Open Access

Cyber-Attacks and Freedom of Expression: Coercion, Intimidation and Virtual Occupation

   | Dec 21, 2019

Cite

Aquila, J. & Ronfeldt, D. (1993), ‘Cyberwar is coming!’ RAND Corporation. Retrieved from https://www.rand.org/pubs/reprints/RP223.html [accessed 6 Oct 2019]Search in Google Scholar

Bárd, P.; Uszkiewicz, E.; Alemanno, A.; Bayer, J.; Szakács, J. & Bitiukova, N. (2019), ‘Disinformation and propaganda Impact on the functioning of the rule of law in the EU and its Member States.’ Retrieved from http://www.europarl.europa.eu/thinktank/en/document.html?reference=IPOL_STU(2019)608864 [accessed 12 May 2019]Search in Google Scholar

Borghard, E. D. & Lonergan, S. W. (2017), ‘The logic of coercion in cyberspace,’ Security Studies, vol. 26, no. 3, pp. 452–481. https://doi.org/10.1080/09636412.2017.130639610.1080/09636412.2017.1306396Open DOISearch in Google Scholar

Buchanan, B. (2014), ‘Cyber deterrence isn’t MAD; it’s mosaic,’ International Engagement on Cyber IV: Post-Snowden Cyberspace, Georgetown Journal of International Affairs, pp. 130–140.Search in Google Scholar

Cook, S. (2013), ‘Congressional-executive commission on China roundtable China’s treatment of foreign journalists,’ Freedom House. Retrieved from https://freedomhouse.org/article/china-treatment-foreign-journalists [accessed 12 May 2019]Search in Google Scholar

Derfner, A. & Hebert, J. G. (2016), ‘Voting is speech,’ Yale Law and Policy Review, vol. 34, no. 2, p. 471.Search in Google Scholar

Geers, K., ed. (2015), Cyber War in Perspective: Russian Aggression against Ukraine, Tallinn: NATO CCD COE Publications.Search in Google Scholar

Giles, K. (2015), ‘Russia and its neighbours: old attitudes, new capabilities,’ in K. Giles & K. Geers (eds.) Cyber War in Perspective: Russian Aggression against Ukraine, Tallinn: NATO CCD COE Publications, pp. 19–28.Search in Google Scholar

Giles, K. (2016), Russia’s ‘New’ Tools for Confronting the West: Continuity and Innovation in Moscow’s Exercise of Power, Chatham House Research Paper. Retrieved from https://www.chathamhouse.org/sites/default/files/publications/2016-03-russia-new-tools-giles.pdf [accessed 12 May 2019]Search in Google Scholar

Giles, K. & Hagestad, W. (2013), ‘Divided by a common language: Cyber definitions in Chinese, Russian and English, 5th International Conference on Cyber Conflict (CYCON 2013), pp. 1 17.Search in Google Scholar

Gomez, M. & Villar, E. (2018), ‘Fear, uncertainty, and dread: cognitive heuristics and cyber threats,’ Politics and Governance, vol. 6, no. 2, pp. 61–72. https://doi.org/10.17645/pag.v6i2.127910.17645/pag.v6i2.1279Search in Google Scholar

Greenberg, A. (2018), ‘The untold story of NotPetya, the most devastating cyberattack,’ Wired. Retrieved from https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ [accessed 12 May 2019]Search in Google Scholar

Hodgson, Q. (2018), ‘Understanding and countering cyber coercion’ in T. Minárik, R. Jakschis & L. Lindström (eds.) 10th International Conference on Cyber Conflict CyCon X: Maximising Effects, Tallinn: NATO CCD COE Publications, pp. 73–88. https://doi.org/10.23919/CYCON.2018.840501110.23919/CYCON.2018.8405011Search in Google Scholar

Human Rights First (2108), ‘Fake news, free speech, and foreign influence: the smart way the United States can combat disinformation.’ Retrieved from https://www.humanrightsfirst.org/sites/default/files/Disinformation-Brief-March-2018.pdf [accessed 12 May 2019]Search in Google Scholar

Jasper, S. (2017), Strategic Cyber Deterrence: The Active Cyber Defense Option, Lanham, ML: Rowman & Littlefield.Search in Google Scholar

Jensen, B.; Valeriano, B. & Maness, R. (2018), Cyber Strategy: The Evolving Character of Power and Coercion, Oxford: Oxford University Press. https://doi.org/10.1093/oso/9780190618094.001.000110.1093/oso/9780190618094.001.0001Open DOISearch in Google Scholar

