Resources
These resources have been collected over years of research and daily reading across protection, intelligence, strategic studies, and the information environment. They include books, papers, reports, and selected video material that has shaped this project, from NATO ACT and doctrine to academic work, think tank analysis, and practitioner writing. This is not a definitive bibliography. It is a curated working library, updated as the landscape shifts and as better sources emerge.
Abbott, D.H. (2010) The Handbook of Fifth-Generation Warfare (5GW). Michigan: Nimble Books.
Benesch, O. (2014) Inventing the Way of the Samurai: Nationalism, Internationalism, and Bushidō in Modern Japan. Oxford: Oxford University Press.
Betts, R.K. (1983) ‘Warning Dilemmas: Normal Theory vs. Exceptional Theory’, Orbis, 26(4), pp. 828–843.
Boerman, F., Stoffers, E. and Tadic, D. (2024) Geweld van de georganiseerde misdaad in beeld: moord & doodslag en aanslagen met explosieven. Fenomeenbeeld 2024. Den Haag: Nationale Politie. Available at: https://www.politie.nl/binaries/content/assets/politie/onderwerpen/publicaties/2024/8c001d24-810c-4778-8bc2-e723fdc2ad40.pdf (Accessed: 23 December 2025).
Brommersma, S., Reuvers, M. and Tokmetzis, D. (2024) ‘Zoekend naar liefde en seks op Tinder brengen militairen nationale veiligheid in gevaar’, Follow the Money, 14 December. Available at: https://www.ftm.nl/artikelen/militairen-tinder-gevaar-voor-nationale-veiligheid (Accessed: 23 December 2025).
Brotherton, R. (2015) Suspicious Minds: Why We Believe Conspiracy Theories. London: Bloomsbury Sigma.
Byrne, A. (2020) The Monroe Doctrine and United States National Security in the Early Twentieth Century. Cham: Palgrave Macmillan.
Cialdini, R.B. (1984) Influence: The Psychology of Persuasion. New York: Harper Business.
Claverie, B. and du Cluzel, F. (2023) Cognitive Warfare. NATO Innovation Hub. Available at: https://www.innovationhub-act.org/sites/default/files/2023-12/20230113_CognitiveWarfare.pdf (Accessed: 23 December 2025).
Clingendael (n.d.) The return of political warfare. Available at: https://www.clingendael.org/publication/return-political-warfare (Accessed: 23 December 2025).
Corner, E. and Gill, P. (2015) ‘A False Dichotomy? Mental Illness and Lone Actor Terrorism’, Law and Human Behavior, 39(1), pp. 23–34.
Council of Europe (2017) Information disorder: Toward an interdisciplinary framework for research and policy making. Available at: https://edoc.coe.int/en/media/7495-information-disorder-toward-an-interdisciplinary-framework-for-research-and-policy-making.html (Accessed: 23 December 2025).
Deighton, K. (2025) ‘Storytelling in the corporate world’ (article cited in site further reading), The Wall Street Journal. (Accessed: 23 December 2025).
Deppe, C. and Schaal, G.S. (2024) ‘Cognitive warfare: a conceptual analysis of the NATO ACT cognitive warfare exploratory concept’, Frontiers in Big Data, 7. Available at: https://pmc.ncbi.nlm.nih.gov/articles/PMC11565700/ (Accessed: 23 December 2025).
Dhami, M.K., Witt, J.K. and De Werd, P. (2025) ‘Visualizing versus verbalizing uncertainty in intelligence analysis’, Intelligence and National Security, 40(2), pp. 302 to 327. https://doi.org/10.1080/02684527.2025.2468049
Duke, M.C. (2024) ‘Probability and confidence: How to improve communication of uncertainty about uncertainty in intelligence analysis’, Journal of Behavioral Decision Making, 37(1), e2364. https://doi.org/10.1002/bdm.2364
European Commission (n.d.) Disinformation. Available at: https://commission.europa.eu/strategy-and-policy/priorities-2019-2024/europe-fit-digital-age/disinformation_en (Accessed: 23 December 2025).
