<?xml version="1.0" encoding="utf8"?>
 <!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "http://jats.nlm.nih.gov/publishing/1.0/JATS-journalpublishing1.dtd"> <article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.0" xml:lang="en">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JAFS</journal-id>
      <journal-title-group>
        <journal-title>Journal of Advanced Forensic Sciences</journal-title>
      </journal-title-group>
      <issn pub-type="epub">2692-5915</issn>
      <publisher>
        <publisher-name>Open Access Pub</publisher-name>
        <publisher-loc>United States</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.14302/issn.2692-5915.jafs-20-3601</article-id>
      <article-id pub-id-type="publisher-id">JAFS-20-3601</article-id>
      <article-categories>
        <subj-group>
          <subject>research-article</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>A Critical Evaluation of the Estonian Cyber Incident</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <name>
            <surname>Buresh</surname>
            <given-names>Donald L.</given-names>
          </name>
          <xref ref-type="aff" rid="idm1843067212">1</xref>
          <xref ref-type="aff" rid="idm1843066780">*</xref>
        </contrib>
      </contrib-group>
      <aff id="idm1843067212">
        <label>1</label>
        <addr-line>Cybersecurity and Policy Department, Morgan State University, Baltimore, Maryland.</addr-line>
      </aff>
      <aff id="idm1843066780">
        <label>*</label>
        <addr-line>Corresponding author</addr-line>
      </aff>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Barbara</surname>
            <given-names>Kelemen</given-names>
          </name>
          <xref ref-type="aff" rid="idm1842933036">1</xref>
        </contrib>
      </contrib-group>
      <aff id="idm1842933036">
        <label>1</label>
        <addr-line>Central European Institute of Asian Studies (SK).</addr-line>
      </aff>
      <author-notes>
        <corresp>
  Donald L. Buresh (PhD, JD, LL.M.), <addr-line>3115 Enoch Avenue, Zion, Illinois 60099</addr-line>                Telephone: <phone>847-872-1659</phone>. Email: <email>LoganSquareDon@sbcglobal.net</email></corresp>
        <fn fn-type="conflict" id="idm1842916284">
          <p>The authors have declared that no competing interests exist.</p>
        </fn>
      </author-notes>
      <pub-date pub-type="epub" iso-8601-date="2020-11-03">
        <day>03</day>
        <month>11</month>
        <year>2020</year>
      </pub-date>
      <volume>1</volume>
      <issue>2</issue>
      <fpage>7</fpage>
      <lpage>14</lpage>
      <history>
        <date date-type="received">
          <day>22</day>
          <month>10</month>
          <year>2020</year>
        </date>
        <date date-type="accepted">
          <day>27</day>
          <month>10</month>
          <year>2020</year>
        </date>
        <date date-type="online">
          <day>03</day>
          <month>11</month>
          <year>2020</year>
        </date>
      </history>
      <permissions>
        <copyright-statement>© </copyright-statement>
        <copyright-year>2020</copyright-year>
        <copyright-holder>Donald L. Buresh</copyright-holder>
        <license xlink:href="http://creativecommons.org/licenses/by/4.0/" xlink:type="simple">
          <license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.</license-p>
        </license>
      </permissions>
      <self-uri xlink:href="http://openaccesspub.org/jafs/article/1489">This article is available from http://openaccesspub.org/jafs/article/1489</self-uri>
      <abstract>
        <p>This paper evaluates the effect of the Estonian cyber incident on Estonia, Russia, the United States, the European Union, and the North Atlantic Treaty Organization, also known as NATO. The paper employs the Valeriano and Maness criteria for evaluating a cyber incident critically. The article asks how did the Estonian cyber incident come to pass, what were the foreign policy and international relationship effects, what was the impact on Estonia, and how did Estonia react to the attack. The essay concludes that the Estonian cyber incident was a catalyst, prompting the nations listed herein to address the effects of cyber-attacks, and then search for acceptable solutions.</p>
      </abstract>
      <kwd-group>
        <kwd>Cyber-attack</kwd>
        <kwd>Cyber terrorism</kwd>
        <kwd>Digital terrorism</kwd>
        <kwd>Estonian cyber-attack</kwd>
      </kwd-group>
      <counts>
        <fig-count count="0"/>
        <table-count count="0"/>
        <page-count count="8"/>
      </counts>
    </article-meta>
  </front>
  <body>
    <sec id="idm1842931236" sec-type="intro">
      <title>Introduction</title>
      <p>The purpose of this paper is to analyze the Estonian cyber incident of 2007 critically using the Valeriano and Maness criteria<xref ref-type="bibr" rid="ridm1849784772">1</xref>. The analysis will focus on answering the following four questions:</p>
      <p>How did the Estonian incident come about?</p>
      <p>What was the foreign policy and international relations contest of the Estonian attack?</p>
      <p>What was the impact of the attack on Estonia? and</p>
      <p>What was the reaction to the incident by Estonia?<xref ref-type="bibr" rid="ridm1849787796">2</xref></p>
      <p>Because there were five parties involved in the incident – Estonia, Russia, the United States, the European Union, and NATO – the answer to the second question is divided into three parts, (1) the relationship between Estonia and the United States, the European Union, and NATO, (2) the relationship between Estonia and Russia, and (3) the relationship between the United States and Russia. The paper concludes by pointing out that the Estonian attacked resulted in better political relations between Estonia and the West, the publication of the Tallinn Manual, while Russia became further isolated from the Western powers.</p>
