text
stringlengths 4
429
|
---|
Commissar of Nashi says he waged cyber attack on Estonian government sites. 2007. |
Retrieved on March 10, 2008, from http://www.sbcc-chamber.com/index. |
php?lng=en&page_id=60&news_id=888. |
Cook, John. 2008. Cult Friction. Retrieved on July 14, 2008, from http://www.radaronline. |
com/from-the-magazine/2008/03/scientology_anonymous_protests_tom_cruise_01.php. |
Cooper, Simon. 2006. How China Steals US Military Secrets. Retrieved on April 2, 2008, |
from http://www.popularmechanics.com/technology/military_law/3319656.html. |
Cordesman, Anthony, and Kleiber, Martin. 2006. Overview of Major Asians Powers. |
Retrieved on March 12, 2008, from http://www.csis.org/media/csis/pubs/ |
060626_asia_balance_powers.pdf. |
Corpus, Victor N. 2006. Americas Acupuncture Points, Part 1. Retrieved on March 18, 2008, |
from http://www.atimes.com/atimes/China/HJ19Ad01.html. |
Corpus, Victor N. 2006. Americas Acupuncture Points, Part 2. Retrieved on March 18, 2008, |
from http://www.atimes.com/atimes/china/HJ20Ad01.html. |
Cowell, Alan. 2008. French Truckers Protest Fuel Prices. Retrieved on August 1, 2008, from |
http://www.nytimes.com/2008/06/17/world/europe/17fuel.html. |
Cox Report. 1999. Retrieved on June 12, 2008, from http://www.fas.org/spp/starwars/ |
congress/1999_r/cox/ch1bod.htm. |
Cuban, Brian. 2008. Confessions of a Banned Digger. Retrieved on September 5, 2008, from |
http://www.briancuban.com/confessions-of-a-banned-digger/. |
Cyberwarfare in International Law. 2008. Retrieved on March 8, 2008, from |
http://yro.slashdot.org/article.pl?no_d2=1&sid=08/01/24/2151233. |
Davidson, Keay. 2004. Air Force Pursuing Antimatter Weapons. Retrieved on March 10, |
2008, from http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2004/10/04/MNGM393 |
GPK1.DTL. |
Delio, Michelle. 2001. Code Blue Targets China Firm. Retrieved on February 10, 2008, from |
http://www.wired.com/science/discoveries/news/2001/09/46624. |
Delio, Michelle. 2001. It |
s Cyber War: China vs. US. Retrieved on July 2, 2008, from |
http://www.wired.com/politics/law/news/2001/04/43437. |
Derene, Glenn. 2008. Inside NSA Red Team Secret Ops with Government's Top Hackers. |
Retrieved on August 10, 2008, from http://www.popularmechanics.com/technology/ |
military_law/4270420.html. |
Dick, Stevens J. 2006. The Importance of Exploration. Retrieved on March 3, 2008, from |
http://www.nasa.gov/missions/solarsystem/Why_We_01pt1.html. |
DoS Attacks on Estonia Were Launched by Student. Retrieved on March 8, 2008, from |
http://politics.slashdot.org/article.pl?no_d2=1&sid=08/01/25/0120221. |
Economy, Elizabeth C. And Segal, Adam. 2008. China |
s Olympic Nightmare. Retrieved on |
June 30, 2008, from http://www.foreignaffairs.org/20080701faessay87403-p0/elizabeth- |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
c-economy-adam-segal/china-s-olympic-nightmare.html. |
Espiner, Tom. 2006. Academics break the Great Firewall of China. Retrieved on July 4, |
2008, from http://news.com.com/2100-7348_3-6090437.html?part=rss&tag=6090437& |
subj=news. |
Espiner, Tom. 2005. Security Experts Lift Lid On Chinese Hack Attacks. Retrieved on |
February 9, 2008, from http://news.zdnet.com/2100-1009_22-5969516.html. |
Estonia Fines Man for Cyber War. 2008. Retrieved on February 12, 2008, from |
http://news.bbc.co.uk/2/hi/technology/7208511.stm. |
