text
stringlengths
4
429
nnakute uurimisel. Retrieved on
March 10, 2008, from http://www.epl.ee/artikkel/392271.
Streem. 2008. Westpac Glitch Leaves Customers Cashless. Retrieved on August 13, 2008,
from http://www.streem.com.au/breaking-news/6326-thousands-blocked-as-westpaccrashes.
Sun Tzu [Zi]. 1963. The Art of War (trans. Samuel B. Griffith). London: Oxford University Press.
Surface Combatants. 2008. Retrieved on April 9, 2008, from http://www.sinodefence.com/
navy/surface/default.asp.
Taiwan Assassin. 2004. Retrieved on April 7, 2008, from http://www.tzengs.com/News/
Assasin/photos_.htm.
Talmadge, Caitlin. 2008. Closing Time: Assessing the Iranian Threat to the Strait of Hormuz.
Retrieved on August 2, 2008, from http://belfercenter.ksg.harvard.edu/publication/
18409/closing_time.html.
Tellis, Ashley. 2007. China
s Military Space Strategy. Retrieved on January 28, 2008, from
http://www.informaworld.com/smpp/section?content=a780978527&fulltext=713240928.
Thai Truckers Join Global Fuel Price Protest. 2008. Retrieved on August 1, 2008, from
http://business.smh.com.au/business/thai-truckers-join-global-fuel-price-protest-200806112oy3.html.
The Christian Science Monitor. 2006. China's new shopping craze: 'team buying'.
Retrieved on August 1, 2008, from http://articles.moneycentral.msn.com/Savingand
Debt/FindDealsOnline/ChinasNewShoppingCrazeTeamBuying.aspx.
The Cyber Raiders Hitting Estonia. 2007. Retrieved on February 12, 2008, from
http://news.bbc.co.uk/2/hi/europe/6665195.stm.
The Passion of Anonymous. 2008. Retrieved on July 14, 2008, from
http://www.newsweek.com/id/109410.
Thornburgh, Nathan. 2005. Inside the Chinese Hack Attack. Retrieved on July 21,
2008, from http://www.time.com/time/nation/article/0,8599,1098371,00.html.
Thornburgh, Nathan. 2005. The Invasion of the Chinese Cyberspies. Retrieved on March 2,
2008 from http://www.time.com/time/magazine/article/0,9171,1098961,00.html.
Tkacik, John J Jr. 2007. Trojan Dragons: China
s Cyber Threat. Retrieved on March 20,
2008, from http://www.heritage.org/Research/asiaandthepacific/bg2106.cfm.
Towards one laptop per child. 2006. Retrieved on July 28, 2008, from
http://www.sunstar.com.ph/static/ceb/2006/07/24/bus/towards.one.laptop.per.child.html.
Trahan, Jason. 2008. Teen wouldn
t quit his hacking ways, FBI says. Retrieved on August
31, 2008, from http://www.dallasnews.com/sharedcontent/dws/news/nation/stories/DNswating_31met.ART0.West.Edition1.4ddc7cf.html.
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80
Copyright
2008 Jason Fritz
United States General Accounting Office (GAO), Information Security: Code Red, Code Red II, and SirCam
Attacks Highlight Need for Proactive Measures, Statement of Keith A. Rhodes, Chief Technologist, August
29, 2001 (GAO-01-1073T), see http://www.gao.gov/new.items/d011073t.pdf
Use of Social Network Websites in Investigations. 2008. Retrieved on August 12, 2008, from
http://en.wikipedia.org/wiki/Use_of_social_network_websites_in_investigations.
Vallance, Chris. 2008. US Seeks Terrorists In The Web Worlds. Retrieved on March 8, 2008,
from http://news.bbc.co.uk/2/hi/technology/7274377.stm.
Vamosi, Robert. 2008. Anonymous posts another video against Scientology. Retrived on July
14, 2008, from http://news.cnet.com/8301-10789_3-9859513-57.html.
VoIPWiki Blog. 2006. Skype Protocol Has Been Cracked. Retrieved on July 14, 2008,
from http://www.voipwiki.com/blog/?p=16.
