Bibliography
- “2022 (Q1) Report on the Performance of the Vulnerability Detection and Cyber Incident Response System.” Kyiv, Ukraine: Security Operations Centre of the State Cyber Protection Centre of the State Service of Special Communication and Information Protection of Ukraine, May 21, 2022. https://scpc.gov.ua/api/docs/4eeb6a10-b7aa-4396-8b04-e0e4b7fca1b1/4eeb6a10-b7aa-4396-8b04-e0e4b7fca1b1.pdf.
- “2022 Report on Vulnerability Detection and Cyber Incidents/Cyber Attacks Response System.” Kyiv, Ukraine: Cyber Incidents Response Operations Centre of the State Cyber Protection Centre of the State Service of Special Communication and Information Protection of Ukraine, February 16, 2023. https://scpc.gov.ua/api/docs/sseb6a10-b7aa-4396-8b04-e0e4b7fca1l2/sseb6a10-b7aa-4396-8b04-e0e4b7fca1l2.pdf.
- “2023 Performance Report of the Vulnerability Detection and Cyber Incidents/Cyber Attacks Response System.” Kyiv, Ukraine: Cyber Incidents Response Operations Centre of the State Cyber Protection Centre of the State Service of Special Communication and Information Protection of Ukraine, January 8, 2024. https://scpc.gov.ua/api/files/5386350d-d06b-4c17-99c9-f2852ea94fd0.
- Baezner, M. Cyber and Information Warfare in the Ukrainian Conflict. Zurich, CH: Center for Security Studies, ETH Zurich, October, 2018. https://www.research-collection.ethz.ch/bitstream/handle/20.500.11850/321570/20181003_MB_HS_RUS-UKRV2_rev.pdf?sequence=1.
- Barnes, J. E., H. Cooper, T. Gibbons-Neff, M. Schwirtz, and E. Schmitt. “Leaked Documents Reveal Depth of U.S. Spy Efforts and Russia’s Military Struggles.” The New York Times, April 8, 2023. https://www.nytimes.com/2023/04/08/us/politics/leaked-documents-russia-ukraine-war.html.
- Beehner, L., L. Collins, S. Ferenzi, R. Person, and A. Brantly. “Analyzing the Russian Way of War.” West Point, NY: The Modern War Intitute, March 20, 2018. https://mwi.usma.edu/wp-content/uploads/2018/03/Analyzing-the-Russian-Way-of-War.pdf.
- Borghard, E. D., and S. W. Lonergan. “The Logic of Coercion in Cyberspace.” Security Studies 26, no. 3 April 27 (2017): 452 481. doi:10.1080/09636412.2017.1306396.
- Brandt, J. “Preempting Putin: Washington’s Campaign of Intelligence Disclosures is Complicating Moscow’s Plans for Ukraine.” Brookings, February 18, 2022. https://www.brookings.edu/articles/preempting-putin-washingtons-campaign-of-intelligence-disclosures-is-complicating-moscows-plans-for-ukraine/.
- Brantly, A. “CERT-UA Public Disclosures of Cyber Attacks.” Blacksburg, VA: Tech4Humanity Lab, January 24, 2024. https://tech4humanitylab.org/s/CERTUA-Publicly-Available-Data-on-Cyber-Attacks.xlsx.
- Brantly, A. “Narrative Battles: The Impact of Open-Source Intelligence on the Framing of Russian War in Ukraine.” SSRN, October 24, 2022. https://ssrn.com/abstract=4256772.
- Brantly, A. The Decision to Attack: Military and Intelligence Cyber Decision-Making. Athens, GA: University of Georgia Press, 2016.
- Brantly, A. “From Cyberspace to Independence Square: Understanding the Impact of Social Media on Physical Protest Mobilization During Ukraine’s Euromaidan Revolution.” Journal of Information Technology & Politics 16, no. 4 (2019): 1–19. doi:10.1080/19331681.2019.1657047.
- Brantly, A. “Battling the Bear: Ukraine’s Approach to National Cyber and Information Security.” In Cybersecurity Politics, edited by M. D. Cavelty and A. Wenger, 157–171. London, UK: Routledge, 2022. doi:10.4324/9781003110224-13.
- Brantly, A. F. “A Brief History of Fake : Surveying Russian Disinformation from the Russian Empire Through the Cold War to the Present.” In Information Warfare in the Age of Cyber Conflict, edited by A. T. T. Christopher Whyte and B. M. Mazanec, 27–41. Abgingdon, UK: Routledge, 2021. doi:10.4324/9780429470509-3.
