[
‘“The Veto” UN Security Council Working Methods. (2020). The Security Council Report. Available at <https://www.securitycouncilreport.org/un-security-council-working-methods/the-veto.php>.
]Search in Google Scholar
[
‘“Als Zielobjekt markiert” Der Enthüller Edward Snowden über die geheime Macht der NSA’ (2013). Der Spiegel [online]. Available at <https://cryptome.org/2013/07/snowden-spiegel-13–0707.pdf>[Accessed August 20, 2022].
]Search in Google Scholar
[
‘Address by the President of the Russian Federation’. (2022). Retrieved from <http://en.kremlin.ru/events/president/transcripts/67828>.
]Search in Google Scholar
[
‘Cyber Defence’. (2020). North Atlantic Treaty Organization. Available at <https://www.nato.int/cps/en/natohq/topics_78170.htm>.
]Search in Google Scholar
[
‘Hong Kong: US passes sanctions as nations condemn new law’. (2020). BBC News [online]. Available at <https://www.bbc.com/news/world-asia-china-53259656.> [Accessed May 10, 2021].
]Search in Google Scholar
[
‘Interim National Security Strategic Guidance’. (2021). The White House. Available at <https://www.whitehouse.gov/briefing-room/statements-releases/2021/03/03/interim-national-security-strategic-guidance/>.
]Search in Google Scholar
[
‘José Manuel Durão Barroso President of the European Commission The European Union and multilateral global governance Conference at the European University Institute Florence 18 June 2010.’ (2010). European Commission. Available at <https://ec.europa.eu/commission/presscorner/detail/en/SPEECH_10_322>.
]Search in Google Scholar
[
‘Lavrov skazal, chto zheleznyy zanaves mezhdu RF i Zapadom uzhe opuskayetsy.’(2022). InterFax.ru. Available at < https://www.interfax.ru/russia/849755>.
]Search in Google Scholar
[
‘National Cyber Strategy of the United States of America.’ (2018). The White House. Available at <https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf>.
]Search in Google Scholar
[
‘National Cyber Strategy of the United States of America’. (2018). The White House. Available at <https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf>.
]Search in Google Scholar
[
‘Security Council — Veto List (in reverse chronological order).’ UN Documents, Dag Hammarskjöld Library. Available at <https://research.un.org/en/docs/sc/quick>.
]Search in Google Scholar
[
‘US charges ‘China government hackers’.’ (2018). BBC News. Available at <https://www.bbc.com/news/world-us-canada-46638323>.
]Search in Google Scholar
[
‘What is a distributed denial of service attack (DDoS) and what can you do about them?’ (2020). Emerging Threats, Security Center. Available at <https://us.norton.com/inter-netsecurity-emerging-threats-what-is-a-ddos-attack-30sectech-by-norton.html>.
]Search in Google Scholar
[
Agnew J. (2001). ‘The New Global Economy: Time-Space Compression, Geopolitics, and Global Uneven Development’. Journal of World-Systems Research VII. 2, 133.10.5195/jwsr.2001.167
]Search in Google Scholar
[
Ahang Y. (2019). ‘Huawei and “Made in China 2025” Challenging the US Tech Supremacy.’ Trade Finance Global. Available at: <https://www.tradefinanceglobal.com/posts/huawei-5g-flagship-challenging-us-supremacy/>.
]Search in Google Scholar
[
Allison G., Schmidt E. (2022) ‘China’s 5G Soars Over America’s’ Wall Street Journal [online]. Available at <https://www.wsj.com/articles/chinas-5g-america-streaming-speed-midband-investment-innovation-competition-act-semiconductor-biotech-ai11645046867?st=hmjpsnr5e7nmxni&reflink=article_copyURL_share>.
]Search in Google Scholar
[
Altynbayev K. (2020). ‘Putin’s invented territorial claims on post-Soviet states draw ire of Kazakhs’. Caravanserai [online]. Available at <https://central.asia-news.com/en_GB/articles/cnmi_ca/features/2020/06/29/feature-01.> [Accesssed on May 8, 2021].
]Search in Google Scholar
[
Alvarez J. (2015). ‘Stuxnet: The world’s first cyber weapon.’ Center for International Security and Cooperation. Available at <https://cisac.fsi.stanford.edu/news/stuxnet>.
]Search in Google Scholar
[
Bar-Siman-Tov Y. (1984) ‘The Strategy of War by Proxy’. Cooperation and Conflict 19, no. 4, 263–73. https://doi.org/10.1177/001083678401900405
]Search in Google Scholar
[
Boylan B. M., McBeath J., Wang B. ‘US–China Relations: Nationalism, the Trade War, and COVID-19’. Fudan Journal of the Humanities and Social Sciences 14, 23–40. Buchanan B. (2020). The Hacker and the State Cyber Attacks and the New Normal of Geopolitics. Harvard University Press.
