Cyberespionage

Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
Particularly recommended items are flagged with a red logo:

Connexions Library

China's Cyber-War: Don't Believe the Hype: Net Threat Inflation
Lee, Peter
Article
2013
Addressing cyber-theft, U.S hypocrisy, and China.
China's Cyberspying Is 'on a Scale No One Imagined' -- if You Pretend NSA Doesn't Exist
Jackson, Janine
Article
2015
Stories about cyberespionage -- like the data theft at the US Office of Personal Management believed but not officially stated to have been carried out by China -- are weird. For one thing, they inclu...
Documents Reveal Canada's Secret Hacking Tactics
Gallagher, Ryan
Article
2015
Canada's electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries' infrastructure, according to newly revealed classified do...
Hacktivist Jeremy Hammond Sentenced to 10 Years: His Idealism Remains at Large
Hayase, Nozomi
Article
2013
28-year-old political activist Jeremy Hammond was sentenced to 10 years in prison and three years of supervised release at the Federal District Court for the Southern District of New York. This was th...
Jeremy Hammond's Court Statement Upon Being Sentenced To 10 Years In Jail
Hammond, Jeremy
Article
2013
Jeremy Hammond was sentenced to ten years in prison for hacking Stratfor communications, then releasing information to Wikileaks. This is his statement.
Researchers Find 'Astonishing' Malware Linked to NSA Spying
Gallagher, Peter
Article
2015
Security researchers have uncovered highly sophisticated malware that is linked to a secret National Security Agency hacking operation.