其他1. | 習近平(20131115)。關於中共中央關於全面深化改革若干重大問題的決定的說明,http://news.xinhuanet.com/politics/2013-11/15/c_118164294.htm。 延伸查詢 |
2. | (20120308)。報告:中國網絡戰爭能力危及美國軍隊,http://www.bbc.com/zhongwen/trad/science/2012/03/120308_us_china_cyberwar.shtml。 延伸查詢 |
3. | (20121008)。美國認定華為中興威脅其國家安全,http://www.bbc.com/zhongwen/trad/chinese_news/2012/10/121008_us_china_huaweizte。 延伸查詢 |
4. | (20130608)。談網路攻擊習近平:中國也是受害者,http://www.ettoday.net/news/20130608/219833.htm。 延伸查詢 |
5. | 楊婷(20140227)。習近平:把我國從網絡大國建設成為網絡強國,http://news.xinhuanet.com/politics/2014-02/27/c_119538788.htm。 延伸查詢 |
6. | (20140520)。國家互聯網信息辦公室公布美國攻擊中國網絡最新數據,http://news.xinhuanet.com/politics/2014-05/20/c_126520505.htm。 延伸查詢 |
7. | (20140522)。中央國家機關政府採購電腦對Win8 說''不'',http://zqb.cyol.com/html/2014-05/22/nw.D110000zgqnb_20140522_1-12.htm。 延伸查詢 |
8. | (20140522)。國家網信辦:我國將出臺網路安全審查制度,http://www.cac.gov.cn/2014-05/22/c_126534290.htm。 延伸查詢 |
9. | (20140711)。柯瑞:中國駭客製造寒蟬效應,http://www.worldjournal.com/266365/article-%E6%9F%AF%E7%91%9E%EF%BC%9A%E4%B8%AD%E5%9C%8B%E9%A7%AD%E5%AE%A2-%E8%A3%BD%E9%80%A0%E5%AF%92%E8%9F%AC%E6%95%88%E6%87%89/?npg=2。 |
10. | (20140717)。習近平巴西談互聯網治理,http://politics.people.com.cn/BIG5/n/2014/0717/c1024-25296103.html。 |
11. | (20150706)。網路安全法(草案),http://www.npc.gov.cn/npc/xinwen/lfgz/flca/2015-07/06/content_1940614.htm。 |
12. | (20150710)。中華人民共和國國家安全法,http://npc.people.com.cn/BIG5/n/2015/0710/c14576-27285049.html。 延伸查詢 |
13. | (20151216)。習近平在第二屆世界互聯網大會開幕式上的講話(全文),http://cpc.people.com.cn/BIG5/n1/2015/1216/c64094-27937316.html。 延伸查詢 |
14. | (20160407)。美建逾百支網軍主攻中俄,http://news.takungpao.com.hk/world/exclusive/2016-04/3302887.html。 延伸查詢 |
15. | 中央社(20130516)。美媒點名陸4高校涉及駭客行為,http://www.chinatimes.com/realtimenews/20130516005087-260409。 延伸查詢 |
16. | 中央社(20130705)。中美網路小組將舉行首次會議,http://www.chinatimes.com/realtimenews/20130705004146-260409。 延伸查詢 |
17. | 中國互聯網絡資訊中心(20150722)。第36次中國互聯網絡發展狀況統計報告,https://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/201507/t20150722_52624.htm。 延伸查詢 |
18. | 中華人民共和國外交部(20140520)。中方強力反擊美方「起訴」中方人員,http://www.fmprc.gov.cn/web/fyrbt_673021/dhdw_673027/t1157508.shtml。 延伸查詢 |
19. | 支林飛(20130710)。張業遂和伯恩斯共同主持第三次中美戰略安全對話,http://www.gov.cn/jrzg/2013-07/10/content_2443808.htm。 延伸查詢 |
20. | 江蔚(20140227)。中央網絡安全和信息化領導小組成立:從網絡大國邁向網絡強國,http://news.xinhuanet.com/2014-02/27/c_119538719.htm。 延伸查詢 |
21. | 沈丁立(20130617)。美國賊喊捉賊貽害世界,http://opinion.huanqiu.com/opinion_world/2013-06/4031340.html。 延伸查詢 |
22. | 武竹(20140526)。美國思科路由器預置''後門''意欲何為,http://article.cyol.com/news/content/2014-05/26/content_10138288.htm。 延伸查詢 |
23. | 柳芳(20150926)。美中首腦達共識不從事網絡商業間諜活動,http://www.epochtimes.com/b5/15/9/26/n4536290.htm。 延伸查詢 |
24. | 秦安(20130604)。對美國''八大金剛''不能不設防,http://opinion.huanqiu.com/opinion_world/2013-06/3997929.html。 延伸查詢 |
25. | 程靜(20150212)。美中9月峰會網絡安全或成焦點,http://www.epochtimes.com/b5/15/2/12/n4364927.htm。 延伸查詢 |
26. | 賈秀東(20130709)。網絡安全不容「霸王條款」,http://paper.people.com.cn/rmrbhwb/html/2013-07/09/content_1265989.htm。 延伸查詢 |
27. | 管淑平(20110826)。解放軍「駭」美/央視播出「證據」中國賴不掉,http://news.ltn.com.tw/news/world/paper/519296。 延伸查詢 |
28. | 劉屏,朱建陵(20140520)。涉竊150家公司機密美政府告解放軍5軍官,http://www.chinatimes.com/newspapers/20140520000344-260102。 延伸查詢 |
29. | 檀有志(20150804)。中國網絡安全法草案的外揚與內抑,http://www.ftchinese.com/story/001063323?full=y。 延伸查詢 |