- Brantly, A. F. “Forged in the Fires of War: The Rise of a New Ukrainian Identity.” Policy Studies ahead-of-print, no. ahead–of–print (2023): 1–25. doi:10.1080/01442872.2023.2298800.
- Brantly, A. F. “Risk and Uncertainty Can Be Analyzed in Cyberspace.” Journal of Cybersecurity 7, no. 1 (2021). doi:10.1093/cybsec/tyab001.
- Brantly, A., and N. Brantly. “Biopolitics: Power, Pandemics, and War.” Orbis 67, no. 1 (2023): 64–84. doi:10.1016/j.orbis.2022.12.008.
- Brantly, A., N. Cal, and D. Winkelstein. “Defending the Borderland: Ukrainian Military Experiences with IO, Cyber, and EW.” West Point, NY: United States Army Cyber Institute, December 1, 2017. http://www.dtic.mil/dtic/tr/fulltext/u2/1046052.pdf.
- Browne, R., and B. Starr. “Top Pentagon Official: ‘Right Now It Sucks’ to Be ISIS.” CNN, April 14, 2016. https://www.cnn.com/2016/04/13/politics/robert-work-cyber-bombs-isis-sucks/index.html.
- Burgess, M. “A Mysterious Satellite Hack Has Victims Far Beyond Ukraine.” Wired, March 23, 2022. https://www.wired.com/story/viasat-internet-hack-ukraine-russia/.
- CERT-UA. “Cyberattack on Government Websites,” January 14, 2022. https://cert.gov.ua/article/17899.
- CISA. “Strengthening Cybersecurity of SATCOM Network Providers and Customers,” May 10, 2022. https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-076a.
- Coker, M., and P. Sonne. “Ukraine: Cyberwar’s Hottest Front.” The Wall Street Journal, November 9, 2015. https://www.wsj.com/articles/ukraine-cyberwars-hottest-front-1447121671
- Corera, G. “Inside a US Military Cyber Team’s Defence of Ukraine.” BBC, October 29, 2022. https://www.bbc.com/news/uk-63328398.
- Cyber Peace Institute. “Attack Details,” January 24, 2024. https://cyberconflicts.cyberpeaceinstitute.org/threats/attack-details.
- “Defending Ukraine:Early Lessons from the Cyber War.” Microsoft, June 22, 2022. https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE50KOK.
- Dylan, H., D. V. Gioe, and E. Grossfeld. “The Autocrat’s Intelligence Paradox: Vladimir Putin’s(Mis)Management of Russian Strategic Assessment in TheUkraine War.” The British Journal of Politics and International Relations 25, no. 3 (2023): 385–404. doi:10.1177/13691481221146113.
- Egloff, F. Semi-State Actors in Cybersecurity. New York, NY: Oxford University Press, 2022. https://oxford.universitypressscholarship.com/view/10.1093/oso/9780197579275.001.0001/oso-9780197579275.
- Fitzgerald, C. W., and A. F. Brantly. “Subverting Reality: The Role of Propaganda in 21st Century Intelligence.” International Journal of Intelligence and CounterIntelligence 30, no. 2 (2017): 215–240. doi:10.1080/08850607.2017.1263528.
- Galeotti, M. “Hybrid War’ and ‘Little Green Men’: How It Works and How It Doesn’t.” In People, Politics, Propaganda and Perspectives, edited by A. Pikulicka-Wilczewska and R. Sakwa. Ukraine and Russia: E-International Relations Publishing, 149–156, 2015.
- Garamone, J. “Ukraine-California Ties Show Worth of National Guard Program.” National Guard - DoD News, March 21, 2022. https://www.nationalguard.mil/News/Article/2972128/ukraine-california-ties-show-worth-of-national-guard-program/.
- Greenberg, A. “The Untold Story of NotPetya, the Most Devastating Cyberattack in History,” August 22, 2018. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/.
- Greenberg, A. Sandworm : A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers. First ed. New York: Doubleday, 2019.
- Haigh, M., T. Haigh, and N. I. Kozak. “Stopping Fake News.” Journalism Studies 19, no. 14 (2018): 2062–2087. doi:10.1080/1461670x.2017.1316681.
- Harvey, A. S. “The Levels of War as Levels of Analysis.” Military Review (2021): 75–81. https://www.armyupress.army.mil/Portals/7/military-review/Archives/English/ND-21/Harvey-Levels-of-War-1.pdf.
- Intel471. “Pro-Russian Hacktivist Groups Target Ukraine Supporters,” September 14, 2022. https://intel471.com/blog/pro-russian-hacktivist-groups-target-ukraine-supporters.