Wagstaff, Jeremy. 2005. The First U.S.- China Cyberwar. Retrieved on July 27, 2008,
from http://loosewire.typepad.com/blog/2005/12/the_first_uschi.html.
Warrick, Joby and Johnson, Carrie. 2008. Chinese Spy Slept In US For 2 Decades. Retrieved
on April 3, 2008, from http://www.washingtonpost.com/wp-dyn/content/story/
2008/04/02/ST2008040204050.html.
Warren, Peter. 2006. Smash and grab, the hi-tech way. Retrieved on July 18, 2008,
from http://technology.guardian.co.uk/weekly/story/0,,1689093,00.html.
Waterman, Shaun. 2008. Analysis DHS Stages Cyberwar Exercise. Retrieved on April 10,
2008, from http://www.spacewar.com/reports/Analysis_DHS_stages_cyberwar_
exercise_999.html.
Waterman, Shaun. 2008. Analysis: Russia-Georgia Cyber War Doubted. Retrieved on August
18, 2008, from http://www.spacewar.com/reports/Analysis_Russia-Georgia_cyber
war_doubted_999.html.
Waterman, Shaun. 2008. Chinese Cyberattacks Target US Think Tanks. Retrieved on March
8, 2008, from http://www.spacewar.com/reports/Chinese_Cyberattacks_Target_
US_Think_Tanks_999.html.
Waterman, Shaun. 2007. China Has .75 Million Zombie Computers In US. Retrieved on
March 17, 2008, from http://www.upi.com/International_Security/Emerging_Threats/
Briefing/2007/09/17/china_has_75m_zombie_computers_in_us/7394/.
Waterman, Shaun. 2007. Who cyber smacked Estonia? Retrieved on January 17, 2008 from
http://www.upi.com/Security_Terrorism/Analysis/2007/06/11/analysis_who_
cyber_smacked_estonia/2683/.
Wayner, Peter. 1999. Hacker Attacks on Military Networks May Be Closer to Espionage.
Retrieved on August 10, 2008, from http://www.landfield.com/isn/mail-archive/1999/
Mar/0022.html.
Weber, Harry. 2008. FAA Says Communications Breakdown Delaying Flights. Retrieved on
August 28, 2008, from http://news.yahoo.com/s/ap/20080826/ap_on_re_us/faa_
communication_breakdown;_ylt=A0WTUeXUlbRISucAawSs0NUE.
Weber, Tim. 2007. Criminals may overwhelm the web. Retrieved on August 1, 2008, from
http://news.bbc.co.uk/1/hi/business/6298641.stm.
Wei, Michael. 2008. Facebook Targets China, World
s Biggest Web Market. Retrieved on
June 20, 2008, from http://www.reuters.com/article/ousiv/idUSSHA17883120080620.
Wensheng, Wang. 2006. Bridging the Digital Divide Inside China. Retrieved on July 28,
2008, from http://zoushoku.narc.affrc.go.jp/ADR/AFITA/afita/afita-conf/2002/part7/
p533.pdf.
WFTV. 2008. Girls Record Brutal Attack On Teen To Allegedly Post on YouTube. Retrieved
On May 10, 2008, from http://www.wftv.com/news/15817394/detail.html.
Winkler, Ira. 2005. Guard Against Titan Rain Hackers. Retrieved on January 8, 2008, from
http://www.computerworld.com/securitytopics/security/story/0,10801,105585,00.html.
Winkler, Ira. 2007. How To Take Down The Power Grid. Retrieved on June 7, 2008, from
http://www.internetevolution.com/author.asp?section_id=515&doc_id=136047.
Winkler, Tim. 2003. Dragonflies Prove Clever Predators. Retrieved on February 10, 2008,
from http://info.anu.edu.au/ovc/media/Media_Releases/_2003/_030605Dragonflies.asp.
Winn, Patrick. 2008. Hypothetical attack on U.S. outlined by China. Retrieved on
February 23, 2008, from http://www.airforcetimes.com/news/2008/01/airforce_
china_strategy_080121/.
Whitney, Mike. 2008. Three Internet Cables Slashed In A Week. Retrieved on July 4, 2008,
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80
Copyright