text
stringlengths
4
429
John Arquilla. Retrieved June 13, 2011, from Cyber War! | Frontline | PBS:
http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/interviews/arquilla.html
Benson, S. (2011, March 29). Hackers log in to federal MPs' emails. Retrieved June 13, 2011, from The Daily
Telegraph: http://www.dailytelegraph.com.au/news/national/hackers
federal
emails/story
e6freuzr
1226029677394
Borders, K. (2007, July 19). Building a Threat Model: Hackenomics (Part 2
The Cost of Hacking). Retrieved June
13, 2011, from StraightSecTalk: http://www.straightsectalk.com/?p=16
Central Intelligence Agency. (2007, May 02). Annual Report 1999 Counterintelligence. Retrieved June 13, 2011,
from Central Intellgence Agency: https://www.cia.gov/library/reports/archived
reports
1/ann_rpt_1999/dci_annual_report_99_16.html
Comodo. (2011, March 31). Comodo Report of Incident. Retrieved June 13, 2011, from Comodo Group Inc.:
http://www.comodo.com/Comodo
Fraud
Incident
2011
23.html
Coviello, A. (2011, March 17). Open Letter to RSA Customers. Retrieved June 13, 2011, from RSA:
http://www.rsa.com/node.aspx?id=3872
Coviello, A. (2011, June). Open Letter to RSA SecurID Customers. Retrieved June 13, 2011, from RSA:
http://www.rsa.com/node.aspx?id=3891
Drummond, D. (2010, January 01). A new approach to China. Retrieved June 13, 2011, from The Official Google
Blog: http://googleblog.blogspot.com/2010/01/new
approach
china.html
Farlliere, N., O Muchu, L., & Chien, E. (2011, February). W32.Stuxnet Dossier. Retrieved June 13, 2011, from
Symantec:
http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stux
net_dossier.pdf
gHale. (2011, June 03). Second Defense Contractor Targeted. Retrieved June 13, 2011, from Industrial Safety and
Security Source: htp://www.isssource.com/second
defense
contractor
targeted/
Goodin, D. (2007, December 07). Top
secret US labs penetrated by phishers. Retrieved June 13, 2011, from The
Register: http://www.channelregister.co.uk/2007/12/07/national_labs_breached/
Kaplan, J. (2011, June 01). Exclusive: Northrop Grumman May Have Been Hit by Cyberattack, Source says. Retrieved
June 13, 2011, from Fox News Network: http://www.foxnews.com/scitech/2011/05/31/northrop
grumman
cyber
attack
source
says/
PAGE 10 OF 13
COPYRIGHT
COMMAND FIVE PTY LTD. ALL RIGHTS RESERVED.
Kobie, N. (2011, March 29). Lone Iranian claims credit for Comodo certificate hack. Retrieved June 13, 2011, from
PC & Tech Authority: http://www.pcauthority.com.au/News/252662,lone
iranian
claims
credit
comodo
certificate
hack.aspx
Lockheed Martin Corporation. (2011, May 28). Lockheed Martin Customer, Program and Employee Data Secure.
Retrieved June 13, 2011, from Lockheed Martin:
http://www.lockheedmartin.com/news/press_releases/2011/0528hq
secuirty.html [sic]
Lynn III, W. J. (2010, October 04). Defending a New Domain: The Pentagon's Cyberstrategy. Retrieved June 13,
2011, from U.S. Department of Defense: http://defense.gov/home/features/2010/0410_cybersec/lynn
article1.aspx
McAfee Foundation Professional Services and McAfee Labs. (2011, February 10). Global Energy Cyberattacks:
"Night Dragon". Retrieved June 13, 2011, from McAfee: http://www.mcafee.com/us/resources/white
papers/wp
global
energy
cyberattacks
night
dragon.pdf
Mehnle, J. (2010, April 17). Sender Policy Framework: Introduction. Retrieved June 13, 2011, from The Sender
Policy Framework Project: http://www.openspf.org/Introduction
Moyanhan, M. (2011, February 14). The Price of a Zero Day Exploit. Retrieved June 15, 2011, from Veracode, Inc.
The State of Software Security: http://www.veracode.com/ceo
blog/2011/02/the
price
zero
exploit/
Munger, F. (2011, April 19). Lab halts Web access after cyber attack. Retrieved June 13, 2011, from Knoxville News
Sentinel Co.: http://www.knoxnews.com/news/2011/apr/19/lab
halts
access
after
cyber
attack
Nagaraja, S., & Anderson, R. (2009, March). The snooping dragon:social
malware surveillance of the Tibetan
movement. Retrieved June 13, 2011, from University of Cambridge:
http://www.cl.cam.ac.uk/techreports/UCAM
746.html Shishir Nagaraja, Ross Anderson March
2009
Oak Ridge National Laboratory. (2007). Potential Identity Theft. Retrieved June 13, 2011, from Oak Ridge National
Laboratory: http://www.ornl.gov/identitytheft/
Postmedia News. (2011, June 03). Classified infromation accessed during cyber attacks on federal departments:
Report. Retrieved June 13, 2011, from Postmedia Network Inc:
http://www.canada.com/news/Classified+information+accessed+during+cyber+attacks+federal+depart