European Union Agency for Law Enforcement Cooperation (Europol) (2025) EU Serious and Organised Crime Threat Assessment 2025 (EU-SOCTA 2025): The changing DNA of serious and organised crime. The Hague: Europol. Available at: https://www.europol.europa.eu/cms/sites/default/files/documents/EU-SOCTA-2025.pdf (Accessed: 23 December 2025).
First Draft (2018) Information Disorder: The Essential Glossary. Available at: https://firstdraftnews.org/wp-content/uploads/2018/07/infoDisorder_glossary.pdf (Accessed: 23 December 2025).
Gill, P. and Corner, E. (2017) ‘There and Back Again: The Study of Mental Disorder and Terrorist Involvement’, American Psychologist, 72(3), pp. 231–241.
Gupta, A. (2022) ‘Abstract: Understanding AI-enabled influence operations’, PRISM, 9(4). Available at: https://ndupress.ndu.edu/Portals/68/Documents/prism/prism_9-4/prism_9-4_Gupta.pdf (Accessed: 23 December 2025).
Hamm, M.S. and Spaaij, R. (2015) Lone Wolf Terrorism in America: Using Knowledge of Radicalization Pathways to Forge Prevention Strategies, 1940–2013. Washington, DC: National Institute of Justice.
Hurst, G.C. III (1990) ‘Death, Honor, and Loyalty: The Bushidō Ideal’, Philosophy East and West, 40(4), pp. 511–527.
Joint Chiefs of Staff (2012) Joint Publication 3-13: Information Operations (27 November 2012). Available at: https://nsarchive.gwu.edu/document/16817-joint-chiefs-staff-joint-publication-3-13 (Accessed: 23 December 2025).
Kahneman, D. (2011) Thinking, Fast and Slow. New York: Farrar, Straus and Giroux.
Keohane, R.O. and Nye, J.S. (1977) Power and Interdependence: World Politics in Transition. Boston: Little, Brown.
Krishnan, A. (2022) ‘Fifth Generation Warfare, Hybrid Warfare, and Gray Zone Conflict: A Comparison’, Journal of Strategic Security, 15(4). Available at: https://digitalcommons.usf.edu/jss/vol15/iss4/2/ (Accessed: 23 December 2025).
Liang, Q. and Xiangsui, W. (1999) Unrestricted Warfare. Beijing: PLA Literature and Arts Publishing House. (English translation) Available at: https://www.c4i.org/unrestricted.pdf (Accessed: 23 December 2025).
McCauley, C. and Moskalenko, S. (2008) ‘Mechanisms of Political Radicalization: Pathways Toward Terrorism’, Terrorism and Political Violence, 20(3), pp. 415–433.
Mattoo, A. and Staiger, R.W. (2019) Trade Wars: What do they mean? Why are they happening now? What are the costs? NBER Working Paper 25762. Available at: https://www.nber.org/system/files/working_papers/w25762/w25762.pdf (Accessed: 23 December 2025).
Naganuma, K. (2021) Warfare in the Cognitive Domain: Narrative, Emotionality, and Temporality. NIDS Commentary No. 163. Tokyo: National Institute for Defense Studies. Available at: https://www.nids.mod.go.jp/english/publication/commentary/pdf/commentary163e.pdf (Accessed: 23 December 2025).
National Endowment for Democracy (2017) Sharp Power: Rising Authoritarian Influence. Washington, DC: National Endowment for Democracy. Available at: https://www.ned.org/wp-content/uploads/2017/12/Sharp-Power-Rising-Authoritarian-Influence-Full-Report.pdf (Accessed: 23 December 2025).
National Endowment for Democracy (2017) ‘What Is “Sharp Power”?’, Journal of Democracy. Available at: https://www.journalofdemocracy.org/articles/what-is-sharp-power/ (Accessed: 23 December 2025).
NATO (2016) Warsaw Summit Communiqué. Warsaw, 8–9 July. Available at: https://ccdcoe.org/uploads/2018/11/NATO-160709-WarsawSummitCommunique.pdf (Accessed: 23 December 2025).
