<?xml version="1.0" encoding="utf8"?>
 <!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "http://jats.nlm.nih.gov/publishing/1.0/JATS-journalpublishing1.dtd"> <article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="opinion-article" dtd-version="1.0" xml:lang="en">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JAFS</journal-id>
      <journal-title-group>
        <journal-title>Journal of Advanced Forensic Sciences</journal-title>
      </journal-title-group>
      <issn pub-type="epub">2692-5915</issn>
      <publisher>
        <publisher-name>Open Access Pub</publisher-name>
        <publisher-loc>United States</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.14302/issn.2692-5915.jafs-21-3930</article-id>
      <article-id pub-id-type="publisher-id">JAFS-21-3930</article-id>
      <article-categories>
        <subj-group>
          <subject>opinion-article</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Russian Cyber-Attacks on Estonia, Georgia, and Ukraine, Including Tactics, Techniques, Procedures, and Effects</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <name>
            <surname>Buresh</surname>
            <given-names>Donald L.</given-names>
          </name>
          <xref ref-type="aff" rid="idm1841690068">1</xref>
          <xref ref-type="aff" rid="idm1841689564">*</xref>
        </contrib>
      </contrib-group>
      <aff id="idm1841690068">
        <label>1</label>
        <addr-line>Morgan State University.</addr-line>
      </aff>
      <aff id="idm1841689564">
        <label>*</label>
        <addr-line>Corresponding author</addr-line>
      </aff>
      <author-notes>
        <corresp>
  Donald L. Buresh (PhD, JD, LL.M.) <addr-line>Morgan State University</addr-line><email>logansquaredon@sbcglobal.net</email></corresp>
        <fn fn-type="conflict" id="idm1842785860">
          <p>The authors have declared that no competing interests exist.</p>
        </fn>
      </author-notes>
      <pub-date pub-type="epub" iso-8601-date="2021-08-19">
        <day>19</day>
        <month>08</month>
        <year>2021</year>
      </pub-date>
      <volume>1</volume>
      <issue>2</issue>
      <fpage>15</fpage>
      <lpage>26</lpage>
      <history>
        <date date-type="received">
          <day>11</day>
          <month>08</month>
          <year>2021</year>
        </date>
        <date date-type="accepted">
          <day>14</day>
          <month>08</month>
          <year>2021</year>
        </date>
        <date date-type="online">
          <day>19</day>
          <month>08</month>
          <year>2021</year>
        </date>
      </history>
      <permissions>
        <copyright-statement>© </copyright-statement>
        <copyright-year>2021</copyright-year>
        <copyright-holder>Donald L. Buresh</copyright-holder>
        <license xlink:href="http://creativecommons.org/licenses/by/4.0/" xlink:type="simple">
          <license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.</license-p>
        </license>
      </permissions>
      <self-uri xlink:href="http://openaccesspub.org/jafs/article/1686">This article is available from http://openaccesspub.org/jafs/article/1686</self-uri>
      <abstract>
        <p>The purpose of this essay is to compare and contrast the cyber-attacks on Estonia,                         Georgia, and Ukraine, including tactics,                       techniques, procedures, and effects. The paper states that none of the models will probably be repeated. The thesis is that cyber-attacks will change as technology changes. In other words, past cyber-attacks operations, particularly in                    Estonia, Georgia, and Ukraine, are not good                        predictors of future cyber-attack activity.</p>
      </abstract>
      <kwd-group>
        <kwd>Cyber-Attack Tactics</kwd>
        <kwd>Cyber-Attack Techniques</kwd>
        <kwd>Cyber-Attack Procedures</kwd>
        <kwd>Cyber-Attack Effects</kwd>
        <kwd>Estonian Cyber-Attack</kwd>
        <kwd>Georgian Cyber-Attack</kwd>
        <kwd>Ukrainian Cyber-Attack</kwd>
      </kwd-group>
      <counts>
        <fig-count count="0"/>
        <table-count count="0"/>
        <page-count count="12"/>
      </counts>
    </article-meta>
  </front>
  <body>
    <sec id="idm1841555964" sec-type="intro">
      <title>Introduction</title>
      <p>This paper aims to look at the cyber-attacks of Estonia, Georgia, and Ukraine in light of future attacks. The issue is whether cyber attacks in years to come will resemble the attacks that occurred in Estonia, Georgia, and Ukraine, or will future attacks be based on new technologies that are currently emerging or in development. The cyber-attacks of Estonia, Georgia, and Ukraine are discussed in detail from the perspective of what occurred and what was learned. The thesis that is presented herein is that cyber-attacks will change and evolve as technology becomes more and more pervasive in everyday life. It is proposed that the cyber-attacks in Estonia, Georgia, and Ukraine are relatively poor predictors of future cyber-attacks.</p>
      <sec id="idm1841557332">
        <title>Russian Cyber-Attacks</title>
        <p>The Russian cyber-attacks that are             discussed include the Estonian, Georgian, and Ukrainian cyber-attacks. Each attack is analyzed in terms of its                tactics, techniques, procedures, and effects. The measures taken to counter the cyber-attacks and lessons learned from the cyber-attacks are also highlighted in some                 detail. </p>
      </sec>
      <sec id="idm1841557692">
        <title>Estonian Cyber-Attack</title>
        <p>The Estonian cyber-attack began on Friday, April 27, 2007, and ended on Friday, May 18, 2007. The attack lasted for three weeks.<xref ref-type="bibr" rid="ridm1849913420">1</xref> The attack was precipitated by the Estonian government’s decision to move a Soviet World War II memorial of a Bronze soldier two meters high from central Tallinn, the capital city of Estonia, to a                military cemetery.<xref ref-type="bibr" rid="ridm1849920044">2</xref> During World War II-related holidays, individuals commemorated their losses by placing                  flowers on the Tallinn site.<xref ref-type="bibr" rid="ridm1849916732">3</xref> However, over time, these events increasingly provoked hostile actions against the Estonian government.<xref ref-type="bibr" rid="ridm1849980236">4</xref> The movement of the statute was countered by intense opposition by the Russian                           government and Russian media, where protests in the streets quickly devolved into riots, the Estonian embassy went under siege, and the Estonian ambassador to Russia was physically harassed.<xref ref-type="bibr" rid="ridm1849921564">5</xref></p>
        <p>There was almost universal access to the                    Internet in Estonia, where the government promoted  information technology to increase the administrative ability to foster communications between Estonian                   citizens and their government and became virtually                paperless in 2001.<xref ref-type="bibr" rid="ridm1849995140">6</xref> The cyber attackers employed three methods against the Estonian government and Estonian institutions. The attacks consisted of Denial of Service (DoS) attacks, Distributed Denial of Service (DDoS)              attacks, website defacement, attacks against Data Name Servers (DNS), and mass email comment spam.<xref ref-type="bibr" rid="ridm1849989524">7</xref> The                attacks of April 27 through April 29 consisted of defacing government websites using the straightforward <italic>ping</italic> command.<xref ref-type="bibr" rid="ridm1850018612">8</xref> However, as time went by, malformed web queries were employed against the sites of the                      government and media outlets.<xref ref-type="bibr" rid="ridm1849986572">9</xref></p>
        <p>In the second phase of the attack, the first wave began on May 04, involving intense and precise attacks against websites and data name servers by using botnets, routing the attacks from proxy servers in other                          countries.<xref ref-type="bibr" rid="ridm1849774116">10</xref>  While the second wave lasted from May 09 through May 11, it should be remembered that in Russia, May 09 is the national holiday, Victory Day, signifying the defeat Nazi Germany in World War II.<xref ref-type="bibr" rid="ridm1849775052">11</xref> The DDoS attacks increased by 150 percent against government websites during the  second phase, lasting from May 09 to                      May 10.<xref ref-type="bibr" rid="ridm1849771380">12</xref> Although the Estonian government was the primary victim of the attack, Hansapank, the largest                 Estonian bank, was also affected by the DDoS attacks.<xref ref-type="bibr" rid="ridm1849771884">13</xref></p>
