text
stringlengths 4
429
|
---|
Leyden, John. 2007. France blames China for hack attacks. Retrieved on January 2, 2008, |
from http://www.theregister.co.uk/2007/09/12/french_cyberattacks/. |
Leyden, John. 2004. Telenor Takes Down Massive Botnet. Retrieved on August 1, 2008 |
from http://www.theregister.co.uk/2004/09/09/telenor_botnet_dismantled/. |
Leyden, John. 2001. Code Blue Targets Red China. Retrieved on July 18, 2006, |
from http://www.theregister.co.uk/2001/09/10/code_blue_targets_red_china/. |
Levinson, Charles. 2008. Hackers Attack Iraq |
s Vulnerable Computers. Retrieved on August, |
25, 2008, from http://abcnews.go.com/Technology/story?id=5685746&page=1. |
Liedtke, Michael. 2005. Google Agrees to Censor Results in China. Retrieved on July |
22, 2006, from http://www.breitbart.com/news/2006/01/24/D8FBC4C02.html. |
List of Internet Phenomena. 2008. Retrieved on April 10, 2008, from |
http://en.wikipedia.org/wiki/List_of_Internet_phenomena. |
Lo, Joseph. 1996. Internet Chat Relay FAQ. Retrieved on March 15, 2006, from |
http://irchelp.org/irchelp/altircfaq.html. |
Luard, Tim. 2005. China |
s Spies Come Out From The Cold. Retrieved on April 2, 2008, from |
http://news.bbc.co.uk/2/hi/asia-pacific/4704691.stm. |
Lynch, David. 2007. Law Enforcement Struggles To Combat Chinese Spying. Retrieved on |
March 23, 2008, from http://www.usatoday.com/money/world/2007-07-22-china-spy1_N.htm. |
Malone, Scott. 2008. Hackers stole 40 million credit card numbers. Retrieved on August 10, |
2008, from http://www.australianit.news.com.au/story/0,24897,24136467-15306,00.html. |
Marshall, Matt. 2008. Xiaonei, The Facebook Of China, Raises $430M. Retrieved on April 2, |
2008, from http://venturebeat.com/2008/04/30/xiaonei-the-facebook-of-china-raises-430mbetter-funded-than-facebook/. |
Magnuson, Stew. 2006. Wikipedia for Intel Officers Proves Useful. Retrieved on July 7, from |
http://www.allbusiness.com/public-administration/national-security-international/39323311.html. |
Mao, Tse-Tung [Zedong]. 2000. On Guerrilla Warfare (trans. Samuel B. Griffith). Chicago: University of |
Illinois Press |
Mark, David. 2008. Scientists one step closer to invisibility cloak. Retrieved on August 12, |
2008, from http://www.abc.net.au/news/stories/2008/08/11/2330897.htm. |
Marquand, Robert. 2007. China Emerges As Leader In Cyber Warfare. Retrieved on April, |
10, 2008, from http://www.csmonitor.com/2007/0914/p01s01-woap.html. |
Marsal, Katie. 2008. China asking Apple to intentionally cripple iPhones. Retrieved on |
September 26, 2008, from http://www.appleinsider.com/articles/08/09/25/china_mobile_ |
asking_apple_to_intentionally_cripple_iphones.html. |
Maynor, David and Graham, Robert. 2006. SCADA Security and Terrorism: We |
re Not |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
Crying Wolf. Retrieved on February 27, 2008, from http://www.blackhat.com/ |
presentations/bh-federal-06/BH-Fed-06-Maynor-Graham-up.pdf. |
McLaughlin, Martin. 1999. China Spy Scare. Retrieved on March 23, 2008, from |
http://www.wsws.org/articles/1999/mar1999/chin-m10.shtml. |
McLean, Doug. 1995. Hacking in 17 Easy Steps. Retrieved on January 15, 2008, from |
http://web.archive.org/web/20010708111438/http://www.claws-and-paws.com/personal/ |
hacking/17steps.shtml. |
McMillan, Robert. 2008. CIA Says Hackers Have Cut Power Grid. Retrieved on January 19, |
2008, from http://www.pcworld.com/article/id,141564-pg,1/article.html. |