    </sec>
    <sec id="idm1842934836">
      <title>How Did the Estonian Incident Come About?</title>
      <p>The Estonian cyber-attack started on Friday, April 27, 2007, and finished on Friday, May 18, 2007, continuing for three weeks<xref ref-type="bibr" rid="ridm1849790612">3</xref>. The attack was triggered by the decision of the Estonian government to move a Soviet World War II memorial of a Bronze Soldier from central Tallinn, the capital city of Estonia, to a military cemetery<xref ref-type="bibr" rid="ridm1849888764">4</xref>. During holidays related to World War II, Russian Estonians commemorated their losses by placing flowers on the site<xref ref-type="bibr" rid="ridm1849884948">5</xref>. These events increasingly provoked hostile actions against the Estonian government by the Russian government and Russian media, where the protests in the streets quickly morphed into riots<xref ref-type="bibr" rid="ridm1849856940">6</xref>. The Estonian embassy came under siege, and the Estonian ambassador to Russia was physically harassed.<xref ref-type="bibr" rid="ridm1849645724">7</xref> Estonians had almost universal access to the Internet, where the government had promoted information technology to expand the ability of Estonian citizens to communicate with their government and vice versa<xref ref-type="bibr" rid="ridm1849646660">8</xref>. By 2001, the Estonian government had become virtually paperless<xref ref-type="bibr" rid="ridm1849643852">9</xref>.</p>
      <p>The cyber attackers employed the following four methods against the Estonian government and Estonian companies and institutions:</p>
      <p>Distributed Denial of Service (“DDoS”) attacks; </p>
      <p>Website defacement; and</p>
      <p>Data Name Servers (“DNS”) attacks;</p>
      <p>Mass email comment spam.<xref ref-type="bibr" rid="ridm1849643564">10</xref></p>
      <p>First, the attacks from April 27 to April 29 involved defacing government websites, where these attacks were reasonably clear-cut, employing the ping command<xref ref-type="bibr" rid="ridm1849649396">11</xref>. However, over time, malformed web queries were used against government and media sites<xref ref-type="bibr" rid="ridm1849647668">12</xref>. The second phase began on May 04, involving penetrating and precise attacks against these sites and data-name servers that employed botnets, where the attacks came from proxy servers located in foreign countries<xref ref-type="bibr" rid="ridm1849647524">13</xref>.  The second wave lasted from May 09 to May 11<xref ref-type="bibr" rid="ridm1849635772">14</xref>. In Russia, May 09 is Victory Day, a national holiday, celebrating the defeat of Nazi Germany in World War II<xref ref-type="bibr" rid="ridm1849635556">15</xref>. During this phase, phase, the DDoS attacks were amplified by 150 percent against government websites<xref ref-type="bibr" rid="ridm1849633900">16</xref>.  Hansapank, the largest Estonian bank, was also impacted by the DDoS attacks<xref ref-type="bibr" rid="ridm1849639876">17</xref>.</p>
      <p>During the third wave, 85,000 Estonian computers were hijacked, where the third wave occurred from noon until midnight on May 15<xref ref-type="bibr" rid="ridm1849640380">18</xref>. The attack on the SEB EestiÜhispank website, Estonia’s second-largest commercial bank, lasted for approximately 1.5 hours for Estonian customers and much longer for customers outside the country<xref ref-type="bibr" rid="ridm1849640236">19</xref>. On May 18, or during the fourth wave, both government and banking websites suffered from DDoS attacks<xref ref-type="bibr" rid="ridm1849638436">20</xref>. The attacks were traced to computers in 178 different countries and were probably politically motivated by people who followed instructions on Russian-language websites<xref ref-type="bibr" rid="ridm1849638004">21</xref>. The second phase of the episode seemed to be controlled from a central location, but only a few individuals acknowledged responsibility for the attacks<xref ref-type="bibr" rid="ridm1849625556">22</xref>. The Russian government denied any involvement in the cyber-attacks<xref ref-type="bibr" rid="ridm1849631820">23</xref>. </p>
      <p>The cyber-attack noticeably affected the whole Estonian economy because Estonian institutions heavily relied on information and communications technology infrastructure<xref ref-type="bibr" rid="ridm1849631388">24</xref>. Banks, media companies, government institutions, and small to medium businesses were affected<xref ref-type="bibr" rid="ridm1849633116">25</xref>. Communication with public administrators was significantly impeded along with the information flow to other countries, where one side-effect was that legitimate Internet traffic was congested<xref ref-type="bibr" rid="ridm1849628940">26</xref>. On a technical level, Estonia, along with the European Union (“EU”) and the North Atlantic Treaty Organization (“NATO”), worked together to combat this attack<xref ref-type="bibr" rid="ridm1849629516">27</xref>. In the end, public awareness was magnified, Estonia began cooperating with other nations to prevent such attacks in the future, thereby raising international awareness of cyber-criminal activity<xref ref-type="bibr" rid="ridm1849626636">28</xref>. The result of the episode was that countries became aware that cyber-attacks have global consequences with the possibility of affecting multiple regions and nations<xref ref-type="bibr" rid="ridm1849626996">29</xref>.</p>
      <sec id="idm1842903124">
        <title>What Was the Foreign Policy and International Relations Contest of the Estonian Attack?</title>