- Korns, S. W., and J. E. Kastenberg. “Georgia’s Cyber Left Hook.” Parameters, no. Winter (January, 2009); 1 17. https://apps.dtic.mil/sti/tr/pdf/ADA636632.pdf
- Kostyuk, N., and A. Brantly. “War in the Borderland Through Cyberspace: Limits of Defending Ukraine Through Interstate Cooperation.” Contemporary Security Policy 43, no. 3 (2022): 498–515. doi:10.1080/13523260.2022.2093587.
- Kostyuk, N., and E. Gartzke. “Indirect Substitution of Cyber and Military Operations: Why Cyber Dogs Have Yet to Bark Loudly in Russia’s Invasion of Ukraine.” Texas National Security Review 5, no. 3 (2022).
- Kostyuk, N., and E. Gartzke. “Fighting in Cyberspace: Internet Access and the Substitutability of Cyber and Military Operations.” Journal of Conflict Resolution 68, no. 1 (2024): 80–107. doi:10.1177/00220027231160993.
- Kostyuk, N., and Y. M. Zhukov. “Invisible Digital Front.” Journal of Conflict Resolution 9, no. 1 (December 6, 2017). doi:10.1177/0022002717737138.
- Koval, N. “Revolution Hacking.” In Cyber War in Perspective: Russian Aggression Against Ukraine, edited by K. Geers, 55–58. Tallinn, EE: NATO CCD COE, 2015. https://www.ccdcoe.org/uploads/2018/10/Ch06_CyberWarinPerspective_Koval.pdf.
- Kuzio, T. “Competing Nationalisms, Euromaidan, and the Russian‐Ukrainian Conflict.” Studies in Ethnicity and Nationalism 15, no. 1 (2015): 157–169. doi:10.1111/sena.12137.
- Lee, B. “The Impact of Cyber Capabilities in the Syrian Civil War.” Small Wars Journal, April 26, 2016. https://smallwarsjournal.com/jrnl/art/the-impact-of-cyber-capabilities-in-the-syrian-civil-war.
- Lindsay, J. R. “Cyber Conflict Vs. Cyber Command: Hidden Dangers in the American Military Solution to a Large-Scale Intelligence Problem.” Intelligence & National Security 36, no. 2 (2020): 260–278. doi:10.1080/02684527.2020.1840746.
- Lonergan, E. “Cyberspace is Neither Just an Intelligence Contest, nor a Domain of Military Conflict; SolarWinds Shows Us Why It’s Both.” Lawfare, May 12, 2021. https://www.lawfaremedia.org/article/cyberspace-neither-just-intelligence-contest-nor-domain-military-conflict-solarwinds-shows-us-why.
- Maschmeyer, L. “The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations.” International Security 46, no. 2 (2021): 51–90. doi:10.1162/isec_a_00418.
- Maurer, T. “Cyber Proxies and the Crisis in Ukraine.” In Cyber War in Perspective: Russian Aggression Against Ukraine, edited by K. Geers, 79–86. Tallinn, EE: NATO CCD COE, 2015.
- Maurer, T. Cyber Mercenaries : The State, Hackers, and Power. Cambridge: UK: Cambridge University Press, 2018.
- Mueller, G. B., B. Jensen, B. Valeriano, R. C. Maness, and J. M. Macias. “Cyber Operations During the Russo-Ukrainian War.” Washington, D.C: Center for Strategic and International Studies, July 2023. https://csis-website-prod.s3.amazonaws.com/s3fs-public/2023-07/230713_Mueller_CyberOps_RussiaUkraine.pdf?VersionId=BwNbsmkThLIPVpB0tctC59kwVpZ2aXeI.
- NATO. “NATO’s Support to Ukraine,” July 2016. https://www.nato.int/nato_static_fl2014/assets/pdf/pdf_2016_07/20160627_1607-factsheet-nato-ukraine-support-eng.pdf.
- NetBlocks.org. “Internet Disruptions Registered as Russia Moves in on Ukraine,” February 24, 2022. https://netblocks.org/reports/internet-disruptions-registered-as-russia-moves-in-on-ukraine-W80p4k8K.
- Neuman, S. “Ukraine is Hit by a Massive Cyberattack That Targeted Government Websites.” NPR, January 14, 2022. https://www.npr.org/2022/01/14/1073001754/ukraine-cyber-attack-government-websites-russia.
- Onuch, O., and G. Sasse. “The Maidan in Movement: Diversity and the Cycles of Protest.” Europe-Asia Studies 68, no. 4 June 3 (2016): 556 587. doi:10.1080/09668136.2016.1159665.