        <p>The third wave involved the hijacking of 85,000 Estonian computers, taking place from noon until                      midnight on May 15.<xref ref-type="bibr" rid="ridm1849770588">14</xref> The website for SEB Eesti                Ühispank, Estonia’s second-largest commercial bank,       lasted about 1.5 hours for Estonian customers and                   extended more for customers outside the country.<xref ref-type="bibr" rid="ridm1849775988">15</xref> On May 18, or the fourth wave, both government and                 banking websites experienced DDoS attacks.<xref ref-type="bibr" rid="ridm1849777572">16</xref> The source of the attacks was traced to computers in 178 different countries.<xref ref-type="bibr" rid="ridm1849776924">17</xref> The attacks were politically motivated by individuals who were following instructions on Russian-language websites.<xref ref-type="bibr" rid="ridm1849763108">18</xref> The second phase of the attack     appears to be centrally controlled.<xref ref-type="bibr" rid="ridm1849761452">19</xref> There were only a few individuals that took credit for the attacks.<xref ref-type="bibr" rid="ridm1849768004">20</xref> The      Russian government denied involvement in the                      cyber-attacks.<xref ref-type="bibr" rid="ridm1849769372">21</xref></p>
        <p>The cyber-attack had a noticeable effect on the Estonian economy, affecting commerce, industry, and governance that relied on information and                                   communications technology (ICT) infrastructure.<xref ref-type="bibr" rid="ridm1849767644">22</xref> Bank, media companies, government institutions, and small to medium businesses were all affected.<xref ref-type="bibr" rid="ridm1849766060">23</xref> The societal effect was that communication to public administration was significantly hampered along with the information flow to other countries.<xref ref-type="bibr" rid="ridm1849750572">24</xref> A side-effect was that was the                  legitimate Internet traffic was clogged.<xref ref-type="bibr" rid="ridm1849750284">25</xref> There was                     substantial technical response employed, with                           international cooperation from the European Union (EU) and the North Atlantic Treaty Organization (NATO).<xref ref-type="bibr" rid="ridm1849748556">26</xref> There was also  increasing public awareness as Estonia worked with other countries to bring cybercriminals to justice.<xref ref-type="bibr" rid="ridm1849748628">27</xref></p>
        <p>The lessons learned are manifold. The Estonian                cyber-attack raised international awareness that                     cyber-attacks were new forms of criminal activity in an information society.<xref ref-type="bibr" rid="ridm1849755252">28</xref> The attacks accentuated the need for mutual criminal assistance on an international level.<xref ref-type="bibr" rid="ridm1849754604">29</xref> The challenge was to appreciate that cyber-attacks have               international implications affecting one country and a global region or even the whole planet itself.<xref ref-type="bibr" rid="ridm1849754028">30</xref></p>
      </sec>
      <sec id="idm1841524924">
        <title>Georgian Cyber-Attack</title>
        <p>The Georgian cyber-attack began on Friday,            August 08, 2008, and ended on Thursday, August 28, 2008, and the attack lasted for three weeks.<xref ref-type="bibr" rid="ridm1849752012">31</xref> The attack was precipitated by an armed conflict between the                  Russian Federation and the country of Georgia over South Ossetia.<xref ref-type="bibr" rid="ridm1849740892">32</xref> In 2008, the Internet had a low penetration rate of 7 percent of the population.<xref ref-type="bibr" rid="ridm1849742188">33</xref> At the time, Georgia was not heavily dependent on IT infrastructure, but there were limited options to connect to the Internet via land routes, where the connections that did exist heavily                depended on Russia.<xref ref-type="bibr" rid="ridm1849739452">34</xref></p>
        <p>There were several methods employed in the Georgian cyber-attack. DoS and DDoS were involved,                including distributing malicious MS batch scripts whose instructions exploited Structured Query Language (SQL) vulnerabilities.<xref ref-type="bibr" rid="ridm1849740460">35</xref> Websites were also defaced, and email was used for targeting spamming attacks.<xref ref-type="bibr" rid="ridm1849736140">36</xref> The targets were the President of Georgia, the Georgian Parliament, Ministries, and the local government of Abkhazia.                       Financial institutions such as banks were also affected by the attacks.<xref ref-type="bibr" rid="ridm1849736572">37</xref> Although there was little or no evidence               linking the Russian government or state organizations to the attacks, it was thought that Russian hackers were the culprits.<xref ref-type="bibr" rid="ridm1849734124">38</xref> In essence, there is no conclusive proof as to who was behind the DDoS or defacement attacks.</p>
        <p>The effects of the Georgian attacks were limited because of the kinetic military conflict between Russia and Georgia.<xref ref-type="bibr" rid="ridm1849734844">39</xref> Because of the lack of communication                  technology in Georgia at the time, the transmission of information to the outside world was constrained,                  particularly during the beginning of the conflict.<xref ref-type="bibr" rid="ridm1849731892">40</xref>                      Primary communications operations were severely                     affected because most of the Georgian communications lines passed through Russia.<xref ref-type="bibr" rid="ridm1849732108">41</xref> Internet  services had to be                relocated to servers outside the country.<xref ref-type="bibr" rid="ridm1849732468">42</xref> National                  Community Emergency Response Team (CERT)                      assistance came from other countries to help alleviate the interruption of Internet service.<xref ref-type="bibr" rid="ridm1849745716">43</xref> The Georgian academic center CERT mitigated the attack by assuming the role of the Georgian national CERT at the time of the attack.<xref ref-type="bibr" rid="ridm1849747516">44</xref> There was a state-mandated blockage on Russian         websites to control information flow and free up                   bandwidth where services to servers were relocated to other countries.<xref ref-type="bibr" rid="ridm1849744852">45</xref> The national CERTs from other                    countries were thus involved in helping Georgia                       overcome the cyber-attack.<xref ref-type="bibr" rid="ridm1849745212">46</xref></p>
        <p>One of the significant lessons learned from the Georgian cyber-attacks was the applicability to the Law of Armed Conflicts (LOAC).<xref ref-type="bibr" rid="ridm1849716804">47</xref> The right of a country to         employ force against another state depends on the                   actions of the other state.<xref ref-type="bibr" rid="ridm1849717452">48</xref> The remedy must be                        proportionate to the threat and the harm incurred.<xref ref-type="bibr" rid="ridm1849714284">49</xref> The problem with the Georgian cyber-attack was that it was difficult to estimate the direct effects of the attacks.<xref ref-type="bibr" rid="ridm1849714068">50</xref>            Because the Georgian population was not highly                         dependent on Internet services, the cyber-attacks were not sufficiently serious to result in severe economic                  damage or human suffering.<xref ref-type="bibr" rid="ridm1849727532">51</xref> Thus, the application of the LOAC to the Georgian cyber-attacks seems problematic at best and irrelevant and immaterial at worst.<xref ref-type="bibr" rid="ridm1849728036">52</xref> The                    challenges are that new  approaches are needed to                     provide effective legal remedies, and that continued                  national information communication technologies are essential.<xref ref-type="bibr" rid="ridm1849726452">53</xref></p>
      </sec>
      <sec id="idm1841513092">
        <title>Ukrainian Cyber-Attack</title>
        <p>On December 23, 2015, Prykapattyapblenergo, a Ukrainian regional electricity distribution company,                stated that the service outages experienced by its                      customers were because of a third party’s illegal entry into the company’s computer and supervisory control and data acquisition (SCADA) systems.<xref ref-type="bibr" rid="ridm1849726524">54</xref> The outage    began at 3:35 PM local time.<xref ref-type="bibr" rid="ridm1849724004">55</xref> Seven 110 kilovolt (kV) and twenty-three 35 kV substations were disconnected from the Ukrainian power grid for three hours.<xref ref-type="bibr" rid="ridm1849722852">56</xref> The cyber-attack affected other portions of the distribution power grid, forcing the company to switch to manual mode.<xref ref-type="bibr" rid="ridm1849721268">57</xref></p>
        <p>The Ukrainian news agencies conducted                   interviews and concluded that a foreign government had remotely controlled the SCADA electrical distribution system.<xref ref-type="bibr" rid="ridm1849721700">58</xref> It was originally estimated that the outage only affected 80,000 customers.<xref ref-type="bibr" rid="ridm1849718244">59</xref> However, it was later                        discovered that the electrical distribution grids for                 Chernivtsioblenergo and Kyivoblenerogo were                  affected.<xref ref-type="bibr" rid="ridm1849719252">60</xref>In total, approximately  225,000 customers lost power due to the attack.<xref ref-type="bibr" rid="ridm1849697292">61</xref> These cyber-attacks in Ukraine were the first attacks that were publicly acknowledged to have resulted in power outages.<xref ref-type="bibr" rid="ridm1849698516">62</xref></p>
