Russian Cyber Operations. Scott Jasper
Tallinn Manual 2.0, 341.
33.Schmitt, 341.
34.Schmitt, “Peacetime Cyber Responses,” 246.
35.UN, Charter of the United Nations, Chapter VII, Article 51, October 24, 1945.
36.DOD, Law of War Manual, 40.
37.Schmitt, Tallinn Manual 2.0, 348.
38.Schmitt, 349.
39.Schmitt, “Peacetime Cyber Responses,” 248.
40.Schmitt, Tallinn Manual 2.0, 84.
41.Schmitt, 84.
42.Schmitt, 85.
43.Schmitt, 20.
44.Schmitt, 20.
45.Michael Schmitt, “In Defense of Sovereignty in Cyberspace,” Just Security, May 8, 2018.
46.Schmitt.
47.Schmitt, Tallinn Manual 2.0, 21.
48.Schmitt, 22.
49.Schmitt, Tallinn Manual 2.0, 84.
50.International Law Commission, “Draft Articles on Responsibility of States for Internationally Wrongful Acts, with Commentaries,” Article 2, 2001, 34.
51.International Law Commission, 34.
52.Schmitt, Tallinn Manual 2.0, 87.
53.International Law Commission, “Draft Articles on Responsibility of States,” Article 8.
54.International Law Commission, chap. II, commentary, para. 1.
55.Michael N. Schmitt and Liis Vihul, “Proxy Wars in Cyberspace: The Evolving International Law of Attribution,” Fletcher Security Review 1, no. 2 (Spring 2014): 59.
56.Matthew Monte, Network Attacks and Exploitation: A Framework (New York: John Wiley, 2015).
57.International Law Commission, “Draft Articles on Responsibility,” Article 50, 1a.
58.Scott Maucione, “Lawmakers Still Looking for Definitive Answer on What Constitutes Cyber War,” Federal News Radio, April 16, 2018.
59.Lettre, “Cybersecurity, Encryption,” 85.
60.Bradley Barth, “New EU Framework Allows Members to Consider Cyber-Attacks Acts of War,” SC Magazine, October 31, 2017.
61.Schmitt, Tallinn Manual 2.0, 375.
62.Verizon, “2018 Data Breach Investigations Report,” 11th ed., April 2018, 8.
63.Tao Yan, Bo Qu, and Zhanglin He, “Phishing in a Nutshell: January–March 2018,” Palo Alto Networks, Unit 42 Blog, June 18, 2018.
64.Cisco, “2018 Annual Cybersecurity Report,” May 2018, 21.
65.Sandra, “Top 10 Free Keylogger Software in 2019,” Elite Keylogger (blog), January 17, 2019.
66.National Institute of Standards and Technology (hereafter NIST), Glossary of Key Information Security Terms, draft NISTIR 7298, revision 3, September 2018.
67.Elise Thomas, “As the West Warns of Chinese Cyber Spies, Poorer Nations Welcome Gifts with Open Arms,” Wired, June 11, 2018.
68.NIST, Glossary of Key Information Security Terms.
69.Radware, “Five Ways Modern Malware Defeats Your Defenses . . . and What You Can Do about It,” 2018.
70.Julia Sowells, “Polymorphic: Refers to a Malware’s Ability to Change,” Hacker Combat, August 20, 2018.
71.McAfee Labs, “Quarterly Threats Report,” June 2017, 8–10.
72.CrowdStrike, “Who Needs Malware?,” white paper, 2017, 2.
73.Kevin Jones, “Fileless Ransomware: The Next Big Threat for the US in the Waiting,” Hacker Combat, December 30, 2018.
74.Red Canary, “Threat Detection Report,” 1st ed., 2019, 6.
75.Red Canary, 8.
76.McAfee Labs, “Quarterly Threats Report,” September 2017, 38, 53.
77.Cisco, “2018 Annual Cybersecurity Report,” 6.
78.FireEye, “Advanced Malware Exposed,” white paper, 2011, 16.
79.Joseph Caddel, “Deception 101: Primer on Deception,” Strategic Studies Institute, US Army War College, December 2004.