Main Content
Global Bandwidth Research Service, TeleGeography Submarine Cable Map, 2011
2.2.3.1.1
http://www.submarinecablemap.com/
Gordon M. Snow, Assistant Director, Cyber Division, Federal Bureau of Investigation, Statement Before the Senate Judiciary Committee, Subcommittee on Crime and Terrorism, 12 April 2011
5.2.3
http://www.fbi.gov/news/testimony/cybersecurity-responding-to-the-threat-of-cyber-crime-and-terrorism/
Gregg Keizer, Hackers Stole Google SSL Certificate, Dutch Firm Admits, Computerworld, Aug 30, 2011
2.2.4.2.3
http://www.computerworld.com/s/article/9219606/Hackers_stole_Google_SSL_certificate_Dutch_firm_admits
Group IB, State and Trends of the Russian Digital Crime Market, 2011
5.1.3
http://group-ib.com/images/media/Group-IB_Report_2011_ENG.pdf
Hackers Release Symantec Source Code After Failed $50K Extortion Attempt
5.1.1.2
http://www.wired.com/threatlevel/2012/02/symantec-extortion-attempt/
Hacktivism Case Studies - Berkman Cybersecurity Wiki
1.6.1
http://cyber.law.harvard.edu/cybersecurity/Category:Case_Studies
Harvard Law National Security Research Group, Cloud Computing and National Security Law, 2010
2.3.4.2
http://sw.cs.nccu.edu.tw/files/Cloud-nationalSecurityLaw.pdf
Homeland Security Presidential Directive 5 , 28 February 2003
4.2.2.3.2
http://www.fas.org/irp/offdocs/nspd/hspd-5.html
How the RSA SecurID Hack Worked
5.1.1.1
http://www.pcmag.com/article2/0,2817,2382970,00.asp
Ian Traynor, Russia Accused of Unleashing Cyberwar to Disable Estonia, Guardian, May 16, 2007
1.1.2
http://www.guardian.co.uk/world/2007/may/17/topstories3.russia
This book, and all H2O books, are Creative Commons licensed for sharing and re-use with the exception of certain excerpts. Any excerpts from the Restatements of the Law, Principles of the Law, and the Model Penal Code are copyright by The American Law Institute. Excerpts are reproduced with permission, not as part of a Creative Commons license.