Page 221 - Privacy in a Cyber Age Policy and Practice
P. 221

NOTES  209

              us-usa-cybersecurity-congress-idUSBREA3T0QF20140430 (accessed June 29,
              2014).
           27.  Alex Wilhelm, “Sen. Rockefeller Blasts Granting Firms Liability Protection for
              Following Voluntary Cybersecurity Standards,” The Next Web, http://thenex-
              tweb.com/us/2013/06/05/sen-rockefeller-blasts-granting-firms-liability-pro-
              tection-for-following-voluntary-cybersecurity-standards/ (accessed June 29,
              2014).
           28.  Amitai Etzioni, “The Bankruptcy of Liberalism and Conservatism,”  Politi-
              cal Science Quarterly 128, 1 (Spring 2013): 39–65. Internal quotation marks
              omitted.
           29.  Ken Dilanian, “U.S. Chamber of Commerce Leads Defeat of Cyber-security
              Bill,” Los Angeles Times, http://articles.latimes.com/2012/aug/03/nation/la-na-
              cyber-security-20120803 (accessed June 29, 2014).
           30.  Grant Gross, “Feds Explore Cybersecurity Incentives for Private Sector,”
              Computer World,  http://www.computerworld.com/s/article/9241407/Feds_
              explore_cybersecurity_incentives_for_the_private_sector (accessed June 29,
              2014).
           31.  Alexander Botting, “Cybersecurity in the Private Sector.”
           32.  Trisha Leon, “U.S. Launches Initiative for Procurement Cybersecurity,” Business
              Solutions. http://www.bsminfo.com/doc/u-s-launches-initiative-for-
              procurement-cybersecurity-0001 (accessed June 29, 2014).
           33.  Alexander Botting, “Cybersecurity in the Private Sector.”
           34.  Danielle Ivory, “Federal Contracts Plunge, Squeezing Private Companies,” New
              York Times,  http://www.nytimes.com/2014/01/16/business/federal-contracts-
              plunge-squeezing-private-companies.html (accessed June 29, 2014).
           35.  Robert O’Harrow, Jr., Dana Priest, and Marjorie Censer, “NSA Leaks Put Focus
              on Intelligence Apparatus’s Reliance on Outside Contractors,”  Washington
              Post, http://www.washingtonpost.com/business/nsa-leaks-put-focus-on-intel-
              ligence-apparatuss-reliance-on-outside-contractors/2013/06/10/e940c4ba-
              d20e-11e2-9f1a-1a7cdee20287_story.html (accessed June 29, 2014).
           36.  The Associated Press, “Case Against Contractors Resurfaces,” http://www.
              nytimes.com/2013/10/18/us/case-against-contractors-resurfaces.html?_r=0
              (accessed June 29, 2014).
           37.  Jeremy Scahill, “Blackwater’s Secret Ops,” The Nation, http://www.thenation.
              com/article/154739/blackwaters-black-ops# (accessed June 29, 2014).
           38.  Michael S. Schmidt and David E. Sanger, “5 in China Army Face U.S. Charges
              of Cyberattacks,”  New York Times,  http://www.nytimes.com/2014/05/20/us/
              us-to-charge-chinese-workers-with-cyberspying.html (accessed June 29,
              2014).
           39.  Bill Gertz, “Indictment of China Military Hackers Reveals New Details of
              Cyber Attack Methods,” The Washington Free Beacon, http://freebeacon.com/
              national-security/obama-administration-indictment-of-army-hackers-seeks-
              to-deter-cyber-attacks/ (accessed June 29, 2014).
           40.  Eloise Lee and Robert Johnson, “The 25 Biggest Defense Companies in Amer-
              ica,”  Business Insider,  http://www.businessinsider.com/top-25-us-defense-
              companies-2012-2?op=1 (accessed June 29, 2014).
   216   217   218   219   220   221   222   223   224   225   226