        <p>There were a variety of capabilities                       demonstrated by the Ukrainian attacks, including       spear-phishing emails, variations on Black Energy 3  malware, and altering Microsoft Office documents that contained the malware.<xref ref-type="bibr" rid="ridm1849696356">63</xref> The attack harvested                        credentials and information to gain admission to the Ukrainian ICT.<xref ref-type="bibr" rid="ridm1849694628">64</xref> The attackers advanced two SCADA  hijack approaches, the first one was a custom hijack, and the other was an agnostic hijack.<xref ref-type="bibr" rid="ridm1849710108">65</xref> The attackers were successful in employing them across different types of SCADA/DMS implementations.<xref ref-type="bibr" rid="ridm1849706292">66</xref> The attackers showed a desire to target field devices at substations, write                   custom malicious firmware, and ensure that specific  devices were inoperable.<xref ref-type="bibr" rid="ridm1849707444">67</xref></p>
        <p>It is not clear why these three oblenergos were targeted. Lee et al. gave the following possible decision factors.<xref ref-type="bibr" rid="ridm1849704060">68</xref></p>
        <p>Standard systems and configurations;</p>
        <p>Impact duration estimates;</p>
        <p>Existing capabilities would achieve the desired               results;</p>
        <p>Risk-level was reasonable; and</p>
        <p>Access to act within the environment. </p>
        <p>The lessons learned are legion. The                          spear-phishing employed social engineering techniques to target the Ukrainian oblenergos need to safelist             extensively, identifying users that are given the specific privilege, service, mobility, access, or recognition.<xref ref-type="bibr" rid="ridm1849703916">69</xref>                 Because <italic>Black Energy 3</italic> was used, user passwords should be changed periodically, data exfiltration and controlling access is critical, and two-factor                            authentication with user tokens should be applied.<xref ref-type="bibr" rid="ridm1849703772">70</xref></p>
      </sec>
      <sec id="idm1841514676">
        <title>Attacks Most Likely to Occur in the Future</title>
        <p>The purpose of this section of this essay is to discuss the likelihood of using the Estonian, Georgian, and Ukrainian cyber-attacks as models for future                    attacks. The paper points out that the Estonian and Georgian cyber-attacks share a familiar <italic>modus operandi</italic>, whereas the Ukrainian cyber-attack is either a special attack, a test attack, or possibly an attack by                              non-government actors. The reason is that the Estonian and Georgian cyber-attacks lasted for approximately three weeks, while the Ukrainian cyber-attack                         transpired for merely three hours. The difference in duration could be indicating an alternative explanation.</p>
      </sec>
      <sec id="idm1841515036">
        <title>Estonian and Georgian Cyber-Attacks</title>
        <p>The Estonian and Georgian cyber-attacks share several common characteristics. Both cyber-attacks used DoS and DDoS attacks, defacement of websites, and                  attacks on DNS.<xref ref-type="bibr" rid="ridm1849702692">71</xref> Both attacks lasted for approximately three weeks.<xref ref-type="bibr" rid="ridm1849701396">72</xref> The attacks occurred within 16 months, and both attacks were precipitated by the remembrance of a past war or an actual war.<xref ref-type="bibr" rid="ridm1849699740">73</xref> At the time,  Estonia had a highly developed Internet infrastructure, whereas the opposite was true in Georgia.<xref ref-type="bibr" rid="ridm1849685860">74</xref></p>
        <p>In projecting whether these two cyber-attacks would be good models for future attacks, the problem with such a prediction is that the technology employed is ten or more years old. Cell phones were present in the 2007-08 timeframe, but their sophistication at the time was a far cry from current technology.<xref ref-type="bibr" rid="ridm1849687732">75</xref> The Internet-of-Things (IoT) was in its infancy.<xref ref-type="bibr" rid="ridm1849684348">76</xref> The machines that            instigated the cyber-attacks were likely either computer towers or notebooks. Sophisticated computers inside    automobiles, televisions, refrigerators, microwaves, and gas and electric meters outside a home that use the          Internet were virtually unknown a decade ago.<xref ref-type="bibr" rid="ridm1849681540">77</xref> All of these devices are now candidates for bots to be used in future cyber-attacks.<xref ref-type="bibr" rid="ridm1849682908">78</xref> Thus, based on the evidence above, the cyber-attacks of the future will probably not resemble the cyber-attacks that occurred in Estonia and                       Georgia.<sup>79,80,81</sup>.</p>
      </sec>
      <sec id="idm1841503676">
        <title>Ukrainian Cyber-Attack</title>
        <p>As an example of future cyber-attacks, the               December 2015 cyber-attack in Ukraine has serious               credibility issues. First, in February 2014, the Ukrainian Euromaidan Revolution of 2014  occurred nearly two years before the Ukrainian cyber-attack.<xref ref-type="bibr" rid="ridm1849691908">82</xref> The parties to the revolution that overthrew the existing government included the Euromaidan protestors, the Euromaidan    militants (Sotnia), and the Right Sector, a Ukrainian                 neo-Nazi group.<xref ref-type="bibr" rid="ridm1849691044">83</xref> At the time, the revolution appeared to be a neo-Nazi revolution, thrusting the Right Sector into political power.<xref ref-type="bibr" rid="ridm1849688956">84</xref> The Russian people were adamantly against the new Ukrainian government because the 20 Soviet citizens died during World War II, defeating Nazi Germany.<xref ref-type="bibr" rid="ridm1849689388">85</xref> The citizens of Crimea voted overwhelmingly to secede from Ukraine.<xref ref-type="bibr" rid="ridm1849665932">86</xref> in fear that the new government would institute the ethnic cleansing of Russians in the peninsula.<xref ref-type="bibr" rid="ridm1849665644">87</xref> The Eastern regions of Donbas and Luhansk also seceded from Ukraine because most of its citizens were either Russians or of Russian descent.<xref ref-type="bibr" rid="ridm1849663052">88</xref> The                     government of Ukraine felt that the citizens of Crimea, Donbas, and Luhansk had illegally seceded from the     country and that Russia had instigated the secession.<xref ref-type="bibr" rid="ridm1849660820">89</xref> Thus, when the opportunity arose, it is reasonable to         suggest that blaming Russia for the power outage was a way to cast dispersions on the country’s northern            neighbour. </p>
        <p>Second, the electrical outage only lasted for three hours.<xref ref-type="bibr" rid="ridm1849660100">90</xref> In the United States, it is not uncommon for               power outages to last for three hours or more, mainly when a variety of events causes an equipment failure.<xref ref-type="bibr" rid="ridm1849658732">91</xref> This author experienced a power outage for four days while living in Massachusetts after an ice storm.<xref ref-type="bibr" rid="ridm1849656860">92</xref> In other words, a three-hour power outage could have been caused by a variety of reasons, including equipment                   failure or incompetence, not merely a cyber-attack by the Russian Federation. This is not to say that the Russian government or Russian citizens did not engage in a                  cyber-attack against Ukraine. The power outage could have been a testbed for future cyber-attacks.<xref ref-type="bibr" rid="ridm1849656932">93</xref> Instead, this alternative explanation is mentioned to point out that alternative reasons are possible and maybe probable.</p>
        <p>Third,  unlikely, there is a possibility that the    revolutionary Ukrainian government caused the power outage.  On February 27, 1933, the German Reichstag burned to the ground because of arson.<xref ref-type="bibr" rid="ridm1849654268">94</xref> One month                  earlier, Hitler was made Chancellor by von Hindenburg.<xref ref-type="bibr" rid="ridm1849653908">95</xref> The fire was blamed on Marinus van der Lubbe, an                 unemployed Dutch construction worker who the police arrested because he was outside the building possessing firelighters.<xref ref-type="bibr" rid="ridm1849652108">96</xref> He was also panting and sweating.<xref ref-type="bibr" rid="ridm1849650812">97</xref> Van der Lubbe was tried for the arson and executed.<xref ref-type="bibr" rid="ridm1849648796">98</xref> Hitler used the burning of the building as an excuse to pass The                Enabling Act of  1933, assigning all legislative power to Hitler and his ministers, thereby permitting Hitler to            control the German political process.<xref ref-type="bibr" rid="ridm1849649084">99</xref> Hitler then                proceeded to eliminate the Communists from German politics.<xref ref-type="bibr" rid="ridm1849648436">100</xref></p>
