Into the Gray Zone
2f1BbTW
2f1BbTW
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
58 | Notes<br />
12. Robert Siciliano, “7 Types of Hackers and <strong>the</strong>ir Motivations,” McAfee blog (2011), https://blogs.mcafee.com/consumer/<br />
family-safety/7-types-of-hacker-motivations/<br />
13. U.S. Department of Defense, “The Department of Defense Cyber Strategy.”<br />
14. United States of America vs. Ahmad Fathi, Hamid Firoozi, Amin Shokohi, Sadegh Ahmadzadegan, Omid Ghaffarinia, Sina Keissar,<br />
and Nader Saedi, (Sealed Indictment) U.S. Attorney’s Office S.D.N.Y. (2016), https://www.justice.gov/opa/file/834996/<br />
download.<br />
15. Robert M. Lee, Michael J. Assante, and Tim Conway, “Analysis of <strong>the</strong> Cyber Attack on <strong>the</strong> Ukrainian Power Grid,” SANS<br />
Industrial Control System and <strong>the</strong> Electricity Information Sharing and Analysis Center (2016), https://ics.sans.org/media/E-ISAC_<br />
SANS_Ukraine_DUC_5.pdf.<br />
16. Josh Rogin, “NSA Chief: Cybercrime constitutes <strong>the</strong> ‘greatest transfer of wealth in history,’” Foreign Policy, July 9, 2012,<br />
http://foreignpolicy.com/2012/07/09/nsa-chief-cybercrime-constitutes-<strong>the</strong>-greatest-transfer-of-wealth-in-history.<br />
17. https://www.justice.gov/opa/pr/russian-cyber-criminal-convicted-38-counts-related-hacking-businesses-and-stealingmore-two<br />
18. “The World if Financial Systems were Hacked,” The Economist, June 16, 2016, http://worldif.economist.com/article/12136/<br />
joker-pack.<br />
19. Dennis Blair and John M. Huntsman Jr., “The IP Commission Report: The Report of <strong>the</strong> Commission on <strong>the</strong> Theft of<br />
American Intellectual Property,” The National Bureau of Asian Research (2013), http://www.ipcommission.org/report/ip_<br />
commission_report_052213.pdf.<br />
20. Roger C. Molander, Peter A. Wilson, and Robert H. Anderson, “U.S. Strategic Vulnerabilities: Threats Against Society,”<br />
Strategic Appraisal, RAND (1999), https://www.rand.org/content/dam/rand/pubs/monograph_reports/MR1016/MR1016.<br />
chap9.pdf.<br />
21. Ross Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel JG Van Eeten, Michael Levi, Tyler Moore, and Stefan<br />
Savage. “Measuring <strong>the</strong> cost of cybercrime.” The Economics of Information Security and Privacy, Springer Berlin Heidelberg<br />
(2013), 265-300, http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf.<br />
22. Eric Cohen and Davide di Gennaro, “Cybersecurity and Payment Fraud: The Challenge for Treasury,” PricewaterhouseCoopers<br />
(2015), http://www.pwc.com/us/en/risk-management/publications/cybersecurity-and-payment-fraud-<strong>the</strong>-challenge-fortreasury.html.<br />
23. “Operation Blockbuster Unraveling <strong>the</strong> Long Thread of <strong>the</strong> Sony Attack,” Novetta (2016) https://www.operationblockbuster.com/<br />
wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdf; Nicole Perlroth, “Yahoo Says Hackers Stole Data on 500 Million<br />
Users in 2014,” The New York Times, September 23, 2016, http://www.nytimes.com/2016/09/23/technology/yahoo-hackers.html;<br />
Ellen Nakashima, “Cyber Researchers Confirm Russian Government Hack of Democratic National Committee,” The Washington<br />
Post, June 20, 2016, https://www.washingtonpost.com/world/national-security/cyber-researchers-confirm-russian-governmenthack-of-democratic-national-committee/2016/06/20/e7375bc0-3719-11e6-9ccd-d6005beac8b3_story.html.<br />
24. Torri Piper, “An Uneven Playing Field: The Advantages of <strong>the</strong> Cyber Criminal vs. Law Enforcement—and Some Practical<br />
Suggestions,” SANS Institute (2002), https://www.sans.org/reading-room/whitepapers/legal/uneven-playing-fieldadvantages-cyber-criminal-vs-law-enforcement-and-practica-115.<br />
25. Eric M. Hutchins, Michael J. Cloppert, and Rohan M. Amin. “Intelligence-driven computer network defense informed by analysis<br />
of adversary campaigns and intrusion kill chains.” Leading Issues in Information Warfare & Security Research 1 (2011): 80, http://www.<br />
lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf.<br />
26. Dimitar Kostadinov, “The Cyber Exploitation Life Cycle,” Infosec Institute (2013), http://resources.infosecinstitute.com/<strong>the</strong>cyber-exploitation-life-cycle.<br />
27. Giora Engel, “Deconstructing <strong>the</strong> Cyber Kill Chain,” Dark Reading (2014), http://www.darkreading.com/attacks-breaches/<br />
deconstructing-<strong>the</strong>-cyber-kill-chain/a/d-id/1317542.<br />
28. Amol Sarwate, “2016 State of Vulnerability Exploits,” Paper presented at <strong>the</strong> RSA Conference 2016, San Francisco, California,<br />
February 29-March 4, 2016, https://www.rsaconference.com/writable/presentations/file_upload/spo2-t09-2016-stateof-_vulnerability-exploits_v2.pdf.<br />
29. Press Release, Joint Statement from <strong>the</strong> Department of Homeland Security and Office of <strong>the</strong> Director of National Intelligence