References
- Adams, J. 2012. “The Government of Canada and Cyber Security: Security Begins at Home.” Journal of Military and Strategic Studies 14 (2). http://jmss.org/jmss/index.php/jmss/article/view/458
- Bailey, J. 2014. “Time to Unpack the Juggernaut?: Reflections on the Canadian Federal Parliamentary Debates on ‘Cyberbullying.’” Dalhousie Law Journal 37 (2): 661–707.
- Barnard-Wills, D., and D. Ashenden. 2012. “Securing Virtual Space: Cyber War, Cyber Terror, and Risk.” Space and Culture 15 (2): 110–123. doi:10.1177/1206331211430016.
- Beaudoin, L., and L. Genik. 2010. “Review and Coordination of Cyber Security for Vancouver 2010.” Accessed February 14, 2013. http://www.aiai.ed.ac.uk/project/coalition/ksco/ksco-2010/papers/10-04-Genik-Beaudoin-Cyber.pdf
- Bejtlich, R. 2010. “What is APT and What Does it Want?” TaoSecurity, January 16. http://taosecurity.blogspot.ca/2010/01/what-is-apt-and-what-does-it-want.html
- Betz, D. J., and T. Stevens. 2013. “Analogical Reasoning and Cyber Security.” Security Dialogue 44 (2): 147–164. doi:10.1177/0967010613478323.
- Bigo, D. 2002. “Security and Immigration: Toward a Critique of the Governmentality of Unease.” Alternatives: Global, Local, Political 27 (February): 63–92.
- Brown, J. 2013. “NSA Says it ‘Finessed’ Canada, Seizing Control of Global Crypto.” Macleans. September 11. http://www.macleans.ca/society/technology/nsa-says-it-finessed-canada-seizing-control-of-global-crypto/
- Buzan, B., O. Wæver, and D. W. Jaap. 1998. Security: A New Framework For Analysis. Boulder, CO: Lynne Rienner Publishers.
- C.A.S.E. Collective. 2006. “Critical Approaches to Security in Europe: A Networked Manifesto.” Security Dialogue 37 (4): 443–487. doi:10.1177/0967010606073085.
- Cabinet Office. 2011. “Cyber Security Strategy.” Accessed July 27, 2015. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber-security-strategy-final.pdf
- Dunn Cavelty, M. 2007. Cyber-Security and Threat Politics: US Efforts to Secure the Information Age. London: Routledge.
- Dunn Cavelty, M. 2013. “From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse.” International Studies Review 15 (1): 105–122. doi:10.1111/misr.12023.
- CBC News. 2014. “Whistleblower Edward Snowden’s Impact on Canada.” February 21. http://www.cbc.ca/1.2546624
- Cloppert, M. 2009. “Security Intelligence: Introduction (Pt 1).” Computer Forensics Blog, July 22. http://computer-forensics.sans.org/blog/2009/07/22/security-intelligence-introduction-pt-1/
- CSEC. 2014. Q&A Prepared for the Chief in Advance of His Early February 2014 Appearance at a Senate Security Committee. Access to Information Act Request A-2014–0012. Accessed July 27, 2015. https://drive.google.com/file/d/0B0wdLKxvw1xsYzhKWVFJenlNWE0/edit?usp=sharing
- Deibert, R. 2012. “Distributed Security as Cyber Strategy: Outlining a Comprehensive Approach for Canada in Cyberspace.” Canadian Defence & Foreign Affairs Institute Research Paper. Accessed July 27, 2015. https://citizenlab.org/wp-content/uploads/2012/08/CDFAI-Distributed-Security-as-Cyber-Strategy_-outlining-a-comprehensive-approach-for-Canada-in-Cyber.pdf
- Flack, G. 2012. “Defence, Issue 9, Evidence.” Presented at the Proceedings of the Standing Senate Committee on National Security and Defence, October 29. http://www.parl.gc.ca/content/sen/committee/411/SECD/09EV-49764-E.HTM
- Freeze, C. 2014. “The Landmark File: Inside Canadian Cyber-Security Agency’s ‘Target the World’ Strategy.” The Globe and Mail, August 25. http://www.theglobeandmail.com/news/national/the-landmark-file-inside-canadian-cyber-security-agencys-target-the-world-strategy/article20179786/
- Fung, B. 2013. “Microsoft: U.S. Government is a Potential Security Threat.” Washington Post - The Switch, December 5. http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/05/microsoft-u-s-government-is-a-potential-security-threat/
- Gallagher, S. 2014. “Photos of an NSA ‘Upgrade’ Factory Show Cisco Router Getting Implant.” Ars Technica, May 14. http://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/
- Gellman, B., A. Soltani, and A. Peterson. 2013. “How We Know the NSA Had Access to Internal Google and Yahoo Cloud Data.” Washington Post, November 4. http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/how-we-know-the-nsa-had-access-to-internal-google-and-yahoo-cloud-data/
- Gillis, M. 2013. “Hacker Gets House Arrest for Crippling Quebec Government Website.” Ottawa Sun, June 12. http://www.ottawasun.com/2013/06/12/hacker-gets-house-arrest-for-crippling-quebec-government-website
- Government of Canada. 2012. “Get Cyber Safe: Glossary.” September 27. http://www.getcybersafe.gc.ca/cnt/rsrcs/glssr-eng.aspx
- Hansen, L., and H. Nissenbaum. 2009. “Digital Disaster, Cyber Security, and the Copenhagen School.” International Studies Quarterly 53 (4): 1155–1175. doi:10.1111/isqu.2009.53.issue-4.