        <p>In contrast, Hett argued that Hitler and the        German Nazis could have caused the burning of the Reichstag to gain political power.<xref ref-type="bibr" rid="ridm1849645844">101</xref> Hett observed that in the previous election, the Nazis had lost seats in the Reichstag.<xref ref-type="bibr" rid="ridm1849643828">102</xref> To secure more power, Hitler may have used arson to abandon the constitution of the Weimar              Republic.<xref ref-type="bibr" rid="ridm1849643468">103</xref> With the burning embers of the Reichstag not yet extinguished, Hitler arrested 5,000 people, primarily communists.<xref ref-type="bibr" rid="ridm1849644044">104</xref> The result was the 12-year reign of the Third Reich.<xref ref-type="bibr" rid="ridm1849642820">105</xref>.</p>
        <p>The Right Sector, a Ukrainian political party, is a neo-Nazi group that has Third Reich roots.<xref ref-type="bibr" rid="ridm1849639652">106</xref> There is a possibility that the Ukrainian government used the power outage as an excuse to blame the Russian Federation for a cyber-attack, thereby garnering international support for the new Ukrainian government.<xref ref-type="bibr" rid="ridm1849640444">107</xref> What is peculiar about the power outage is that it only lasted for three hours.<xref ref-type="bibr" rid="ridm1849670756">108</xref> If it were indeed a Russian cyber-attack, the attack would probably have continued for more than a mere few hours, but then again, the attacks could be an effort by the                Russian government, even if it is somewhat lackluster, to prevent Ukraine from joining the European Union.<xref ref-type="bibr" rid="ridm1849667948">109</xref> Western media have claimed that the power outage was a cyber test conducted by the Russians Federation.<xref ref-type="bibr" rid="ridm1849666652">110</xref> If so, the account would have to explain the short duration of the power outage. One possibility is that the Ukrainian cyber-attack was conducted by Russian hackers who were not affiliated with the Russian government.<xref ref-type="bibr" rid="ridm1849616564">111</xref> It is also possible that Right Sector hackers attacked the Ukrainian government facilities while spoofing their URL attacking addresses to make it appear that the Russian government was involved in the cyber-attack, but there is seemingly no proof to this theory. It is indeed far more likely that Estonia and Georgia were attacked by the Russian                     Federation even though the Russian government denied any involvement in the attacks.<xref ref-type="bibr" rid="ridm1849616924">112</xref> After all, the Estonian and Georgian attacks lasted for three weeks.<xref ref-type="bibr" rid="ridm1849613108">113</xref> There are several alternative explanations and too many political axes to grind by Ukraine and the Western powers to                conclude positively that the power outage was a Russian Federation cyber-attack.<xref ref-type="bibr" rid="ridm1849611452">114</xref> The Russian Federation may have had little to nothing to gain by instigating a                      three-hour cyber-attack against the three oblenergos,   except collecting the data from a cyber-test.<xref ref-type="bibr" rid="ridm1849610228">115</xref> However, when considering the potential adverse effects on world opinion, Russia had a lot to lose if it was determined to be the perpetrator of the attacks.<xref ref-type="bibr" rid="ridm1849608572">116</xref> Thus, the short-lived cyber-attacks of oblenergos may not have originated in Russia and are probably not a good model for future                 international cyber-attacks.<xref ref-type="bibr" rid="ridm1849609508">117</xref> It appears that a cyber-test of this magnitude, if it was indeed a test, need only be    conducted once and not repeated.<xref ref-type="bibr" rid="ridm1849607708">118</xref></p>
      </sec>
      <sec id="idm1841494316">
        <title>A Glimpse into the Future</title>
        <p>The short response to whether the three                     cyber-attack models discussed above is likely to be           repeated in the future is none of the above.<xref ref-type="bibr" rid="ridm1849607780">119</xref> The reason is that the answer depends on the date and time of the attack and the technology that is employed by the            attack.<xref ref-type="bibr" rid="ridm1849603460">120</xref> For example, if a cyber-attack were to occur now, there would be little or no change in technology.<xref ref-type="bibr" rid="ridm1849603604">121</xref> The attack would probably very closely resemble past attacks because the cyber-attack would use existing                           available technology, such as fax machines, printers, video conference systems, security cameras, door access                     systems, and heating, ventilation, and cooling systems.<xref ref-type="bibr" rid="ridm1849601732">122</xref> There would be almost no change in the availability of the IoT and their controlling computer systems.<xref ref-type="bibr" rid="ridm1849599788">123</xref> Thus, a cyber-attack could resemble the Estonian, Georgian, or Ukrainian attacks, depending on the existing hardware and software employed by the attackers and available at the target site.</p>
        <p>However, if we move forward five, ten, or 20 years, the situation dramatically changes. The technology in this future period will probably be entirely different from the technology around us today.<xref ref-type="bibr" rid="ridm1849598996">124</xref>,<xref ref-type="bibr" rid="ridm1849596908">125</xref> First, there is the IoT. Smart devices are being marketed and sold to consumers at a rapid pace.<xref ref-type="bibr" rid="ridm1849595972">126</xref> IoT will pervasively                   dominate our economy in the next five to ten years.<xref ref-type="bibr" rid="ridm1849595252">127</xref> These devices will probably possess less than adequate security features because security will likely be brushed aside in a rush to market, while cybercriminals will note this situation and probably exploit it.<xref ref-type="bibr" rid="ridm1849592012">128</xref></p>
        <p>Stuxnet and its variations will probably play a dramatic role in future cyber-attacks.<xref ref-type="bibr" rid="ridm1849591508">129</xref> When the United States government used Stuxnet a decade ago to disrupt Iranian centrifuges, a physical machine was involved that stopped working correctly.<xref ref-type="bibr" rid="ridm1849623908">130</xref> The child or grandchild of Stuxnet could be employed to modify the actions of                     physical devices such as automobiles, televisions,                   refrigerators, or microwave ovens.<xref ref-type="bibr" rid="ridm1849621460">131</xref> These devices could be programmed by malware to stop functioning or even to explode.<xref ref-type="bibr" rid="ridm1849618652">132</xref> A car is the most potentially dangerous of the machines mentioned because it is large, heavy, and moves quickly.<xref ref-type="bibr" rid="ridm1849618796">133</xref> With sophisticated computers inside controlling the operation of an automobile, cars could be employed to run people over or even explode in crowded areas.<xref ref-type="bibr" rid="ridm1849566812">134</xref> A Stuxnet-like virus that infected a vehicle could be programmed to affect specific vehicles that would             injure or kill particular individuals, where the attack               occurs in an automobile assembly plant or while                        driving.<xref ref-type="bibr" rid="ridm1849564652">135</xref> When this type of cyber-attack occurs, a kinetic response of some sort may be entirely appropriate under certain conditions, such as what happened when                       Archduke Ferdinand, the heir to the Austrian-Hungarian Empire, was the heir at the time to the                                          Austrian-Hungarian Empire assassinated on June 28, 1914.<xref ref-type="bibr" rid="ridm1849563716">136</xref></p>
        <p>When looking 20 years into the future, it is quite likely that human beings will be physically connected to the Internet via nanotechnology that is implanted into their bodies.<xref ref-type="bibr" rid="ridm1849562060">137</xref> This technology could interact with                   human DNA, causing numerous issues.<xref ref-type="bibr" rid="ridm1849559828">138</xref> For example, a cyber-attack could involve programming humans to                   perform actions that they normally would not do. A                 cyber-attack could circumvent human free will.<xref ref-type="bibr" rid="ridm1849559540">139</xref> If the attack was sufficiently malicious, it might be possible to program humans to attack others or to do nothing when a defensive response would be appropriate. In this case, society could easily resemble a <italic>Brave New World</italic> or a <italic>1984</italic> society.<xref ref-type="bibr" rid="ridm1849558172">140</xref>,<xref ref-type="bibr" rid="ridm1849555364">141</xref></p>
