Cite

‘“The Veto” UN Security Council Working Methods. (2020). The Security Council Report. Available at <https://www.securitycouncilreport.org/un-security-council-working-methods/the-veto.php>. Search in Google Scholar

‘“Als Zielobjekt markiert” Der Enthüller Edward Snowden über die geheime Macht der NSA’ (2013). Der Spiegel [online]. Available at <https://cryptome.org/2013/07/snowden-spiegel-13–0707.pdf>[Accessed August 20, 2022]. Search in Google Scholar

‘Address by the President of the Russian Federation’. (2022). Retrieved from <http://en.kremlin.ru/events/president/transcripts/67828>. Search in Google Scholar

‘Cyber Defence’. (2020). North Atlantic Treaty Organization. Available at <https://www.nato.int/cps/en/natohq/topics_78170.htm>. Search in Google Scholar

‘Hong Kong: US passes sanctions as nations condemn new law’. (2020). BBC News [online]. Available at <https://www.bbc.com/news/world-asia-china-53259656.> [Accessed May 10, 2021]. Search in Google Scholar

‘Interim National Security Strategic Guidance’. (2021). The White House. Available at <https://www.whitehouse.gov/briefing-room/statements-releases/2021/03/03/interim-national-security-strategic-guidance/>. Search in Google Scholar

‘José Manuel Durão Barroso President of the European Commission The European Union and multilateral global governance Conference at the European University Institute Florence 18 June 2010.’ (2010). European Commission. Available at <https://ec.europa.eu/commission/presscorner/detail/en/SPEECH_10_322>. Search in Google Scholar

‘Lavrov skazal, chto zheleznyy zanaves mezhdu RF i Zapadom uzhe opuskayetsy.’(2022). InterFax.ru. Available at < https://www.interfax.ru/russia/849755>. Search in Google Scholar

‘National Cyber Strategy of the United States of America.’ (2018). The White House. Available at <https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf>. Search in Google Scholar

‘National Cyber Strategy of the United States of America’. (2018). The White House. Available at <https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf>. Search in Google Scholar

‘Security Council — Veto List (in reverse chronological order).’ UN Documents, Dag Hammarskjöld Library. Available at <https://research.un.org/en/docs/sc/quick>. Search in Google Scholar

‘US charges ‘China government hackers’.’ (2018). BBC News. Available at <https://www.bbc.com/news/world-us-canada-46638323>. Search in Google Scholar

‘What is a distributed denial of service attack (DDoS) and what can you do about them?’ (2020). Emerging Threats, Security Center. Available at <https://us.norton.com/inter-netsecurity-emerging-threats-what-is-a-ddos-attack-30sectech-by-norton.html>. Search in Google Scholar

Agnew J. (2001). ‘The New Global Economy: Time-Space Compression, Geopolitics, and Global Uneven Development’. Journal of World-Systems Research VII. 2, 133.10.5195/jwsr.2001.167 Search in Google Scholar

Ahang Y. (2019). ‘Huawei and “Made in China 2025” Challenging the US Tech Supremacy.’ Trade Finance Global. Available at: <https://www.tradefinanceglobal.com/posts/huawei-5g-flagship-challenging-us-supremacy/>. Search in Google Scholar

Allison G., Schmidt E. (2022) ‘China’s 5G Soars Over America’s’ Wall Street Journal [online]. Available at <https://www.wsj.com/articles/chinas-5g-america-streaming-speed-midband-investment-innovation-competition-act-semiconductor-biotech-ai11645046867?st=hmjpsnr5e7nmxni&reflink=article_copyURL_share>. Search in Google Scholar

Altynbayev K. (2020). ‘Putin’s invented territorial claims on post-Soviet states draw ire of Kazakhs’. Caravanserai [online]. Available at <https://central.asia-news.com/en_GB/articles/cnmi_ca/features/2020/06/29/feature-01.> [Accesssed on May 8, 2021]. Search in Google Scholar

Alvarez J. (2015). ‘Stuxnet: The world’s first cyber weapon.’ Center for International Security and Cooperation. Available at <https://cisac.fsi.stanford.edu/news/stuxnet>. Search in Google Scholar

Bar-Siman-Tov Y. (1984) ‘The Strategy of War by Proxy’. Cooperation and Conflict 19, no. 4, 263–73. https://doi.org/10.1177/001083678401900405 Search in Google Scholar

Boylan B. M., McBeath J., Wang B. ‘US–China Relations: Nationalism, the Trade War, and COVID-19’. Fudan Journal of the Humanities and Social Sciences 14, 23–40. Buchanan B. (2020). The Hacker and the State Cyber Attacks and the New Normal of Geopolitics. Harvard University Press.10.1007/s40647-020-00302-6 Search in Google Scholar