- Paganini, P. “Following NotPetya NATO Increases Support for Ukraine’s Cyber Defenses,” July 12, 2017. https://securityaffairs.co/wordpress/60941/cyber-warfare-2/nato-support-ukraine-cybersecurity.html.
- Pervushyn, M. M. “The Impact of Censoring and Filtering Practices in the Ukrainian Internet on Ukraine’s International Image in Context of Russian Military Aggression.” National Technical University of Ukraine Journal Political Science Sociology Law 0, no. 4(40) (2018): 47–51. doi:10.20535/2308-5053.2018.4(40).194062.
- Pietsch, B. “Hacking Group Claims Control of Belarusian Railroads in Move to ‘Disrupt’ Russian Troops Heading Near Ukraine.” The Washington Post, January 25, 2022. https://www.washingtonpost.com/world/2022/01/25/belarus-railway-hacktivist-russia-ukraine-cyberattack/.
- Pop-Eleches, G., and G. B. Robertson. “Identity and Political Preferences in Ukraine – Before and After the Euromaidan.” Post-Soviet Affairs 34, no. 2–3 (2018): 107–118. doi:10.1080/1060586x.2018.1452181.
- Sakwa, R. Frontline Ukraine : Crisis in the Borderlands. I.B. Tauris. I.B. Tauris, London, UK, 2016.
- Schulze, M., and M. Kerttunen. “Cyber Operations in Russia’sWar Against Ukraine.” Berlin, DE: Stiftung Wissenschaftund Politik, April 2023. https://www.swp-berlin.org/publications/products/comments/2023C23_CyberOperations_UkraineWar.pdf.
- Shakarian, P. “The 2008 Russian Cyber Campaign Against Georgia.” Military Review 63-68, no. November–December (2011). https://www.armyupress.army.mil/Portals/7/military-review/Archives/English/MilitaryReview_20111231_art013.pdf.
- Shveda, Y., and J. Ho Park. “Ukraine’s Revolution of Dignity: The Dynamics of Euromaidan.” Journal of Eurasian Studies 7, no. 1 (2016): 85–91. doi:10.1016/j.euras.2015.10.007.
- Slayton, R. “What is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment.” International Security 41, no. 3 (January, 2017): 72 109. doi:10.1162/isec_a_00267.
- Snyder, T. The Road to Unfreedom : Russia, Europe, America. First ed. New York, NY: Tim Duggan Books, 2018.
- Sood, K., and S. Hurley. “NotPetya Ransomware Attack Technical Analysis: A Triple Threat: File Encryption, MFT Encryption, Credential Theft,” June 29, 2017. https://www.crowdstrike.com/blog/petrwrap-ransomware-technical-analysis-triple-threat-file-encryption-mft-encryption-credential-theft/.
- Temple-Raston, D. “How the U.S. Hacked ISIS.” NPR, September 26, 2019. https://www.npr.org/2019/09/26/763545811/how-the-u-s-hacked-isis.
- Thomson, C. P., M. Mader, F. Munchow, J. Reifler, and H. Schoen. “European Public Opinion: Uniting in Supporting Ukraine, Divided on the Future of NATO.” International Affairs 99, no. 6 (2022): 2485–2500. doi:10.1093/ia/iiad241.
- “Use of Fancy Bear Android Malware in Tracking of Ukrainian Field Artillery Units.” Crowdstrike, December 22, 2016. https://www.crowdstrike.com/wp-content/brochures/FancyBearTracksUkrainianArtillery.pdf.
- “U.S. Support for Connectivity and Cybersecurity in Ukraine.” United States Department of State, May 22, 2022. https://www.state.gov/u-s-support-for-connectivity-and-cybersecurity-in-ukraine/.
- Valeriano, B., B. M. Jensen, and R. C. Maness. Cyber Strategy: The Evolving Character of Power and Coercion. Oxford, UK: Oxford University Press, 2018.
- Whitehead, D. E., K. Owens, D. Gammel, and J. Smith. “Ukraine Cyber-Induced Power Outage: Analysis and Practical Mitigation Strategies.” 2017 70th Annual Conference for Protective Relay Engineers (CPRE), 2017, 1–8. doi:10.1109/cpre.2017.8090056.
- Zetter, K. “Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid | WIRED.” Wired, March 3, 2016. https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/.
- Zetter, K. “Viasat Hack ‘Did Not’ Have Huge Impact on Ukrainian Military Communications, Official Says.” Zero Day, September 26, 2022. https://zetter.substack.com/p/viasat-hack-did-not-have-huge-impact.