30. | (20130313)。Transcript: President Obama's Exclusive Interview With George Stephanopoulos,http://abcnews.go.com/blogs/politics/2013/03/transcript-president-obamas-interview-with-georgestephanopoulos/。 |
31. | Clapper, James R.(20110310)。Statement for the Record on the Worldwide Threat Assessment of the U.S. Intelligence Community for the Senate Committee on Armed Services,https://www.dni.gov/files/documents/Newsroom/Testimonies/20110310_testimony_clapper.pdf。 |
32. | Abdollah, Tami(20151110)。US official: Charges possible if Chinese hackers keep it up,http://www.businessinsider.com/ap-us-official-charges-possible-if-chinese-hackers-keep-it-up-2015-11。 |
33. | Barboza, David(20130310)。In Wake of Cyberattacks, China Seeks New Rules,http://www.nytimes.com/2013/03/11/world/asia/china-calls-for-global-hacking-rules.html?_r=0。 |
34. | Barboza, David(20140227)。China's President Will Lead a New Effort on Cybersecurity,http://www.nytimes.com/2014/02/28/world/asia/china-announces-new-cybersecurity-push.html。 |
35. | Clapper, James R.(20130312)。Statement for the Record, Worldwide Threat Assessment of the U.S. Intelligence Community,http://www.dni.gov/files/documents/Intelligence%20Reports/2013%20ATA%20SFR%20for%20SSCI%2012%20Mar%202013.pdf。 |
36. | Cook, James(20141006)。FBI Director: China Has Hacked Every Big US Company,http://www.businessinsider.com/fbi-director-china-has-hacked-every-big-us-company-2014-10。 |
37. | Crawford, Jamie(20141121)。The U.S. government thinks China could take down the power grid,http://edition.cnn.com/2014/11/20/politics/nsa-china-power-grid/。 |
38. | Creemers, Rogier(20150410)。Disarming the Great Cannon,https://foreignpolicy.com/2015/04/10/great-cannon-china-internet-cyber-attack-baidu。 |
39. | Daniel, J. Michael,Holleyman, Robert,Niejelow, Alex(20150204)。China's Undermining an Open Internet,http://www.politico.com/magazine/story/2015/02/china-cybersecurity-114875。 |
40. | Gates, Robert M.(20090623)。Memorandum to Secretaries of the Military Departments, Subject: Establishment of a Subordinate Unified U.S. Cyber Command Under U.S. Strategic Command for Military Cyberspace Operations,http://nsarchive.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-029.pdf。 |
41. | Deal, Jacqueline Newmyer(20150713)。How the U.S. Should Respond to the Latest Chinese Hack,http://www.nationalreview.com/article/421105/how-us-should-respond-latest-chinesehack-jacqueline-newmyer-deal。 |
42. | Dewey, Caitlin(20130528)。The U.S. weapons systems that experts say were hacked by the Chinese,https://www.washingtonpost.com/blogs/worldviews/wp/2013/05/28/the-u-s-weapons-systems-that-experts-say-were-hacked-by-the-chinese。 |
43. | Gellman, Barton,Poitras, Laura(20130607)。U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program,https://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html, 。 |
44. | Gertz, Bill(20130730)。China's Military Preparing for 'People's War' in Cyberspace, Space,http://freebeacon.com/national-security/china-military-preparing-for-peoples-war-in-cyberspace-space/。 |
45. | Groll, Elias(20150902)。The U.S. Hoped Indicting 5 Chinese Hackers Would Deter Beijing's Cyberwarriors. It Hasn't Worked,http://foreignpolicy.com/2015/09/02/the-u-s-hoped-indicting-5-chinese-hackers-would-deter-beijings-cyberwarriors-it-hasntworked。 |
