15. Hacquebord, Feike. “Pawn Storm’s Domestic Spying Campaign Revealed; Ukraine and US Top Global Targets.” Web log post. TrendLabs Security Intelligence Blog. Trend Micro, 18 Aug. 2015. Web. 30 Aug. 2016. blog.trendmicro.com/trendlabs-security-intelligence/pawn-storms-domestic-spying-campaign-revealed-ukraine-and-us-top-global-targets/
16. F-Secure Labs. THE DUKES: 7 Years of Russian Cyberespionage. Rep. F-Secure, 5 Sept. 2015. Web. 30 Aug. 2016. www.f-secure.com/documents/996508/1030745/dukes_whitepaper.pdf
17. Ibid.
18. Silva, Cristina. “Meet Turla, The Russian Hacking Group Using Commercial Satellites To Spy On US, Europe.”International Business Times. IBT Media, 09 Sept. 2015. Web. 30 Aug. 2016. www.ibtimes.com/meet-turla-russian-hacking-group-using-commercial-satellites-spy-us-europe-2089116
19. “Breaking the Code on Russian Malware.” Web log post. The Recorded Future Blog. Recorded Future, 20 Nov. 2016. Web. 28 Aug. 2016. www.recordedfuture.com/russian-malware-analysis/
20. Ibid.
21. Nakashima, Ellen. “Cyber-intruder Sparks Response, Debate.” Washington Post. The Washington Post Company, 8 Dec. 2011. Web. 28 Aug. 2016. www.washingtonpost.com/national/national-security/cyber-intruder-sparks-response-debate/2011/12/06/gIQAxLuFgO_story.html
22. The Waterbug Attack Group. Security Response. Symantec, 14 Jan. 2016. Web. 28 Aug. 2016. www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/waterbug-attack-group.pdf
23. 2015 Global Threat Report. Rep. CrowdStrike, 14 Jan. 2016. Web. 31 Aug. 2016. go.crowdstrike.com/rs/281-OBQ-266/images/15GlobalThreatReport.pdf
24. “Denial-of-Service: The Estonian Cyberwar and Its Implications for U.S. National Security.” International Affairs Review. Elliott School of International Affairs, n.d. Web. 30 Aug. 2016. www.iar-gwu.org/node/65
25. Traynor, Ian. “Russia Accused of Unleashing Cyberwar to Disable Estonia.” The Guardian. Guardian News and Media, 16 May 2007. Web. 29 Aug. 2016. www.theguardian.com/world/2007/may/17/topstories3.russia
26. “Estonia Fines Man for ‘cyber War’” BBC News. British Broadcasting Corporation, 25 Jan. 2008. Web. 29 Aug. 2016. news.bbc.co.uk/2/hi/technology/7208511.stm
27. “Georgia: Avoiding War in South Ossetia”. Rep. International Crisis Group, 26 Nov. 2014. Web. 29 Aug. 2016. unpan1.un.org/intradoc/groups/public/documents/UNTC/UNPAN019224.pdf
28. “If Kosovo Goes Free.” The Economist. The Economist Group, 29 Nov. 2007. Web. 29 Aug. 2016. www.economist.com/node/10225052.
29. Hollis, David, “Cyberwar Case Study: Georgia 2008”, Small Wars Journal. Small Wars Foundation, 6 Jan. 2011. Web 29 Aug. 2016. http://smallwarsjournal.com/blog/journal/docs-temp/639-hollis.pdf.
30. Schachtman, Noah. “Top Georgian Official: Moscow Cyber Attacked Us – We Just Can’t Prove It.” Wired. Conde Nast, 6 Jan. 2011. Web. 29 Aug. 2016. www.wired.com/2009/03/georgia-blames
31. F-Secure Labs. BLACKENERGY & QUEDAGH: The Convergence of Crimeware and APT Attacks. Rep. F-Secure, n.d. Web. 29 Aug. 2016. www.f-secure.com/documents/996508/1030745/blackenergy_whitepaper.pdf
32. US-CCU. Overview by the US-CCU of the Cyber Campaign Against Georgia in August of 2008. Campaign Overview. The U.S. Cyber Consequences Unit, Aug. 2009. Web. 29 Aug. 2016. www.registan.net/wp-content/uploads/2009/08/US-CCU-Georgia-Cyber-Campaign-Overview.pdf