Категории
Самые читаемые
RUSBOOK.SU » Компьютеры и Интернет » Прочая околокомпьтерная литература » Великий китайский файрвол - Джеймс Гриффитс

Великий китайский файрвол - Джеймс Гриффитс

Читать онлайн Великий китайский файрвол - Джеймс Гриффитс

Шрифт:

-
+

Интервал:

-
+

Закладка:

Сделать
1 ... 89 90 91 92 93 94 95 96 97 ... 101
Перейти на страницу:
Society in China: creating, celebrating and instrumentalising the online carnival, London: Routledge, 2011, pp. 53–68.

448

J. Ng, Blocked on Weibo, New York NY: The New Press, 2013, p. 186.

449

А. Барр «Письмо Карен Берк», письма HBGary, 5 февраля 2011 г., WikiLeaks, https://wikileaks.org/hbgary-emails/emailid/39192

450

‘Anonymous hacktivists say WikiLeaks war to continue’, BBC News, 9 December 2010, http://www.bbc.com/news/technology-11935539

451

N. Anderson, ‘How one man tracked down Anonymous – and paid a heavy price’, Ars Technica, 10 February 2011, https://arstechnica.com/tech-policy/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price/

452

Без названия, ‘Лог чата Anonymous в IRC’, Pastebin, 7 февраля 2011 г, https://pastebin.com/x69Akp5L

453

J. Leyden, ‘US gov IT services vendor swallows HBGary’, The Register, 29 February 2012, https://www.theregister.co.uk/2012/02/29/hbgary_mantech/

454

N. Anderson, ‘How Anonymous accidentally helped expose two Chinese hackers’, Ars Technica, 20 February 2013, https://arstechnica.com/information-technology/2013/02/how-anonymous-accidentally-helped-expose-two-chinese-hackers/

455

Архив Rootkit.com по адресу https://web.archive.org/web/20110113042750/http://www.rootkit.com/

456

Department of Justice, ‘US charges five Chinese military hackers for cyber espionage against US corporations and a labor organization for commercial advantage’, US Department of Justice, 19 May 2014, https://www.justice.gov/usao-wdpa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and; D. Sanger et al., ‘Chinese army unit is seen as tied to hacking against US, The New York Times, 18 February 2013, http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html; M. Clayton, ‘Stealing US business secrets: experts ID two huge cyber “gangs” in China’, The Christian Science Monitor, 14 September 2012, https://www.csmonitor.com/USA/2012/0914/Stealing-US-business-secrets-Experts-ID-two-huge-cyber-gangs-in-China

457

J. Markoff, ‘SecurID company suffers a breach of data security’, The New York Times, 17 March 2011, https://www.nytimes.com/2011/03/18/technology/18secure.html

458

Mandiant, APT1: exposing one of China’s cyber espionage units, Milpitas CA: Mandiant, 2013, p. 52.

459

Mandiant, APT1, p. 55.

460

Department of Justice, ‘US charges five Chinese military hackers’.

461

B. Koerner, ‘Inside the cyberattack that shocked the US government’, Wired, 23 October 2016, https://www.wired.com/2016/10/inside-cyberattack-shocked-us-government/

462

E. Perez and S. Prokupecz, ‘US data hack may be 4 times larger than the government originally said’, CNN, 24 June 2015, http://edition.cnn.com/2015/06/22/politics/opm-hack-18-milliion/index.html

463

The OPM Data Breach: how the government jeopardised our national security for more than a generation, Congressional Report, Washington DC: Committee on Oversight and Government Reform, 2016.

464

K. Liptak et al., ‘China might be building vast database of federal worker info, experts say’, CNN, 6 June 2015, http://edition.cnn.com/2015/06/04/politics/federal-agency-hacked-personnel-management/

465

E. Perez, ‘FBI arrests Chinese national connected to malware used in OPM data breach’, CNN, 24 August 2017, http://edition.cnn.com/2017/08/24/politics/fbi-arrests-chinese-national-in-opm-data-breach/index.html

466

‘President Xi Jinping’s state visit to the United States’, Office of the Press Secretary, White House, 25 September 2015, https://obamawhitehouse.archives.gov/the-press-office/2015/09/25/fact-sheet-president-xi-jinpings-state-visit-united-states

467

S. Harold, ‘The US – China cyber agreement: a good first step’, Rand Corporation, 1 August 2016, https://www.rand.org/blog/2016/08/the-us-china-cyber-agreement-a-good-first-step.html

468

FireEye, Red Line Drawn: Chinese recalculates its use of cyberespionage, Milpitas CA: FireEye, 2016, https://www.fireeye.com/content/dam/fireeye-www/current-threats/pdfs/rpt-china-espionage.pdf

469

S. Kravchenko, ‘Russia more prey than predator to cyber firm wary of China’, Bloomberg, 25 August 2016, https://www.bloomberg.com/news/articles/2016-08-25/russia-more-prey-than-predator-to-cyber-firm-wary-of-china

Часть IV

470

Описание попытки побега Ильхама и Джевхер из Китая приводится на основе бесед автора с Джевхер и рассказа из ее книги «Джевхер Ильхам: Как уйгурская девушка борется за освобождение отца».

