157 "Faustian bargains"

Herman Kahn, "Technology and the Faustian Bargain," January 1, 1976, Lance Morrow, "The Faustian Bargain of Stem Cell Research," Time, July 12, 2001.

158 read by the government without a warrant

John Seabrook, "Petraeus and the Cloud," New Yorker, November 14, 2012.

159 reliance on the cloud creates new potential choke points

Nicole Perlroth, "Amazon Cloud Service Goes Down and Takes Popular Sites with It," New York Times, October 22, 2012.

160 "So you have these two fighting against each other"

Richard Siklos, "Information Wants to Be Free ... and Expensive," CNN, July 20, 2009,

161 on servers based in Sweden, Iceland, and possibly other locations

Andy Greenberg, "Wikileaks Servers Move to Underground Nuclear Bunker," Forbes, August 30, 2010.

162 broke into numerous other government and corporate

"WikiLeaks Backlash: The First Global Cyber War Has Begun, Claim Hackers," Guardian, December 11, 2010.

163 Independent groups of hacktivists

Hayley Tsukayama, "Anonymous Claims Credit for Crashing FBI, DOJ Sites," Washington Post, January 20, 1012; Ellen Nakashima, "CIA Web Site Hacked; Group LulzSec Takes Credit," Washington Post, June 15, 2011; Thom Shanker and Elisabeth b.u.miller, "Hackers Gained Access to Sensitive Military Files," New York Times, July 14, 2011; David E. Sanger and John Markoff, "I.M.F. Reports Cyberattack Led to "Very Major Breach," " New York Times, June 11, 2011; David Batty, "Vatican Becomes Latest Anonymous Hacking Victim," Guardian, March 7, 2012; Melanie Hick, "Anonymous Hacks Interpol Site After 25 Arrests," Huffington Post, January 3, 2012, Martin Beckford, "Downing Street Website Also Taken Down by Anonymous," Telegraph, April 8, 2012; Tom Brewster, "Anonymous Strikes Downing Street and Ministry of Justice," TechWeek Europe, April 10, 2012, "NASA Says Was Hacked 13 Times Last Year," Reuters, March 2, 2012.

164 hackers recorded the call and put it on the web

Duncan Gardham, " "Anonymous" Hackers Intercept Conversation Between FBI and Scotland Yard on How to Deal with Hackers," Telegraph, February 3, 2012.

165 penetrated by a cyberattack believed to have originated in China

Michael Joseph Gross, "Enter the Cyber-Dragon," Vanity Fair, September 2011.

166 "fifth domain" for potential military conflict

Susan P. Crawford, "When We Wage Cyberwar, the Whole Web Suffers," Bloomberg, April 25, 2012.

167 "a global cyber arms race"

David Alexander, "Global Cyber Arms Race Engulfing Web-Defense Official," Reuters, April 11, 2012.

168 cybersecurity technology, offense has the advantage over defense

Ibid.; Ron Rosenbaum, "Richard Clarke on Who Was Behind the Stuxnet Attack," Smithsonian, April 2, 2012.

169 which prevented ancient Greece"s conquest by Persia

Simon Singh, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (New York: Doubleday, 1999).

170 on the messenger"s scalp, and then "waited for the hair to regrow"

Ibid.

171 cryptography in its various forms

Ibid.; Andrew Lycett, "Breaking Germany"s Enigma Code," BBC, February 17, 2011, "The system kind of got loose"

Michael Joseph Gross, "World War 3.0," Vanity Fair, May 2012.

173 four trends have converged to make cybersecurity a problem

James Kaplan, Shantnu Sharma, and Allen Weinberg, "Meeting the Cybersecurity Challenge," McKinsey Quarterly, June 2011.

© 2024 www.topnovel.cc