12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

156 7. WHY CYBER ESPIONAGE IS A KEY COMPONENT OF CHINESE STRATEGY60. Boshu Z. Zang Boshu: the way <strong>to</strong> resolve the Tibet issue (Original article was written April 22-28, 2008 in Beijing).China Digital Times. Retrieved from: http: /chinadigitaltimes.net/2008/05/zhang-boshu-the-way-<strong>to</strong>-resolve-thetibet-issue/;May 8, 2008 [retrieved 4 April 2013].61. International Campaign for Tibet. The Sino-Tibetan dialogue. Retrieved from: http: /www.savetibet.org/files/documents/SinoTibetan_Dialogue.pdf; 2008.62. The Tibetan Government in Exile. Memorandum on genuine au<strong>to</strong>nomy for the Tibetan people as presented byenvoys of His Holiness the Dalai Lama. International Network of Parliamentarians on Tibet. Retrieved from:http: /www.inpatnet.org/fileadmin/files/Resources_documents/Sino-Tibetan_Dialogue/MemorandumENG.pdf; 2008.63. XinhuaNews Agency. DalaiLama’s‘GenuineAu<strong>to</strong>nomy’means ‘Tibetindependence’.Retrievedfrom: http: /www.china.org.cn/china/tibet_democratic_reform/content_17489041.htm; March 23, 2009 [retrieved 4 April 2013].64. Tibetan Political Review. The impact of the resignations of Gyari and Gyaltsen. Phayul. Retrieved from: http: /www.phayul.com/news/article.aspx?id¼31646&t¼1; June, 26 2012 [retrieved 4 April 2013].65. Xinhua News Agency. Dalai Lama’s ‘Genuine Au<strong>to</strong>nomy’ means ‘Tibet independence’. Retrieved from: http: /www.china.org.cn/china/tibet_democratic_reform/content_17489041.htm; March 23, 2009; Woodward D. WhyTibet must go it alone. Herald Sun. Retrieved from: http: /www.heraldsun.com.au/opinion/why-tibet-must-goit-alone/s<strong>to</strong>ry-e6frfifo-1111115840903;March 20, 2008.66. Ibid.67. Information <strong>Warfare</strong> Moni<strong>to</strong>r and Shadowserver Foundation. Shadows in the cloud: investigating cyber espionage 2.0;April, 2010.68. Ibid.69. Goldschlag D, Reed M, Syverson P. Onion routing for anonymous and private Internet connections. CommunACM 1999;42(2):39–41.70. Zetter K. Rogue nodes turn Tor Anonymizer in<strong>to</strong> eavesdropper’s paradise. Wired; September 2007.71. Information <strong>Warfare</strong> Moni<strong>to</strong>r and Shadowserver Foundation. Shadows in the cloud: investigating cyber espionage 2.0;April 2010.72. Pechora-2M Surface-<strong>to</strong>-Air Anti-aircraft missile system. Army Recognition. Available at: http: /www.armyrecognition.com/index.php?option¼com_content&task¼view&id¼979 [accessed January 4, 2012].73. Information <strong>Warfare</strong> Moni<strong>to</strong>r and Shadowserver Foundation. Shadows in the Cloud: Investigating <strong>Cyber</strong> Espionage2.0; April 2010.74. Drummond D. A new approach <strong>to</strong> China. The Official Google Blog. Available at: http: /googleblog.blogspot.com/2010/01/new-approach-<strong>to</strong>-china.html; January 12, 2010 [accessed January 8, 2012].75. Prasad P. Adobe investigates corporate network security issue. Adobe Featured Blogs. Available at: http: /blogs.adobe.com/conversations/2010/01/adobe_investigates_corporate_n.html; January 12, 2010 [accessed January8, 2012].76. Higgins KJ. More victims of Chinese hacking attacks come forward. Dark Reading. Available at: http: /www.darkreading.com/security/attacks-breaches/222301032/index.html; January 14, 2010 [accessed January 8, 2012].77. Zetter K. Google hackers targeted source code of more than 30 companies. Wired Threat Level. Available at: http: /www.wired.com/threatlevel/2010/01/google-hack-attack/; January 13, 2010 [accessed January 8, 2012].78. Markoff J. <strong>Cyber</strong> attack on Google said <strong>to</strong> hit password system. New York Times. Available from: http: /www.nytimes.com/2010/04/20/technology/20google.html; April 19, 2010 [accessed January 15, 2012].79. McAfee Labs and McAfee Foundation Professional Service. Protecting your critical assets: lessons learned fromOperation Aurora. McAfee White Paper; 2010.80. Markoff J. <strong>Cyber</strong>attack on Google said <strong>to</strong> hit password system. New York Times. Available from: http: /www.nytimes.com/2010/04/20/technology/20google.html; April 19, 2010 [accessed January 15, 2012].81. McAfee Labs and McAfee Foundation Professional Service. Protecting your critical assets: lessons learned fromOperation Aurora. McAfee White Paper; 2010.82. Kurtz G. Where’s the body. McAfee Blog Central. Available from: http: /siblog.mcafee.com/c<strong>to</strong>/where%E2%80%99s-the-body/; January 25, 2010 [accessed January 15, 2012].83. VeriSign iDefense Security Lab report quoted by Ryan Paul. Researchers identify command servers behind Googleattack. ArsTechnica. Available from: http: /arstechnica.com/security/news/2010/01/researchers-identifycommand-servers-behind-google-attack.ars;January 2010 [accessed January 15, 2012].84. Markoff J, Barboza D. Two Chinese schools said <strong>to</strong> be tied <strong>to</strong> online attacks. New York Times; February 19, 2010.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!