Выбрать главу

34. King, Bob, and Tim Starks. “Hackers Suspected in New Attack on Democrats.” POLITICO. POLITICO, 28 July 2016. Web. 1 Sept. 2016. www.politico.com/story/2016/07/dccc-hack-fbi-226398

35. Meyer, Josh, Alex Moe, and Tracy Connor. “New Democratic Party Hack ‘Similar’ to Earlier Breach.” NBC News. NBCUniversal News Group, 29 July 2016. Web. 1 Sept. 2016. www.nbcnews.com/news/us-news/hack-democratic-congressional-campaign-committee-tied-earlier-breach-n619786

36. “FANCY BEAR Has an (IT) Itch That They Can’t Scratch.” ‘Threat Geek’ Fidelis Cyber Security, 1 Aug. 2016. Web. 28 Aug. 2016. www.threatgeek.com/2016/08/fancy-bear-has-an-it-itch-that-they-cant-scratch.html

37. Ibid.

38. Frenkel, Sheera. “Hackers Behind Leaked DNC Emails Are Still Trying To Hack Democratic Party Members.”BuzzFeed. BuzzFeed, Inc., 2 Aug. 2016. Web. 31 Aug. 2016. www.buzzfeed.com/sheerafrenkel/the-dncs-hackers-are-targeting-democratic-party-members-in-a?utm_term=.yyJlKwpbP#.oeL9YyXN8

39. David, Javier E. “Twitter Suspends Guccifer 2’s Account in Wake of DCCC Hack.” CNBC. NBCUniversal News Group, 13 Aug. 2016. Web. 1 Sept. 2016. www.cnbc.com/2016/08/13/twitter-suspends-guccifer2-after-dccc-hack.html

40. Hosenball, Mark. “Exclusive: Clinton Campaign Also Hacked in Attacks on Democrats.” Reuters. Thomson Reuters, 30 July 2016. Web. 1 Sept. 2016. www.reuters.com/article/us-usa-cyber-democrats-investigation-exc-idUSKCN1092HK

41. CTU Research Team. “Threatgroup 4127 targets Hillary Clinton Presidential Campaign” Secure Works Research. Tech. Secure Works, 16 June 2016. Web. 11 Aug. 2016. www.secureworks.com/research/threat-group-4127-targets-hillary-clinton-presidential-campaign

42. Ibid.

43. Guccifer. “DCCC Docs from Pelosi’s PC.” GUCCIFER 2.0. WordPress, 31 Aug. 2016. Web. 1 Sept. 2016. guccifer2.wordpress.com/2016/08/31/pelosi/

44. Hosenball, Mark, Joseph Menn, and John Walcott. “Exclusive: Clinton Campaign Also Hacked in Attacks on Democrats.” Reuters. Thomson Reuters, 30 July 2016. Web. 1 Sept. 2016. www.reuters.com/article/us-usa-cyber-democrats-investigation-exc-idUSKCN1092HK

45. Lichtblau, Eric. “Computer Systems Used by Clinton Campaign Are Said to Be Hacked, Apparently by Russians.”The New York Times. The New York Times Company, 29 July 2016. Web. 1 Sept. 2016. www.nytimes.com/2016/07/30/us/politics/clinton-campaign-hacked-russians.html?_r=0

46. Carroll, Lauren. “What We Know about Russia’s Role in the DNC Email Leak.” PolitiFact. Tampa Bay Times, 31 July 2016. Web. 1 Sept. 2016. www.politifact.com/truth-o-meter/article/2016/jul/31/what-we-know-about-russias-role-dnc-email-leak/

47. NBCNews. “President Obama on Russian DNC Hack Involvement: ‘Anything’s Possible’—NBC News.” NBC News. NBCUniversal News Group, 26 July 2016. Web. 1 Sept. 2016. www.nbcnews.com/nightly-news/video/president-obama-on-russian-dnc-hack-involvement-anything-s-possible-732675139636

48. Isikoff, Michael. “FBI Says Foreign Hackers Penetrated State Election Systems.” Yahoo News. ]Yahoo Inc., 29 Aug. 2016. Web. 1 Sept. 2016. www.yahoo.com/news/fbi-says-foreign-hackers-penetrated-000000175.html

49. Ibid.

50. Salter, Raphael, and Josh Lederman. “’Anything’s Possible’—Obama Points to Russia on DNC Hack.” The Big Story. Associated Press, 26 July 2016. Web. 25 Aug. 2016. bigstory.ap.org/article/a4be29bc14954dbabe2d968ba4a1bf68/cybersecurity-experts-see-merit-claims-russian-hacking

51. The Evolving Nature of Cyber-Espionage. Issue brief. The Soufan Group, 3 Aug. 2016. Web. 31 Aug. 2016. soufangroup.com/tsg-intelbrief-the-evolving-nature-of-cyber-espionage/

Chapter 9

1. Martin, Jonathan, and Amy Chozick. “Donald Trump’s Campaign Stands By Embrace of Putin.” The New York Times. The New York Times Company, 08 Sept. 2016. Web. 31 Aug. 2016. www.nytimes.com/2016/09/09/us/politics/hillary-clinton-donald-trump-putin.html?_r=0

2. 18, LII § 115-2381 (Cornell University Law School 1948). Web.

3. Williams, Katie Bo. “Clinton: Treat Cyberattacks ‘like Any Other Attack’” The Hill. Capitol Hill Publishing Corp., 31 Aug. 2016. Web. 1 Sept. 2016. www.thehill.com/policy/cybersecurity/293970-clinton-treat-cyberattacks-like-any-other-attack

4. “WATCH: Donald Trump’s Terrifying Response When Asked about Cybersecurity.” New Statesman. Progressive Digital Media, 8 Sept. 2016. Web. 10 Sept. 2016. www.newstatesman.com/politics/media/2016/09/watch-donald-trump-s-terrifying-response-when-asked-about-cybersecurity

5. Trump, Donald. “On Russian TV, Trump Says It’s ‘unlikely’ Putin Trying to Sway Election.” Interview by Larry King.CNN. Turner Broadcasting System, 9 Sept. 2016. Web. 10 Sept. 2016.

ALSO BY MALCOLM NANCE

DEFEATING ISIS

Who They Are, How They Fight, What They Believe

Malcolm Nance, Richard Engel

A New York Times bestseller!

This reference shows the history and tactics of the global terror group ISIS—and how to use that knowledge to defeat it.

ISIS—the Islamic State of Iraq and Syria—has become the single most dangerous terrorist threat to global security since al-Qaeda. In Defeating ISIS, internationally renowned intelligence veteran and counterterrorism expert Malcolm Nance gives an insider’s view on the origins of this organization, its violent propaganda, and how it spreads its ideology throughout the Middle East and to disaffected youth in the Western world.