        <p>In attempting to appreciate the foreign policy and international implications of the Estonian                   cyber-attack, it is necessary to list the players. Based on the information above, the parties involved directly or indirectly were Estonia, Russia, the European Union, NATO, and the United States<xref ref-type="bibr" rid="ridm1849606316">30</xref>. Mathematically, there are ten possible relationships to consider<xref ref-type="bibr" rid="ridm1849605740">31</xref>. However, from a practical perspective, this number can be drastically reduced because several of the relationships are similar. For example, Estonia’s relationship to the United States, the EU, and NATO can be analyzed as a single relationship because (1) NATO is led by the United States, and (2) the EU is an ally of the United States. Estonia’s relationship with Russia is another possibility because Estonia is a Baltic state that borders Russia, and according to Valeriano and Mannes<xref ref-type="bibr" rid="ridm1849605308">32</xref>, rivalries may exist between Estonia and Russia. Finally, there is the relationship between the United States and Russia to contemplate. Even though the United States and the European Union are separate sovereign entities, and NATO is a non-government organization, their relationship is more likely related to the relationship between the United States and Russia.</p>
      </sec>
      <sec id="idm1842903772">
        <title>Estonia and the United States, the European Union, and NATO</title>
        <p>The primary effect of the Estonian cyber-attack was that Estonia drew closer to the West, particularly the United States, the EU, and NATO<xref ref-type="bibr" rid="ridm1849604876">33</xref>. Mansel aptly pointed out that the country went from Estonia to <italic>E-stonia</italic><xref ref-type="bibr" rid="ridm1849617404">34</xref>. According to McGuinness, the government of Estonia has established a voluntary Cyber Defence Unit<xref ref-type="bibr" rid="ridm1849615100">35</xref>. These individuals are trained by the Estonian Ministry of Defence, donating their free time to protecting their country by practicing what procedures to follow if a utility or an Internet service provider was the victim of a cyber-attack<xref ref-type="bibr" rid="ridm1849615028">36</xref>. After the Russian annexation of the Crimea in 2014, on the weekends, 25,000 Estonian volunteers dress up in fatigues, practicing their shooting skills<xref ref-type="bibr" rid="ridm1849613588">37</xref>.</p>
        <p>Another major international event that brought Estonia closer to the United States, the EU, and NATO were the creating of the <italic>Tallinn Manual on the International Law Applicable to Cyber Warfare</italic></p>
        <p>(“Tallinn Manual”)<xref ref-type="bibr" rid="ridm1849613732">38</xref>. It was written by the Tallinn-based <italic>NATO Cooperative Cyber </italic><italic>Defence</italic><italic> Centre of Excellence</italic> (“CCDCE”) by an international group of approximately twenty experts<xref ref-type="bibr" rid="ridm1849611284">39</xref>. According to Schmidt, in the latter part of 2009, the CCDCE assembled an international group of legal scholars and practitioners to write a manual that dealt with interpreting international law in the context of cyber operations and cyber warfare<xref ref-type="bibr" rid="ridm1849610924">40</xref>. It was the first time that the international community comprehensively and authoritatively addressed cyber operations and cyberwar with the desire to bring order to these highly complex legal issues<xref ref-type="bibr" rid="ridm1849609052">41</xref>.</p>
        <p>The result of these efforts was that Estonia drew closer to the West, and the West embraced Estonia<xref ref-type="bibr" rid="ridm1849609412">42</xref>. Another consequence of the Estonian attack was the increased political distance between Russia and the United States, the EU, and NATO<xref ref-type="bibr" rid="ridm1849609628">43</xref>. In other words, the Estonian attack further strained the relations between the United States and Russia (Valeriano &amp; Maness, 2015)<xref ref-type="bibr" rid="ridm1849587108">44</xref>. This will be discussed later in this paper.</p>
      </sec>
      <sec id="idm1842881068">
        <title>Estonia and Russia</title>
        <p>According to Valeriano and Maness, the purpose of the Estonian cyber-attack was to punish Estonia for disrespecting Russian culture, history, and identity by removing the Bronze Soldier from central Tallinn to a military cemetery<xref ref-type="bibr" rid="ridm1849588260">45</xref>. At the beginning of World War II and during the post-war period, Estonia became a satellite state of the Union of Soviet Socialist Republics (“USSR”). Thus, it makes sense that when the USSR dissolved, and Estonia received its independence, there would be significant animosity between the two sovereigns<xref ref-type="bibr" rid="ridm1849586172">46</xref>. It should also be remembered that during pre-World War II, there was a substantial number of ethnic Russians that lived in Estonia<xref ref-type="bibr" rid="ridm1849586676">47</xref>. After the war, Estonia was ruled by Moscow via Russian-born Estonian governors. They were from families of native Estonians residing in Russia, having later obtained their education in the Soviet Union during the Stalinist era<xref ref-type="bibr" rid="ridm1849599492">48</xref>. Many of these individuals had fought in the Red Army under the guise of the Estonian Rifle Corps<xref ref-type="bibr" rid="ridm1849596252">49</xref>. Even so, only a few spoke the Estonian language<xref ref-type="bibr" rid="ridm1849597980">50</xref>.</p>
