Read Return to Winter: Russia, China, and the New Cold War Against America Online
Authors: Douglas E. Schoen,Melik Kaylan
70
. “Iran, N. Korea ‘Trading Missile Technology,’” Al Jazeera, May 14, 2011,
http://www.aljazeera.com/news/middleeast/2011/05/2011514223248385833.html
.
71
. John S. Park, “What’s Behind New Iran and North Korea Pact?” PBS, September 8, 2012,
http://www.pbs.org/wgbh/pages/frontline/tehranbureau/2012/09/comment-whats-behind-new-iran-and-north-korea-pact.html
.
72
. Rosett, “Iran–North Korea Axis of Proliferation.”
73
. Ibid.
74
. Ibid.
75
. Ibid.
76
. Christina Y. Lin, “China, Iran, North Korea: a Triangular Strategic Alliance,” Gloria Center, March 5, 2010,
http://www.gloria-center.org/2010/03/lin-2010-03-05/
.
77
. Bertil Lintner, “Tunnels, Guns, and Kimchi: North Korea’s Quest for Dollars, Part I,” Yale Global Online, June 9, 2009,
http://yaleglobal.yale.edu/content/NK-quest-for-dollars-part1
.
78
. Jonathan Saul, “Exclusive: Russia Steps Up Military Lifeline to Syria’s Assad—Sources,” Reuters, January 17. 2014,
http://www.reuters.com/article/2014/01/17/us-syria-russia-arms-idUSBREA0G0MN20140117
.
79
. Shaun Walker, “Vladimir Putin Expresses Doubts over Syria’s Disposal of Chemical Weapons,”
The Guardian
, September 19, 2013,
http://www.theguardian.com/world/2013/sep/19/vladimir-putin-doubts-syria-plan-weapons
.
80
. Ibid.
81
. “Russia warns UK on Arming Syrian Rebels,” BBC News, March 13, 2013,
http://www.bbc.co.uk/news/uk-politics-21772658
.
82
. Maayan Lubell, “Israel Warns Against Russian Arms Supply to Syria,” Reuters, May 18, 2013,
http://www.reuters.com/article/2013/05/18/us-israel-syria-idUSBRE94H0BO20130518
.
83
. “Syria Unlikely to Use Chemical Weapons—FM Lavrov,” RIA Novosti, December 24, 2012,
http://en.ria.ru/world/20121224/178361278.html
.
84
. David Jolly, “Russia Urges Syria to Cooperate in Chemical Weapons Inquiry,”
New York Times
, August 23, 2013,
http://www.nytimes.com/2013/08/24/world/middleeast/syria-chemical-attack.html
.
85
. Ibid.
86
. Robert Mackey, “Confused by How YouTube Assigns Dates, Russians Cite False Claim on Syria Videos,”
The Lede
(blog),
New York Times
, August 23, 2013,
http://thelede.blogs.nytimes.com/2013/08/23/confused-by-how-youtube-assigns-dates-russians-cite-false-claim-on-syria-videos/
.
87
. “Russia Warns Against Military Intervention in Syria,” Tasnim News Agency, August 26, 2013,
http://www.tasnimnews.com/English/Home/Single/126306
.
88
. Thomas Grove, “Russia Says Iran Must Take Part in Proposed Syria Talks,” Reuters, May 16, 2013,
http://www.reuters.com/article/2013/05/16/us-syria-crisis-russia-idUSBRE94F0UJ20130516
.
89
. Adam Entous, Julian E. Barnes, and Gregory White, “Russia Raises Stakes in Syria,”
Wall Street Journal
, May 16, 2013,
http://online.wsj.com/news/articles/SB10001424127887323398204578487333332405720
.
90
. Michael R. Gordon and Eric Schmitt, “Russia Sends More Advanced Missiles to Aid Assad in Syria,”
New York Times
, May 16, 2013,
http://www.nytimes.com/2013/05/17/world/middleeast/russia-provides-syria-with-advanced-missiles.html
.
91
. Ibid.
92
. Jean Aziz, “Hezbollah’s Russian Connection,”
Al-Monitor
, May 12, 2013,
http://www.al-monitor.com/pulse/originals/2013/05/nasrallah-tries-to-reassure-popular-base.html#ixzz2W3Y6zQOV
.
93
. Entous, Barnes, and White, “Russia Raises Stakes.”
94
. Adam Entous and Julian E. Barnes, “U.S. Weighs Syria Response,”
Wall Street Journal
, April 28, 2013,
http://online.wsj.com/article/SB10001424127887323798104578450863284390292.html
.
95
. Cohen and Blank, “Reset Regret: Russian Global Strategy Undermines American Interests.”
96
. Ruslan Pukhov, “Why Russia Is Backing Syria,”
New York Times
, July 6, 2012,
http://www.nytimes.com/2012/07/07/opinion/why-russia-supports-syria.html
.
97
. Tamsin Carlisle, “Qaddafi Offers Russia, China, and India a Stake in Libyan Oil Industry,”
The National
, March 15, 2011,
http://www.thenational.ae/business/energy/qaddafi-offers-russia-china-and-india-a-stake-in-libyan-oil-industry#ixzz2CX40JZVG
.
