1,372
Views
1
CrossRef citations to date
0
Altmetric
Article

Human-cyber Nexus: the parallels between ‘illegal’ intelligence operations and advanced persistent threats

Bibliography

  • “Abel, Red Spy, Dies; Freed in 1962 Swap,” New York Times, 17 November 1971.
  • Agabekov, G. OGPU: The Russian Secret Terror. New York: Brentano’s, 1931.
  • Agabekov, G. ЧК За Работой (The ChK at Work). Berlin: Strela, 1931.
  • Anderson, J. P. Computer Security Technology Planning Study, conducted for the U.S. Air Force Systems Command, Ft. Washington, PA, October 1972.
  • Andrew, C., and V. Mitrokhin. The Sword and the Shield: The Mitrokhin Archive and the Secret History of the KGB. New York: Basic Books, 1999.
  • Carr, B. Loginov Spy in the Sun. The Story of Yuriy Loginov. Cape Town, South Africa: Howard Timmins, 1969.
  • Central Intelligence Agency, “Biography of Yevgeniy Yevgen’yevich Runge,” 8 January 1968, obtained via FOIA.
  • Command Five. Advanced Persistent Threats: A Decade in Review. Sydney: Command Five, 2011.
  • Corera, G. Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage. New York: Pegusus Books, 2016.
  • “A Covey of Spies Is Flushed in Germany,” Life, 3 November 1967.
  • Crotts, A. The New Moon: Water, Exploration, and Future Habitation. Cambridge: Cambridge University Press‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬, 2014.
  • Federal Bureau of Investigation. Milwaukee Airtel, 11 March 1959, FBI file 105-76241, obtained via FOIA.
  • Federal Bureau of Investigation. “Ghost Stories: Russian Foreign Intelligence Service Illegals,” FBI FOIA Site. https://vault.fbi.gov/ghost-stories-russian-foreign-intelligence-service-illegals.
  • Federal Bureau of Investigation. “Hollow Nickel/Rudolph Abel,” FBI History Site. https://www.fbi.gov/history/famous-cases/hollow-nickel-rudolph-abel.
  • Feifer, G. “Spy Defection Roils Russian Intelligence Service,” Radio Free Europe/Radio Liberty, 12 November 2010.
  • FireEye, Threat Research Blog. “APT28: A Window into Russia’s Cyber Espionage Operations,” 27 October 2014. https://www.fireeye.com/blog/threat-research/2014/10/apt28-a-window-into-russias-cyber-espionage-operations.html.
  • Granovsky, A. I Was an NKVD Agent: A Top Soviet Spy Tells His Story. New York: Devin-Adair, 1962.
  • Hellman, B. “Писатель Алекцандр Сипельгас, Он Же Разведчик А. Смирнов. Русско-Финско-Эстонская Загадка” (“Author Alexander Sipelgas, Also Known as Intelligence Officer A. Smirnov: Russo-Finno-Estonian Riddle”). In Встречи и столкновения: Статьи по русской литературе (Meetings and Clashes: Articles on Russian Literature), Slavica Helsingiensia 36, 199–231. Helsinki: Helsinki University Press, 2008.
  • Hudson, B. Advanced Persistent Threats: Detection, Protection and Prevention. Oxford: Sophos UTM, 2014.
  • Infosec Institute, Advanced Persistent Threats: Attack and Defense, 13 June 2013. http://resources.infosecinstitute.com/advanced-persistent-threats-attack-and-defense/.
  • Khokhlov, N. E. “I Would Not Murder for the Soviets,” Saturday Evening Post, 11 December 1954.
  • Khokhlov, N. E. In the Name of Conscience: The Testament of a Soviet Secret Agent. New York: David McKay, 1959.
  • Krivitsky, W. G. I Was Stalin’s Agent. London: Hamish Hamilton, 1939.
  • Kuzichkin, V. Inside the KGB: My Life in Soviet Espionage. New York: Pantheon Books, 1990.
  • Mahar, D. G. Shattered Illusions: KGB Cold War Espionage in Canada. Lanham, MD: Rowman & Littlefield, 2016.
  • Mandiant Corporation. APT1: Exposing One of China’s Cyber Espionage Units, 13 February 2013. https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf.
  • Mandiant Corporation. Special Report, M-Trends 2018, 4 April 2018. https://investors.fireeye.com/static-files/b7dcb16f-44a8-4cfb-927f-efeed397dd52.
  • Massing, H. This Deception. New York: Duell, Sloan and Pearce, 1951.
  • Massing, H. Compilation of the French and Swiss Investigations of Poretskiy’s Murder, item number 160, Hoover Institution Archives, Hede Massing Papers, Box 1, Folder 7.
  • Mitrokhin, V., ed. KGB Lexicon: A Soviet Intelligence Officer’s Handbook. London: Frank Cass, 2002.
  • Moran, N. “Understanding Advanced Persistent Threats: A Case Study”, login: The Usenix Magazine, August 2011.
  • National Archives of Australia. Australian Security Intelligence Service, Extract from ASIO Source Reports, 12 and 21 July 1952 and 21 October 1952, File A6117, folder 7, Item number 12037437, serial 148, 150, and 215
