34. King, Bob, and Tim Starks. “Hackers Suspected in New Attack on Democrats.” POLITICO. POLITICO, 28 July 2016. Web. 1 Sept. 2016. www.politico.com/story/2016/07/dccc-hack-fbi-226398
35. Meyer, Josh, Alex Moe, and Tracy Connor. “New Democratic Party Hack ‘Similar’ to Earlier Breach.” NBC News. NBCUniversal News Group, 29 July 2016. Web. 1 Sept. 2016. www.nbcnews.com/news/us-news/hack-democratic-congressional-campaign-committee-tied-earlier-breach-n619786
36. “FANCY BEAR Has an (IT) Itch That They Can’t Scratch.” ‘Threat Geek’ Fidelis Cyber Security, 1 Aug. 2016. Web. 28 Aug. 2016. www.threatgeek.com/2016/08/fancy-bear-has-an-it-itch-that-they-cant-scratch.html
37. Ibid.
38. Frenkel, Sheera. “Hackers Behind Leaked DNC Emails Are Still Trying To Hack Democratic Party Members.”BuzzFeed. BuzzFeed, Inc., 2 Aug. 2016. Web. 31 Aug. 2016. www.buzzfeed.com/sheerafrenkel/the-dncs-hackers-are-targeting-democratic-party-members-in-a?utm_term=.yyJlKwpbP#.oeL9YyXN8
39. David, Javier E. “Twitter Suspends Guccifer 2’s Account in Wake of DCCC Hack.” CNBC. NBCUniversal News Group, 13 Aug. 2016. Web. 1 Sept. 2016. www.cnbc.com/2016/08/13/twitter-suspends-guccifer2-after-dccc-hack.html
40. Hosenball, Mark. “Exclusive: Clinton Campaign Also Hacked in Attacks on Democrats.” Reuters. Thomson Reuters, 30 July 2016. Web. 1 Sept. 2016. www.reuters.com/article/us-usa-cyber-democrats-investigation-exc-idUSKCN1092HK
41. CTU Research Team. “Threatgroup 4127 targets Hillary Clinton Presidential Campaign” Secure Works Research. Tech. Secure Works, 16 June 2016. Web. 11 Aug. 2016. www.secureworks.com/research/threat-group-4127-targets-hillary-clinton-presidential-campaign
42. Ibid.
43. Guccifer. “DCCC Docs from Pelosi’s PC.” GUCCIFER 2.0. WordPress, 31 Aug. 2016. Web. 1 Sept. 2016. guccifer2.wordpress.com/2016/08/31/pelosi/
44. Hosenball, Mark, Joseph Menn, and John Walcott. “Exclusive: Clinton Campaign Also Hacked in Attacks on Democrats.” Reuters. Thomson Reuters, 30 July 2016. Web. 1 Sept. 2016. www.reuters.com/article/us-usa-cyber-democrats-investigation-exc-idUSKCN1092HK
45. Lichtblau, Eric. “Computer Systems Used by Clinton Campaign Are Said to Be Hacked, Apparently by Russians.”The New York Times. The New York Times Company, 29 July 2016. Web. 1 Sept. 2016. www.nytimes.com/2016/07/30/us/politics/clinton-campaign-hacked-russians.html?_r=0
46. Carroll, Lauren. “What We Know about Russia’s Role in the DNC Email Leak.” PolitiFact. Tampa Bay Times, 31 July 2016. Web. 1 Sept. 2016. www.politifact.com/truth-o-meter/article/2016/jul/31/what-we-know-about-russias-role-dnc-email-leak/
47. NBCNews. “President Obama on Russian DNC Hack Involvement: ‘Anything’s Possible’—NBC News.” NBC News. NBCUniversal News Group, 26 July 2016. Web. 1 Sept. 2016. www.nbcnews.com/nightly-news/video/president-obama-on-russian-dnc-hack-involvement-anything-s-possible-732675139636
48. Isikoff, Michael. “FBI Says Foreign Hackers Penetrated State Election Systems.” Yahoo News. ]Yahoo Inc., 29 Aug. 2016. Web. 1 Sept. 2016. www.yahoo.com/news/fbi-says-foreign-hackers-penetrated-000000175.html
49. Ibid.
50. Salter, Raphael, and Josh Lederman. “’Anything’s Possible’—Obama Points to Russia on DNC Hack.” The Big Story. Associated Press, 26 July 2016. Web. 25 Aug. 2016. bigstory.ap.org/article/a4be29bc14954dbabe2d968ba4a1bf68/cybersecurity-experts-see-merit-claims-russian-hacking
51. The Evolving Nature of Cyber-Espionage. Issue brief. The Soufan Group, 3 Aug. 2016. Web. 31 Aug. 2016. soufangroup.com/tsg-intelbrief-the-evolving-nature-of-cyber-espionage/
Chapter 9
1. Martin, Jonathan, and Amy Chozick. “Donald Trump’s Campaign Stands By Embrace of Putin.” The New York Times. The New York Times Company, 08 Sept. 2016. Web. 31 Aug. 2016. www.nytimes.com/2016/09/09/us/politics/hillary-clinton-donald-trump-putin.html?_r=0
2. 18, LII § 115-2381 (Cornell University Law School 1948). Web.
3. Williams, Katie Bo. “Clinton: Treat Cyberattacks ‘like Any Other Attack’” The Hill. Capitol Hill Publishing Corp., 31 Aug. 2016. Web. 1 Sept. 2016. www.thehill.com/policy/cybersecurity/293970-clinton-treat-cyberattacks-like-any-other-attack
4. “WATCH: Donald Trump’s Terrifying Response When Asked about Cybersecurity.” New Statesman. Progressive Digital Media, 8 Sept. 2016. Web. 10 Sept. 2016. www.newstatesman.com/politics/media/2016/09/watch-donald-trump-s-terrifying-response-when-asked-about-cybersecurity
5. Trump, Donald. “On Russian TV, Trump Says It’s ‘unlikely’ Putin Trying to Sway Election.” Interview by Larry King.CNN. Turner Broadcasting System, 9 Sept. 2016. Web. 10 Sept. 2016.
ALSO BY MALCOLM NANCE
DEFEATING ISIS
Who They Are, How They Fight, What They Believe
Malcolm Nance, Richard Engel
A New York Times bestseller!
This reference shows the history and tactics of the global terror group ISIS—and how to use that knowledge to defeat it.
ISIS—the Islamic State of Iraq and Syria—has become the single most dangerous terrorist threat to global security since al-Qaeda. In Defeating ISIS, internationally renowned intelligence veteran and counterterrorism expert Malcolm Nance gives an insider’s view on the origins of this organization, its violent propaganda, and how it spreads its ideology throughout the Middle East and to disaffected youth in the Western world.