98
. Daniel Treisman, “Why Russia Protects Syria’s Assad,” CNN, February 3, 2012,
http://www.cnn.com/2012/02/02/opinion/treisman-russia-syria/index.html
.
99
. Igor Latunsky, “Why Didn’t Russia Use Veto Right on Libya?”
Pravda
, November 7, 2012,
http://english.pravda.ru/world/asia/11-07-2012/121625-libya-0/
.
100
. Pukhov, “Why Russia Is Backing Syria.”
101
. Ioffe, “The Cold War Heats Up.”
102
. Pukhov, “Why Russia Is Backing Syria.”
103
. Abed al-Toraifi, “Does China Truly Support Bashar al-Assad?” Al Arabiya, February 16, 2012,
http://www.alarabiya.net/views/2012/02/16/194981.html
.
104
. Daniel Wallis, “Venezuela’s Post-Chavez Oil Policy to Focus on China, Russia,” Reuters, March 15, 2013,
http://www.reuters.com/article/2013/03/15/venezuela-election-oil-idUSL1N0C69N220130315
.
105
. Roger Noriega, “Is There a Chavez Terror Network on America’s Doorstep?”
Washington Post
, March 20, 2011,
http://articles.washingtonpost.com/2011-03-20/opinions/35207542_1_venezuelan-counterpart-rangel-silva-venezuelan-embassy
.
106
. “Venezuela Ranked Top Importer of Russian Arms,” RIA Novosti, December 27, 2011,
http://www.globalsecurity.org/military/library/news/2011/12/mil-111227-rianovosti01.htm
.
107
. “Putin Hopes for Continuity in Russian-Venezuelan Relations,” RIA Novosti, March 7, 2013,
http://en.rian.ru/russia/20130307/179878459.html
.
108
. “Venezuela, China Sign $6 Billion Oil Deals.” Yahoo! Singapore Finance, November 25, 2011,
http://sg.finance.yahoo.com/news/Venezuela-China-sign-6-afpsg-3543804459.html
.
109
. “Venezuela-China Relations Grow Following VP’s Visit,”
Correo del Orinoco International
, May 17, 2013,
http://venezuelanalysis.com/news/9380
.
110
. Mitchell B. Reiss and Ray Takeyh, “Don’t Get Suckered by Iran,”
Foreign Affairs
, January 2, 2014,
http://www.foreignaffairs.com/articles/140620/mitchell-b-reiss-and-ray-takeyh/dont-get-suckered-by-iran
.
111
. Maddy Fry, “Putin Wishes Egypt Army Chief ‘Success’ in Presidential Campaign,”
Time
, February 13, 2014
http://world.time.com/2014/02/13/putin-wishes-egypt-army-chief-success-in-presidential-campaign/
.
CHAPTER 3: CYBER SECURITY
1
. Mike W. Thomas, “Air Force Looking to Hire 1,000 Cybersecurity Professionals,”
San Antonio Business Journal
, January 31, 2013.
http://www.bizjournals.com/sanantonio/blog/2013/01/air-force-looking-to-hire-1000.html
.
2
. Shane Harris, “China’s Cyber-Militia,”
National Journal
, March 31, 2008,
http://www.nationaljournal.com/magazine/china-s-cyber-militia-20080531
.
3
. Josh Rogin, “The Top 10 Chinese Cyber Attacks (That We Know Of),”
Foreign Policy
, January 22, 2010,
http://thecable.foreignpolicy.com/posts/2010/01/22/the_top_10_chinese_cyber_attacks_that_we_know_of
.
4
. Bill Gertz, “Cyber Threat Looms,”
Washington Free Beacon
, January 24, 2013,
http://freebeacon.com/cyber-threat-looms/
.
5
. Max Fisher, “Eric Schmidt, in New Book: China Could Contribute to Fracturing the Internet Into Pieces,”
Worldviews
(blog),
Washington Post
, February 3, 2013,
http://www.washingtonpost.com/blogs/worldviews/wp/2013/02/03/eric-schmidt-in-new-book-china-could-contribute-to-fracturing-the-internet-into-pieces/
.
6
. Philip Rucker, “At U.S.-China Shirt-Sleeves Summit, Formalities and Suspicions Were on Display,”
Washington Post
, June 9, 2013,
http://articles.washingtonpost.com/2013-06-09/politics/39856581_1_president-obama-obama-and-xi-donilon
.
7
. Glenn Greenwald, “NSA Prism Program Taps In to User Data of Apple, Google, and Others,”
The Guardian
, June 6, 2013,
http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data
.
8
. Philip Rucker, “Obama Warns Xi that Continued Cybertheft Would Damage Relations, U.S. Officials Said,”
Washington Post
, June 8, 2013,
http://www.washingtonpost.com/politics/obama-warns-xi-that-continued-cybertheft-would-damage-relations-us-officials-said/2013/06/08/04843edc-d075-11e2-8845-d970ccb04497_story.html
.
