диссертация (1169257), страница 33
Текст из файла (страница 33)
06.07.2013. — Режим доступа: http://www.nytimes.com/2013/07/07/us/insecret-court-vastly-broadens-powers-of-nsa.html?src=mb&_r=1&pagewanted=all& (датаобращения: 17.03.2016).16728.Andrew Rosenthal. A Court Without Adversaries // The New York Times.09.07.2013. — Режим доступа: http://takingnote.blogs.nytimes.com/2013/07/09/a-courtwithout-adversaries/?src=recg (дата обращения: 30.03.2016).29.stationedSpencer Ackerman. US military blocks entire Guardian website for troopsabroad//TheGuardian.—01.07.2013.Режимдоступа:http://www.theguardian.com/world/2013/jul/01/us-military-blocks-guardian-troops(датаобращения: 09.03.2016).30.James Kanter.
Rules Shielding Online Data From N.S.A. and Other PryingEyes Advance in Europe // The New York Times. 21.10.2013. — Режим доступа:http://www.nytimes.com/2013/10/22/business/international/eu-panel-backs-plan-to-shieldonline-data.html (дата обращения: 04.04.2016).31.spyingAdrian Croft, Arshad Mohammed. France summons U.S. ambassador overreport//Reuters.21.10.2013.—Режимдоступа:http://www.reuters.com/article/2013/10/21/us-france-nsa-idUSBRE99K04920131021(дата обращения: 20.03.2016).32.U.S. surveillance revelations deepen European fears of Web giants // Reuters.07.06.2013. — Режим доступа: http://www.reuters.com/article/2013/06/07/europesurveillance-prism-idUSL5N0EJ3G520130607 (дата обращения: 17.03.2016).33.James Risen.
Snowden Says He Took No Secret Files to Russia // The NewYorkTimes.17.10.2013.—Режимдоступа:http://www.nytimes.com/2013/10/18/world/snowden-says-he-took-no-secret-files-torussia.html?pagewanted=all&_r=0 (дата обращения: 05.03.2016).34.StoodNicole Pearlroth, Scott Shane. As F.B.I. Pursued Snowden, an E-Mail ServiceFirm//TheNewYorkTimes.02.10.2014.—Режимдоступа:http://www.nytimes.com/2013/10/03/us/snowdens-e-mail-provider-discusses-pressurefrom-fbi-to-disclose-data.html?_r=0 (дата обращения: 26.04.2016)35.Barton Gellman. Code name ‘Verax’: Snowden, in exchanges with Postreporter, made clear he knew risks // The Washington Post. 10.06.2013. — Режим168доступа:http://www.washingtonpost.com/world/national-security/code-name-verax-snowden-in-exchanges-with-post-reporter-made-clear-he-knewrisks/2013/06/09/c9a25b54-d14c-11e2-9f1a-1a7cdee20287_story.html (дата обращения:18.03.2016).36.Josh Taylor. Australian government to assess PRISM impact // ZDNet.11.06.2013.
— Режим доступа: http://www.zdnet.com/au/australian-government-toassess-prism-impact-7000016637/ (дата обращения: 15.03.2016).37.customersGlenn Greenwald. NSA collecting phone records of millions of Verizondaily//TheGuardian.06.06.2013.—Режимдоступа:http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order(дата обращения: 06.04.2016).38.ACLU v. NSA: The Challenge to Illegal Spying // American Civil LibertiesUnion. — Режим доступа: https://www.aclu.org/national-security/aclu-v-nsa-challengeillegal-spying (дата обращения: 29.04.2016).39.Ellen Nakashima, Joby Warrick. For NSA chief, terrorist threat drives passionto ‘collect it all,’ observers say // American Civil Liberties Union. 15.07.2013.
— Режимдоступа:http://www.washingtonpost.com/world/national-security/for-nsa-chief-terrorist-threat-drives-passion-to-collect-it-all/2013/07/14/3d26ef80-ea49-11e2-a301ea5a8116d211_story.html (дата обращения: 30.03.2016).40.overZack Whittaker. Failed twice, revived again: CISPA returns despite concernsprivacy,datasharing//ZDNet.30.04.2014.—Режимдоступа:http://www.zdnet.com/failed-twice-revived-again-cispa-returns-despite-concerns-overprivacy-data-sharing-7000028943/ (дата обращения: 03.05.2016).41.NewDavid Barboza. China Says Army Is Not Behind Attacks in Report // TheYorkTimes.20.02.2013.—Режимдоступа:http://www.nytimes.com/2013/02/21/business/global/china-says-army-not-behind-attacksin-report.html (дата обращения: 30.05.2016).16942.//William Wan.
