text
stringlengths
4
429
2008 Jason Fritz
Onley, Dawn and Wait, Patience. 2006. Red Storm Rising. Retrieved on January 8, 2008,
from http://www.gcn.com/print/25_25/41716-1.html.
Operation Spam Zombies. 2005. Retrieved on August 1, 2008, from http://www.ftc.gov/bcp/
conline/edcams/spam/zombie/partners.htm.
Pang, Kevin. 2008. Chinese text-message primer. Retrieved on August 25, 2008, from http://
www.chicagotribune.com/features/lifestyle/chi-chinese.text.0812aug12,0,606145.story.
Paramilitary Olympics: Beijing: at least 94,000 security staff
but only 10,500 athletes. 2008. The Independent,
April 13. Retrieved on September 20, 2008, from
http://www.independent.co.uk/news/world/asia/paramilitary-olympics-beijing-at-least-94000-security-staffndash-but-only-10500-athletes-808490.html.
Pasternack, Alex. 2008. When Nature Won
t Cooperate in China, Photoshop! Retrieved on
April 10, 2008, from http://www.treehugger.com/files/2008/02/fake_photo_tibet_
railway_antelope_greenwashing.php.
Paul, Ryan. 2007. Top US government research labs infiltrated by hackers. Retrieved on
February 10, 2008, from http://arstechnica.com/news.ars/post/20071209-top-us-militaryresearch-labs-infiltrated-by-hackers.html.
People
s Daily Online. 2006. Authorities make first hit in anti-piracy campaign. Retrieved
on July 29, 2008, from http://english.people.com.cn/200607/29/eng20060729_288072.
html.
People
s Armed Police. 2005. Retrieved on March 20, 2008, from http://www.globalsecurity.
org/intell/world/china/pap.htm.
People
s Armed Police Force Organisation. 2007. Retrieved on March 20, 2008, from
http://www.sinodefence.com/organisation/armedpolice/introduction.asp.
Phone Phreaking. 2008. Retrieved on June 26, 2008, from http://www.textfiles.com/phreak/.
Pike, John. 2008. China
s Defense Budget. Retrieved on February 2, 2008, from
http://www.globalsecurity.org/military/world/china/budget.htm.
Pike, John. 2008. X-45 Unmanned Combat Air Vehicle (UCAV). Retrieved on August 10,
2008, from http://www.fas.org/man/dod-101/sys/ac/ucav.htm.
Pillsbury, Michael. 2000. China Debates the Future Security Environment. National Defense University Press.
Retrieved on February 2, 2008, from http://www.fas.org/nuke/guide/china/doctrine/pills2/part08.htm.
Pirates of the Orient. 2006. Retrieved on July 15, 2008, from http://www.thestandard.com.
hk/weekend_news_detail.asp?pp_cat=30&art_id=22887&sid=8816949&con_type=3&d_
str=20060715.
Polyanskaya, Anna. 2006. Commissars of the Internet. Retrieved on June 12, 2008, from
http://lrtranslations.blogspot.com/2007/02/commissars-of-internet.html.
PRC Acquisitions of US Technology. 1998. Retrieved on March 10, 2008, from
http://www.fas.org/spp/starwars/congress/1999_r/cox/ch1bod.htm.
Put Your Mobile Where Your Mouth Is. 2002. Retrieved on March 10, 2008, from
http://news.bbc.co.uk/2/hi/science/nature/2055654.stm.
Qiao, Liang and Wang Xiangsui. 1999. Unrestricted Warfare. Retrieved on February 10,
2008, from http://www.terrorism.com/documents/TRC-Analysis/unrestricted.pdf
Raduege, Harry. 2004. Net-Centric Warfare Is Changing The Battlefield Environment.
Retrieved on April 2, 2008, from http://www.stsc.hill.af.mil/crosstalk/2004/01/0401
Raduege.html.
Ramadge, Andrew. 2008. Scientology protest surge crashes websites. Retrieved on July 14,
2008, from http://www.news.com.au/technology/story/0,25642,23212002-5014239,00.
html.
Raun, Alo. 2007. Venemaa j
tab Eesti k
berr
nnakute uurimisel
igusabita. Retrieved on
March 10, 2008, from http://www.postimees.ee/060707/esileht/siseuudised/270899.php.
Reid, Tim. 2007. China
s cyber army is preparing to march on America, says Pentagon.
Retrieved on February 21, 2008, from http://technology.timesonline.co.uk/tol/news/
tech_and_web/the_web/article2409865.ece.
Reporters Without Borders. 2006. Yahoo ! implicated in third cyberdissident trial.
Retrieved on July 25, 2008, from http://www.rsf.org/article.php3?id_article=17180.
Richards, Jonathan. 2008. China Blocks YouTube Yahoo! Over Tibet. Retrieved on March
12, 2008, from http://technology.timesonline.co.uk/tol/news/tech_and_web/article
3568040.ece.
Robson, Gary. 2004. The Origins of Phreaking. Retrieved on June 28, 2008, from
http://www.robson.org/gary/writing/phreaking.html.
SBDCNET. 2001. Convenience Store/Gasoline Station Market Profile. Retrieved on June 1,
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80
Copyright
2008 Jason Fritz
2008, from http://sbdcnet.utsa.edu/industry/gas_stations.pdf.
Schearf, Daniel. 2006. Chinese Intellectuals Condemn Web Site Closure. Retrieved on
August 4, 2008, from http://www.voanews.com/english/2006-08-04-voa17.cfm.
Second Artillery Corps. 2000. Retrieved on March 20, 2008, from
http://www.fas.org/nuke/guide/china/agency/2-corps.htm.
Second Intelligence Department. 2005. Retrieved on March 24, 2008, from
http://www.globalsecurity.org/intell/world/china/pla-dept_2.htm.
Schwartz, John. 2007. When Computers Attack. Retrieved on February 2, 2008, from
http://www.nytimes.com/2007/06/24/weekinreview/24schwartz.html?_r=1&oref=slogin.
Shaughnessy, Larry. 2008. CIA, FBI push Facebook for Spies. Retrieved on September 5,
2008, from http://edition.cnn.com/2008/TECH/ptech/09/05/facebook.spies/index.html?
eref=rss_latest.
Single, Ryan. 2008. War Breaks Out Between Hackers And Scientology. Retrieved on July
14, 2008, from http://blog.wired.com/27bstroke6/2008/01/anonymous-attac.html.
Skype Protocol Has Been Cracked. 2006. Retrieved on July 14, 2008, from
http://politics.slashdot.org/article.pl?sid=06/07/14/1514226.
Slashdot Subculture. 2008. Retrieved on April 10, 2008, from http://wikipedia.qwika.com/en/
Slashdot_subculture.
Slashdot Trolling Phenomenon. 2008. Retrieved on April 10, 2008, from http://wikipedia.
qwika.com/en/Slashdot_trolling_phenomena.
Small Arms. 2008. Retrieved on April 10, 2008, from http://www.sinodefence.com/army/
small_arms/default.asp.
Smith, Charles. 2001. Russian Rocket Torpedo Arms Chinese Subs. Retrieved on February
10, 2008, from http://archive.newsmax.com/archives/articles/2001/4/23/220813.shtml.
Sobrale, Saada. 2007. Venemaa keeldus koost
st k
berr