Notes
1. In many cases, hackers have tendencies that hint at their identity. See Carmody, “Intel Report on Russia.”
2. Sanger, “Obama Order Sped Up Wave of Cyberattacks Against Iran.”
3. Sanger, Confront and Conceal, xxi.
4. The New York Times published an Oct 2012 story about the wealth of then Chinese Prime Minister Wen Jiabao’s family; Bloomberg published a June 2012 story about wealth accumulated by relatives of then vice-president Xi Jinping. Perlroth, “Wall Street Journal Announces That It.”
5. Greenwald and MacAskill, “NSA Prism Program Taps in to User Data of Apple.”
6. Soldatov and Borogan, The Red Web, 166.
7. Staff, “Putin Tells Russia’s Tech Sector.”
8. Egan and Long, “NYSE Trading Outage.”