Выбрать главу

4. Reuvers, Paul, and Marc Simons. “IBM Selectric Bug.” Crypto Museum. N.p., Aug.-Sept. 2010. Web. 29 Aug. 2016. cryptomuseum.com/covert/bugs/selectric/

5. Kaplan, Fred M. “’Could Something Like This Really Happen?’” Dark Territory: The Secret History of Cyber War. 1st ed. New York, NY: Simon & Schuster, 2016. p. 16. Print.

6. Kaplan, Fred M. “Solar Sunrise, Moonlight Gaze” Dark Territory: The Secret History of Cyber War. 1st ed. New York, NY: Simon & Schuster, 2016. pp. 78-88. Print.

7. Cutler, Terry. “The Anatomy of an Advanced Persistent Threat | SecurityWeek.Com.” Security Week. Wired Business Media, 06 Dec. 2010. Web. 27 Aug. 2016. www.securityweek.com/anatomy-advanced-persistent-threat

8. “Microsoft Security Intelligence Report: Strontium.” Web log post. TechNet. Microsoft, 16 Nov. 2015. Web. 28 Aug. 2016. blogs.technet.microsoft.com/mmpc/2015/11/16/microsoft-security-intelligence-report-strontium/

9. Hacquebord, Feike. “Pawn Storm’s Domestic Spying Campaign Revealed; Ukraine and US Top Global Targets.” Web log post. TrendLabs Security Intelligence Blog. Trend Micro, 18 Aug. 2015. Web. 30 Aug. 2016. blog.trendmicro.com/trendlabs-security-intelligence/pawn-storms-domestic-spying-campaign-revealed-ukraine-and-us-top-global-targets/

10. Kharouni, Loucif, Feike Hacquebord, Numaan Huq, Jim Gogolinski, Fernando Mercês, Alfred Remorin, and Douglas Otis. Operation Pawn Storm: Using Decoys to Evade Detection. Trend Micro. Trend Micro Inc., 22 Oct. 2014. Web. 9 Aug. 2016. www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/whitepapers/wp-operation-pawn-storm.pdf

11. Ibid.

12. Ibid.

13. Ibid.

14. Ibid.

15. Hacquebord, Feike. “Pawn Storm’s Domestic Spying Campaign Revealed; Ukraine and US Top Global Targets.” Web log post. TrendLabs Security Intelligence Blog. Trend Micro, 18 Aug. 2015. Web. 30 Aug. 2016. blog.trendmicro.com/trendlabs-security-intelligence/pawn-storms-domestic-spying-campaign-revealed-ukraine-and-us-top-global-targets/

16. F-Secure Labs. THE DUKES: 7 Years of Russian Cyberespionage. Rep. F-Secure, 5 Sept. 2015. Web. 30 Aug. 2016. www.f-secure.com/documents/996508/1030745/dukes_whitepaper.pdf

17. Ibid.

18. Silva, Cristina. “Meet Turla, The Russian Hacking Group Using Commercial Satellites To Spy On US, Europe.”International Business Times. IBT Media, 09 Sept. 2015. Web. 30 Aug. 2016. www.ibtimes.com/meet-turla-russian-hacking-group-using-commercial-satellites-spy-us-europe-2089116

19. “Breaking the Code on Russian Malware.” Web log post. The Recorded Future Blog. Recorded Future, 20 Nov. 2016. Web. 28 Aug. 2016. www.recordedfuture.com/russian-malware-analysis/

20. Ibid.

21. Nakashima, Ellen. “Cyber-intruder Sparks Response, Debate.” Washington Post. The Washington Post Company, 8 Dec. 2011. Web. 28 Aug. 2016. www.washingtonpost.com/national/national-security/cyber-intruder-sparks-response-debate/2011/12/06/gIQAxLuFgO_story.html

22. The Waterbug Attack Group. Security Response. Symantec, 14 Jan. 2016. Web. 28 Aug. 2016. www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/waterbug-attack-group.pdf

23. 2015 Global Threat Report. Rep. CrowdStrike, 14 Jan. 2016. Web. 31 Aug. 2016. go.crowdstrike.com/rs/281-OBQ-266/images/15GlobalThreatReport.pdf

24. “Denial-of-Service: The Estonian Cyberwar and Its Implications for U.S. National Security.” International Affairs Review. Elliott School of International Affairs, n.d. Web. 30 Aug. 2016. www.iar-gwu.org/node/65

25. Traynor, Ian. “Russia Accused of Unleashing Cyberwar to Disable Estonia.” The Guardian. Guardian News and Media, 16 May 2007. Web. 29 Aug. 2016. www.theguardian.com/world/2007/may/17/topstories3.russia

26. “Estonia Fines Man for ‘cyber War’” BBC News. British Broadcasting Corporation, 25 Jan. 2008. Web. 29 Aug. 2016. news.bbc.co.uk/2/hi/technology/7208511.stm

27. “Georgia: Avoiding War in South Ossetia”. Rep. International Crisis Group, 26 Nov. 2014. Web. 29 Aug. 2016. unpan1.un.org/intradoc/groups/public/documents/UNTC/UNPAN019224.pdf

28. “If Kosovo Goes Free.” The Economist. The Economist Group, 29 Nov. 2007. Web. 29 Aug. 2016. www.economist.com/node/10225052.

29. Hollis, David, “Cyberwar Case Study: Georgia 2008”, Small Wars Journal. Small Wars Foundation, 6 Jan. 2011. Web 29 Aug. 2016. http://smallwarsjournal.com/blog/journal/docs-temp/639-hollis.pdf.

30. Schachtman, Noah. “Top Georgian Officiaclass="underline" Moscow Cyber Attacked Us – We Just Can’t Prove It.” Wired. Conde Nast, 6 Jan. 2011. Web. 29 Aug. 2016. www.wired.com/2009/03/georgia-blames

31. F-Secure Labs. BLACKENERGY & QUEDAGH: The Convergence of Crimeware and APT Attacks. Rep. F-Secure, n.d. Web. 29 Aug. 2016. www.f-secure.com/documents/996508/1030745/blackenergy_whitepaper.pdf

32. US-CCU. Overview by the US-CCU of the Cyber Campaign Against Georgia in August of 2008. Campaign Overview. The U.S. Cyber Consequences Unit, Aug. 2009. Web. 29 Aug. 2016. www.registan.net/wp-content/uploads/2009/08/US-CCU-Georgia-Cyber-Campaign-Overview.pdf

33. APT28: A Window Into Russia’s Cyber Espionage Operations? Rep. FireEye, 5 Feb. 2016. Web. 29 Aug. 2016. www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdf

34. United States of America. Library of Congress. Global Legal Monitor. Lithuania: Ban on Nazi and Soviet Symbols. By Peter Roudik. The Law Library of Congress, 2 July 2008. Web. 29 Aug. 2016. www.loc.gov/law/foreign-news/article/lithuania-ban-on-nazi-and-soviet-symbols/