text
stringlengths
4
429
s Republic of China Controls tighten as Internet
activism grows. Retrieved on August 1, 2008, from http://www.amnesty.org/en/library/
asset/ASA17/001/2004/en/dom-ASA170012004en.html.
Appel, Edward. 2004. China
s Espionage: What
s At Stake. Retrieved on March 20, 2008,
from http://www.pbs.org/wgbh/pages/frontline/shows/spy/spies/atstake.html.
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80
Copyright
2008 Jason Fritz
Armoured Fighting Vehicles. 2008. Retrieved on April, 10, 2008, from
http://www.sinodefence.com/army/armour/default.asp.
Arrests Following Jakarta Fuel Price Increases. 2008. Retrieved on August 1, 2008, from
http://www.radioaustralia.net.au/news/stories/200806/s2285064.htm.
Baard, Mark. 2007. Sentient World: War Games on the Grandest Scale. Retrieved on March
20, 2008, from http://www.theregister.co.uk/2007/06/23/sentient_worlds/.
Banerjee, Manik and Zappei, Julia. 2008. Fuel Price Hikes Spark Protests In India And
Malaysia That Could Undermine Governments. Retrieved on August 1, 2008, from
http://www.aol.com.au/news/story/Fuel-price-hikes-spark-protests-in-India-and-Malaysiathat-could-undermine-governments/550071/index.html.
Barker, Garry. 2002. Cyber terrorism a mouse-click away. Retrieved on February 24, 2008,
from http://www.theage.com.au/articles/2002/07/07/1025667089019.html.
Basu, Indrajit. 2008. India Faces Cyber Challenge From China. Retrieved on June 10, 2008,
from http://www.upiasiaonline.com/Security/2008/05/09/india_faces_cyber_
challenge_from_china/5587/.
Beam It Right There Scotty. 2005. Retrieved on January 26, 2008, from
http://www.wired.com/science/discoveries/news/2005/07/68152.
Berkeley Bionics Human Exoskeleton. 2007. Retrieved On March 10, 2008, from
http://www.youtube.com/watch?v=EdK2y3lphmE.
Block, Ryan. 2006. The Brain Port, Neural Tongue Interface Of The Future. Retrieved on
March 10, 2008, from http://www.engadget.com/2006/04/25/the-brain-port-neural-tongueinterface-of-the-future/.
Bloom, James. 2008. Robots ready to support soldiers on the battlefield. Retrieved on June
26, 2008, from http://www.guardian.co.uk/technology/2008/jun/26/robots.weapons
technology.
Bonsor, Kevin. 2008. How Augmented Reality Will Work. Retrieved on March 10, 2008,
from http://www.howstuffworks.com/augmented-reality.htm.
Boyd, Clark. 2008. Profile: Gary McKinnon. Retrieved on August 4, 2008, from
http://news.bbc.co.uk/2/hi/technology/4715612.stm.
Bradsher, Keith. 2006. Hong Kong enlists youth to fight piracy. Retrieved on July 20,
2008, from http://www.iht.com/articles/2006/07/18/business/piracy.php.
Braukus, Michael. 2004. NASA Develops System To Computerize Silent Subvocal Speech.
Retrieved on March 2008, from http://www.nasa.gov/home/hqnews/2004/mar/HQ_04093_
subvocal_speech.html.
Brenner, Bill. 2007. Experts doubt Russian government launched DDoS attacks. Retrieved on
February 18, 2008, from http://searchsecurity.techtarget.com/news/article/0,289142,
sid14_gci1255548,00.html.
Bingemann, Mitchell. 2008. Buggy Software Sends Optus Offline. Retrieved on August 8,
2008, from http://www.australianit.news.com.au/story/0,,24141034-15306,00.html.
Brenner, Bill. 2005. Myfip
s Titan Rain Connection. Retrieved on January 8, 2008, from
http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1120855,00.html.
Bridis, Ted. 2008. CIA: Hackers demanding cash disrupted power. Retrieved on February 2,
2008, from http://www.msnbc.msn.com/id/22734229/.
Bright, Arthur. 2007. Estonia Accuses Russia Of Cyberattack. Retrieved on March 10, 2008,
from http://www.csmonitor.com/2007/0517/p99s01-duts.html.
Brookes, Peter. 2006. China
s Influence In Africa. Retrieved on March 15, 2008, from
http://www.heritage.org/Research/AsiaandthePacific/bg1916.cfm.
Bruno, Greg. 2008. The Evolution of Cyber Warfare. Retrieved on March 12, 2008, from
http://www.cfr.org/publication/15577/.
Burns, Simon. 2006. MySpace and Wikipedia Clones Storm China. Retrieved on July 31,
2008, from http://www.itnews.com.au/News/NewsStory.aspx?story=35422.
Center for Strategic and International Studies. 2003. China
s Space Program. Retrieved on April 3, 2008, from
http://www.csis.org/index.php?option=com_csis_progj&task=view&id=76.
China and Internet Censorship. 2006. Retrieved on August 5, 2008, from http://www.cnn.
com/interactive/world/0603/explainer.china.internet/frameset.exclude.html.
China defends internet regulation. 2006. Retrieved on July 15, 2008, from http://news.bbc.
co.uk/2/hi/asia-pacific/4715044.stm.
China hires Net squad to sway opinion. 2005. Retrieved on July 15, 2008, from
http://www.asiamedia.ucla.edu/article.asp?parentid=24609.
China internet use grows. 2006. Retrieved on August 1, 2008, from http://news.bbc.co.uk/
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80
Copyright
2008 Jason Fritz
2/hi/business/2145865.stm.
China Tightens Vice On Internet. 2006. Retrieved on June 11, 2008, from http://cryptome.
cn/china-vise.htm.
China's National Defense in 2006 (White Paper). 2006. Retrieved on March 3, 2006, from
http://www.fas.org/nuke/guide/china/doctrine/wp2006.html.
China
s Navy 2007. 2007. US Office of Naval Intelligence. Retrieved January 10, 2008, from
http://fas.org/irp/agency/oni/chinanavy2007.pdf.
China
s Proliferation Practices, and the Development of Its Cyber and Space Warfare Capabilities. 2008.
Retrieved on June 30, 2008, from http://www.uscc.gov/hearings/2008
hearings/transcripts/08_05_20_trans/08_05_20_trans.pdf.
China
s Space Program Aims at Peaceful Use of Space Resources. 2005. Chinanews.cn, 15 October. Retrieved
on July 10, 2006, from www.chinanews.cn/news/2005/2005-10-15/12428.html
Chinese Submarines. 2008. Retrieved on April 10, 2008, from http://www.sinodefence.com/
navy/sub/default.asp.
Christensen, John. 1999. Bracing For Guerrilla Warfare In Cyberspace. Retrieved on
February 2, 2008, from http://edition.cnn.com/TECH/specials/hackers/cyberterror/.
Code Red Worm Spreading, Set To Flood Whitehouse. 2001. Retrieved on July 18,
2008, from http://slashdot.org/articles/01/07/19/2230246.shtml.
Cost of Code Red Rising. 2001. Retrieved on February 2, 2008, from
http://archives.cnn.com/2001/TECH/internet/08/08/code.red.II/.
Coleman, Kevin. 2008. Cyber War 2.0
Russia V. Georgia. Retrieved on August 13, 2008,
from http://www.defensetech.org/archives/004363.html.