14. Meeks, Karen Robes. “Hillary Clinton Compares Vladimir Putin’s Actions in Ukraine to Adolf Hitler’s in Nazi Germany.” Long Beach Press Telegram. Digital First Media, 05 Mar. 2014. Web. 30 Aug. 2016. www.presstelegram.com/general-news/20140304/hillary-clinton-compares-vladimir-putins-actions-in-ukraine-to-adolf-hitlers-in-nazi-germany
15. Diamond, Jeremy. “Timeline: Donald Trump’s Praise for Vladimir Putin.” CNN. Turner Broadcasting System, 21 July 2016. Web. 29 Aug. 2016. www.cnn.com/2016/07/28/politics/donald-trump-vladimir-putin-quotes/
16. Kalb, Marvin L. Imperial Gamble: Putin, Ukraine, and the New Cold War. 1st ed. Washington, D.C.: Brookings Institution Press, 2015. Print.
17. Lazar, Alex, and Alexey Eremenko. “Here’s Why Russians like Donald Trump (sort Of).” NBC News. NBCUniversal News Group24, 24 Aug. 2016. Web. 30 Aug. 2016. www.nbcnews.com/news/world/why-russians-donald-trump-sort-n634626
18.Schreckinger, Ben. “Clinton Urges More Financial, Military Aid to Ukraine.” POLITICO. POLITICO, 21 Jan. 2015. Web. 28 Aug. 2016. www.politico.com/story/2015/01/hillary-clinton-ukraine-aid-military-financial-114462
19. ?
20. Bradner, Eric, and David Wright. “Trump Says Putin Is ‘not Going to Go into Ukraine,’ despite Crimea.” CNN. Turner Broadcasting System, 1 Aug. 2016. Web. 28 Aug. 2016. www.cnn.com/2016/07/31/politics/donald-trump-russia-ukraine-crimea-putin/
Chapter 6
1. Zetter, Kim. “Russian ‘Sandworm’ Hack Has Been Spying on Foreign Governments for Years.” Wired. Conde Nast, 14 Oct. 2014. Web. 28 Aug. 2016. www.wired.com/2014/10/russian-sandworm-hack-isight
2. Bejtlich, Richard. “Putting the A, P, and T in the APT.” 2011 Business Security Conference. Honolulu Design Center, Honolulu. 7 Sept. 2011. Hawaiian Telcom. Web. 12 Aug. 2016. www.hawaiiantel.com/Portals/1/Bejtlich.pdf
3. Alperovitch, Dmitri. “Bears in the Midst: Intrusion into the Democratic National Committee.” Web log post. CrowdStrike. N.p., 15 June 2016. Web. 28 Aug. 2016. www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/
4. Reuvers, Paul, and Marc Simons. “IBM Selectric Bug.” Crypto Museum. N.p., Aug.-Sept. 2010. Web. 29 Aug. 2016. cryptomuseum.com/covert/bugs/selectric/
5. Kaplan, Fred M. “’Could Something Like This Really Happen?’” Dark Territory: The Secret History of Cyber War. 1st ed. New York, NY: Simon & Schuster, 2016. p. 16. Print.
6. Kaplan, Fred M. “Solar Sunrise, Moonlight Gaze” Dark Territory: The Secret History of Cyber War. 1st ed. New York, NY: Simon & Schuster, 2016. pp. 78-88. Print.
7. Cutler, Terry. “The Anatomy of an Advanced Persistent Threat | SecurityWeek.Com.” Security Week. Wired Business Media, 06 Dec. 2010. Web. 27 Aug. 2016. www.securityweek.com/anatomy-advanced-persistent-threat
8. “Microsoft Security Intelligence Report: Strontium.” Web log post. TechNet. Microsoft, 16 Nov. 2015. Web. 28 Aug. 2016. blogs.technet.microsoft.com/mmpc/2015/11/16/microsoft-security-intelligence-report-strontium/
9. Hacquebord, Feike. “Pawn Storm’s Domestic Spying Campaign Revealed; Ukraine and US Top Global Targets.” Web log post. TrendLabs Security Intelligence Blog. Trend Micro, 18 Aug. 2015. Web. 30 Aug. 2016. blog.trendmicro.com/trendlabs-security-intelligence/pawn-storms-domestic-spying-campaign-revealed-ukraine-and-us-top-global-targets/
10. Kharouni, Loucif, Feike Hacquebord, Numaan Huq, Jim Gogolinski, Fernando Mercês, Alfred Remorin, and Douglas Otis. Operation Pawn Storm: Using Decoys to Evade Detection. Trend Micro. Trend Micro Inc., 22 Oct. 2014. Web. 9 Aug. 2016. www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/whitepapers/wp-operation-pawn-storm.pdf
11. Ibid.
12. Ibid.
13. Ibid.
14. Ibid.