Page 62 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 62
SECTION I: EXTREMISM, RADICALIZATION AND CYBER THREATS AS AN IMPORTANT
SECURITY FACTORS FOR COUNTERING TERRORISM PROCESSES
warfare, including cybercrime (McFate, 2019). If the West does not realize that the ground
is shifting beneath them in the international system and that revisionist actors are employing
cybercrime as a hybrid capability, then the US will continue to miss out on a whole spectrum
of warfare within GPC.
7 References
1. Al Jazeera (2019). Russian ‘Evil Corp’ hackers charged by US in $100m cyber theft. Al Jazeera.
Retrieved from https://www.aljazeera.com/news/2019/12/russian-evil-corp-hackers-charged-100m-
cyber-theft-191206054758063.html.
2. Alperovitch, D. (2009). Fighting Russian cybercrime mobsters: report from the trenches. Presented
at Black Hat USA 2009. Retrieved from: http://www.blackhat.com/presentations/bh-usa09/ALP-
EROVITCH/BHUSA09-Alperovitch-RussCybercrime-PAPER.pdf
3. Applegate, S. D. (2011). Cybermilitias and political hackers: Use of irregular forces in cyberwar-
fare. IEEE Security & Privacy, 5, 16-22.
4. Blank, S. (2017). Cyber war and information war a la russe. Understanding Cyber Conflict: Four-
teen Analogies, 1-18.
5. Broadhurst, R., Grabosky, P., Alazab, M., Bouhours, B., and Chon, S. (2014). Organizations and
Cybercrime: An Analysis of the nature of groups engaged in cybercrime. International Journal of
Cyber Criminology. 8. 1-20.
6. Brewster, T. (2014). Trouble with Russia, trouble with the law: inside Europe’s digital crime unit.
The Guardian. Retrieved from http://www.theguardian.com/technology/2014/apr/15/european-
cyber-crimeunit-russia.
7. Carr, J. (2012). Inside cyber space: mapping the cyber underworld. 2nd ed. Sebastopol: O’Reilly.
8. Cimpanu, C. (2019). Cybercrime group FIN6 evolves from POS malware to ransomware. ZDNet.
Retrieved from https://www.zdnet.com/article/cybercrime-group-fin6-evolves-from-pos-malware-
to-ransomware/.
9. Connell, M. and Vogler, S. (2017). Russia’s Approach to Cyber Warfare. Center for Naval Analy-
ses Occasional Paper. Retrieved from https://www.cna.org/cna_files/pdf/DOP-2016-U-014231-
1Rev.pdf.
10. Department of Justice (2018). Thirty-Six Defendants Indicted for Alleged Roles in Transnational
Criminal Organization Responsible for More than $530 Million in Losses from Cybercrimes. Of-
fice of Public Affairs. Retrieved from https://www.justice.gov/opa/pr/thirty-six-defendants-indict-
ed-alleged-roles-transnational-criminal-organization-responsible.
11. Dinniss, H. (2013). Participants in Conflict – Cyber Warriors, Patriotic Hackers and the Laws of
War. In International Humanitarian Law and the Changing Technology of War (pp 251-278). Brill
Nijhoff.
12. Dobrynin, S. and Krutov, M. (2019). In Lavish Wedding Photos, Clues To An Alleged Russian Cy-
berthief’s FSB Family Ties. Radio Free Europe Radio Liberty. Retrieved from https://www.rferl.
org/a/in-lavish-wedding-photos-clues-to-an-alleged-russian-cyberthief-fsb-family-ties/30320440.
html.
13. Ferguson, S. (2019). Report: FIN6 Shifts From Payment Card Theft to Ransomware. Bank Info
Security. Retrieved from https://www.bankinfosecurity.com/report-fin6-shifts-from-payment-card-
theft-to-ransomware-a-12358.
62