        <p>According to Valeriano and Maness, the dispute about the Bronze Soldier began in 1991 when Estonia, like many other satellite states, cast off the Soviet yoke<xref ref-type="bibr" rid="ridm1849595964">51</xref>. Like Latvia and Lithuania, the two other Baltic states, Estonia, viewed the Soviet annexation into the USSR after World War II, trading one oppressive regime (Nazi Germany) for another (the USSR)<xref ref-type="bibr" rid="ridm1849595244">52</xref>. Given that in 2007 seven percent of ethnic Russians lived in Estonia, it was not surprising that these individuals perceived the movement of the Bronze Soldier as an affront to their Russian identity and to the millions of Russians that died during World War II while freeing the world from Nazi oppression<xref ref-type="bibr" rid="ridm1849593300">53</xref>. As a significant power and as a permanent member of the United Nations Security Council, one could anticipate that Russia would be offended by Estonia relegating the Bronze Soldier to a seemingly unknown location<xref ref-type="bibr" rid="ridm1849593660">54</xref>.<xref ref-type="bibr" rid="ridm1849590420">55</xref>According to Valeriano and Maness, it is not astonishing that Russia reacted, or even overreacted, in a manner to protect its perceived honor<xref ref-type="bibr" rid="ridm1849589556">56</xref>. What was startling was that Russia engaged in cyber action as a retaliatory response<xref ref-type="bibr" rid="ridm1849591140">57</xref>. </p>
      </sec>
      <sec id="idm1842879268">
        <title>The United States and Russia</title>
        <p>According to Stadnik, US-Russian cyber relations desires to answer the following two questions:</p>
        <p>Can the United States or Russia change the cybersecurity discussion in another country without committing a cyber-attack; and</p>
        <p>Do shifts in the discourse between the two power promote changes in foreign policy towards                   cyber-norms? <xref ref-type="bibr" rid="ridm1849579412">58</xref></p>
        <p>Ashmore observed that the high profile Estonian attack thrust cybersecurity from the domain of Internet magazines into the mainstream media<xref ref-type="bibr" rid="ridm1849578188">59</xref>. In the short-run, the attack advanced the perception of a new Cold War between the United States and Russia and between Russia and former Soviet satellites<xref ref-type="bibr" rid="ridm1849578620">60</xref>. The episode also demonstrated that NATO, the EU, and even the United Nations (“UN”) had inadequately prepared for preventing cyber-attacks<xref ref-type="bibr" rid="ridm1849575020">61</xref>.</p>
        <p>At issue is that there is scant evidence indicating that the Russian government was involved in the attack<sup>62,63</sup>. Even so, the circumstantial evidence does suggest that the Russian government was probably behind or support the attack<xref ref-type="bibr" rid="ridm1849574588">64</xref>. When countries or organizations are opposed to each other, a cyber-attack to influence the other party may be a viable option<xref ref-type="bibr" rid="ridm1849571276">65</xref>. This rule seems to be correct, with one glaring exception – the relationship between the United States and China<xref ref-type="bibr" rid="ridm1849570628">66</xref>. According to Valeriano and Maness wrote that only in this instance is a cyber-attack met with diplomacy by the United States rather than a cyber response<xref ref-type="bibr" rid="ridm1849572068">67</xref>.</p>
        <p>On November 18, 2019, a United Nations committee passed a Russia-backed cybercrime resolution by a vote of 88 to 58, with 34 countries abstaining<xref ref-type="bibr" rid="ridm1849568972">68</xref>. The resolution was sponsored by Russia, </p>
        <p>Belarus, Cambodia, China, Iran, Myanmar, Nicaragua, Syria, and Venezuela, and was entitled, <italic>Countering the use of information and communications technologies for criminal purposes</italic><xref ref-type="bibr" rid="ridm1849583084">69</xref>. Unfortunately, the United States was disappointed with the decision<xref ref-type="bibr" rid="ridm1849582292">70</xref>.</p>
        <p>The resolution created terms of reference for a future worldwide cybercrime treaty<xref ref-type="bibr" rid="ridm1849583804">71</xref>. According to Sherman and Reynolds, hacking attacks, privacy violations, or identity thefts are not the primary concern of the document<xref ref-type="bibr" rid="ridm1849550372">72</xref>. The idea behind the proposal is to make it easier for nations to cooperate in repressing political dissent<xref ref-type="bibr" rid="ridm1849549436">73</xref>. Although the ramification of the vote is that China and Russia are becoming quite adept in traversing international politics via the UN, the effect on the US-Russian relationship is that the Russian government is taking steps to curb the blatant use of the Internet for political purposes.<xref ref-type="bibr" rid="ridm1849564772">74</xref></p>
        <p>In contrast, according to Collier (2019),               twenty-seven (27) nations expressly agreed that countries should adhere to international law regarding basic rules concerning cyber behavior<xref ref-type="bibr" rid="ridm1849563188">75</xref>. Some signatories include the Five Eyes intelligence alliance (the United States, the United Kingdom, Australia, New Zealand, and Canada) and other major European nations, Colombia, Japan, and South Korea<xref ref-type="bibr" rid="ridm1849561676">76</xref>. The agreement stated that it is acceptable to engage in cyber espionage among nations, but attacking civilian infrastructure or providing a country with an economic advantage is objectionable<xref ref-type="bibr" rid="ridm1849561244">77</xref>.</p>
        <p>If the United States and other Western nations (including Japan and South Korea) can overcome their suspicion of Russia and China, the long-term effect of the Estonian attack could be greater cooperation between the two superpowers, their allies, and                       non-aligned states. Without an international cyber framework, cybercriminals will probably continue to operate successfully, profiting from their activities<xref ref-type="bibr" rid="ridm1849559084">78</xref>.</p>