46. | Fergus, Hanson(20140521)。Moving Past Snowden,http://www.brookings.edu/blogs/up-front/posts/2014/05/21-theft-us-intellectual-property-snowden-hanson。 |
47. | Zachary, Keck(20140910)。China's Military Creates New Space Force,http://thediplomat.com/2014/09/chinas-military-createsnew-space-force/。 |
48. | Robert, Kehler, C.(20090819)。Twenty-Fourth Air Force Activation,http://www.24af.af.mil/news/story.asp? id=123163965。 |
49. | Krekel, Bryan,Adams, Patton,Bakos, George(20120307)。Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage,http://origin.www.uscc.gov/sites/default/files/Research/USCC_Report_Chinese_Capabilities_for_Computer_Network_Operations_and_Cyber_%20Espionage.pdf。 |
50. | Landler, Mark,Sanger, David E.(20130311)。U.S. Demands China Block Cyberattacks and Agree to Rules,http://www.nytimes.com/2013/03/12/world/asia/us-demands-that-china-endhacking-and-set-cyber-rules.html?rref=collection%2Ftimestopic%2FDonilon%2C%20Thomas%20E.&action=click&contentCollection=timestopics®ion=stream&module=stream_unit&version=latest&contentPlacement=10&pgtype=collection&_r=0。 |
51. | Logan, Sarah(20150504)。Beijing's Great Cannon exposes vulnerable Chinese tech firms,http://www.lowyinterpreter.org/post/2015/05/04/Beijings-Great-Cannon-exposes-vulnerable-Chinese-tech-firms.aspx。 |
52. | Michael, Maloof, F.(20120701)。China: Pervasive access' to 80% of telecoms,http://www.wnd.com/2012/07/chinese-have-pervasiveaccess-to-80-of-worlds-telecoms/。 |
53. | Mandiant(2013)。APT1: Exposing One of China's Cyber Espionage Unit,http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf, 20130220。 |
54. | Michael, Martina(20130329)。Quarter of U.S. firms in China face data theft: business lobby,http://www.reuters.com/article/uschina-us-hacking-idUSBRE92S02P20130329。 |
55. | Mazzetti, Mark,Sanger, David E.(20130312)。Security Leader Says U.S. Would Retaliate Against Cyberattacks,http://www.nytimes.com/2013/03/13/us/intelligence-official-warns-congress-that-cyberattacks-pose-threat-to-us.html。 |
56. | Mazzetti, Mark,Sanger, David E.(20150724)。U.S. Fears Data Stolen by Chinese Hacker Could Identify Spies,http://www.nytimes.com/2015/07/25/world/asia/us-fears-data-stolen-by-chinese-hacker-could-identify-spies.html。 |
57. | McLeary, Paul,Francis, David(20150409)。Pentagon Says It Is Moving to Protect Its Cyber Flanks,https://foreignpolicy.com/2015/04/09/pentagon-says-it-is-moving-to-protect-its-cyber-flanks/。 |
58. | Mozur, Paul(20150205)。Trade Groups Urge U.S. to Push Against Chinese Regulations,http://bits.blogs.nytimes.com/2015/02/05/trade-groups-urge-u-s-to-push-against-chinese-regulations/?_r=0。 |
59. | Mozur, Paul,Goel, Vindu(20141005)。To Reach China, LinkedIn Plays by Local Rules,http://www.nytimes.com/2014/10/06/technology/to-reach-china-linkedin-plays-by-local-rules.html?_r=0。 |
60. | Nye, Joseph S., Jr.(20120410)。Cyber War and Peace,http://globalpublicsquare.blogs.cnn.com/2012/04/10/nye-cyber-war-andpeace/。 |
61. | Office of Public Affairs,U.S. Department of Justice(20140519)。U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage,http://www.justice.gov/opa/pr/uscharges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor。 |
