Additional sources and materials
1. Barack Obama’s Letter “Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities” (https://www.whitehouse.gov/the-press-office/2015/04/01/letter-blocking-property-certain-persons-engaging-significant-malicious).-
2. Challenges to Doing Business with the Department of Defense (http://armedservices.house.gov/index.cfm/files/serve?File_id=f60b62cb-ce5d-44b7-a2aa-8b693487cd44).
3. Chinese hack of federal personnel files included security-clearance database (http://www.washingtonpost.com/world/national-security/chinese-hack-of-government-network-compromises-security-clearance-files/2015/06/12/9f91f146-1135-11e5-9726-49d6fa26a8c6_story.html?wpisrc=nl_headlines&wpmm=1http:// www.washingtonpost.com/opinions/hitting-an-agency-where-it-hurts/2015/06/17/ffca6c6a-1512-11e5-9ddc-e3353542100c_story.html?wpisrc=nl_headlines&wpmm=1).
4. Cyber Attacks Likely to Increase (http://www.pewinternet.org/2014/10/29/cyber-attacks-likely-to-increase/).
5. Department of Homeland Security opening Silicon Valley office (http://www.siliconbeat.com/2015/04/22/department-of-homeland-security-opening-silicon-valley-office/).
6. Ewing Philip. Ash Carter's appeal to Silicon Valley: We're 'cool' too (http://www.politico.com/story/2015/04/ash-carter-silicon-valley-appeal-117293.html).
7. Executive Order 13694 of April 1, 2015 Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities (http://www.treasury.gov/resource-center/sanctions/Programs/Documents/cyber_eo.pdf).
8. Federal Eye. Officials: Chinese had access to U.S. security clearance data for one year (http://www.washingtonpost.com/blogs/federal-eye/wp/2015/06/18/officials-chinese-had-access-to-u-s-security-clearance-data-for-one-year/?wpisrc=nl_headlines&wpmm=1).
9. Furchtgott-Roth H. In a regulated Internet, consumers lose because businesses get ahead by pleasing politicians (http://www.marketwatch.com/story/in-net-neutrality-the-only-winner-is-washington-2015-02-27).
10. IRS Theft Affects Over 100 000 Taxpayers (http://www.liveandinvestoverseas.com/news/irs-theft-affects-over-100000-taxpayers/).
11. DoD CYBER STRATEGY (http://www.defense.gov/home/feature/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf)
12. Letter. Progressive Kristallnacht Coming? 24.01.2014. (http://www.wsj.com/articles/SB10001424052702304549504579316913982034286)
13. Lofgren Mike. The Party Is Over: How Republicans Went Crazy, Democrats Became Useless and the Middle Class Got Shafted, 2012 (http://www.human-crisis.com/2014/04/blog-post_8898.html).
14. Lynn William III. Defending a new domain // Foreign Affairs, Sept./Oct. 2010.
15. Lynn William III. The Pentagon’s Cyberstrategy, One Year Later. Defending Against the Next Cyberattack. Foreign Affairs. Sept. 2011.
16. Manjoo Farhad. Silicon Valley Has an Arrogance Problem (updated 3.11.2013) (http://www.wsj.com/articles/SB10001424052702303661404579175712015473766).
17. Rodgers T.J. Why Silicon Valley Should Not Normalize Relations With Washington, D.C. (http://object.cato.org/sites/cato.org/files/pubs/pdf/silvalley.pdf).
18. Sanger David E. U.S. Decides to Retaliate Against China's Hacking // The New York Times, 31.07.2015.
19. Why Silicon Valley is the new revolving door for Obama staffers (http://www.washingtonpost.com/business/economy/as-obama-nears-close-of-his-tenure-commitment-to-silicon-valley-is-clear/2015/02/27/3bee8088-bc8e-11e4-bdfa-b8e8f594e6ee_story.html).
20. Why the Pentagon is wooing Silicon Valley (and the valley is playing hard to get) (http://www.washingtonpost.com/news/checkpoint/wp/2015/04/23/why-the-pentagon-is-wooing-silicon-valley-and-the-valley-is-playing-hard-to-get/?wpisrc=nl_headlines&wpmm=1).
Comments
No posts found