text
stringlengths 4
429
|
---|
s Republic of China Controls tighten as Internet |
activism grows. Retrieved on August 1, 2008, from http://www.amnesty.org/en/library/ |
asset/ASA17/001/2004/en/dom-ASA170012004en.html. |
Appel, Edward. 2004. China |
s Espionage: What |
s At Stake. Retrieved on March 20, 2008, |
from http://www.pbs.org/wgbh/pages/frontline/shows/spy/spies/atstake.html. |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
Armoured Fighting Vehicles. 2008. Retrieved on April, 10, 2008, from |
http://www.sinodefence.com/army/armour/default.asp. |
Arrests Following Jakarta Fuel Price Increases. 2008. Retrieved on August 1, 2008, from |
http://www.radioaustralia.net.au/news/stories/200806/s2285064.htm. |
Baard, Mark. 2007. Sentient World: War Games on the Grandest Scale. Retrieved on March |
20, 2008, from http://www.theregister.co.uk/2007/06/23/sentient_worlds/. |
Banerjee, Manik and Zappei, Julia. 2008. Fuel Price Hikes Spark Protests In India And |
Malaysia That Could Undermine Governments. Retrieved on August 1, 2008, from |
http://www.aol.com.au/news/story/Fuel-price-hikes-spark-protests-in-India-and-Malaysiathat-could-undermine-governments/550071/index.html. |
Barker, Garry. 2002. Cyber terrorism a mouse-click away. Retrieved on February 24, 2008, |
from http://www.theage.com.au/articles/2002/07/07/1025667089019.html. |
Basu, Indrajit. 2008. India Faces Cyber Challenge From China. Retrieved on June 10, 2008, |
from http://www.upiasiaonline.com/Security/2008/05/09/india_faces_cyber_ |
challenge_from_china/5587/. |
Beam It Right There Scotty. 2005. Retrieved on January 26, 2008, from |
http://www.wired.com/science/discoveries/news/2005/07/68152. |
Berkeley Bionics Human Exoskeleton. 2007. Retrieved On March 10, 2008, from |
http://www.youtube.com/watch?v=EdK2y3lphmE. |
Block, Ryan. 2006. The Brain Port, Neural Tongue Interface Of The Future. Retrieved on |
March 10, 2008, from http://www.engadget.com/2006/04/25/the-brain-port-neural-tongueinterface-of-the-future/. |
Bloom, James. 2008. Robots ready to support soldiers on the battlefield. Retrieved on June |
26, 2008, from http://www.guardian.co.uk/technology/2008/jun/26/robots.weapons |
technology. |
Bonsor, Kevin. 2008. How Augmented Reality Will Work. Retrieved on March 10, 2008, |
from http://www.howstuffworks.com/augmented-reality.htm. |
Boyd, Clark. 2008. Profile: Gary McKinnon. Retrieved on August 4, 2008, from |
http://news.bbc.co.uk/2/hi/technology/4715612.stm. |
Bradsher, Keith. 2006. Hong Kong enlists youth to fight piracy. Retrieved on July 20, |
2008, from http://www.iht.com/articles/2006/07/18/business/piracy.php. |
Braukus, Michael. 2004. NASA Develops System To Computerize Silent Subvocal Speech. |
Retrieved on March 2008, from http://www.nasa.gov/home/hqnews/2004/mar/HQ_04093_ |
subvocal_speech.html. |
Brenner, Bill. 2007. Experts doubt Russian government launched DDoS attacks. Retrieved on |
February 18, 2008, from http://searchsecurity.techtarget.com/news/article/0,289142, |
sid14_gci1255548,00.html. |
Bingemann, Mitchell. 2008. Buggy Software Sends Optus Offline. Retrieved on August 8, |
2008, from http://www.australianit.news.com.au/story/0,,24141034-15306,00.html. |
Brenner, Bill. 2005. Myfip |
s Titan Rain Connection. Retrieved on January 8, 2008, from |
http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1120855,00.html. |
Bridis, Ted. 2008. CIA: Hackers demanding cash disrupted power. Retrieved on February 2, |
2008, from http://www.msnbc.msn.com/id/22734229/. |
Bright, Arthur. 2007. Estonia Accuses Russia Of Cyberattack. Retrieved on March 10, 2008, |
from http://www.csmonitor.com/2007/0517/p99s01-duts.html. |
Brookes, Peter. 2006. China |
s Influence In Africa. Retrieved on March 15, 2008, from |
http://www.heritage.org/Research/AsiaandthePacific/bg1916.cfm. |
Bruno, Greg. 2008. The Evolution of Cyber Warfare. Retrieved on March 12, 2008, from |
http://www.cfr.org/publication/15577/. |
Burns, Simon. 2006. MySpace and Wikipedia Clones Storm China. Retrieved on July 31, |
2008, from http://www.itnews.com.au/News/NewsStory.aspx?story=35422. |
Center for Strategic and International Studies. 2003. China |
s Space Program. Retrieved on April 3, 2008, from |
http://www.csis.org/index.php?option=com_csis_progj&task=view&id=76. |
China and Internet Censorship. 2006. Retrieved on August 5, 2008, from http://www.cnn. |
com/interactive/world/0603/explainer.china.internet/frameset.exclude.html. |
China defends internet regulation. 2006. Retrieved on July 15, 2008, from http://news.bbc. |
co.uk/2/hi/asia-pacific/4715044.stm. |
China hires Net squad to sway opinion. 2005. Retrieved on July 15, 2008, from |
http://www.asiamedia.ucla.edu/article.asp?parentid=24609. |
China internet use grows. 2006. Retrieved on August 1, 2008, from http://news.bbc.co.uk/ |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
2/hi/business/2145865.stm. |
China Tightens Vice On Internet. 2006. Retrieved on June 11, 2008, from http://cryptome. |
cn/china-vise.htm. |
China's National Defense in 2006 (White Paper). 2006. Retrieved on March 3, 2006, from |
http://www.fas.org/nuke/guide/china/doctrine/wp2006.html. |
China |
s Navy 2007. 2007. US Office of Naval Intelligence. Retrieved January 10, 2008, from |
http://fas.org/irp/agency/oni/chinanavy2007.pdf. |
China |
s Proliferation Practices, and the Development of Its Cyber and Space Warfare Capabilities. 2008. |
Retrieved on June 30, 2008, from http://www.uscc.gov/hearings/2008 |
hearings/transcripts/08_05_20_trans/08_05_20_trans.pdf. |
China |
s Space Program Aims at Peaceful Use of Space Resources. 2005. Chinanews.cn, 15 October. Retrieved |
on July 10, 2006, from www.chinanews.cn/news/2005/2005-10-15/12428.html |
Chinese Submarines. 2008. Retrieved on April 10, 2008, from http://www.sinodefence.com/ |
navy/sub/default.asp. |
Christensen, John. 1999. Bracing For Guerrilla Warfare In Cyberspace. Retrieved on |
February 2, 2008, from http://edition.cnn.com/TECH/specials/hackers/cyberterror/. |
Code Red Worm Spreading, Set To Flood Whitehouse. 2001. Retrieved on July 18, |
2008, from http://slashdot.org/articles/01/07/19/2230246.shtml. |
Cost of Code Red Rising. 2001. Retrieved on February 2, 2008, from |
http://archives.cnn.com/2001/TECH/internet/08/08/code.red.II/. |
Coleman, Kevin. 2008. Cyber War 2.0 |
Russia V. Georgia. Retrieved on August 13, 2008, |
from http://www.defensetech.org/archives/004363.html. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.