- Huysmans, J. 2006. The Politics of Insecurity: Fear, Migration and Asylum in the EU. Milton Park: Routledge.
- Jadan, K., S. Lefebvre, and C. Docherty. 2012. “Advanced Persistent Threats: GC’s Worst Nightmare.” Presented at the GTEC 2012, Ottawa, November 7. http://www.gtec.ca/conference/conference-overview.php?session_id=36
- MacAskill, E., J. Borger, N. Hopkins, N. Davies, and J. Ball. 2013. “Mastering the Internet: How GCHQ Set out to Spy on the World Wide Web.” The Guardian, June 21, sec. UK news. http://www.guardian.co.uk/uk/2013/jun/21/gchq-mastering-the-internet
- Mandiant. 2013. APT1: Exposing One of China’s Cyber Espionage Units. Accessed July 27, 2015. http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf
- Naraine, R. 2012. “Nortel Hacking Attack Went Unnoticed for Almost 10 Years.” ZDNet, February 14. http://www.zdnet.com/blog/security/nortel-hacking-attack-went-unnoticed-for-almost-10-years/10304
- New York Times. 2013. “Secret Documents Reveal N.S.A. Campaign Against Encryption.” September 5. http://www.nytimes.com/interactive/2013/09/05/us/documents-reveal-nsa-campaign-against-encryption.html
- Office of the Auditor General of Canada. 2012. Report of the Auditor General of Canada to the House of Commons. Ottawa: Office of the Auditor General of Canada. Accessed July 27, 2015. http://www.oag-bvg.gc.ca/internet/English/parl_oag_201210_03_e_37347.html
- Perlroth, N. 2014. “Government Announces Steps to Restore Confidence on Encryption Standards.” Bits, September 10. http://bits.blogs.nytimes.com/2013/09/10/government-announces-steps-to-restore-confidence-on-encryption-standards/
- Press, J. 2013. “Online Activism won’t be Legalized, Emails Show; Tories Ignore Recommendations.” The Gazette, January 15.
- Public Safety Canada. 2011a. “AL11-003: Exfiltration of Some EMC RSA SecurID Two-Factor Authentication Products Related Information.” June 16. http://www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/2011/al11-003-eng.aspx
- Public Safety Canada. 2011b. “Canada’s Cyber Security Strategy.” October 22. http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/index-eng.aspx
- Public Safety Canada. 2011c. “TR11-002: Mitigation Guidelines for Advanced Persistent Threats.” December 2. http://www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/2011/tr11-002-eng.aspx
- Public Safety Canada. 2012a. Records from November 1, 2011 to February 10, 2012 Regarding the Hacker Group Anonymous. Access to Information Act Request A-2011-00318.
- Public Safety Canada. 2012b. Briefing Material Prepared for the Minister Regarding Cyber Security from January 1, 2012 to September 30, 2012. Access to Information Act Request A-2012-00263.
- Public Safety Canada. 2012c. 2011 Incident Reports and Ministerial Briefings Concerning Cyber Attacks, as Well as the Budgets for CCIRC from 2010-2012 and Projected Costs for the Upcoming Year. Access to Information Act Request A-2011-00253.
- Public Safety Canada. 2013a. “Action Plan 2010-2015 for Canada’s Cyber Security Strategy.” April 18. http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx
- Public Safety Canada. 2013b. Briefing Material to DM Re: IT Security, IM Security and Cyber Security from Jan. 2012. Access to Information Act Request A-2012-00471.
- Public Safety Canada. 2014a. “Public Safety Canada Quarterly Financial Report for the Quarter Ended June 30, 2013.” March 4. http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/qrtrl-fnncl-rprt-20130630/index-eng.aspx
- Public Safety Canada. 2014b. Hacker Group Anonymous - Especially on “#OPPartyCrasher”, from January 2012 to May 9, 2013. Access to Information Act Request A-2013-00070.
- Sanger, D. E., and N. Perlroth. 2014. “Internet Giants Erect Barriers to Spy Agencies.” The New York Times, June 6. http://www.nytimes.com/2014/06/07/technology/internet-giants-erect-barriers-to-spy-agencies.html
- Sauter, M. 2013. “‘LOIC Will Tear Us Apart’: The Impact of Tool Design and Media Portrayals in the Success of Activist DDOS Attacks.” American Behavioral Scientist 57 (7): 983–1007. doi:10.1177/0002764213479370.
- Shared Services Canada. 2013. Any and All Reference to Cyberhacker Group Anonymous in Reports and Emails to and from CSEC Dating from August 2011 to Present (June 20, 2013). A-2013-00020.
- Stone, B., and M. Riley. 2013. “Mandiant, the Go-To Security Firm for Cyber-Espionage Attacks.” BusinessWeek: Technology, February 7. http://www.businessweek.com/articles/2013-02-07/mandiant-the-go-to-security-firm-for-cyber-espionage-attacks
- Warner, M. 2012. “Cybersecurity: A Pre-History.” Intelligence and National Security 27 (5): 781–799. doi:10.1080/02684527.2012.708530.
- Weston, G. 2011. “Foreign Hackers Attack Canadian Government.” CBC News, February 16. http://www.cbc.ca/news/technology/story/2011/02/16/pol-weston-hacking.html