]Search in Google Scholar
[
Chen A. (2015). ‘The Agency’. New York Times [online]. Available at <https://www.ny-times.com/2015/06/07/magazine/the-agency.html>.
]Search in Google Scholar
[
Contemporary Russian Military Strategy.’ Finnish Defence Studies 22.
]Search in Google Scholar
[
Cormac R., Aldrich R. J. (2018). ‘Grey is the new black: covert action and implausible deniability’. International Affairs. vol. 94:3, 490.
]Search in Google Scholar
[
Davidson J. S. (2001). ‘East versus West: Human Rights and Cultural Difference.’ Canter Law Review 37.
]Search in Google Scholar
[
Davis D. L. (2016) ‘What the ‘World Police’ Analogy Gets Wrong’. The National Interest [online]. Available at <https://nationalinterest.org/blog/the-skeptics/what-the-world-police-analogy-gets-wrong-17903>.
]Search in Google Scholar
[
Deutsch K. W., Singer D. J. (1964). ‘Multipolar Power Systems and International Stability’. World Politics 16, no. 3, 390–406.10.2307/2009578
]Search in Google Scholar
[
Elliott L. (2021). ‘Xi Jinping warns of ‘new cold war’ if US keeps up protectionism’ The Guardian [online], Available at <https://www.theguardian.com/world/2021/jan/25/china-xi-jinping-warns-of-new-cold-war-us-protectionist-policies.> [Accessed January 5, 2021].
]Search in Google Scholar
[
Featherly K. (2021). ‘ARPANET’. Encyclopedia Britannica. Available at <https://www.britannica.com/topic/ARPANET>.
]Search in Google Scholar
[
Freeden M. (2003). ‘Editorial: ideological boundaries and ideological systems.’ Journal of Political Ideologies. 8.1, 6.
]Search in Google Scholar
[
Fukuyama F. (1989). ‘The End of History?’ The National Interest. no. 16, 3–18. Available at <http://www.jstor.org/stable/24027184>.
]Search in Google Scholar
[
Fukuyama F. (1989). ‘The End of History?’ The National Interest. no. 16, 3–18. http://www.jstor.org/stable/24027184.
]Search in Google Scholar
[
Gaddis J. L. (2005). The Cold War: A New History. New York: Penguin Books.
]Search in Google Scholar
[
Greenberg A. (2022). ‘Russia’s Sandworm Hackers Attempted a Third Blackout in Ukraine.’ Wired. Available at <https://www.wired.com/story/sandworm-russia-ukraine-blackout-gru/>.
]Search in Google Scholar
[
Griffiths J. (2019). ‘When Chinese hackers declared war on the rest of us.’ MIT Technology Review. Available at <https://www.technologyreview.com/2019/01/10/103560/when-chinese-hackers-declared-war-on-the-rest-of-us/>.
]Search in Google Scholar
[
Guyatt N. (2013). The End of the Cold War. In: R. H. Immerman, P. Goedde. The Oxford Handbook of the Cold War. Oxford: OUP.
]Search in Google Scholar
[
Hatch B. B. (2018) “Defining a Class of Cyber Weapons as WMD: An Examination of the Merits,” Journal of Strategic Security 11 no. 1, 48.10.5038/1944-0472.11.1.1657
]Search in Google Scholar
[
Heywood A. (2017). Political Ideologies: What They Are and Why They Matter. In Political Ideologies: An Introduction. Macmillian Education.10.1057/978-1-137-60604-4
]Search in Google Scholar
[
Hoffman F. G. (2007). ‘Conflict in the 21st century: the rise of hybrid Wars’. Potomac Institute for Policy Studies, 8.
]Search in Google Scholar
[
Insikt Group. (2020). ‘Swallowing the Snake’s Tail: Tracking Turla Infrastructure.’ Recorded Future [online]. Available at <https://www.recordedfuture.com/turla-apt-infrastructure/>.
]Search in Google Scholar
[
Kaplan R. D. (2019). A New Cold War Has Begun. Foreign Policy [online]. Available at <https://foreignpolicy.com/2019/01/07/a-new-cold-war-has-begun/>.
]Search in Google Scholar
[
Khalip A. (2018). ‘U. N. chief urges global rules for cyber warfare’. Reuters [online]. Available at <https://www.reuters.com/article/us-un-guterres-cyber-idUSKCN1G31Q4>.
]Search in Google Scholar
[
Klimburg A. (2018). The Darkening Web: The War for Cyberspace. New York: Penguin Books, 332.
]Search in Google Scholar
[
Kowalewski A. (2017). ‘Disinformation and Reflexive Control: The New Cold War’ Georgetown Security Studies Review. Available at <https://georgetownsecuritystudiesreview.org/2017/02/01/disinformation-and-reflexive-control-the-new-cold-war/>.
]Search in Google Scholar
[
Krauthammer Ch. (2017). ‘The Unipolar Moment’. Foreign Affairs [online]. Available at <https://www.foreignaffairs.com/articles/1990–01–01/unipolar-moment> [Accessed on 10 May 2021].