        <p>Thus, a future cyber-attack depends on the date and time that the attack occurs and the technology                   involved. Without this information, it is probably                          impossible to predict what a future cyber-attack will                resemble with any precision or accuracy. However, with this information, the only impediment to a precise and accurate prediction is the imagination of a sage or                     prophet. A prospective attacker will have no such                       limitation. They are already well aware that the future belongs to them.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ridm1849913420">
        <label>1.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Tikk</surname>
            <given-names>Eneken</given-names>
          </name>
          <name>
            <surname>Kaska</surname>
            <given-names>Kadri</given-names>
          </name>
          <name>
            <surname>Vihul</surname>
            <given-names>Liis</given-names>
          </name>
          <article-title>International Cyber Incidents: Legal Considerations, The NATO Cooperative Cyber Defence Centre of Excellence. available at https://ccdcoe.org/library/publications/international-cyber-incidents-legal-considerations/</article-title>
          <date>
            <year>2010</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1849920044">
        <label>2.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849916732">
        <label>3.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849980236">
        <label>4.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849921564">
        <label>5.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Donald</surname>
            <given-names>L Buresh</given-names>
          </name>
          <article-title>(2020). ACriticalEvaluation of the Estonian Cyber Incident</article-title>
          <source>Journal of Advanced Forensic Sciences</source>
          <volume>2</volume>
          <fpage>7</fpage>
          <lpage>14</lpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1849995140">
        <label>6.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849989524">
        <label>7.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850018612">
        <label>8.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Rain</surname>
            <given-names/>
          </name>
          <article-title>Otis, Analysis of the 2007 Cyber Attacks Against Estonia from the Information Warfare Perspective, The Cooperative Cyber Defence Centre of Excellence, (n.d.), available at https://ccdcoe.org/uploads/2018/10/O tis2008_AnalysisOf2007FromTheInformationWarfarePerspective.pdf</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1849986572">
        <label>9.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849774116">
        <label>10.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849775052">
        <label>11.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849771380">
        <label>12.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Tikk</surname>
            <given-names>Eneken</given-names>
          </name>
          <name>
            <surname>Kaska</surname>
            <given-names>Kadri</given-names>
          </name>
          <source>Liis Vihul, supra, note</source>
          <volume>1</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1849771884">
        <label>13.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849770588">
        <label>14.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849775988">
        <label>15.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849777572">
        <label>16.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <publisher-loc>Rain Otis, supra, note 8</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1849776924">
        <label>17.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Tikk</surname>
            <given-names>Eneken</given-names>
          </name>
          <name>
            <surname>Kaska</surname>
            <given-names>Kadri</given-names>
          </name>
          <source>Liis Vihul,supra, note</source>
          <volume>1</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1849763108">
        <label>18.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849761452">
        <label>19.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849768004">
        <label>20.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849769372">
        <label>21.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849767644">
        <label>22.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Herzog</surname>
            <given-names>Stephen</given-names>
          </name>
          <article-title>2011. Revisiting theEstonianCyber Attacks: Digital Threats and Multinational Responses</article-title>
          <source>4 Journal of Strategic Security</source>
          <fpage>49</fpage>
          <lpage>60</lpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1849766060">
        <label>23.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Tamkin</surname>
            <given-names>Emily</given-names>
          </name>
          <article-title>(2020). 10 YearsAfterthe Landmark Attack on Estonia, Is the World Better Prepared for CyberThreats?, Foreign Policy, available at https://foreignpolicy.com/2017/04/27/10-years-after-the-landmark-attack-on-estonia-is-the-world-better-prepared-for-cyber-threats/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1849750572">
        <label>24.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849750284">
        <label>25.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849748556">
        <label>26.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849748628">
        <label>27.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849755252">
        <label>28.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>The Conversation Staff,Cyber Attacks Ten Years On: From Disruption to Disinformation, The Conversation, available at https://theconversation.com/cyber-attacks-ten-years-on-from-disruption-to-disinformation-75773</article-title>
          <date>
            <year>2017</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1849754604">
        <label>29.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849754028">
        <label>30.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849752012">
        <label>31.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Tikk</surname>
            <given-names>Eneken</given-names>
          </name>
          <name>
            <surname>Kaska</surname>
            <given-names>Kadri</given-names>
          </name>
          <source>Liis Vihul,supra, note</source>
          <volume>1</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1849740892">
        <label>32.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849742188">
        <label>33.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849739452">
        <label>34.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849740460">
        <label>35.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Dancho Danchev,Coordinated Russia vs Georgia Cyber Attack in Progress, ZDNet</article-title>
          <date>
            <year>2008</year>
          </date>
          <fpage>at https://www.zdnet.com/article/coordinated-russia-vs-georgia-cyber-attack-in-progress/.</fpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1849736140">
        <label>36.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849736572">
        <label>37.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849734124">
        <label>38.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849734844">
        <label>39.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Swanson</surname>
            <given-names>Lesley</given-names>
          </name>
          <article-title>(2010). The Era of CyberWarfare:</article-title>
          <chapter-title>Applying International Humanitarian Law to the2008 Russian-Georgian Cyber Conflict, 32 Loy.L.A.Int'l&amp;Comp.L.Rev.303, available at http://digitalcommons.lmu.edu/cgi/viewcontent.cgi?article=1010&amp;context=ilr</chapter-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1849731892">
        <label>40.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849732108">
        <label>41.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849732468">
        <label>42.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849745716">
        <label>43.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849747516">
        <label>44.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Tikk</surname>
            <given-names>Eneken</given-names>
          </name>
          <name>
            <surname>Kaska</surname>
            <given-names>Kadri</given-names>
          </name>
          <source>Liis Vihul,supra, note</source>
          <volume>1</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1849744852">
        <label>45.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849745212">
        <label>46.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849716804">
        <label>47.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Sarah</surname>
            <given-names>P</given-names>
          </name>
          <article-title>White, Understanding Cyberwarfare: Lessons from the Russia-Georgia War, Modern War Institute at West Point, available at https://mwi.usma.edu/wp-content/uploads/2018/03/Understanding-Cyberwarfare.pdf</article-title>
          <date>