  • National Archives of Australia. Australian Security Intelligence Service, Extract ASIO from Source Reports, 13 March and 1 April 1953, NAA, A6117, folder 8, item number 12077929, serials 100, 118.
  • National Archives of Australia. Australian Security Intelligence Service Memo, 7 May 1954, File A6283, folder 1, Item number 4104669.
  • National Archives of Australia. Statement by Petrova, 8 September 1954, File A6283, folder 14, item number 4104675.
  • National Archives of Sweden. Swedish State Police Debriefing Report, 16 August 1954, SUK, Classified Archive, F4, Volume 11.
  • National Archives of Sweden. Statens Utlänningskommission (National Immigration Commission; SUK) Hemliga Archivet (Classified Archive), F4, Volume 7, Granovski, Anatoli Michailovitj.
  • National Institutes of Standards and Technology. Managing Information Security Risk: Organization, Mission, and Information System View, Special Publication 800-39, March 2011. https://csrc.nist.gov/publications/detail/sp/800-39/final.
  • Olshanskiy, A. Записки агента Разведупра (Notes of a Razvedupr Agent). Paris: Mishen, 1930.
  • Parfitt, T. “Russian Double Agent Sentenced in Absentia to 25 Years in Prison,” The Guardian, 27 June 2011.
  • Poretsky, E. K. Our Own People: A Memoir of “Ignace Reiss” and His Friends. London: Oxford University Press, 1969.
  • Schmid, F., and H. Stark. “Spies Strain German-Russian Ties,” Der Spiegel Online, 2 July 2013.
  • Schneier, B. “The Story behind the Stuxnet Virus,” Forbes, 7 October 2010.
  • Segal, A. Tracking State-Sponsored Cyber Operations. New York: Council on Foreign Relations, 6 November 2017. https://www.cfr.org/blog/tracking-state-sponsored-cyber-operations.
  • Sigl, R. In the Claws of the KGB: Memoirs of a Double Agent. Philadelphia: Dorrance and Co., 1978.
  • Stoll, Clifford, “Stalking the Wily Hacker,” Communications of the ACM, Vol. 31, No. 5 (May 1988). 484–497 doi:10.1145/42411.42412
  • Stoll, C. The Cuckoo’s Egg. New York: Doubleday, 1989.
  • Symantec Corporation. Advanced Persistent Threats: A Symantec Perspective. Mountain View, CA: Symantec, 2011.
  • U.S. Congress. House. Committee on Un-American Activities. The Shameful Years: Thirty Years of Soviet Espionage in the United States, 82nd Congress, Second Session. Washington, DC: Government Printing Office, 1952.
  • U.S. Congress. House. Committee on Un-American Activities. Investigation of Communist Activities in the Los Angeles, California, Area, 84th Congress, Second Session. Washington, DC: Government Printing Office, 1956.
  • U.S. Congress. Senate. Committee on the Judiciary. Testimony of Colonel Yevgeny Runge, 91st Congress, Second Session. Washington, DC: Government Printing Office, 1970.
  • U.S. Department of Justice. USA Vs. Defendant #4, a/k/a/“Donald Howard Heathfield,” Et Al, District of Massachusetts, 7 July 2010.
  • U.S. Department of Justice. USA V. Anna Chapman, Mikhail Semenko, Southern District of New York, 27 June 2010.
  • U.S. Department of Justice. USA V. Su Bin, Central District of California, 27 June 2014.
  • U.S. Department of Justice. “Justice Department Announces Actions to Disrupt Advanced Persistent Threat 28 Botnet of Infected Routers and Network Storage Devices,” Press Release, 23 May 2018. https://www.justice.gov/opa/pr/justice-department-announces-actions-disrupt-advanced-persistent-threat-28-botnet-infected.
  • U.S. National Archives and Records Administration. RG 319. Entry A1 134B, Box 600, Headquarters, Sub-Region Kassel, Counterintelligence Corps Region III memo, dated 8 March 1948.
  • U.S. National Archives and Records Administration. RG 319, Entry A1 314B, Box 443, U.S. Army G-2 memo and attached Kukowitsch debriefing report, 29 March 1954.
  • UK National Archives, File KV 2/2398-2399, Agabekov.
  • UK National Archives, File KV 2/1898, Record of 1940 British debriefings of Kritivsky.
  • “Ukraine’s Power Outage Was a Cyber Attack: Ukrenergo,” Reuters, 18 January 2017.
  • Ware, Willis H., ed. Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security, study conducted for the U.S. Department of Defense, Office of the Director of Defense Research and Engineering. Santa Monica, CA: Rand, 11 February 1970.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.