Page 221 - Privacy in a Cyber Age Policy and Practice
P. 221
NOTES 209
us-usa-cybersecurity-congress-idUSBREA3T0QF20140430 (accessed June 29,
2014).
27. Alex Wilhelm, “Sen. Rockefeller Blasts Granting Firms Liability Protection for
Following Voluntary Cybersecurity Standards,” The Next Web, http://thenex-
tweb.com/us/2013/06/05/sen-rockefeller-blasts-granting-firms-liability-pro-
tection-for-following-voluntary-cybersecurity-standards/ (accessed June 29,
2014).
28. Amitai Etzioni, “The Bankruptcy of Liberalism and Conservatism,” Politi-
cal Science Quarterly 128, 1 (Spring 2013): 39–65. Internal quotation marks
omitted.
29. Ken Dilanian, “U.S. Chamber of Commerce Leads Defeat of Cyber-security
Bill,” Los Angeles Times, http://articles.latimes.com/2012/aug/03/nation/la-na-
cyber-security-20120803 (accessed June 29, 2014).
30. Grant Gross, “Feds Explore Cybersecurity Incentives for Private Sector,”
Computer World, http://www.computerworld.com/s/article/9241407/Feds_
explore_cybersecurity_incentives_for_the_private_sector (accessed June 29,
2014).
31. Alexander Botting, “Cybersecurity in the Private Sector.”
32. Trisha Leon, “U.S. Launches Initiative for Procurement Cybersecurity,” Business
Solutions. http://www.bsminfo.com/doc/u-s-launches-initiative-for-
procurement-cybersecurity-0001 (accessed June 29, 2014).
33. Alexander Botting, “Cybersecurity in the Private Sector.”
34. Danielle Ivory, “Federal Contracts Plunge, Squeezing Private Companies,” New
York Times, http://www.nytimes.com/2014/01/16/business/federal-contracts-
plunge-squeezing-private-companies.html (accessed June 29, 2014).
35. Robert O’Harrow, Jr., Dana Priest, and Marjorie Censer, “NSA Leaks Put Focus
on Intelligence Apparatus’s Reliance on Outside Contractors,” Washington
Post, http://www.washingtonpost.com/business/nsa-leaks-put-focus-on-intel-
ligence-apparatuss-reliance-on-outside-contractors/2013/06/10/e940c4ba-
d20e-11e2-9f1a-1a7cdee20287_story.html (accessed June 29, 2014).
36. The Associated Press, “Case Against Contractors Resurfaces,” http://www.
nytimes.com/2013/10/18/us/case-against-contractors-resurfaces.html?_r=0
(accessed June 29, 2014).
37. Jeremy Scahill, “Blackwater’s Secret Ops,” The Nation, http://www.thenation.
com/article/154739/blackwaters-black-ops# (accessed June 29, 2014).
38. Michael S. Schmidt and David E. Sanger, “5 in China Army Face U.S. Charges
of Cyberattacks,” New York Times, http://www.nytimes.com/2014/05/20/us/
us-to-charge-chinese-workers-with-cyberspying.html (accessed June 29,
2014).
39. Bill Gertz, “Indictment of China Military Hackers Reveals New Details of
Cyber Attack Methods,” The Washington Free Beacon, http://freebeacon.com/
national-security/obama-administration-indictment-of-army-hackers-seeks-
to-deter-cyber-attacks/ (accessed June 29, 2014).
40. Eloise Lee and Robert Johnson, “The 25 Biggest Defense Companies in Amer-
ica,” Business Insider, http://www.businessinsider.com/top-25-us-defense-
companies-2012-2?op=1 (accessed June 29, 2014).