9
. Michael Riley et al., “Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It,”
Bloomberg Businessweek
, March 13, 2014,
http://www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data
.
10
. Richard A. Clarke and Robert Knake,
Cyber War: The Next Threat to National Security and What to Do About It
(New York: HarperCollins, 2010), 67–68.
11
. Ibid., 68.
12
. “U.S. Should Prepare for a Cyber Attack That Will Ruin the Country in Just 15 MINUTES, Expert Warns,”
Daily Mail
, May 7, 2010,
http://www.dailymail.co.uk/news/article-1275001/U-S-prepare-cyber-attack-ruin-country-just-15-MINUTES-expert-warns.html
.
13
. “Text of Speech by Defense U.S. Secretary Leon Panetta,”
Defense News
, October12, 2012,
http://www.defensenews.com/article/20121012/DEFREG02/310120001/Text-Speech-by-Defense-U-S-Secretary-Leon-Panetta
.
14
. Ibid.
15
. James Clapper, “Unclassified Statement for the Record on the Worldwide Threat Assessment of the US Intelligence Community for the Senate Select Committee on Intelligence,” January 31, 2012,
http://www.intelligence.senate.gov/120131/clapper.pdf
.
16
. Bill Gertz, “Cyber Threat Looms.”
17
. Tania Branigan, “US Calls on Chinese Government to Crack Down on Hacking,”
The Guardian
, March 12, 2103,
http://www.theguardian.com/world/2013/mar/12/us-chinese-government-hacking
.
18
. Mark Clayton, “Alerts Say Major Cyber Attack Aimed at Gas Pipeline Industry,”
Christian Science Monitor
, May 5, 2012,
http://www.csmonitor.com/USA/2012/0505/Alert-Major-cyber-attack-aimed-at-natural-gas-pipeline-companies
.
19
. Bill Gertz, “Cyber Breach,”
Washington Free Beacon
, February 4, 2013,
http://freebeacon.com/cyber-breach/
.
20
. Ibid.
21
. Colonel Jayson M. Spade, “China’s Cyber Power and America’s National Security,” U.S. Army War College, May 2012,
http://www.carlisle.army.mil/dime/documents/China’s
Cyber Power and America’s National Security Web Version.pdf.
22
. Gertz, “Cyber Threat Looms.”
23
. Spade, “China’s Cyber Power.”
24
. “Target Data Breach Cost for Banks Tops $200M,” NBC News, February 18, 2014,
http://www.nbcnews.com/business/business-news/target-data-breach-cost-banks-tops-200m-n33156
.
25
. “More Well-Known US Retailers Victims of Cyberattacks: Sources,” Reuters, January 12, 2014,
http://www.cnbc.com/id/101328744
.
26
. Ellen Messmer, “Cyberattacks in U.S. Cost an Average $8.9 Million Annually to Clean Up, Study Says,”
Network World
, October 8, 2012,
http://www.networkworld.com/news/2012/100812-ponemon-cyberattacks-263113.html
.
27
. Michael A. Riley and Ashlee Vance, “Chinese Hackers Knock the Wind out of US Companies,”
Bloomberg Businessweek
, March 15 2012,
http://www.businessweek.com/news/2012-03-15/china-corporate-espionage-boom-knocks-wind-out-of-u-dot-s-dot-companies
.
28
. “Foreign Spies Stealing US Economic Secrets in Cyberspace: Report to Congress on Foreign Economic Collection and Industrial Espionage 2009–2011,” Office of the National Counterintelligence Executive, October 2011,
http://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf
.
29
. Edward Wong, “Hackers Find China Is Land of Opportunity,”
New York Times
, May 22, 2013,
http://www.nytimes.com/2013/05/23/world/asia/in-china-hacking-has-widespread-acceptance.html
.
30
. Jeremy Page and Julian E. Barnes, “China Shows Its Growing Might,”
Wall Street Journal
, January 12, 2011,
http://online.wsj.com/article/SB10001424052748704428004576075042571461586.html
.
31
. Terril Yue Jones, Bill Trott, and Rob Taylor, “Chinese Hackers Steal U.S. Weapons Systems Designs, Report Says,” NBC News, May 28, 2013,
http://usnews.nbcnews.com/_news/2013/05/28/18556787-chinese-hackers-steal-us-weapons-systems-designs-report-says
.
32
. Rogin, “The Top 10 Chinese Cyber Attacks.”
33
. Dave Mujumdar, “Chengdu J-20 Could Enter Service by 2018,”
Flightglobal
, May 18, 2012,
http://www.flightglobal.com/news/articles/chengdu-j-20-could-enter-service-by-2018-372082/
.
34
. Eddie Wrenn, “Is This the Biggest Chinese Rip-Off Ever? People’s Republic Unveils Stealth Fighter . . . but It Looks Remarkably Similar to US Jet,”
Daily Mail
, May 18, 2012,
http://www.dailymail.co.uk/sciencetech/article-2146283/Chinas-stealth-jet-goes-strength-strength-U-S-air-technology-falters-just-Chinese-rip-off.html
.