62. | Office of the Secretary of Defense(20130506)。Annual Report to Congress: Military and Security Developments Involving the People's Republic of China 2013,http://archive.defense.gov/pubs/2013_China_Report_FINAL.pdf。 |
63. | Open Source Center(20111005)。Huawei Annual Report Details Directors, Supervisory Board for First Time,http://fas.org/irp/dni/osc/huawei.pdf。 |
64. | Pennington, Matthew(20150203)。Intel chief warns US tech threatened by China cybertheft,http://bigstory.ap.org/article/9d713a5fd6ab45d6b962bd380023e1d6/intel-chief-warns-us-tech-threatened-china-cybertheft。 |
65. | Perlroth, Nicole(20130314)。Cyberattacks a Topic in Obama Call With New Chinese President,http://bits.blogs.nytimes.com/2013/03/14/cyberattacks-prominent-in-obama-call-with-new-chinese-president/?_r=0。 |
66. | Perlroth, Nicole(20140609)。2nd China Army Unit Implicated in Online Spying,http://www.nytimes.com/2014/06/10/technology/private-report-further-details-chinese-cyberattacks.html?_r=0。 |
67. | Sanger, David E.(20140406)。U.S. Tries Candor to Assure China on Cyberattacks,http://www.nytimes.com/2014/04/07/world/us-tries-candor-to-assure-china-on-cyberattacks.html?_r=0。 |
68. | Sanger, David E.(20150731)。U.S. Decides to Retaliate Against China's Hacking,http://www.nytimes.com/2015/08/01/world/asia/us-decides-to-retaliate-against-chinas-hacking.html。 |
69. | Sanger, David E.(20150919)。U.S. and China Seek Arms Deal for Cyberspace,http://www.nytimes.com/2015/09/20/world/asia/us-and-china-seek-arms-deal-for-cyberspace.html。 |
70. | Sanger, David E.(20150923)。Hackers Took Fingerprints of 5.6 Million U.S. Workers, Government Says,http://www.nytimes.com/2015/09/24/world/asia/hackers-took-fingerprints-of-5-6-million-us-workers-government-says.html。 |
71. | Sanger, David E.(20160424)。U.S. Cyberattacks Target ISIS in a New Line of Combat,http://www.nytimes.com/2016/04/25/us/politics/us-directs-cyberweapons-at-isis-for-firsttime.html?_r=0。 |
72. | Sanger, David E.,Davis, Julie Hirschfeld(20150604)。Hacking Linked to China Exposes Millions of U.S. Workers,http://www.nytimes.com/2015/06/05/us/breach-in-a-federal-computer-system-exposes-personnel-data.html?_r=0。 |
73. | Sanger, David E.,Davis, Julie Hirschfeld(20150610)。Hackers May Have Obtained Names of Chinese With Ties to U.S. Government,http://www.nytimes.com/2015/06/11/world/asia/hackers-may-have-obtained-names-of-chinese-with-ties-to-us-government.html。 |
74. | Sanger, David E.,Landler, Mark(20130601)。U.S. and China Agree to Hold Regular Talks on Hacking,http://www.nytimes.com/2013/06/02/world/asia/us-and-china-to-hold-talks-onhacking.html。 |
75. | Sanger, David E.,Shanker, Thom(20130203)。Broad Powers Seen for Obama in Cyberstrikes,http://www.nytimes.com/2013/02/04/us/broad-powers-seen-for-obama-in-cyberstrikes.html。 |
76. | Sanger, David E.,Barboza, David,Perlroth, Nicole(20130218)。Chinese Army Unit Is Seen as Tied to Hacking Against U.S.,http://www.nytimes.com/2013/02/19/technology/chinas-armyis-seen-as-tied-to-hacking-against-us.html?_r=0。 |
77. | Sanger, David E.,Perlroth, Nicole,Shear, Michael D.(20150620)。Attack Gave Chinese Hackers Privileged Access to U.S. Systems,http://www.nytimes.com/2015/06/21/us/attack-gave-chin-ese-hackers-privileged-access-to-us-systems.html?_r=0。 |