            <year>2018</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1849717452">
        <label>48.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849714284">
        <label>49.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849714068">
        <label>50.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849727532">
        <label>51.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Tikk</surname>
            <given-names>Eneken</given-names>
          </name>
          <name>
            <surname>Kaska</surname>
            <given-names>Kadri</given-names>
          </name>
          <source>Liis Vihul, supra, note</source>
          <volume>1</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1849728036">
        <label>52.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849726452">
        <label>53.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Id</surname>
            <given-names/>
          </name>
        </mixed-citation>
      </ref>
      <ref id="ridm1849726524">
        <label>54.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Zetter</surname>
            <given-names>Kim</given-names>
          </name>
          <article-title>(2016). Insidethe Cunning, Unprecedented Hack of Ukraine's Power Grid</article-title>
          <publisher-loc>Wired, available at https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1849724004">
        <label>55.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849722852">
        <label>56.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849721268">
        <label>57.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849721700">
        <label>58.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Robert</surname>
            <given-names>M Lee</given-names>
          </name>
          <name>
            <surname>Michael</surname>
            <given-names>J Assante</given-names>
          </name>
          <name>
            <surname>Conway</surname>
            <given-names>Tim</given-names>
          </name>
          <article-title>of the Cyber Attack on the Ukrainian Power GridElectricity Information Sharing and Analysis Center, available at https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2016/05/20081514/E-ISAC_SANS_Ukraine_DUC_5.pdf</article-title>
          <date>
            <year>2016</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1849718244">
        <label>59.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849719252">
        <label>60.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849697292">
        <label>61.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849698516">
        <label>62.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849696356">
        <label>63.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Staff</surname><given-names>CPI</given-names></name><name><surname>Black</surname><given-names/></name><article-title>Energy Ukraine, EU Cyber Direct: Cyber Policy Institute</article-title>
(n.d.), available at https://eucyberdirect.eu/wp-content/uploads/2020/11/2015-black-energy-ukraine.pdf


</mixed-citation>
      </ref>
      <ref id="ridm1849694628">
        <label>64.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849710108">
        <label>65.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Staff</surname>
            <given-names>Kaspersky</given-names>
          </name>
          <article-title>(2021).BlackEnergyAPT Attacks in</article-title>
          <publisher-loc>Ukraine, Kaspersky, available at https://www.kaspersky.com/resource-center/threats/blackenergy</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1849706292">
        <label>66.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>FireEye Staff,Cyber Attacks on the Ukrainian Grid: What You Should Know, FireEye</article-title>
          <date>
            <year>2016</year>
          </date>
          <fpage>at https://www.fireeye.kr/content/dam/fireeye-www/global/en/solutions/pdfs/fe-cyber-attacks-ukrainian-grIdpdf.</fpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1849707444">
        <label>67.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849704060">
        <label>68.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Robert</surname>
            <given-names>M Lee</given-names>
          </name>
          <name>
            <surname>Michael</surname>
            <given-names>J Assante</given-names>
          </name>
          <source>Tim Conway, supra, note</source>
          <volume>58</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1849703916">
        <label>69.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849703772">
        <label>70.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849702692">
        <label>71.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Tikk</surname>
            <given-names>Eneken</given-names>
          </name>
          <name>
            <surname>Kaska</surname>
            <given-names>Kadri</given-names>
          </name>
          <source>Liis Vihul, supra, note</source>
          <volume>1</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1849701396">
        <label>72.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Id</surname>
            <given-names/>
          </name>
        </mixed-citation>
      </ref>
      <ref id="ridm1849699740">
        <label>73.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849685860">
        <label>74.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849687732">
        <label>75.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Arthur</surname>
            <given-names>Charles</given-names>
          </name>
          <article-title>The History of Smartphones: Timeline, The Guardian,available at https://www.theguardian.com/technology/2012/jan/24/smartphones-timeline</article-title>
          <date>
            <year>2014</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1849684348">
        <label>76.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Keith</surname>
            <given-names>D</given-names>
          </name>
          <date>
            <year>2016</year>
          </date>
          <source>Foote, A Brief History of the Internet of Things, DataVersity,available at http://www.dataversity.net/brief-history-internet-things/</source>
        </mixed-citation>
      </ref>
      <ref id="ridm1849681540">
        <label>77.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849682908">
        <label>78.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849682980">
        <label>79.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Jack</surname><given-names>M</given-names></name><article-title>Germain,The Future of Cybersecurity in 2021 and Beyond, Tech News World</article-title><date><year>2021</year></date>
available at https://www.technewsworld.com/story/the-future-of-cybersecurity-in-2021-and-beyond-87018.html


</mixed-citation>
      </ref>
      <ref id="ridm1849679308">
        <label>80.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Arnaud</surname>
            <given-names>de Borchgrave</given-names>
          </name>
          <date>
            <year>2001</year>
          </date>
          <chapter-title>Cyber Threats and Information Security: Meeting the 21st Century Challenge (Csis Report) (Center for Strategic &amp; Intl Studies May 21, 2001)</chapter-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1849678084">
        <label>81.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Brooks</surname><given-names>Chuck</given-names></name><article-title>Key Cybersecurity TrendsToKnow For</article-title><date><year>2021</year></date><volume>12</volume><fpage>2021</fpage><lpage>2021</lpage>
and


</mixed-citation>
      </ref>
      <ref id="ridm1849691908">
        <label>82.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Kurkov</surname>
            <given-names>Andrey</given-names>
          </name>
          <article-title>(2014). Ukraine'sRevolution: Making Sense of a Year of Chaos</article-title>
          <source>BBC News,availableathttps://www.bbc.com/news/world-europe-30131108</source>
        </mixed-citation>
      </ref>
      <ref id="ridm1849691044">
        <label>83.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849688956">
        <label>84.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Losh</surname>
            <given-names>Jack</given-names>
          </name>
          <article-title>(2017). Ukraine Turns a BlindEyetoUltrarightistMilitia, The Washington Post, available at https://www.washingtonpost.com/world/europe/ukraine-turns-a-blind-eye-to-ultrarightist-militia/2017/02/12/dbf9ea3c-ecab-11e6-b4ff-ac2cf509efe5_story.html?utm_term=.c688f9c2d870</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1849689388">
        <label>85.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849665932">
        <label>86.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>CBS News Staff,Official Results: 97 Percent of Crimea Voters Back Joining Russia. CBS News,available at https://www.cbsnews.com/news/official-results-97-of-crimea-voters-back-joining-russia/. The vote by the citizens of Crimea was overwhelmingly in favor of becoming part of the Russian Federation. According to CBS News, 97 percent of Crimean voters voted in favor of becoming part of the Russian Federation. The Crimean vote was apparently an excellent example of the self-determination of peoples, regardless of the lamenting of the American political class. For an example of their bemoaning, see, Steve Pifer,Crimea: Six Years After Illegal Annexation</article-title>