        <p>Thus, it appears that the Estonian attack may be the catalyst for future cooperation among the United States, Russia, and even China<xref ref-type="bibr" rid="ridm1849558436">79</xref>. With diplomacy, a sense of urgency may not necessarily be a precious commodity, but what is essential is that the need for cyber rules is becoming increasingly evident. A synthesis between the American perspective on international cyber regulations and the Russian-Chinese view on cyber laws may be closer than some people think. Time will tell.</p>
      </sec>
      <sec id="idm1842864068">
        <title>What Was the Impact of the Attack on Estonia?</title>
        <p>According to Valeriano and Maness, the short-run monetary impact on Estonia was a loss of US $750 million in business and government revenues<xref ref-type="bibr" rid="ridm1849556420">80</xref>. The Estonian government was hampered in conducting normal business operations or providing government services to its citizenry<xref ref-type="bibr" rid="ridm1849556924">81</xref>. Estonia experienced another impact when NATO did not react thoughtfully while the attack occurred<xref ref-type="bibr" rid="ridm1849555772">82</xref>. Rid observed that the long-term result of the incident was that Estonia successfully acquired from NATO permanent cybersecurity agency in Tallinn, the <italic>Cooperative Cyber Defense Centre of Excellence</italic><xref ref-type="bibr" rid="ridm1849554764">83</xref>. Although one should remember that the Centre was created before the Estonian incident, the cyber-attack assured that the Centre would, after that, become critical to NATO operations<xref ref-type="bibr" rid="ridm1849551740">84</xref>. </p>
        <p>Finally, during the Estonian cyber-attack, there was the real possibility that Estonia would have invoked Article 5 of the NATO Charter, thereby yanking other NATO states into the fray and potentially causing a crisis in conventional foreign policy<xref ref-type="bibr" rid="ridm1849553324">85</xref>. Fiedler (2013) insightfully observed that when other nations are drawn into a conflict, the chances of success decline dramatically. The reason is that calmer minds may be cast to the wayside<xref ref-type="bibr" rid="ridm1849539252">86</xref>. According to Valeriano and Maness, it is possible that Estonia over- reacted, but with no precedent to guide the nation, the Estonian response may have, after all, been reasonable.<xref ref-type="bibr" rid="ridm1849539324">87</xref></p>
      </sec>
      <sec id="idm1842860972">
        <title>What Was the Reaction to the Incident by Estonia?</title>
        <p>According to Valeriano and Maness, after the cyber-attack ended, Estonians felt violated and vulnerable<xref ref-type="bibr" rid="ridm1849537668">88</xref>. A Saar Poll indicated that 65 percent of all Estonians believed that cyber incidents were the greatest threat to this small Baltic state<xref ref-type="bibr" rid="ridm1849535580">89</xref>. In comparison, 55 percent of Estonians thought that foreign intervention threatened Estonian sovereignty<xref ref-type="bibr" rid="ridm1849533564">90</xref>. According to Valeriano and Maness, the cyber-attack did little or no damage beyond a loss of time and a perceived loss of security<xref ref-type="bibr" rid="ridm1849532196">91</xref>. Essentially, the threat of a conventional conflict was negligible<xref ref-type="bibr" rid="ridm1849532556">92</xref>. The real impact is that Estonia is now considered a cybersecurity hub, where Tallinn, the capital of Estonia, has hosted the International Conference of Cyber Conflict at least five times<xref ref-type="bibr" rid="ridm1849530396">93</xref>.</p>
        <p>Although Estonia could have prompted NATO to engage in a tit-for-tat response, at the end of the day, it was Russia that was chastened as a disruptor of the international order<xref ref-type="bibr" rid="ridm1849529964">94</xref>. There is a question regarding Russia’s culpability, but it is probably correct to say that the Russian government could have stopped the attack<xref ref-type="bibr" rid="ridm1849527372">95</xref>. Quite likely, the sophistication of the attack caught the attention of the Russian Federal Security Service (“FSB”), the successor to the Komitet Gosudarstvennoy Bezopasnos (“KGB”), and the American Central Intelligence Agency (“CIA”)<xref ref-type="bibr" rid="ridm1849527588">96</xref>. The Estonian targets were hit with surgical precision, pointing to Russian government involvement<xref ref-type="bibr" rid="ridm1849526076">97</xref>. To naïvely state that the cyber-attack was an amateur effort challenges the reasonable mind<xref ref-type="bibr" rid="ridm1849526292">98</xref>. The scope, precision, and organization of the cyber-attack seem to support the conclusion that the attack possessed government support<xref ref-type="bibr" rid="ridm1849522620">99</xref>. Finally, the cyber-attack was comprehensive because of the Estonian response, and not because the attack was organized at the beginning of the conflict<xref ref-type="bibr" rid="ridm1849523196">100</xref>.</p>
      </sec>
    </sec>
    <sec id="idm1842856580" sec-type="conclusions">
      <title>Conclusion</title>
      <p>In conclusion, the Estonian cyber incident was a significant cyber-attack that did not lead to a kinetic conflict<xref ref-type="bibr" rid="ridm1849519524">101</xref>. It is also an important milestone because the attack led parties in the East and the West to a better understanding of cyber conflict and its ramifications. The <italic>Tallinn Manual</italic> was created in response to the Estonian cyber-attack<xref ref-type="bibr" rid="ridm1849519740">102</xref>. Finally, even though the major powers cannot currently agree on how to address cyber conflicts, both the United States and its allies, together with China and Russia, seem to be seeking ways to mitigate cyber conflict. Over time, a synthesis will most likely occur, where the meshing of the two perspectives may yield a cohesive whole. It is only a matter of time.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ridm1849784772">