78. | Schmidt, Michael S.,Sanger, David E.,Perlroth, Nicole(20140709)。Chinese Hackers Pursue Key Data on U.S. Workers,http://www.nytimes.com/2014/07/10/world/asia/chinese-hackers-pursue-key-data-on-us-workers.html?_r=0, 。 |
79. | Segal, Adam(20140519)。Department of Justice Indicts Chinese Hackers: What Next?,http://blogs.cfr.org/asia/2014/05/19/department-of-justice-indicts-chinese-hackers-what-next/。 |
80. | Segal, Adam(20150803)。Revealed: Why China and America are Set to Clash in Cyberspace,http://www.nationalinterest.org/blog/the-buzz/revealed-why-china-america-are-set-clash-cyberspace-13479。 |
81. | Stokes, Mark A.,Lin, Jenny,Hsiao, L. C. Russell(20111111)。The Chinese People's Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure,http://project2049.net/documents/pla_third_department_sigint_cyber_stokes_lin_hsiao.pdf。 |
82. | United States Army Cyber Command and Second Army(20150415)。Establishment of U.S. Army Cyber Command,http://www.arcyber.army.mil/Organization/ARCYBERHistory。 |
83. | U.S. China Economic,Security Review Commission(20151117)。2015 Report to Congress of the U.S. China Economic and Security Review Commission,http://origin.www.uscc.gov/sites/default/files/annual_reports/2015%20Annual%20Report%20to%20Congress.PDF。 |
84. | United States Department of Defense(20140304)。Quadrennial Defense Review 2014,http://archive.defense.gov/pubs/2014_Quadrennial_Defense_Review.pdf。 |
85. | United States Department of Defense(20150415)。The Department of Defense Cyber Strategy,http://www.defense.gov/News/Special-Reports/0415_Cyber-Strategy。 |
86. | United States Intelligence Community(20160209)。Worldwide Threat Assessment of the US Intelligence Community,http://www.armed-services.senate.gov/imo/media/doc/Clapper_02-09-16.pdf。 |
87. | United States Navy(20100129)。Navy Stands Up Fleet Cyber Command, Reestablishes U.S. 10th Fleet,http://www.navy.mil/submit/display.asp?story_id=50954。 |
88. | United States Office of Personnel Management(20150604)。OPM to Notify Employees of Cybersecurity Incident,https://www.opm.gov/news/releases/2015/06/opm-to-notify-employees-of-cybersecurity-incident/。 |
89. | The White House(20120214)。Remarks by Vice President Biden and Chinese Vice President Xi at the State Department Luncheon,https://www.whitehouse.gov/the-press-office/2012/02/14/remarks-vice-president-biden-and-chinese-vice-president-xi-state-departm。 |
90. | The White House(20150206)。National Security Strategy,https://obamawhitehouse.archives.gov/sites/default/files/docs/2015_national_security_strategy_2.pdf。 |
91. | The White House(20150401)。Executive Order 13694 of April 1, 2015: Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities,https://www.gpo.gov/fdsys/pkg/FR-2015-04-02/pdf/2015-07788.pdf。 |
92. | The White House Office of the Press Secretary(20150925)。Remarks by President Obama and President Xi of the People's Republic of China in Joint Press Conference,https://www.whitehouse.gov/the-press-office/2015/09/25/remarks-president-obama-and-president-xi-peoples-republic-china-joint。 |
93. | Stokes, Mark A.(20150727)。The PLA General Staff Department Third Department Second Bureau: An Organizational Overview of Unit 61398,Arlington:2049 Project Institute。,http://www.project2049.net/documents/Stokes_PLA_General_Staff_Department_Unit_61398.pdf。 |