          <date>
            <year>2017</year>
          </date>
          <publisher-loc>Brookings Institute,availableathttps://www.brookings.edu/blog/order-from-chaos/2020/03/17/crimea-six-years-after-illegal-annexation/</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1849665644">
        <label>87.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>David</surname>
            <given-names>M Herszenhorn</given-names>
          </name>
          <article-title>(2014).Crimea Votes to Secede from Ukraine as Russian Troops KeepWatch, The</article-title>
          <publisher-loc>New York Times, available at https://www.nytimes.com/2014/03/17/world/europe/crimea-ukraine-secession-vote-referendum.html</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1849663052">
        <label>88.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>CBS News Staff,No End in Sight for Ukraine's Deadly, &amp;quot;Pointless War&amp;quot;</article-title>
          <date>
            <year>2016</year>
          </date>
          <source>CBS News,available at https://www.cbsnews.com/news/ukraine-war-russia-rebels-donbass-luhansk-donetsk-pointless-ceaseless/</source>
        </mixed-citation>
      </ref>
      <ref id="ridm1849660820">
        <label>89.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849660100">
        <label>90.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Robert</surname>
            <given-names>M Lee</given-names>
          </name>
          <name>
            <surname>Michael</surname>
            <given-names>J Assante</given-names>
          </name>
          <source>Tim Conway, supra, note</source>
          <volume>58</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1849658732">
        <label>91.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Moore</surname>
            <given-names>Heidi</given-names>
          </name>
          <article-title>(2017).Rush-Hour Power Outages Hit</article-title>
          <publisher-loc>New York, LA and San Francisco, Ladders,available at https://www.theladders.com/career-advice/power-outages-nightmare-commute.=</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1849656860">
        <label>92.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>The ice storm occurred in Westford, Massachusetts in circa December 1997.The power was out for four days due to downed power lines</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1849656932">
        <label>93.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Zetter</surname>
            <given-names>Kim</given-names>
          </name>
          <article-title>(2017).The Ukrainian Power Grid Was Hacked Again</article-title>
          <publisher-loc>Motherboard,available at https://motherboard.vice.com/en_us/article/bmvkn4/ukrainian-power-station-hacking-december-2016-report</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1849654268">
        <label>94.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Boissoneault</surname>
            <given-names>Loraine</given-names>
          </name>
          <article-title>(2017).The True Story of the Reichstag Fire and the Nazi Rise to Power, Smithsonian Magazine,availableathttps://www.smithsonianmag.com/history/true-story-reichstag-fire-and-nazis-rise-power-180962240/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1849653908">
        <label>95.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849652108">
        <label>96.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849650812">
        <label>97.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849648796">
        <label>98.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849649084">
        <label>99.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849648436">
        <label>100.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849645844">
        <label>101.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Benjamin</surname>
            <given-names>Carter Hett</given-names>
          </name>
          <article-title>Burning the Reichstag: An Investigation into the Third Reich's Enduring Mystery</article-title>
          <date>
            <year>2014</year>
          </date>
          <publisher-name>Oxford University Press</publisher-name>
        </mixed-citation>
      </ref>
      <ref id="ridm1849643828">
        <label>102.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849643468">
        <label>103.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849644044">
        <label>104.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849642820">
        <label>105.</label>
        <mixed-citation xlink:type="simple" publication-type="book"><name><surname>William</surname><given-names>L Shirer</given-names></name><date><year>2011</year></date><chapter-title>The Rise and Fall of the Third Reich: A History of Nazi Germany</chapter-title>
(Simon &amp; Schuster, Reissue ed.)


</mixed-citation>
      </ref>
      <ref id="ridm1849639652">
        <label>106.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Golinkin</surname>
            <given-names>Lev</given-names>
          </name>
          <article-title>(2019).Neo-Nazis and the Far Right Are On the March in Ukraine, The Nation, available at https://www.thenation.com/article/archive/neo-nazis-far-right-ukraine/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1849640444">
        <label>107.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Park</surname>
            <given-names>Donghui</given-names>
          </name>
          <name>
            <surname>Walstrom</surname>
            <given-names>Michael</given-names>
          </name>
          <article-title>(2017).Cyberattack on Critical Infrastructure: Russia and the Ukrainian Power Grid Attacks</article-title>
          <chapter-title>The Henry M Jackson School of International Studies: University of Washington,(October11,2017) available</chapter-title>
          <fpage>at https://jsis.washington.edu/news/cyberattack-critical-infrastructure-russia-ukrainian-power-grid-attacks/.</fpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1849670756">
        <label>108.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Robert</surname>
            <given-names>M Lee</given-names>
          </name>
          <name>
            <surname>Michael</surname>
            <given-names>J Assante</given-names>
          </name>
          <source>Tim Conway,supra, note</source>
          <volume>58</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1849667948">
        <label>109.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <source>Donghui Park,Michael Walstrom,supra,note</source>
          <volume>107</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1849666652">
        <label>110.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Zetter</surname>
            <given-names>Kim</given-names>
          </name>
          <name>
            <surname>supra</surname>
            <given-names>note54</given-names>
          </name>
        </mixed-citation>
      </ref>
      <ref id="ridm1849616564">
        <label>111.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Park</surname>
            <given-names>Donghui</given-names>
          </name>
          <publisher-loc>Michael Walstrom, supra, note 107</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1849616924">
        <label>112.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <source>Kim Zetter, supra, note</source>
          <volume>54</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1849613108">
        <label>113.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Tikk</surname>
            <given-names>Eneken</given-names>
          </name>
          <name>
            <surname>Kaska</surname>
            <given-names>Kadri</given-names>
          </name>
          <source>Liis Vihul, supra, note</source>
          <volume>1</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1849611452">
        <label>114.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Park</surname>
            <given-names>Donghui</given-names>
          </name>
          <name>
            <surname>Walstrom</surname>
            <given-names>Michael</given-names>
          </name>
          <fpage>107</fpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1849610228">
        <label>115.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Gross</surname>
            <given-names>Terry</given-names>
          </name>
          <article-title>(2017).Experts Suspect Russia Is Using Ukraine as a Cyberwar Testing Ground, National Public Radio, available at https://www.npr.org/2017/06/22/533951389/experts-suspect-russia-is-using-ukraine-as-a-cyberwar-testing-ground</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1849608572">
        <label>116.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849609508">
        <label>117.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849607708">
        <label>118.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849607780">
        <label>119.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Jack</surname>