        <label>1.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Valeriano</surname><given-names>B</given-names></name><name><surname>Maness</surname><given-names>R C</given-names></name><article-title>Cyber War versus Cyber Realities:Cyber Conflict</article-title><date><year>2015</year></date>
in the International System(Oxford University Press)



</mixed-citation>
      </ref>
      <ref id="ridm1849787796">
        <label>2.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849790612">
        <label>3.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Tikk</surname>
            <given-names>E</given-names>
          </name>
          <name>
            <surname>Kaska</surname>
            <given-names>E K</given-names>
          </name>
          <name>
            <surname>Vihul</surname>
            <given-names>L</given-names>
          </name>
          <date>
            <year>2010</year>
          </date>
          <chapter-title>International cyber incidents: Legal considerations, CCDCOE</chapter-title>
          <publisher-loc>https://ccdcoe.org/publications/books/legalconsiderations.pdf</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1849888764">
        <label>4.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849884948">
        <label>5.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849856940">
        <label>6.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849645724">
        <label>7.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849646660">
        <label>8.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849643852">
        <label>9.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849643564">
        <label>10.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>D</surname>
            <given-names>L Buresh</given-names>
          </name>
          <article-title>Does digital terrorism really exist?</article-title>
          <date>
            <year>2020</year>
          </date>
          <source>Journal of Advanced Forensic Sciences</source>
          <volume>1</volume>
          <issue>1</issue>
          <fpage>18</fpage>
          <lpage>29</lpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1849649396">
        <label>11.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849647668">
        <label>12.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849647524">
        <label>13.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849635772">
        <label>14.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849635556">
        <label>15.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849633900">
        <label>16.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 3</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849639876">
        <label>17.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849640380">
        <label>18.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849640236">
        <label>19.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849638436">
        <label>20.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849638004">
        <label>21.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849625556">
        <label>22.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849631820">
        <label>23.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849631388">
        <label>24.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 10</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849633116">
        <label>25.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849628940">
        <label>26.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849629516">
        <label>27.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849626636">
        <label>28.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849626996">
        <label>29.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849606316">
        <label>30.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 1</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849605740">
        <label>31.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>GR</surname>
            <given-names>Jones George</given-names>
          </name>
          <article-title>Understanding and Managing Organizational Behavior (Addison-Wesley Publishing). Specifically, the number of relationships = (the number of parties*(the number of parties-1))/2 or=(5*4)/2=10</article-title>
          <date>
            <year>1996</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1849605308">
        <label>32.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 1</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849604876">
        <label>33.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>McGuinness</surname>
            <given-names>D</given-names>
          </name>
          <article-title>How a cyber attack transformed Estonia,BBC News.https://www.bbc.com/news/39655415</article-title>
          <date>
            <year>2017</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1849617404">
        <label>34.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Mansel</surname>
            <given-names>T</given-names>
          </name>
          <article-title>How Estonia became E-stonia,BBC News.https://www.bbc.com/news/business-22317297</article-title>
          <date>
            <year>2013</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1849615100">