Chen A. (2015). ‘The Agency’. New York Times [online]. Available at <https://www.ny-times.com/2015/06/07/magazine/the-agency.html>. Search in Google Scholar

Contemporary Russian Military Strategy.’ Finnish Defence Studies 22. Search in Google Scholar

Cormac R., Aldrich R. J. (2018). ‘Grey is the new black: covert action and implausible deniability’. International Affairs. vol. 94:3, 490.10.1093/ia/iiy067 Search in Google Scholar

Davidson J. S. (2001). ‘East versus West: Human Rights and Cultural Difference.’ Canter Law Review 37. Search in Google Scholar

Davis D. L. (2016) ‘What the ‘World Police’ Analogy Gets Wrong’. The National Interest [online]. Available at <https://nationalinterest.org/blog/the-skeptics/what-the-world-police-analogy-gets-wrong-17903>. Search in Google Scholar

Deutsch K. W., Singer D. J. (1964). ‘Multipolar Power Systems and International Stability’. World Politics 16, no. 3, 390–406.10.2307/2009578 Search in Google Scholar

Elliott L. (2021). ‘Xi Jinping warns of ‘new cold war’ if US keeps up protectionism’ The Guardian [online], Available at <https://www.theguardian.com/world/2021/jan/25/china-xi-jinping-warns-of-new-cold-war-us-protectionist-policies.> [Accessed January 5, 2021]. Search in Google Scholar

Featherly K. (2021). ‘ARPANET’. Encyclopedia Britannica. Available at <https://www.britannica.com/topic/ARPANET>. Search in Google Scholar

Freeden M. (2003). ‘Editorial: ideological boundaries and ideological systems.’ Journal of Political Ideologies. 8.1, 6.10.1080/13569310306081 Search in Google Scholar

Fukuyama F. (1989). ‘The End of History?’ The National Interest. no. 16, 3–18. Available at <http://www.jstor.org/stable/24027184>. Search in Google Scholar

Fukuyama F. (1989). ‘The End of History?’ The National Interest. no. 16, 3–18. http://www.jstor.org/stable/24027184. Search in Google Scholar

Gaddis J. L. (2005). The Cold War: A New History. New York: Penguin Books. Search in Google Scholar

Greenberg A. (2022). ‘Russia’s Sandworm Hackers Attempted a Third Blackout in Ukraine.’ Wired. Available at <https://www.wired.com/story/sandworm-russia-ukraine-blackout-gru/>. Search in Google Scholar

Griffiths J. (2019). ‘When Chinese hackers declared war on the rest of us.’ MIT Technology Review. Available at <https://www.technologyreview.com/2019/01/10/103560/when-chinese-hackers-declared-war-on-the-rest-of-us/>. Search in Google Scholar

Guyatt N. (2013). The End of the Cold War. In: R. H. Immerman, P. Goedde. The Oxford Handbook of the Cold War. Oxford: OUP.10.1093/oxfordhb/9780199236961.013.0034 Search in Google Scholar

Hatch B. B. (2018) “Defining a Class of Cyber Weapons as WMD: An Examination of the Merits,” Journal of Strategic Security 11 no. 1, 48.10.5038/1944-0472.11.1.1657 Search in Google Scholar

Heywood A. (2017). Political Ideologies: What They Are and Why They Matter. In Political Ideologies: An Introduction. Macmillian Education.10.1057/978-1-137-60604-4 Search in Google Scholar

Hoffman F. G. (2007). ‘Conflict in the 21st century: the rise of hybrid Wars’. Potomac Institute for Policy Studies, 8. Search in Google Scholar

Insikt Group. (2020). ‘Swallowing the Snake’s Tail: Tracking Turla Infrastructure.’ Recorded Future [online]. Available at <https://www.recordedfuture.com/turla-apt-infrastructure/>. Search in Google Scholar

Kaplan R. D. (2019). A New Cold War Has Begun. Foreign Policy [online]. Available at <https://foreignpolicy.com/2019/01/07/a-new-cold-war-has-begun/>.10.31579/2690-1919/146 Search in Google Scholar

Khalip A. (2018). ‘U. N. chief urges global rules for cyber warfare’. Reuters [online]. Available at <https://www.reuters.com/article/us-un-guterres-cyber-idUSKCN1G31Q4>. Search in Google Scholar

Klimburg A. (2018). The Darkening Web: The War for Cyberspace. New York: Penguin Books, 332. Search in Google Scholar

Kowalewski A. (2017). ‘Disinformation and Reflexive Control: The New Cold War’ Georgetown Security Studies Review. Available at <https://georgetownsecuritystudiesreview.org/2017/02/01/disinformation-and-reflexive-control-the-new-cold-war/>. Search in Google Scholar

Krauthammer Ch. (2017). ‘The Unipolar Moment’. Foreign Affairs [online]. Available at <https://www.foreignaffairs.com/articles/1990–01–01/unipolar-moment> [Accessed on 10 May 2021]. Search in Google Scholar