China continues to deny carrying out cyberattacks against U.S.TheWashingtonPost.—29.05.2013.Режимдоступа:http://articles.washingtonpost.com/2013-05-29/world/39592129_1_news-briefing-newpath-president-obama (дата обращения: 30.05.2016).43.Li Xiaokun, Zhang Yunbi. Core interests at heart of new US ties // ChinaDaily. 20.03.2013. — Режим доступа: http://www.chinadaily.com.cn/china/201303/20/content_16321491.htm (дата обращения: 30.05.2016).44.Interests’Lew Tells China Cyber Attacks ‘Very Serious Threat To Our Economic//CBSDC.20.03.2013.—Режимдоступа:http://washington.cbslocal.com/2013/03/20/us-treasury-secretary-tells-china-cyber-attacksa-very-serious-threat-to-our-economic-interests/ (дата обращения: 30.05.2016).45.Report APT1: Exposing One of China’s Cyber Espionage Units [Electronicresource] – Режим доступа: http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf(дата обращения: 30.05.2016).46.AnnualFormer Homeland Security Secretary Michael Chertoff to Keynote 2ndMandiantConference//Mandiant.21.09.2011.—Режимдоступа:https://www.mandiant.com/news/release/former-homeland-security-secretary-michaelchertoff-to-keynote-2nd-ann/ (дата обращения: 30.05.2016).47.Mark Clayton.
China cyberspies suspected in new caper: what has expertsworried // The Christian Science Monitor. 27.09.2012. — Режим доступа:http://www.csmonitor.com/USA/2012/0927/China-cyberspies-suspected-in-new-caperwhat-has-experts-worried/(page)/2 (дата обращения: 30.05.2016).48.David Perera. Chinese attacks 'Byzantine Candor' penetrated federal agencies,says leaked cable // Fierce Government IT. 06.12.2010. — Режим доступа:http://www.fiercegovernmentit.com/story/chinese-attacks-byzantine-candor-penetratedfederal-agencies-says-leaked-ca/ (дата обращения: 30.05.2016).49.presenceJennifer Martinez, Mandiant: Chinese hacker unit attempted to clean up online[Electronicresource]/TheHill—Режимдоступа:170http://thehill.com/blogs/hillicon-valley/technology/289127-mandiant-chinese-hacker-unitattempted-to-clean-up-online-presence (дата обращения: 30.05.2016).50.yan.
China's military to drill on digitalized forces // Xinhuanet. 29.05.2013. —Режим доступа: http://news.xinhuanet.com/english/china/2013-05/29/c_132415053.htm(дата обращения: 30.05.2016).51.David Vranicar. China to Conduct Digital War Games // Xinhuanet.29.05.2013. — Режим доступа: http://www.technewsworld.com/story/78151.html (датаобращения: 30.05.2016).52.Joseph Menn, onathan Weber, Claudia Parsons. SPECIAL REPORT — U.S.cyberwar strategy stokes fear of blowback // Reuters. 10.05.2013. — Режим доступа:http://in.reuters.com/article/2013/05/10/usa-cyberweaponsidINDEE9490AX20130510?type=economicNews (дата обращения: 30.05.2016).53.Ellen Nakashima, Washington Post [Electronic resource] / Confidential reportlists U.S.
weapons system designs compromised by Chinese cyberspies – Режим доступа:http://www.washingtonpost.com/world/national-security/confidential-report-lists-usweapons-system-designs-compromised-by-chinese-cyberspies/2013/05/27/a42c3e1c-c2dd11e2-8c3b-0b5e9247e8ca_story.html (дата обращения: 30.05.2016).54.Jeff Mason, Andrea Shalal-Esa, Bill Trott, Terril Yue Jones, Rob Taylor,Alistair Bell, Philip Barbara. Obama, China's Xi to discuss cyber security in June meeting// Reuters. 28.05.2013. — Режим доступа: http://www.reuters.com/article/2013/05/28/ususa-china-hacking-idUSBRE94R02720130528 (дата обращения: 30.05.2016).55.TellsKenneth Rapoza .
U.S. Hacked China Universities, Mobile Phones, SnowdenChinaPress//Forbes.22.06.2013.—Режимдоступа:http://www.forbes.com/sites/kenrapoza/2013/06/22/u-s-hacked-china-universities-mobilephones-snowden-tells-china-press/#39c4c4205d84 (дата обращения: 24.01.2017).56.Terril Yue Jones, Jonathan. U.S., China agree to work together on cybersecurity // Reuters. 13.04.2013.
— Режим доступа: http://www.reuters.com/article/uschina-us-cyber-idUSBRE93C05T20130413 (дата обращения: 24.01.2017).171Steven Mosher. At G20 Summit, Obama Must Confront China’s Xi About57.Cybertheft//BreitBart.—01.09.2016.Режимдоступа:http://www.breitbart.com/national-security/2016/09/01/obama-xi-jinping-meet-privatelyg20-summit/ (дата обращения: 23.01.2017).58.Michael S.
Schmidt, David E. Sanger. 5 in China Army Face U.S. Charges ofCyberattacks//NewYorkTimes.—19.05.2014.Режимдоступа:https://www.nytimes.com/2014/05/20/us/us-to-charge-chinese-workers-withcyberspying.html?_r=0 (дата обращения: 23.01.2017).US and China agree cybercrime truce // БиБиСи.