        <label>35.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 33</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849615028">
        <label>36.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849613588">
        <label>37.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849613732">
        <label>38.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 3</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849611284">
        <label>39.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <date>
            <year>2013</year>
          </date>
          <chapter-title>Tallinn Manual on the International Law Applicable to Cyber Warfare</chapter-title>
          <institution>Tallinn Manual Staff.Cambridge University Press</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849610924">
        <label>40.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <chapter-title>Schmitt MN. Cambridge University Press(2013).Tallinn Manual on the International Law Applicable to Cyber Warfare</chapter-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1849609052">
        <label>41.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849609412">
        <label>42.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 1</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849609628">
        <label>43.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849587108">
        <label>44.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849588260">
        <label>45.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849586172">
        <label>46.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Hilden</surname>
            <given-names>D J</given-names>
          </name>
          <name>
            <surname>Smith</surname>
            <given-names>D J</given-names>
          </name>
          <article-title>The Baltic States and their region: New Europe or old? Slavic Review,65(3)</article-title>
          <date>
            <year>2007</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1849586676">
        <label>47.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849599492">
        <label>48.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Humphrey</surname>
            <given-names>R</given-names>
          </name>
          <name>
            <surname>Miller</surname>
            <given-names>R</given-names>
          </name>
          <name>
            <surname>Zdravomyslova</surname>
            <given-names>E A</given-names>
          </name>
          <date>
            <year>2003</year>
          </date>
          <chapter-title>Biographical Research in Eastern Europe: Altered Lives and Broken Biographies (Ashgate</chapter-title>
          <publisher-name>Publishing)</publisher-name>
        </mixed-citation>
      </ref>
      <ref id="ridm1849596252">
        <label>49.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849597980">
        <label>50.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849595964">
        <label>51.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 1</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849595244">
        <label>52.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849593300">
        <label>53.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849593660">
        <label>54.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Staff</surname><given-names>UNSC</given-names></name><article-title>United Nations Security Council, United Nations</article-title>
n.d., https://www.un.org/securitycouncil/content/current-members


</mixed-citation>
      </ref>
      <ref id="ridm1849590420">
        <label>55.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
         <institution>Id., supra 1</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849589556">
        <label>56.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849591140">
        <label>57.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849579412">
        <label>58.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Stadnik</surname>
            <given-names>I</given-names>
          </name>
          <article-title>US-Russian relations in cybersecurity: The constructivist dimension</article-title>
          <date>
            <year>2019</year>
          </date>
          <chapter-title>European Conference on Cyber Warfare and Security.</chapter-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1849578188">
        <label>59.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Ashmore</surname>
            <given-names>W C</given-names>
          </name>
          <article-title>Impact of alleged Russian cyber attacks, School of Advanced Military Studies. United States Army Command and General Staff College. Fort</article-title>
          <date>
            <year>2009</year>
          </date>
          <publisher-loc>Leavenworth, Kansas, August.</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1849578620">
        <label>60.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849575020">
        <label>61.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849574948">
        <label>62.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849573436">
        <label>63.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 1</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849574588">
        <label>64.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 59</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849571276">
        <label>65.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849570628">
        <label>66.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 1</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849572068">
        <label>67.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849568972">