471

T. Chen, ‘China convicts almost everyone it accuses; one group is fighting back’, The Wall Street Journal, 1 July 2016, https://www.wsj.com/articles/the-fight-to-free-the-innocent-from-chinas-99-9-conviction-rate-1467384598

472

E. Wong, ‘China sentences Uighur scholar to life’, The New York Times, 23 September 2014, https://www.nytimes.com/2014/09/24/world/asia/china-court-sentences-uighur-scholar-to-life-in-separatism-case.html

473

J. Griffiths, ‘Al-Qaeda magazine calls for Xinjiang to be “recovered by the Islamic Caliphate”’, South China Morning Post, 21 October 2014, http://www.scmp.com/news/china/article/1621190/new-al-qaeda-magazine-calls-xinjiang-be-recovered-islamic-caliphate; S. Osborne, ‘Isis threatens China and vows to “shed blood like rivers”’, The Independent, 1 March 2017, https://www.independent.co.uk/news/world/middle-east/isis-china-threaten-terror-attack-muslim-islamist-group-islamic-state-a7606211.html

474

‘China “expels” French journalist over Uighur article’, BBC News, 26 December 2015, http://www.bbc.com/news/world-asia-china-35181299

475

J. Jacobs, Xinjiang and the Modern Chinese State, Seattle WA: University of Washington Press, 2016, p. 3.

476

M. Rajagopalan, ‘This is what a 21st-century police state really looks like’, BuzzFeed, 17 October 2017, https://www.buzzfeed.com/meghara/the-police-state-of-the-future-is-already-here?utm_term=.jiJKNDzG2#.mnPM42wem

477

T. Phillips, ‘China testing facial-recognition surveillance system in Xinjiang – report, The Guardian, 18 January 2018, https://www.theguardian.com/world/2018/jan/18/china-testing-facial-recognition-surveillance-system-in-xinjiang-report

478

S. Pham, ‘Chinese AI startup dwarfs global rivals with $4.5 billion valuation’, CNNMoney, 9 April 2018, http://money.cnn.com/2018/04/09/technology/china-ai-sensetime-startup/index.html

479

C. Beam, ‘Behind China’s cyber curtain’, The New Republic, 6 December 2013, https://newrepublic.com/article/115709/chinas-aba-county-where-government-shut-internet

480

‘China police block access to protest village’, The Telegraph, 12 December 2011, https://www.telegraph.co.uk/news/worldnews/asia/china/8951275/China-police-block-access-to-protest-village.html

481

J. Palmer, ‘China’s generation gap has never yawned wider’, Aeon, 7 March 2013, https://aeon.co/essays/china-s-generation-gap-has-never-yawned-wider

482

M. Xuecun, ‘Let them eat grass’, Foreign Policy, 2 January 2013, http://foreignpolicy.com/2013/01/02/let-them-eat-grass/

483

«Чжуаньшидан».

484

K. Kuang, ‘How China has censored words relating to the Tiananmen Square anniversary’, PRI, 4 June 2016, https://www.pri.org/stories/2016-06-03/how-china-has-censored-words-relating-tiananmen-square-anniversary

485

S. Robinson, ‘Filtering inappropriate content with the Cloud Vision API’, Google Cloud Big Data and Machine Learning blog, 17 August 2016, https://cloud.google.com/blog/big-data/2016/08/filtering-inappropriate-content-with-the-cloud-vision-api

486

D. Burke, ‘Why images of Mohammed offend Muslims’, CNN, 4 May 2015, https://edition.cnn.com/2015/05/04/living/islam-prophet-images/

487

‘Syria unrest: famed cartoonist Ali Ferzat “beaten”’, BBC News, 25 August 2011, http://www.bbc.com/news/world-middle-east-14665113

488

H. Blackstone, ‘Thrown in prison for drawing cartoons’, The Independent, 27 October 2015, https://www.independent.co.uk/voices/campaigns/voicesindanger/thrown-in-prison-for-drawing-cartoons-a6709841.html

489

S. Crispin, ‘Drawing the line: cartoonists under threat’, Committee to Protect Journalists, 19 May 2015, https://cpj.org/reports/2015/05/drawing-the-line-cartoonists-under-threat-free-expression-zunar-charlie-hebdo.php

490

Интервью автора с Rebel Pepper, апрель 2017 г.

491

I. Fish, ‘Rebel without a country’, Foreign Policy,

1 ... 89 90 91 92 93 94 95 96 97 ... 101
Перейти на страницу:
На этой странице вы можете бесплатно скачать Великий китайский файрвол - Джеймс Гриффитс торрент бесплатно.
Комментарии
Открыть боковую панель
Комментарии
Сергій
Сергій 25.01.2024 - 17:17
"Убийство миссис Спэнлоу" от Агаты Кристи – это великолепный детектив, который завораживает с первой страницы и держит в напряжении до последнего момента. Кристи, как всегда, мастерски строит