text
stringlengths
4
429
Commissar of Nashi says he waged cyber attack on Estonian government sites. 2007.
Retrieved on March 10, 2008, from http://www.sbcc-chamber.com/index.
php?lng=en&page_id=60&news_id=888.
Cook, John. 2008. Cult Friction. Retrieved on July 14, 2008, from http://www.radaronline.
com/from-the-magazine/2008/03/scientology_anonymous_protests_tom_cruise_01.php.
Cooper, Simon. 2006. How China Steals US Military Secrets. Retrieved on April 2, 2008,
from http://www.popularmechanics.com/technology/military_law/3319656.html.
Cordesman, Anthony, and Kleiber, Martin. 2006. Overview of Major Asians Powers.
Retrieved on March 12, 2008, from http://www.csis.org/media/csis/pubs/
060626_asia_balance_powers.pdf.
Corpus, Victor N. 2006. Americas Acupuncture Points, Part 1. Retrieved on March 18, 2008,
from http://www.atimes.com/atimes/China/HJ19Ad01.html.
Corpus, Victor N. 2006. Americas Acupuncture Points, Part 2. Retrieved on March 18, 2008,
from http://www.atimes.com/atimes/china/HJ20Ad01.html.
Cowell, Alan. 2008. French Truckers Protest Fuel Prices. Retrieved on August 1, 2008, from
http://www.nytimes.com/2008/06/17/world/europe/17fuel.html.
Cox Report. 1999. Retrieved on June 12, 2008, from http://www.fas.org/spp/starwars/
congress/1999_r/cox/ch1bod.htm.
Cuban, Brian. 2008. Confessions of a Banned Digger. Retrieved on September 5, 2008, from
http://www.briancuban.com/confessions-of-a-banned-digger/.
Cyberwarfare in International Law. 2008. Retrieved on March 8, 2008, from
http://yro.slashdot.org/article.pl?no_d2=1&sid=08/01/24/2151233.
Davidson, Keay. 2004. Air Force Pursuing Antimatter Weapons. Retrieved on March 10,
2008, from http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2004/10/04/MNGM393
GPK1.DTL.
Delio, Michelle. 2001. Code Blue Targets China Firm. Retrieved on February 10, 2008, from
http://www.wired.com/science/discoveries/news/2001/09/46624.
Delio, Michelle. 2001. It
s Cyber War: China vs. US. Retrieved on July 2, 2008, from
http://www.wired.com/politics/law/news/2001/04/43437.
Derene, Glenn. 2008. Inside NSA Red Team Secret Ops with Government's Top Hackers.
Retrieved on August 10, 2008, from http://www.popularmechanics.com/technology/
military_law/4270420.html.
Dick, Stevens J. 2006. The Importance of Exploration. Retrieved on March 3, 2008, from
http://www.nasa.gov/missions/solarsystem/Why_We_01pt1.html.
DoS Attacks on Estonia Were Launched by Student. Retrieved on March 8, 2008, from
http://politics.slashdot.org/article.pl?no_d2=1&sid=08/01/25/0120221.
Economy, Elizabeth C. And Segal, Adam. 2008. China
s Olympic Nightmare. Retrieved on
June 30, 2008, from http://www.foreignaffairs.org/20080701faessay87403-p0/elizabeth-
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80
Copyright
2008 Jason Fritz
c-economy-adam-segal/china-s-olympic-nightmare.html.
Espiner, Tom. 2006. Academics break the Great Firewall of China. Retrieved on July 4,
2008, from http://news.com.com/2100-7348_3-6090437.html?part=rss&tag=6090437&
subj=news.
Espiner, Tom. 2005. Security Experts Lift Lid On Chinese Hack Attacks. Retrieved on
February 9, 2008, from http://news.zdnet.com/2100-1009_22-5969516.html.
Estonia Fines Man for Cyber War. 2008. Retrieved on February 12, 2008, from
http://news.bbc.co.uk/2/hi/technology/7208511.stm.