Estonia Has No Evidence of Kremlin Involvement. 2007. Retrieved on March 10, 2008, from |
http://en.rian.ru/world/20070906/76959190.html. |
Estonia Hit by Moscow Cyber War. 2007. Retrieved on January 23, 2008, from |
http://news.bbc.co.uk/2/hi/europe/6665145.stm. |
Everett, Margaret. Latin America On-line: The Internet, Development, and Democratization. |
1998. Retrieved on March 2, 2008, from http://library.nmsu.edu/subject/bord/laguia/ |
everett.html. |
Faiola, Anthony. 2005. Anti-Japanese Hostilities Move to the Internet. Retrieved on June 8, |
2008, from http://www.washingtonpost.com/wp-dyn/content/article/2005/05/09/ |
AR2005050901119.html. |
FCS Watch. Retrieved on March 10, 2008, from http://www.defensetech.org/archives/cat_ |
fcs_watch.html. |
French, Howard W. 2006. Chinese Tech Buffs Slake Thirst for U.S. TV Shows. |
Retrieved on August 4, 2008, from http://www.nytimes.com/2006/08/09/world/asia/09 |
china.html/partner/rssnyt?_r=2&oref=slogin. |
Friedman, Elisabeth Jay. 2005. The Reality of Virtual Reality. Retrieved February 22, 2008, |
from http://programs.ssrc.org/itic/publications/friedman.pdf. |
Fuel Demo Adds to Road Taxes Row. 2008. Retrieved on August 1, 2008, from |
http://news.bbc.co.uk/2/hi/uk_news/7420792.stm. |
Future Combat Systems. 2008. Retrieved on March 10, 2008, from http://www.globalsecur |
ity.org/military/systems/ground/fcs.htm. |
Gannon, John C. 2001. The National Security Telecommunications and Information Systems |
Security Committee. Retrieved on February 12, 2008, from http://www.dni.gov/nic/ |
speeches_telecommunications.html. |
General Staff Department. 1997. Retrieved on March 20, 2008, from |
http://www.fas.org/irp/world/china/pla/gen_staff.htm. |
GOA. 1996. Information Security: Computer Attacks at Department of Defense Pose |
Increasing Risks. Retrieved on February 5, 2008, from http://www.fas.org/irp/gao/aim |
96084.htm. |
Goodin, Dan. 2008. India and Belgium Decry Chinese Cyber Attacks. Retrieved on June 10, |
2008, from http://www.theregister.co.uk/2008/05/08/belgium_india_china_warnings/. |
Google censors itself for China. 2006. Retrieved on July 22, 2006, from http://news.bbc.co. |
uk/2/hi/technology/4645596.stm. |
Graham, Bradley. 2005. Hackers Attack Via Chinese Websites. Retrieved on January 8, |
2008, from http://www.washingtonpost.com/wp-dyn/content/article/2005/08/ |
24/AR2005082402318.html. |
Greenberg, Andy. 2007. Apples For The Army. Retrieved on January 20, 2008, from |
http://www.forbes.com/home/technology/2007/12/20/apple-army-hackers-tech-secur |
ity-cx_ag_1221army.html. |
Greenberg, Andy. 2007. Worst Cybersecurity Meltdowns. Retrieved on February 18, 2008, |
from http://www.forbes.com/2007/10/26/tjx-northrop-mcafee-ent-tech-cx_ag_ |
1026worsthacks.html. |
Greenemeier, Larry. 2007. China |
s Cyber Attacks Signal New Battlefield Is Online. |
Retrieved on July 7, 2008, from http://www.sciam.com/article.cfm?id=chinascyber-attacks-sign. |
Grier, Peter. 2005. Spy Case Patterns The Chinese Style of Espionage. Retrieved on March |
23, 2008, from http://www.csmonitor.com/2005/1130/p01s01-usfp.html. |
Griggs, Brandon. 2008. US at risk of Cyberattacks, Experts Say. Retrived on August 25, 2008, from |
http://edition.cnn.com/2008/TECH/08/18/cyber.warfare/index.html. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.