text
stringlengths
4
429
Hacker Attacks in US Linked to Chinese Military. 2005. Retrieved on July 21, 2006,
from http://www.breitbart.com/news/2005/12/12/051212224756.jwmkvntb.html.
Hacking Textfiles. 2008. Retrieved on June 8, 2008, from http://www.textfiles.com/hacking/.
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80
Copyright
2008 Jason Fritz
Hacking US Government Computers from Overseas. 2001. Retrieved on February 2, 2008,
from http://www.totse.com/en/hack/understanding_the_internet/163724.html.
Hanson, Stephanie. 2008. China, Africa, and Oil. Retrieved on June 12, 2008, from
http://www.cfr.org/publication/9557/.
Ha, Michael. 2008. China Gateway for Most Cyber-Attacks. Retrieved on June 20, 2008,
from http://www.koreatimes.co.kr/www/news/nation/2008/05/116_24499.html.
Heilemann, John. 2006. How Digg.com is Democratizing the News. Retrieved on
March 27, 2007 from http://money.cnn.com/2006/03/24/magazines/business2/
diggdemocratizes/index.htm.
Hershkovitch, Ady. 1998. Plasma Window Technology for Propagating Particle Beams and
Radiation from Vacuum to Atmosphere. Retrieved on March 10, 2008, from
http://www.techbriefs.com/content/view/1834/32/1/0/.
Hi-tech Thieves Target Olympics. 2008. Retrieved on August 20, 2008, from
http://news.bbc.co.uk/2/hi/technology/7548870.stm.
Hill, John. 2004. China
s Assassin
s Mace Meets The Taiwanese Scorpion. Retrieved on
March, 18, 2008, from http://www.infowar-monitor.net/modules.php?op=modload
&name=News&file=article&sid=1044.
Hines, Matt. 2008. Be prepared: ActiveX attacks will persist. Retrieved on March 10, 2008,
from http://www.infoworld.com/article/08/02/19/08NF-activex-horror_1.html.
Hollis, Duncan. Why States Need an International Law For Information Operations.
Retrieved on March 2, 2008, from http://papers.ssrn.com/sol3/papers.cfm?abstract_
id=1083889.
Ikenberry, John G. 2008. The Rise of China and the Future of the West. Retrieved on
February 10, 2008, from http://www.foreignaffairs.org/20080101faessay87102-p0/gjohn-ikenberry/the-rise-of-china-and-the-future-of-the-west.html.
Indonesia: Growing Fuel Price Protest Meet Repression. 2008. Retrieved on August 1, 2008,
from http://www.greenleft.org.au/2008/752/38852.
Information Operations Roadmap. 2003. Declassified US Government document. Retrieved on March 1, 2008,
from
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB177/info_ops_roadmap.pdf.
International Assessment and Strategy Center. 2005. Top Ten Chinese Military
Modernization Developments. Retrieved on February 15, 2008, from
http://www.strategycenter.net/research/pubID.65/pub_detail.asp.
International Institute for Strategic Studies. 2008. The Military Balance 2008. Routledge for IISS, Abingdon.
Internet censorship in the People
s Republic of China. 2006. Retrieved on August 2,
2008, from http://en.wikipedia.org/wiki/The_Great_Firewall
Internet Filtering in China in 2004-2005. 2005. Retrieved on July 21, 2008, from
http://opennet.net/studies/china.
Internet Group Declares War on Scientology. Retrieved on March 8, 2008, from
http://yro.slashdot.org/article.pl?no_d2=1&sid=08/01/24/1311252.
Iran Missile Test Provocative. 2008. Retrieved on August 2, 2008, from
http://news.bbc.co.uk/2/hi/middle_east/7498214.stm.
Isachenkov, Vladimir. 2007. Russian Space Exec Convicted For Aiding China. Retrieved on
March 10, 2008, from http://www.msnbc.msn.com/id/22082431/.
ISN. 2001. Code Red virus probably began in China. Retrieved on July 18, 2006,
from http://www.landfield.com/isn/mail-archive/2001/Sep/0007.html.
Jesdanun, Anick. 2008. Chinese Internet Users Up to 210 Million. Retrieved on February 20,
2008, from http://www.physorg.com/news119947914.html.
Johnston, Alastair. 2002. Toward Contextualizing the Concept of a Shashoujian (Assassin
Mace). Retrieved on February 24, 2008, from http://www.people.fas.harvard.edu/~john
ston/shashoujian.pdf.
Jordan, Jakes. 2008. US Charges 2 In China Spy Case. Retrieved on April 1, 2008, from
http://www.time.com/time/world/article/0,8599,1726799,00.html.
Kiezer, Gregg. 2005. Dutch Botnet Suspects Ran 1.5 Million Machines. Retrieved on August
1, 2008, from http://www.techweb.com/wire/security/172303160.
Kerner, Sean. 2007. Estonia Under Russian Cyber Attack? Retrieved on February 19, 2008,
from http://www.internetnews.com/security/article.php/3678606.
Klein, Alec. 2007. The Army
s $200 Billion Makeover. Retrieved on March 10, 2008, from
http://www.washingtonpost.com/wp-dyn/content/story/2007/12/06/ST2007120602927.h
tml.
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80
Copyright
2008 Jason Fritz
Kumar, T. 2006. Human Rights and the Internet in China. Retrieved on August 4, 2008, from
http://www.amnestyusa.org/document.php?id=ENGUSA20060201001.
Lam, Willy Wo-lap. 2004. Beijing
s New
Balanced
Foreign Policy: An Assessment.
China Brief, Vol. 4, No. 4, 20 February. The Jamestown Foundation,
Retrieved on February 6, 2006, from
http://www.jamestown.org/publications_details.php?volume_id=395&&issue_id=2912
Landler, Mark and Markoff, John. 2007. Digital Fears Emerge After Data Siege in Estonia
Retrieved on February 2, 2008, from http://www.nytimes.com/2007/05/29/technology/
29estonia.html?_r=2&ref=technology&oref=slogin&oref=slogin.
Lasker, John. 2005. US Military
s Elite Hacker Crew. Retrieved on February 18, 2008, from
http://www.wired.com/politics/security/news/2005/04/67223.
Layer 8. 2007. Did her MySpace photo derail teacher
s career? Retrieved on June 18, 2008,
from http://www.networkworld.com/community/?q=node/14584.
Lemon, Sumner. 2008. China Crafts Cyber Weapons. Retrieved on June 2, 2008, from
http://www.pcworld.com/article/132284/china_crafts_cyberweapons.html.
Lemon, Sumner. 2007. Chinese Police Arrest Eight For Computer Virus. Retrieved on March
20, 2008, from http://www.infoworld.com/article/07/02/13/HNchinesearresteight_1.html.
Lewis, Jeffrey. 2005. Autonomous Nanosatellite Guardian For Evaluating Local Space
(ANGELS). Retrieved on March 10, 2008, from http://www.defensetech.org/
archives/001996.html.
Lewis, Peter. 1994. Computer Snoopers Imperil Pentagon Files, Experts Say. Retrieved on
July, 2, 2008, from http://query.nytimes.com/gst/fullpage.html?res=9F04E3DD143EF
932A15754C0A962958260.