01.11.2016 Views

Into the Gray Zone

2f1BbTW

2f1BbTW

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

58 | Notes<br />

12. Robert Siciliano, “7 Types of Hackers and <strong>the</strong>ir Motivations,” McAfee blog (2011), https://blogs.mcafee.com/consumer/<br />

family-safety/7-types-of-hacker-motivations/<br />

13. U.S. Department of Defense, “The Department of Defense Cyber Strategy.”<br />

14. United States of America vs. Ahmad Fathi, Hamid Firoozi, Amin Shokohi, Sadegh Ahmadzadegan, Omid Ghaffarinia, Sina Keissar,<br />

and Nader Saedi, (Sealed Indictment) U.S. Attorney’s Office S.D.N.Y. (2016), https://www.justice.gov/opa/file/834996/<br />

download.<br />

15. Robert M. Lee, Michael J. Assante, and Tim Conway, “Analysis of <strong>the</strong> Cyber Attack on <strong>the</strong> Ukrainian Power Grid,” SANS<br />

Industrial Control System and <strong>the</strong> Electricity Information Sharing and Analysis Center (2016), https://ics.sans.org/media/E-ISAC_<br />

SANS_Ukraine_DUC_5.pdf.<br />

16. Josh Rogin, “NSA Chief: Cybercrime constitutes <strong>the</strong> ‘greatest transfer of wealth in history,’” Foreign Policy, July 9, 2012,<br />

http://foreignpolicy.com/2012/07/09/nsa-chief-cybercrime-constitutes-<strong>the</strong>-greatest-transfer-of-wealth-in-history.<br />

17. https://www.justice.gov/opa/pr/russian-cyber-criminal-convicted-38-counts-related-hacking-businesses-and-stealingmore-two<br />

18. “The World if Financial Systems were Hacked,” The Economist, June 16, 2016, http://worldif.economist.com/article/12136/<br />

joker-pack.<br />

19. Dennis Blair and John M. Huntsman Jr., “The IP Commission Report: The Report of <strong>the</strong> Commission on <strong>the</strong> Theft of<br />

American Intellectual Property,” The National Bureau of Asian Research (2013), http://www.ipcommission.org/report/ip_<br />

commission_report_052213.pdf.<br />

20. Roger C. Molander, Peter A. Wilson, and Robert H. Anderson, “U.S. Strategic Vulnerabilities: Threats Against Society,”<br />

Strategic Appraisal, RAND (1999), https://www.rand.org/content/dam/rand/pubs/monograph_reports/MR1016/MR1016.<br />

chap9.pdf.<br />

21. Ross Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel JG Van Eeten, Michael Levi, Tyler Moore, and Stefan<br />

Savage. “Measuring <strong>the</strong> cost of cybercrime.” The Economics of Information Security and Privacy, Springer Berlin Heidelberg<br />

(2013), 265-300, http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf.<br />

22. Eric Cohen and Davide di Gennaro, “Cybersecurity and Payment Fraud: The Challenge for Treasury,” PricewaterhouseCoopers<br />

(2015), http://www.pwc.com/us/en/risk-management/publications/cybersecurity-and-payment-fraud-<strong>the</strong>-challenge-fortreasury.html.<br />

23. “Operation Blockbuster Unraveling <strong>the</strong> Long Thread of <strong>the</strong> Sony Attack,” Novetta (2016) https://www.operationblockbuster.com/<br />

wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdf; Nicole Perlroth, “Yahoo Says Hackers Stole Data on 500 Million<br />

Users in 2014,” The New York Times, September 23, 2016, http://www.nytimes.com/2016/09/23/technology/yahoo-hackers.html;<br />

Ellen Nakashima, “Cyber Researchers Confirm Russian Government Hack of Democratic National Committee,” The Washington<br />

Post, June 20, 2016, https://www.washingtonpost.com/world/national-security/cyber-researchers-confirm-russian-governmenthack-of-democratic-national-committee/2016/06/20/e7375bc0-3719-11e6-9ccd-d6005beac8b3_story.html.<br />

24. Torri Piper, “An Uneven Playing Field: The Advantages of <strong>the</strong> Cyber Criminal vs. Law Enforcement—and Some Practical<br />

Suggestions,” SANS Institute (2002), https://www.sans.org/reading-room/whitepapers/legal/uneven-playing-fieldadvantages-cyber-criminal-vs-law-enforcement-and-practica-115.<br />

25. Eric M. Hutchins, Michael J. Cloppert, and Rohan M. Amin. “Intelligence-driven computer network defense informed by analysis<br />

of adversary campaigns and intrusion kill chains.” Leading Issues in Information Warfare & Security Research 1 (2011): 80, http://www.<br />

lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf.<br />

26. Dimitar Kostadinov, “The Cyber Exploitation Life Cycle,” Infosec Institute (2013), http://resources.infosecinstitute.com/<strong>the</strong>cyber-exploitation-life-cycle.<br />

27. Giora Engel, “Deconstructing <strong>the</strong> Cyber Kill Chain,” Dark Reading (2014), http://www.darkreading.com/attacks-breaches/<br />

deconstructing-<strong>the</strong>-cyber-kill-chain/a/d-id/1317542.<br />

28. Amol Sarwate, “2016 State of Vulnerability Exploits,” Paper presented at <strong>the</strong> RSA Conference 2016, San Francisco, California,<br />

February 29-March 4, 2016, https://www.rsaconference.com/writable/presentations/file_upload/spo2-t09-2016-stateof-_vulnerability-exploits_v2.pdf.<br />

29. Press Release, Joint Statement from <strong>the</strong> Department of Homeland Security and Office of <strong>the</strong> Director of National Intelligence

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!