            <given-names>M</given-names>
          </name>
          <source>Germain,supra,note</source>
          <volume>79</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1849603460">
        <label>120.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849603604">
        <label>121.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Taintor</surname>
            <given-names>David</given-names>
          </name>
          <name>
            <surname>Zoellner</surname>
            <given-names>Danielle</given-names>
          </name>
          <article-title>(2021).New York Subway Hacked in Computer Breach Linked to China, The Independent,available at https://www.independent.co.uk/news/world/americas/crime/cyberattack-new-york-subway-china-b1858492.html</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1849601732">
        <label>122.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Nachreiner</surname>
            <given-names>Corey</given-names>
          </name>
          <article-title>(2019).Breach of Rust: How Hackers Break in through Old Tech, Industry Week,available at https://www.industryweek.com/technology-and-iiot/article/22027329/breach-of-rust-how-hackers-break-in-through-old-tech</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1849599788">
        <label>123.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Tidy</surname>
            <given-names>Joe</given-names>
          </name>
          <article-title>(2021). ColonialHack: How Did Cyber-Attackers Shut OffPipeline?</article-title>
          <source>BBC News, available at https://www.bbc.com/news/technology-57063636</source>
        </mixed-citation>
      </ref>
      <ref id="ridm1849598996">
        <label>124.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Jang-Jaccard</surname>
            <given-names>Julian</given-names>
          </name>
          <article-title>Surya Nepal,A Survey of Emerging Threats in Cybersecurity, 80</article-title>
          <date>
            <year>2014</year>
          </date>
          <source>Journal of Computer and System Sciences</source>
          <volume>5</volume>
          <fpage>973</fpage>
          <lpage>93</lpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1849596908">
        <label>125.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Staff Writers,Hot Technologies inCybersecurity, Cyber Degrees,available at https://www.cyberdegrees.org/resources/hot-technologies-cyber-security/</article-title>
          <date>
            <year>2021</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1849595972">
        <label>126.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Johnson</surname>
            <given-names>Lauren</given-names>
          </name>
          <article-title>(2018).Marketers Are Racing to Reach Rapidly Growing Audiences on Amazon’sAlexaand Google Home</article-title>
          <publisher-loc>AdWeek,available at https://www.adweek.com/digital/marketers-are-racing-to-reach-rapidly-growing-audiences-on-amazons-alexa-and-google-home/</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1849595252">
        <label>127.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>UBS Staff,Future of the Tech Economy: Investing Where Technology Meets Economy, Union Bank of Switzerl and,available at https://www.ubs.com/content/dam/static/noindex/wealth-management/cio/future-of-the-tech-economy-20200610.pdf?campID=DDL-CIOFUTUREOFTECHONOMY-EMAIL-GLOBAL-20200617-PDF</article-title>
          <date>
            <year>2020</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1849592012">
        <label>128.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Gold</surname>
            <given-names>Jon</given-names>
          </name>
          <article-title>Lack of IoT Security Is Scaring the Heck Out of Everybody, Network World,available at https://www.networkworld.com/article/3198914/internet-of-things/a-lack-of-iot-security-is-scaring-the-heck-out-of-everybody.html</article-title>
          <date>
            <year>2017</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1849591508">
        <label>129.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Lachow</surname>
            <given-names>Irving</given-names>
          </name>
          <article-title>(2011).The Stuxnet Enigma: Implications for the Future ofCybersecurity</article-title>
          <source>Georgetown Journal of International Affairs</source>
          <fpage>118</fpage>
          <lpage>126</lpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1849623908">
        <label>130.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Jess</surname>
            <given-names>David Ohlin</given-names>
          </name>
          <name>
            <surname>Govern</surname>
            <given-names>Kevin</given-names>
          </name>
          <name>
            <surname>Finkelstein</surname>
            <given-names>Claire</given-names>
          </name>
          <article-title>Cyberwar: Law and Ethics for Virtual Conflicts</article-title>
          <date>
            <year>2015</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1849621460">
        <label>131.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Shamah</surname>
            <given-names>David</given-names>
          </name>
          <article-title>Top Security Exec: Beware the ‘Sons of Stuxnet’, TheTimes of Israel,available at https://www.timesofisrael.com/top-security-exec-beware-the-sons-of-stuxnet/</article-title>
          <date>
            <year>2021</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1849618652">
        <label>132.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Lolita</surname><given-names>C Baldor</given-names></name>

(2010).StuxnetVirusRepresentsDire Threat
<publisher-loc>Officials Say, NBC News,availableathttps://www.nbcnews.com/id/wbna40238546</publisher-loc></mixed-citation>
      </ref>
      <ref id="ridm1849618796">
        <label>133.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Bullis</surname>
            <given-names>Kevin</given-names>
          </name>
          <article-title>(2009).Lawsof Physics Persist:</article-title>
          <chapter-title>In Crashes, Big CarsWin,MIT Technology Review,available at https://www.technologyreview.com/s/413018/laws-of-physics-persist-in-crashes-big-cars-win/</chapter-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1849566812">
        <label>134.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Salvadori</surname>
            <given-names>Ruben</given-names>
          </name>
          <article-title>(2015).Here is how hackers can remotely take control of your car</article-title>
          <fpage>2015</fpage>
          <lpage>07</lpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1849564652">
        <label>135.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Lolita</surname>
            <given-names>C Baldor</given-names>
          </name>
          <name>
            <surname>supra</surname>
            <given-names>note132</given-names>
          </name>
        </mixed-citation>
      </ref>
      <ref id="ridm1849563716">
        <label>136.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>James</surname>
            <given-names>M Lindsey</given-names>
          </name>
          <article-title>(2014).TWERemembers: The Assassination of Archduke Franz Ferdinand, Council on Foreign Relations, available at https://www.cfr.org/blog/twe-remembers-assassination-archduke-franz-ferdinand</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1849562060">
        <label>137.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Stein</surname>
            <given-names>Chris</given-names>
          </name>
          <article-title>(2016).Meet the Humans with Microchips Implanted in Them</article-title>
          <source>CBS News, available at https://www.cbsnews.com/news/meet-the-humans-with-microchips-implanted-in-them/</source>
        </mixed-citation>
      </ref>
      <ref id="ridm1849559828">
        <label>138.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1849559540">
        <label>139.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Lauterwasser</surname>
            <given-names>Christoph</given-names>
          </name>
          <name>
            <surname>Opportunitiesand</surname>
            <given-names/>
          </name>
          <article-title>Risks of Nanotechnology</article-title>
          <chapter-title>The OECD International Futures Programme, (n.d.), available at https://www.oecd.org/science/nanosafety/37770473.pdf</chapter-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1849558172">
        <label>140.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Huxley</surname>
            <given-names>Aldous</given-names>
          </name>
          <article-title>Brave New World (Chatto and Windus Publishers</article-title>
          <date>
            <year>1931</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1849555364">
        <label>141.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Orwell</surname>
            <given-names>George</given-names>
          </name>
          <date>
            <year>1984</year>
          </date>
          <article-title>Harcourt Brace Publishers</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>
