Page 62 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 62

SECTION I:  EXTREMISM, RADICALIZATION AND CYBER THREATS AS AN IMPORTANT
               SECURITY FACTORS FOR COUNTERING TERRORISM PROCESSES

        warfare, including cybercrime (McFate, 2019). If the West does not realize that the ground
        is shifting beneath them in the international system and that revisionist actors are employing
        cybercrime as a hybrid capability, then the US will continue to miss out on a whole spectrum
        of warfare within GPC.



        7  References

        1.  Al Jazeera (2019). Russian ‘Evil Corp’ hackers charged by US in $100m cyber theft. Al Jazeera.
           Retrieved from https://www.aljazeera.com/news/2019/12/russian-evil-corp-hackers-charged-100m-
           cyber-theft-191206054758063.html.
        2.  Alperovitch, D. (2009). Fighting Russian cybercrime mobsters: report from the trenches. Presented
           at Black Hat USA 2009. Retrieved from: http://www.blackhat.com/presentations/bh-usa09/ALP-
           EROVITCH/BHUSA09-Alperovitch-RussCybercrime-PAPER.pdf
        3.  Applegate, S. D. (2011). Cybermilitias and political hackers: Use of irregular forces in cyberwar-
           fare. IEEE Security & Privacy, 5, 16-22.
        4.  Blank, S. (2017). Cyber war and information war a la russe. Understanding Cyber Conflict: Four-
           teen Analogies, 1-18.
        5.  Broadhurst, R., Grabosky, P., Alazab, M., Bouhours, B., and Chon, S. (2014). Organizations and
           Cybercrime: An Analysis of the nature of groups engaged in cybercrime. International Journal of
           Cyber Criminology. 8. 1-20.

        6.  Brewster, T. (2014). Trouble with Russia, trouble with the law: inside Europe’s digital crime unit.
           The Guardian. Retrieved from http://www.theguardian.com/technology/2014/apr/15/european-
           cyber-crimeunit-russia.
        7.  Carr, J. (2012). Inside cyber space: mapping the cyber underworld. 2nd ed. Sebastopol: O’Reilly.

        8.  Cimpanu, C. (2019). Cybercrime group FIN6 evolves from POS malware to ransomware. ZDNet.
           Retrieved from https://www.zdnet.com/article/cybercrime-group-fin6-evolves-from-pos-malware-
           to-ransomware/.
        9.  Connell, M. and Vogler, S. (2017). Russia’s Approach to Cyber Warfare. Center for Naval Analy-
           ses Occasional Paper. Retrieved from https://www.cna.org/cna_files/pdf/DOP-2016-U-014231-
           1Rev.pdf.
        10. Department of Justice (2018). Thirty-Six Defendants Indicted for Alleged Roles in Transnational
           Criminal Organization Responsible for More than $530 Million in Losses from Cybercrimes. Of-
           fice of Public Affairs. Retrieved from https://www.justice.gov/opa/pr/thirty-six-defendants-indict-
           ed-alleged-roles-transnational-criminal-organization-responsible.
        11. Dinniss, H. (2013). Participants in Conflict – Cyber Warriors, Patriotic Hackers and the Laws of
           War. In International Humanitarian Law and the Changing Technology of War (pp 251-278). Brill
           Nijhoff.
        12. Dobrynin, S. and Krutov, M. (2019). In Lavish Wedding Photos, Clues To An Alleged Russian Cy-
           berthief’s FSB Family Ties. Radio Free Europe Radio Liberty. Retrieved from https://www.rferl.
           org/a/in-lavish-wedding-photos-clues-to-an-alleged-russian-cyberthief-fsb-family-ties/30320440.
           html.
        13. Ferguson, S. (2019). Report: FIN6 Shifts From Payment Card Theft to Ransomware. Bank Info
           Security. Retrieved from https://www.bankinfosecurity.com/report-fin6-shifts-from-payment-card-
           theft-to-ransomware-a-12358.



       62
   57   58   59   60   61   62   63   64   65   66   67