]Search in Google Scholar
[
Lord N. (2018). ‘What is an Advanced Persistent Threat? APT Definition.’ Digital Guardian. Available at <https://digitalguardian.com/blog/what-advanced-persistent-threat-apt-definition>.
]Search in Google Scholar
[
Machnikowski R. M. (2020). Hezbollah as an Iranian proxy in the Age of the Cold War. In: Hänni A., Riegler T. and Gasztold P. eds. Terrorism in the Cold War State Support in the West, Middle East and Latin America.
]Search in Google Scholar
[
Maurer T. (2017). Cyber Mercenaries: The State, Hackers, and Power. Cambridge: Cambridge University Press, 123.
]Search in Google Scholar
[
Maurer T. (2018).’ Why the Russian Government Turns a Blind Eye to Cybercriminals’. Carnegie Endowment for International Peace [online]. Available at < https://carneg-ieendowment.org/2018/02/02/why-russian-government-turns-blind-eye-to-cybercriminals-pub-75499> [Accessed on 20 August 2022].
]Search in Google Scholar
[
Morgenthau H. J. (1978). Politics Among Nations: The Struggle for Power and Peace. Fifth Edition, Revised. New York: Alfred A. Knopf.
]Search in Google Scholar
[
Osgood K. A. (2000) ‘Form before Substance: Eisenhower’s Commitment to Psychological Warfare and Negotiations with the Enemy.’ Diplomatic History 24. no. 3, 405–33.
]Search in Google Scholar
[
Padover S. K. (1951). ‘Psychological Warfare and Foreign Policy.’ The American Scholar. vol. 20. no. 2, 151–161.
]Search in Google Scholar
[
Pattara P. R. (2021). ‘Cyber Mutually Assured Destruction & Counterproliferation for the 21st Century: ‘How I stopped worrying and learned to love the software exploit.’’ Liberty University Journal of Statesmanship & Public Policy 1. no. 2. Available at <https://digitalcommons.liberty.edu/cgi/viewcontent.cgi?article=1052&context=jspp>.
]Search in Google Scholar
[
Rauta V. (2019). ‘Towards a typology of non-state actors in ‘hybrid warfare’: proxy, auxiliary, surrogate and affiliated forces’. Cambridge Review of International Affairs. DOI: 10.1080/09557571.2019.1656600.10.1080/09557571.2019.1656600
]Search in Google Scholar
[
Rid T. (2020). Active Measures: The Secret History of Disinformation and Political Warfare. London: Profile Books.
]Search in Google Scholar
[
Schmitt M. N., Vihul L. (2014). ‘Proxy Wars in Cyberspace: The Evolving International Law of Attribution’. Fletcher Security Review. vol. 1, 2.
]Search in Google Scholar
[
Segev H., Doron E., Orion A. (2019). ‘My Way or the Huawei? The United States-China Race for 5G Dominance’. Institute for National Security Studies.
]Search in Google Scholar
[
Steger M. B. (2005). ‘Ideologies of globalization.’ Journal of Political Ideologies 10.10.1080/1356931052000310263
]Search in Google Scholar
[
Thomas T. L. (2004). ‘Russia’s Reflexive Control Theory and the Military’. Journal of Slavic Military Studies. vol. 17, 237.10.1080/13518040490450529
]Search in Google Scholar
[
Tsygankov A. P. (2018) ‘The sources of Russia’s fear of NATO’. Communist and Post-Communist Studies 51, 2. Weitz R. (2016). ‘Russia Wants to Remake Globalization in Its Own Image’. Yale Global Online [online]. Available at <https://yaleglobal.yale.edu/content/russia-wants-remake-globalization-its-own-image>. [Accessed on May 8, 2021].10.1016/j.postcomstud.2018.03.002
]Search in Google Scholar
[
Vasara A. (2020). ‘Theory of Reflexive Control Origins, Evolution and Application in the Framework of Contemporary Russian Military Strategy’. Finnish Defence Studies 22.
]Search in Google Scholar
[
Waltz K. (1964). ‘The Stability of a Bipolar World’. Population, Prediction, Conflict, Existentialism, Vol. 93, No. 3, 884.
]Search in Google Scholar
[
Weitz R. (2016). ‘Russia Wants to Remake Globalization in Its Own Image.’ Yale Global Online [online]. Available at <https://yaleglobal.yale.edu/content/russia-wants-re-make-globalization-its-own-image>.
]Search in Google Scholar
[
Wohlforth W. C. (1999). ‘The Stability of a Unipolar World’. International Security 24. no. 1.10.1162/016228899560031
]Search in Google Scholar
[
Yeisley M. O. (2011). ‘Bipolarity, Proxy Wars, and the Rise of China.’ Strategic Studies Quarterly 5. no. 4., 75–91.
]Search in Google Scholar