Lord N. (2018). ‘What is an Advanced Persistent Threat? APT Definition.’ Digital Guardian. Available at <https://digitalguardian.com/blog/what-advanced-persistent-threat-apt-definition>. Search in Google Scholar

Machnikowski R. M. (2020). Hezbollah as an Iranian proxy in the Age of the Cold War. In: Hänni A., Riegler T. and Gasztold P. eds. Terrorism in the Cold War State Support in the West, Middle East and Latin America.10.5040/9780755600304.0010 Search in Google Scholar

Maurer T. (2017). Cyber Mercenaries: The State, Hackers, and Power. Cambridge: Cambridge University Press, 123.10.1017/9781316422724 Search in Google Scholar

Maurer T. (2018).’ Why the Russian Government Turns a Blind Eye to Cybercriminals’. Carnegie Endowment for International Peace [online]. Available at < https://carneg-ieendowment.org/2018/02/02/why-russian-government-turns-blind-eye-to-cybercriminals-pub-75499> [Accessed on 20 August 2022]. Search in Google Scholar

Morgenthau H. J. (1978). Politics Among Nations: The Struggle for Power and Peace. Fifth Edition, Revised. New York: Alfred A. Knopf. Search in Google Scholar

Osgood K. A. (2000) ‘Form before Substance: Eisenhower’s Commitment to Psychological Warfare and Negotiations with the Enemy.’ Diplomatic History 24. no. 3, 405–33.10.1111/0145-2096.00225 Search in Google Scholar

Padover S. K. (1951). ‘Psychological Warfare and Foreign Policy.’ The American Scholar. vol. 20. no. 2, 151–161. Search in Google Scholar

Pattara P. R. (2021). ‘Cyber Mutually Assured Destruction & Counterproliferation for the 21st Century: ‘How I stopped worrying and learned to love the software exploit.’’ Liberty University Journal of Statesmanship & Public Policy 1. no. 2. Available at <https://digitalcommons.liberty.edu/cgi/viewcontent.cgi?article=1052&context=jspp>. Search in Google Scholar

Rauta V. (2019). ‘Towards a typology of non-state actors in ‘hybrid warfare’: proxy, auxiliary, surrogate and affiliated forces’. Cambridge Review of International Affairs. DOI: 10.1080/09557571.2019.1656600.10.1080/09557571.2019.1656600 Search in Google Scholar

Rid T. (2020). Active Measures: The Secret History of Disinformation and Political Warfare. London: Profile Books. Search in Google Scholar

Schmitt M. N., Vihul L. (2014). ‘Proxy Wars in Cyberspace: The Evolving International Law of Attribution’. Fletcher Security Review. vol. 1, 2. Search in Google Scholar

Segev H., Doron E., Orion A. (2019). ‘My Way or the Huawei? The United States-China Race for 5G Dominance’. Institute for National Security Studies. Search in Google Scholar

Steger M. B. (2005). ‘Ideologies of globalization.’ Journal of Political Ideologies 10.10.1080/1356931052000310263 Search in Google Scholar

Thomas T. L. (2004). ‘Russia’s Reflexive Control Theory and the Military’. Journal of Slavic Military Studies. vol. 17, 237.10.1080/13518040490450529 Search in Google Scholar

Tsygankov A. P. (2018) ‘The sources of Russia’s fear of NATO’. Communist and Post-Communist Studies 51, 2. Weitz R. (2016). ‘Russia Wants to Remake Globalization in Its Own Image’. Yale Global Online [online]. Available at <https://yaleglobal.yale.edu/content/russia-wants-remake-globalization-its-own-image>. [Accessed on May 8, 2021].10.1016/j.postcomstud.2018.03.002 Search in Google Scholar

Vasara A. (2020). ‘Theory of Reflexive Control Origins, Evolution and Application in the Framework of Contemporary Russian Military Strategy’. Finnish Defence Studies 22. Search in Google Scholar

Waltz K. (1964). ‘The Stability of a Bipolar World’. Population, Prediction, Conflict, Existentialism, Vol. 93, No. 3, 884. Search in Google Scholar

Weitz R. (2016). ‘Russia Wants to Remake Globalization in Its Own Image.’ Yale Global Online [online]. Available at <https://yaleglobal.yale.edu/content/russia-wants-re-make-globalization-its-own-image>. Search in Google Scholar

Wohlforth W. C. (1999). ‘The Stability of a Unipolar World’. International Security 24. no. 1.10.1162/016228899560031 Search in Google Scholar

Yeisley M. O. (2011). ‘Bipolarity, Proxy Wars, and the Rise of China.’ Strategic Studies Quarterly 5. no. 4., 75–91. Search in Google Scholar