NATO ACT (n.d.) ‘Cognitive warfare’. Available at: https://www.act.nato.int/activities/cognitive-warfare/ (Accessed: 23 December 2025).
NATO ACT (n.d.) ‘Strengthening and defending the mind’. Available at: https://www.act.nato.int/article/strengthening-and-defending-the-mind/ (Accessed: 23 December 2025).
NATO ACT (n.d.) ‘Beyond MISO: the evolving role of narrative in modern warfare’. Available at: https://www.act.nato.int/article/beyond-miso/ (Accessed: 23 December 2025).
Nitzl, C. et al. (2025) ‘The use of artificial intelligence in military intelligence analysis: an experiment’, Frontiers in Human Dynamics, 7, 1540450. https://doi.org/10.3389/fhumd.2025.1540450
Nobili, M. et al. (2023) ‘Review OSINT tool for social engineering’, Frontiers in Big Data, 6, 1169636. https://doi.org/10.3389/fdata.2023.1169636
Nye, J.S. (2004) Soft Power: The Means to Success in World Politics. New York: PublicAffairs.
Nye, J.S. (2017) ‘Soft power: the origins and political progress of a concept’, Palgrave Communications, 3, 17008. Available at: https://d-nb.info/1198595728/34 (Accessed: 23 December 2025).
Nye, J.S. (2018) ‘How sharp power threatens soft power’ (article cited in site), Foreign Affairs. (Accessed: 23 December 2025).
O’Driscoll, D. (2018) Violent Extremism and Mental Disorders. London: UK Home Office. Available at: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/761970/violent-extremism-and-mental-disorders.pdf (Accessed: 23 December 2025).
OECD (n.d.) ‘Glossary: Hard power’. Available at: https://www.oecd.org/insights/glossary/hard-power.htm (Accessed: 23 December 2025).
OECD (n.d.) ‘Glossary: Soft power’. Available at: https://www.oecd.org/insights/glossary/soft-power.htm (Accessed: 23 December 2025).
OECD (n.d.) Foreign Information Manipulation and Interference: A toolkit for building resilience to disinformation. Available at: https://www.oecd.org/content/dam/oecd/en/publications/reports/2024/11/foreign-information-manipulation-and-interference_af78d915/0e63bb2d-en.pdf (Accessed: 23 December 2025).
Oerlemans, J.J. and Langenhuijzen, S. (2025) ‘Balancing national security and privacy: Examining the use of commercially available information in OSINT practices’, International Journal of Intelligence and CounterIntelligence, 38(2), pp. 579 to 597. https://doi.org/10.1080/08850607.2024.2387850
OWASP (2025) OWASP Top 10 for LLM Applications: LLM04 Model Denial of Service. Available at: https://genai.owasp.org/llmrisk/llm04-model-denial-of-service/ (Accessed: 23 December 2025).
Paul, C. and Matthews, M. (2016) The Russian “Firehose of Falsehood” Propaganda Model. RAND Corporation. Available at: https://www.rand.org/pubs/perspectives/PE198.html (Accessed: 23 December 2025).
Pauwels, A. (2021) Lone Actors as a Challenge for P/CVE. Radicalisation Awareness Network (RAN), European Commission. Available at: https://home-affairs.ec.europa.eu/system/files/2021-10/ran_lone_actors_as_challenge_for_pcve_july_2021_en.pdf (Accessed: 23 December 2025).
Postma, F. (2018) ‘After Strava, Polar is revealing the homes of soldiers and spies’, Bellingcat, 8 July. Available at: https://www.bellingcat.com/news/2018/07/08/strava-polar-revealing-homes-soldiers-spies/ (Accessed: 23 December 2025).
Redactie Bewaken en Beveiligen (2025) Verdieping Bewaken en Beveiligen 1/2025 (February). Universiteit Leiden, Faculteit Governance & Global Affairs, Den Haag. (Accessed: 23 December 2025).