        <label>68.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Sherman</surname><given-names>J</given-names></name><name><surname>Reynolds</surname><given-names>M</given-names></name><article-title>The UN passed a Russia-backed cybercrime resolution. That’s not good news for Internet freedom, The Washington Post</article-title><date><year>2019</year></date>
https://www.washingtonpost.com/politics/2019/12/04/un-passed-russia-backed-cybercrime-resolution-thats-not-good-news-internet-freedom/


</mixed-citation>
      </ref>
      <ref id="ridm1849583084">
        <label>69.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849582292">
        <label>70.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849583804">
        <label>71.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849550372">
        <label>72.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849549436">
        <label>73.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849564772">
        <label>74.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849563188">
        <label>75.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Collier</surname><given-names>K</given-names></name><article-title>27 countries sign cybersecurity pledge with digs at</article-title><date><year>2019</year></date>
https://www.cnn.com/2019/09/23/politics/united-nations-cyber-condemns-russia-china/index.html


</mixed-citation>
      </ref>
      <ref id="ridm1849561676">
        <label>76.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849561244">
        <label>77.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849559084">
        <label>78.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 59</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849558436">
        <label>79.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 10</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849556420">
        <label>80.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 1</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849556924">
        <label>81.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849555772">
        <label>82.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Healey</surname>
            <given-names>J</given-names>
          </name>
          <article-title>(2013).A fierce domain: Conflict in cyberspace 1986-2012(Cyber Conflict Studies Association)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1849554764">
        <label>83.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>T</surname>
            <given-names/>
          </name>
          <article-title>Rid (2013).Cyberwar will not take place(Hurst&amp;CompanyPublishing)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1849551740">
        <label>84.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849553324">
        <label>85.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 1</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849539252">
        <label>86.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Fiedler</surname>
            <given-names>J D</given-names>
          </name>
          <article-title>(2013).Bandwidth cascades: Escalation and pathogen models for cyber conflict diffusion</article-title>
          <date>
            <year/>
          </date>
          <source>Small Wars Journal</source>
          <fpage>http://smallwarsjournal.com/jrnl/art/bandwidth-cascades-escalation-and-pathogen-models-for-cyber-conflict-diffusion.</fpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1849539324">
        <label>87.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 1</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849537668">
        <label>88.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Id</surname>
            <given-names/>
          </name>
        </mixed-citation>
      </ref>
      <ref id="ridm1849535580">
        <label>89.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Saar</surname><given-names>Poll Staff</given-names></name><article-title>Public opinion and national defence, Ministry of Defence of Estonia</article-title><date><year>2013</year></date>


</mixed-citation>
      </ref>
      <ref id="ridm1849533564">
        <label>90.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849532196">
        <label>91.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 1</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849532556">
        <label>92.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849530396">
        <label>93.</label>
        <mixed-citation xlink:type="simple" publication-type="book"><date><year>2012</year></date><chapter-title>ICCC Staff,International Conference on Cyber Conflict, NATO Cooperative Cyber Defence Centre for Excellence</chapter-title>
http://www.ccdcoe.org/cycon/


</mixed-citation>
      </ref>
      <ref id="ridm1849529964">
        <label>94.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 1</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849527372">
        <label>95.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849527588">
        <label>96.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849526076">
        <label>97.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 1</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849526292">
        <label>98.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 10</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849522620">
        <label>99.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849523196">
        <label>100.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849519524">
        <label>101.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 1</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849519740">
        <label>102.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id., supra 39</institution>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>
