33. APT28: A Window Into Russia’s Cyber Espionage Operations? Rep. FireEye, 5 Feb. 2016. Web. 29 Aug. 2016. www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdf
34. United States of America. Library of Congress. Global Legal Monitor. Lithuania: Ban on Nazi and Soviet Symbols. By Peter Roudik. The Law Library of Congress, 2 July 2008. Web. 29 Aug. 2016. www.loc.gov/law/foreign-news/article/lithuania-ban-on-nazi-and-soviet-symbols/
35. Rhodin, Sara. “Hackers Tag Lithuanian Web Sites With Soviet Symbols.” The New York Times. The New York Times Company, 30 June 2008. Web. 29 Aug. 2016. www.nytimes.com/2008/07/01/world/europe/01baltic.html?_r=1
36. Danchev, Dancho. “300 Lithuanian Sites Hacked by Russian Hackers | ZDNet.” ZDNet. CBS Interactive, 2 July 2008. Web. 29 Aug. 2016. www.zdnet.com/article/300-lithuanian-sites-hacked-by-russian-hackers/
37. Krebs, Brian. “Lithuania Weathers Cyber Attack, Braces for Round 2.” Washington Post. The Washington Post Company, 3 July 2008. Web. 29 Aug. 2016. voices.washingtonpost.com/securityfix/2008/07/lithuania_weathers_cyber_attac_1.html
38. Counter Threat Unit Research Team. “Kyrgyzstan Under DDoS Attack From Russia.” Web log post. Secure Works Blog. Secure Works Corp, 27 Jan. 2009. Web. 29 Aug. 2016. www.secureworks.com/blog/research-20957
39. Blomfield, Adrian. “US Troops Ordered out of Kyrgyzstan after Russia Deal.” The Telegraph. Telegraph Media Group, 4 Feb. 2009. Web. 29 Aug. 2016. www.telegraph.co.uk/news/worldnews/asia/kyrgyzstan/4513296/US-troops-ordered-out-of-Kyrgyzstan-after-Russia-deal.html
40. Constantin, Lucian. “Macro-based Malware Is Making a Comeback, Researchers Warn.” Computerworld. IDG News Service, 07 Jan. 2015. Web. 29 Aug. 2016. www.computerworld.com/article/2866055/macro-based-malware-is-making-a-comeback-researchers-warn.html
41. Muncaster, Phil. “Sandworm Team Went After Firms Running SCADA.” Infosecurity Magazine. Infosecurity Group, 20 Oct. 2014. Web. 29 Aug. 2016. www.infosecurity-magazine.com/news/sandworm-team-went-after-firms/
42. Zetter, Kim. “Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid.” Wired. Conde Nast, 3 Mar. 2016. Web. 29 Aug. 2016. www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/
43. Stone, Jeff. “Russian Hacking Group Sandworm Targeted US Before Knocking Out Power In Ukraine.” International Business Times. IBT Media, 11 Jan. 2016. Web. 25 Aug. 2016. www.ibtimes.com/russian-hacking-group-sandworm-targeted-us-knocking-out-power-ukraine-2257194
44. Finkle, Jim. “U.S. Firm Blames Russian ‘Sandworm’ Hackers for Ukraine Outage.” Reuters. Thomson Reuters, 07 Jan. 2016. Web. 29 Aug. 2016. www.reuters.com/article/us-ukraine-cybersecurity-sandworm-idUSKBN0UM00N20160108
45. Prabhu, Vijay. “Warsaw Stock Exchange Hacked by ISIS Cyber Criminals?” TechWorm. TechWorm, 24 Oct. 2014. Web. 29 Aug. 2016. www.techworm.net/2014/10/warsaw-stock-exchange-hacked-isis-cyber-criminals.html
46. Riley, Michael. “Cyberspace Becomes Second Front in Russia’s Clash With NATO.” Bloomberg. Bloomberg L.P., 14 Oct. 2015. Web. 31 Aug. 2016. www.bloomberg.com/news/articles/2015-10-14/cyberspace-becomes-second-front-in-russia-s-clash-with-nato
47. Prabhu, Vijay. “Warsaw Stock Exchange Hacked by ISIS Cyber Criminals?” TechWorm. TechWorm, 24 Oct. 2014. Web. 29 Aug. 2016. www.techworm.net/2014/10/warsaw-stock-exchange-hacked-isis-cyber-criminals.html