Rifesser, B.J.F. (2023) An Interdisciplinary Analysis of the Weaponisation of TikTok. Master’s thesis. Liverpool: Liverpool John Moores University. (Accessed: 23 December 2025).
Steyvers, M. et al. (2025) ‘What large language models know and what people think they know’, Nature Machine Intelligence, 7, pp. 353 to 362. https://doi.org/10.1038/s42256-024-00976-7
Strange, S. (1996) The Retreat of the State: The Diffusion of Power in the World Economy. Cambridge: Cambridge University Press.
Stohl, R. and Schmid, A.P. (2017) The Age of Lone Wolf Terrorism. New York: Columbia University Press.
Sunstein, C.R. (2017) #Republic: Divided Democracy in the Age of Social Media. Princeton, NJ: Princeton University Press.
The 9/11 Commission (2004) The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States. Washington, DC: U.S. Government Printing Office. Available at: https://9-11commission.gov/report/911Report.pdf (Accessed: 23 December 2025).
United States Congressional Research Service (2023) Disinformation Primer: Russian Influence Campaigns in Europe. CRS. Available at: https://crsreports.congress.gov/product/pdf/IF/IF12345 (Accessed: 23 December 2025).
United States Department of State (2022) ‘Monroe Doctrine, 1823’, Office of the Historian. Available at: https://history.state.gov/milestones/1801-1829/monroe (Accessed: 23 December 2025).
United States Government (2025) National Security Strategy of the United States. Washington, DC. (Accessed: 23 December 2025).
Vance, J.D. (2025) Speech at the Munich Security Conference, Munich, 15 February. (Accessed: 23 December 2025).
Vidino, L. and Marone, F. (2020) ‘The Hanau Terrorist Attack: Race Hate and Conspiracy Theories’, CTC Sentinel, 13(3).
Waltz, K.N. (1979) Theory of International Politics. Reading, MA: Addison-Wesley.
Waltz, K.N. (2000) ‘Structural Realism after the Cold War’, International Security, 25(1), pp. 5–41.
Walker, C. and Ludwig, J. (2017) Sharp Power: Rising Authoritarian Influence. Washington, DC: National Endowment for Democracy.
Wardle, C. and Derakhshan, H. (2017) Information Disorder: Toward an interdisciplinary framework for research and policy making. Strasbourg: Council of Europe. Available at: https://firstdraftnews.org/wp-content/uploads/2017/11/PREMS-162317-GBR-2018-Report-désinformation-1.pdf (Accessed: 23 December 2025).
Wilson, E.J. III (2008) ‘Hard Power, Soft Power, Smart Power’, The ANNALS of the American Academy of Political and Social Science, 616(1), pp. 110–124. Available at: https://journals.sagepub.com/doi/10.1177/0002716207312618 (Accessed: 23 December 2025).
Wittkopf, E.R. (1990) Faces of Internationalism: Public Opinion and American Foreign Policy. Durham, NC: Duke University Press.
Yeung, E.S.F. (2022) ‘Relative Gains in the Shadow of a Trade War’, International Organization, 76(4), pp. 924–951. Available at: https://ideas.repec.org/a/cup/intorg/v76y2022i3p741-765_9.html (Accessed: 23 December 2025).
‘2022 Buffalo shooting’ (2025) Wikipedia. Available at: https://en.wikipedia.org/wiki/2022_Buffalo_shooting (Accessed: 23 December 2025).
‘Killing of Brian Thompson’ (2025) Wikipedia. (As cited on site.) (Accessed: 23 December 2025).
‘Lone wolf terrorism’ (2025) Wikipedia. Available at: https://en.wikipedia.org/wiki/Lone_wolf_attack (Accessed: 23 December 2025).
‘Pizzagate conspiracy theory’ (2025) Wikipedia. Available at: https://en.wikipedia.org/wiki/Pizzagate_conspiracy_theory (Accessed: 23 December 2025).
Samurai (2025) Research Starters: History. EBSCO. (Accessed: 23 December 2025).