  • Chenoweth, E., Stephan, M., & Stephan, M. (2011). Why civil resistance works: The strategic logic of nonviolent conflict. New York: Columbia University Press.
  • Darczewska, Jolanta. (2014). The anatomy of Russian information warfare. The Crimean operation,a case study. Ośrodek Studiów Wschodnich im. Marka Karpia.
  • Duggan, P. (2014a, March). UW in cyberspace. Special Warfare, 27(1), 68–70.
  • Duggan, P. (2014b, January). Man, computer, and special warfare. Retrieved from https://smallwarsjournal.com/jrnl/art/man-computer-and-special-warfare
  • Duggan, P. (2016, January). Why special operations forces in US cyber-warfare? Cyber Defense Review, 1(2), 3–79.
  • Galeotti, M. (2015). “Hybrid war” and “little green men”: How it works, and how it doesn’t. In Ukraine and Russia: People, politics, propaganda and perspectives. Bristol, U.K.: E-International Relations Publishing. https://www.e-ir.info/2015/04/16/hybrid-war-and-little-green-men-how-it-works-and-how-it-doesnt/
  • Hancock, J. T. (2007). Digital deception: why, when, and how people lie online. In Adam N. Joinson, Katelyn Y. A. McKenna, Tom Postmes, and Ulf-Dietrich Reips. (Ed.), The oxford handbook of internet psychology, pp. 287-301. Oxford: Oxford University Press.
  • Harrison, T. (2014). Chaos and uncertainty: The FY2014 defense budget and beyond. Washington, DC: U.S. Center for Strategic and Budgetary Assessment.
  • Irwin, W. (2009). The Jedburghs: The secret history of the allied special forces, France 1944. New York, NY: PublicAffairs.
  • Kofman, M., Migacheva, K., Nichiporuk, B., Radin, A., & Oberholtzer, J. (2017). Lessons from Russia’s operations in crimea and Eastern Ukraine. Santa Monica, CA: Rand Corporation.
  • Lange-Lonatamishvili, E. (2014). New face of war: Lessons for Georgia. Riga, Latvia: NATO StratCom Center of Excellence.
  • McRaven, W. H. (1996). Spec ops: Case studies in special operations warfare theory and practice. New York, NY: Presidio Press.
  • Meadows, D. (2014, September). Understanding Russia’s proxy war in Eastern Ukraine Retrieved from http://euromaidanpress.com/2014/09/14/understanding-russias-proxy-war-in-eastern-ukraine/
  • Namestnikov, Y. (2009). The economics of botnets. Analysis on Viruslist. Com, Kapersky Lab
  • Ottis, R. (2008). Analysis of the 2007 cyber attacks against Estonia from the information warfare perspective. In Proceedings of the 7th European Conference on Information Warfare (p. 163). Plymouth, United Kingdom.
  • Pascoli, S., & Grzegorzewski, M. (2021). Technology adoption in unconventional warfare. Cyber Defense Review. forthcoming.
  • Robinson, G. (2004). Islamic activism: A social movement theory approach. Monterrey, CA: Naval Post Graduate School.
  • Rõigas, H., & Geers, K. (2015). The Ukraine crisis as a test for proposed cyber norms. In T. K. Geers (Ed.), Cyber war in perspective: Russian aggression against Ukraine, pp. 135-144. : NATO CCD COE Publications.
  • Scott, J. (2018). Information warfare: The meme is the embryo of the narrative illusion. Washington, DC: Institute for Critical Infrastructure Technology Press.
  • Singer, P. W., & Brooking, E. T. (2018). LikeWar. New York, NY: Houghton Mifflin Harcourt.
  • Swinhoe, D. (2020). How much does it cost to launch a cyberattack? Retrieved from https://www.csoonline.com/article/3340049/how-much-does-it-cost-to-launch-a-cyberattack.html
  • U.S. Senate, 116th Congress. (2020). Russian active measure’s campaigns and interference in the 2016 U.S. Election. Washington, DC: Library of Congress.
  • US Army Special Operations Command. (2019). A Resistance Manual. Fort Bragg, NC: The United States Army Special Operations Command Press.
  • Volz, D. (2016, February 25). US government concludes cyber attack caused Ukraine power outage. Reuters.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.