Johnson, D. R. & Post, D. G. (1996), ‘Law and borders – the rise of law in cyberspace,’ Stanford Law Review, vol. 48, no. 5, pp. 1367–1402. https://doi.org/10.2307/122939010.2307/1229390Open DOISearch in Google Scholar

Kogan, R. (2015), ‘Bedep trojan malware spread by the Angler exploit kit gets political,’ Trustwave. Retrieved from https://www.trustwave.com/Resources/SpiderLabs-Blog/Bedep-trojan-malware-spread-by-the-Angler-exploit-kit-gets-political/ [accessed 12 May 2019]Search in Google Scholar

Kostyuk, N. & Zhukov, Y. (2019), ‘Invisible digital front: can cyber attacks shape battlefield events?’ Journal of Conflict Resolution, vol. 63, no. 2, pp. 317–347. https://doi.org/10.1177/002200271773713810.1177/0022002717737138Open DOISearch in Google Scholar

Koval, N. (2015), ‘Revolution hacking,’ in K. Geers (ed.) Cyber War in Perspective: Russian Aggression against Ukraine, Tallinn: NATO CCD COE Publications, pp. 55–58.Search in Google Scholar

Libicki, M. C. (2018), ‘Drawing inferences from cyber espionage,’ in T. Minárik, R. Jakschis & L. Lindström (eds.) 10th International Conference on Cyber Conflict CyCon X: Maximising Effects, Tallinn: NATO CCD COE Publications, pp. 109–122. https://doi.org/10.23919/CYCON.2018.840501310.23919/CYCON.2018.8405013Search in Google Scholar

Neuman, C. & Poznansky, M. (2016), ‘Swaggering in cyberspace: busting the conventional wisdom on cyber coercion,’ War on the Rocks, 28 June. Retrieved from https://warontherocks.com/2016/06/swaggering-in-cyberspace-busting-the-conventional-wisdom-on-cyber-coercion/ [accessed 12 May 2019].Search in Google Scholar

Past, L. (2015), ‘Missing in action: rhetoric on cyber warfare,’ in K. Geers (ed.) Cyber War in Perspective: Russian Aggression against Ukraine, Tallinn: NATO CCD COE Publications, pp. 95–102.Search in Google Scholar

Piiparinen, A. (2016), ‘China’s secret weapon in the South China Sea: cyber attacks,’ The Diplomat, 22 July. Retrieved from https://thediplomat.com/2016/07/chinas-secret-weapon-in-the-south-china-sea-cyber-attacks/ [accessed 12 May 2019]Search in Google Scholar

Rid, T. & Buchanan, B. (2018), ‘Hacking democracy,’ The SAIS Review of International Affairs, vol. 38, no. 1, pp. 3–16. https://doi.org/10.1353/sais.2018.000110.1353/sais.2018.0001Open DOISearch in Google Scholar

Schelling, T. C. (1960), The Strategy of Conflict, Cambridge, MA: Harvard University Press.Search in Google Scholar

Schelling, T. C. (2008), Arms and Influence, New Haven, CT: Yale University Press.Search in Google Scholar

Schmitt, M. N. (2018), ‘Virtual disenfranchisement: cyber election meddling in the grey zones of international law,’ Chicago Journal of International Law, vol. 19, no. 1, pp. 8–16.Search in Google Scholar

Universal Declaration of Human Rights (1948), United Nations General Assembly, New York. Retrieved from https://www.un.org/en/universal-declaration-human-rights/ [accessed 12 May 2019]Search in Google Scholar

Weedon, J. (2015), ‘Beyond ‘cyber war’: Russia’s use of strategic cyber espionage and information operations in Ukraine,’ in K. Geers (ed.) Cyber War in Perspective: Russian Aggression against Ukraine, Tallinn: NATO CCD COE Publications, pp. 67–78.Search in Google Scholar

Wilton, C. (2017), ‘Sony, cyber security, and free speech: preserving the First Amendment in the modern world,’ Pace Intellectual Property, Sports & Entertainment Law Forum, vol. 7, no. 1.Search in Google Scholar

Zetter, K. (2016), ‘Inside the cunning, unprecedented hack of Ukraine’s power grid,’ Wired, 3 March. Retrieved from https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/ [accessed 12 May 2019]Search in Google Scholar

eISSN:
2228-0596
Language:
English
Publication timeframe:
2 times per year
Journal Subjects:
Computer Sciences, other, Business and Economics, Political Economics, Law, Social Sciences