McMillan, Robert. 2008. Hackers Hit Scientology With Online Attack. Retrieved on July 14, |
2008, from http://www.pcworld.com/article/141839/hackers_hit_scientology_with_ |
online_attack.html. |
McMillan, Robert. 2007. Couple Swarmed By SWAT Team After 911 Hack. Retrieved on |
June 7, 2008, from http://www.macworld.com/article/60576/2007/10/swat.html. |
Miklaszewski, Jim. 1999. Pentagon and Hackers in Cyberwar. Retrieved on February 2, |
2008, from http://news.zdnet.com/2100-9595_22-513930.html. |
Milchman, Eli. 2006. Yahoo 'Strictest' Censor in China.Retrieved on July 15, 2006, |
from http://www.wired.com/news/technology/internet/0,71166-0.html?tw=rss.index. |
Miller, Chuck 2008. The Rustock botnet spams again, SC Magazine July 25, from |
http://www.scmagazineus.com/The-Rustock-botnet-spams-again/article/112940/ |
Ministry of Internal Affairs Lists PMR |
s 10 Most Wanted. 2007. Retrieved on March 10, 2008, from |
http://www.tiraspoltimes.com/news/ministry_of_internal_affairs_lists_pmrs_10_most_wanted.html. |
Missiles and Space Programme. 2008. Retrieved on March 20, 2008, from |
http://sinodefence.com/strategic/default.asp |
Moore, Frank W. China |
s Military Capabilities. 2000. Retrieved on February 18, 2008, from |
http://www.comw.org/cmp/fulltext/iddschina.html. |
Moss, William. 2006. Chinese YouTubes courting controversy. Retrieved on July 20, 2006, from |
http://asia.cnet.com/reviews/blog/littleredblog/0,39056119,39375940,00.htm. |
Musharbash, Yassin. 2008. Insights Into The Cyber-Jihad. Retrieved on August 30, 2008, |
from http://www.spiegel.de/international/world/0,1518,575276,00.html. |
Navrozov, Lev. 2005. Chinese Geostrategy: The Assassin |
s Mace. Retrieved on February 10, |
2008, from http://archive.newsmax.com/archives/articles/2005/10/20/172811.shtml. |
Newhouse, Barry. 2006. Group Accuses Internet Companies in China of Rights |
Violations. Retrieved on July 21, 2006, from http://www.voanews.com/english/2006 |
-07-20-voa16.cfm. |
New Technology Can Be Operated By Thought. 2007. Retrieved on March 10, 2008, from |
http://www.sciencedaily.com/releases/2007/11/071107210708.htm. |
Nock, Howard and Lizun, Daniel. 2007. Cyberterrorism and Cybercrime: Are You Prepared. |
Retrieved on January 28, 2008, from http://www.clevelandfed.org/bsr/Conditions/v3n2/ |
v3n2.htm. |
Norton-Taylor, Richard. 2007. Titan Rain: How Chinese Hackers Targeted Whitehall. |
Retrieved on January 8, 2008, from http://www.guardian.co.uk/technology/2007/ |
sep/04/news.internet. |
Nuclear Electromagnetic Pulse. 2005. Retrieved on August 23, 2008, from |
http://cryptome.org/bartlett-060905.txt. |
Brien, Kevin. 2008. OLPC XO Review and Teardown. Retrieved on January 14, 2008, |
from http://www.notebookreview.com/default.asp?newsID=4199. |
Connell, Kelly. 2008. Internet Law: Hackers Disable Scientology Website & Declare War. |
Retrieved on July 14, 2008, from http://www.ibls.com/internet_law_news_portal_view. |
aspx?s=latestnews&id=1972. |
Of Cables and Conspiracies. 2008. Retrieved on July 4, 2008, from |
http://www.economist.com/world/international/displaystory.cfm?story_id=10653963. |
Oliver, Chris. 2008. China |
s foreign exchange reserves jump 61.6 bln in January. Retrieved |
on March 13, 2008, from http://www.marketwatch.com/news/story/chinas-foreignexchange-reserves-jump/story.aspx?guid=%7BEBE6E206-9BE9-4329-B71A2AF2F903A5AD%7D. |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.