Estonia Has No Evidence of Kremlin Involvement. 2007. Retrieved on March 10, 2008, from
http://en.rian.ru/world/20070906/76959190.html.
Estonia Hit by Moscow Cyber War. 2007. Retrieved on January 23, 2008, from
http://news.bbc.co.uk/2/hi/europe/6665145.stm.
Everett, Margaret. Latin America On-line: The Internet, Development, and Democratization.
1998. Retrieved on March 2, 2008, from http://library.nmsu.edu/subject/bord/laguia/
everett.html.
Faiola, Anthony. 2005. Anti-Japanese Hostilities Move to the Internet. Retrieved on June 8,
2008, from http://www.washingtonpost.com/wp-dyn/content/article/2005/05/09/
AR2005050901119.html.
FCS Watch. Retrieved on March 10, 2008, from http://www.defensetech.org/archives/cat_
fcs_watch.html.
French, Howard W. 2006. Chinese Tech Buffs Slake Thirst for U.S. TV Shows.
Retrieved on August 4, 2008, from http://www.nytimes.com/2006/08/09/world/asia/09
china.html/partner/rssnyt?_r=2&oref=slogin.
Friedman, Elisabeth Jay. 2005. The Reality of Virtual Reality. Retrieved February 22, 2008,
from http://programs.ssrc.org/itic/publications/friedman.pdf.
Fuel Demo Adds to Road Taxes Row. 2008. Retrieved on August 1, 2008, from
http://news.bbc.co.uk/2/hi/uk_news/7420792.stm.
Future Combat Systems. 2008. Retrieved on March 10, 2008, from http://www.globalsecur
ity.org/military/systems/ground/fcs.htm.
Gannon, John C. 2001. The National Security Telecommunications and Information Systems
Security Committee. Retrieved on February 12, 2008, from http://www.dni.gov/nic/
speeches_telecommunications.html.
General Staff Department. 1997. Retrieved on March 20, 2008, from
http://www.fas.org/irp/world/china/pla/gen_staff.htm.
GOA. 1996. Information Security: Computer Attacks at Department of Defense Pose
Increasing Risks. Retrieved on February 5, 2008, from http://www.fas.org/irp/gao/aim
96084.htm.
Goodin, Dan. 2008. India and Belgium Decry Chinese Cyber Attacks. Retrieved on June 10,
2008, from http://www.theregister.co.uk/2008/05/08/belgium_india_china_warnings/.
Google censors itself for China. 2006. Retrieved on July 22, 2006, from http://news.bbc.co.
uk/2/hi/technology/4645596.stm.
Graham, Bradley. 2005. Hackers Attack Via Chinese Websites. Retrieved on January 8,
2008, from http://www.washingtonpost.com/wp-dyn/content/article/2005/08/
24/AR2005082402318.html.
Greenberg, Andy. 2007. Apples For The Army. Retrieved on January 20, 2008, from
http://www.forbes.com/home/technology/2007/12/20/apple-army-hackers-tech-secur
ity-cx_ag_1221army.html.
Greenberg, Andy. 2007. Worst Cybersecurity Meltdowns. Retrieved on February 18, 2008,
from http://www.forbes.com/2007/10/26/tjx-northrop-mcafee-ent-tech-cx_ag_
1026worsthacks.html.
Greenemeier, Larry. 2007. China
s Cyber Attacks Signal New Battlefield Is Online.
Retrieved on July 7, 2008, from http://www.sciam.com/article.cfm?id=chinascyber-attacks-sign.
Grier, Peter. 2005. Spy Case Patterns The Chinese Style of Espionage. Retrieved on March
23, 2008, from http://www.csmonitor.com/2005/1130/p01s01-usfp.html.
Griggs, Brandon. 2008. US at risk of Cyberattacks, Experts Say. Retrived on August 25, 2008, from
http://edition.cnn.com/2008/TECH/08/18/cyber.warfare/index.html.