Soesanto, Stefan; (2022), Pro-Ukraine Hacktivists Claim to Have Hacked Notorious Russian Mercenary Group, Vice Motherboard.
Smeets, Max; (2022), Why NATO Countries Don’t Share Cyber Weapons, Techland: When Great Power Competition Meets a Digital World The National Interest.
Kohler, Kevin (2022), One, Two, or Two Hundred Internets?: The Politics of Future Internet Architectures, Center for Security Studies (CSS), ETH Zürich.
Maschmeyer, Lennart (2022), Subversion, Cyber Operations, and Reverse Structural Power in World Politics, European Journal of International Relations.
Maschmeyer, Lennart (2022), A New and Better Quiet Option? Strategies of Subversion and Cyber Conflict, Journal of Strategic Studies.
Maschmeyer, Lennart; (2022), Kreml-freundliche News-Sites erreichen auch in der Schweiz und in Deutschland ein grosses Publikum, Neue Zürcher Zeitung.
Dwyer, Andrew C.; Stevens, Clare; Pijnenburg Muller, Lilly; Dunn Cavelty, Myriam; Coles-Kemp, Lizzie; Thornton, Pip (2022), What Can a Critical Cybersecurity Do?, International Political Sociology.
Kaminska, Monica; Shires, James; Smeets, Max (2022), Cyber Operations During the 2022 Russian Invasion of Ukraine: Lessons Learned (so far).
(2022), How a Nonprofit Group Has Become the Biggest Repository for Hacked Russian Data, National Public Radio.
Kohler, Kevin; Pangrazzi, Sara; Zahn, Nicolas (2022), Realitycheck der Ambitionen der Schweizer Digitalaussenpolitik.
Soesanto, Stefan; (2022), Im Ukraine-Krieg kämpft eine «IT-Armee» online gegen Russland. Die Freiwilligen attackieren sogar Apotheken und Universitäten, Neue Zürcher Zeitung.
Soesanto, Stefan; (2022), Research Questions Potentially Dangerous Implications of Ukraine's IT Army, CyberScoop.
Soesanto, Stefan (2022), The IT Army of Ukraine: Structure, Tasking, and Ecosystem, Center for Security Studies (CSS), ETH Zürich.
Smeets, Max; Lieberherr, Boas (eds.); (2022), What it Takes to Develop a Military Cyber-Force, CSS Policy Perspectives Center for Security Studies (CSS), ETH Zürich.
Smeets, Max (2022), A US History of not Conducting Cyber Attacks, Bulletin of the Atomic Scientists, 78, 4: 208-213.