Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Log and Evaluation of Resources

RESOURCE LOG
A RECORD OF ALL THE SOURCES I HAVE USED IN MY PROJECT AND AN EVALUATION OF EACH OF THEM .
Type

Bibliography reference

Web article

AHMED, A., 2014

Reliability

Web article

AI, W., 2012

Web article

ASSOCIATION OF OLD
CROWS, n.d.

Online video

Online news
article

AUSTRALIAN
BROADCASTING
CORPORATION. 2011
BALL, J., 2013

Very recent so up to date in terms of up-to-date


information.
Highly reputable Indian think-tank which
incorporates lots of experts on cyberwarfare and
related issues.

Column by a very prominent pro-democracy Chinese


activist. Strong bias in favour of free speech and
therefore critical of the Chinese government.
The Guardian has distinct views but is a reputable
source of factual information, so this source is likely
to be factually accurate.
AOC is an organisation dedicated to research on
electronic warfare.
It has been active for over 50 years and includes
over 13,000 professional members, including
academics, industry and military personnel.
It is likely to be a reliable source on this topic.
Considered that its purpose is to advocate the need
for strong EW capabilities.
Large, internationally known, institution, so has
good research methods.
Produced a year after the attacks so is likely to be
factually reliable.
Guardian is traditionally politically left-of-centre
(may be relevant in this case).
Scoop story for Guardian using information from
source, Edward Snowden.
Story is based around this single source of
information, so may give wide overview.
Guardian is known as a quality newspaper, so

Usefulness

Cyber-security.
Cybercrime.
Cyber-espionage.
Cyber-terrorism.
Issues for governments.
Another front on the battlefield?
Very useful.
Insightful view on censorship in China.
Useful because this is one viewpoint which can be discussed.

Lots of well-written information on the history and


development of electronic warfare.
Lots of facts as well as logically supported opinion.

Understandable overview of Stuxnet.


Useful questions raised about potential future effects.
Information about how Stuxnet infected Natanz.
Current.
Recent article.
Specific information about NSA and GCHQs techniques and
methods.
Insider source (Edward Snowden) with insider information.

Extended Project 2014 | Maurice Yap 6946

Log and Evaluation of Resources


Web article

BAY, A., 2009

Report

BILLO, C. G. & CHANG, W.,


2004

Book

Web article
Web article,
online video

BLANE, J. V., 2001

BRITISH BROADCASTING
CORPORATION (BBC), 2010a
BRITISH BROADCASTING
CORPORATION (BBC), 2010b

Online news
article

BRITISH BROADCASTING
CORPORATION (BBC), 2010c

Online news
article

BRITISH BROADCASTING
CORPORATION (BBC), 2012

Online news
article

BRITISH BROADCASTING
CORPORATION (BBC), 2013a

Online news
article

BRITISH BROADCASTING
CORPORATION (BBC), 2013b

writing is not sensationalist.


Known conservative American writer.
Website is current affairs magazine site, where
different views are presented.
Not reliable for objective information, but useful for
opinion.
Academic report, so very thoroughly researched to
ensure accuracy.
May be influenced by personal views of the writers.
Published academic work, therefore probably has
been peer reviewed.
Older source, so information may no longer be
accurate.
Writers are academic researchers in this area so very
knowledgeable and likely to write accurately.
Book has been well-researched before being written.
Authors have wide overview, broad knowledge and
accurate information.
Out-of-date
Reputable source, strong research to verify
informations accuracy.
Strong pro-Western bias in foreign affairs, which
this is.
Very biased against DPRKs government and system.
Strong negative portrayal.
Information likely to be factually accurate.
The citizens who gave opinions on interview likely to
have been under duress by government to give a
particular angle.
One of the first reports, so hot-off-the-press.
Breaking news reporting about recent developing
event so may not yet have all the facts.
Reputable.
Generally politically neutral in domestic affairs.
The BBCs strong foreign affairs bias means that this
report is probably deliberately angled against the
Chinese government using clever journalistic
techniques and language.
My view is that there is a strong degree of prejudice
against it.
The BBC is reputable.
It is politically neutral in domestic affairs.
Its prominence means it has access to the best
journalistic sources so information is likely to be

Austin Bays take on cyberwarfare and its implications and


potential effects on America.

Lots of information about the cyberwarfare and related


activities of many governments, though has become slightly
out-of-date.
Information about past events.
Valuable academic insightful conclusions.

From 2001, not recent, technology it is about has progressed


on a lot since time of publication.
Some concepts are useful to think about.
Not greatly relevant to today.
Short biography about Alan Turing.
Useful because it is detailed but condensed.
Newsnight report showing life in North Korea.
Useful because it shows real North Korean citizens talking
about their intranet and shows their knowledge of
information. First-hand accounts.
Relatively recent, but situation probably hasnt changed
much.

Initial facts which emerged about what happened with


Stuxnet in Iran.

News report about a parliamentary committees


recommendations to MI5.
Very concise and easy to read.
Report about allegations that Chinese military personnel are
carrying out cyber-attacks.
Information about alleged hacking group and activities.

Concise information about the UK ISPs new pornography


filters.
Very relevant and recent.

Extended Project 2014 | Maurice Yap 6946

Log and Evaluation of Resources


Online news
article

Web article

BRITISH BROADCASTING
CORPORATION (BBC), 2014

BROAD, W. J., 2008

accurate.
The BBC supports the British governments stance
against QSIS

Source is just analysis of their tactics so bias is not a


factor in reliability in this case.

Factual information is this source is supported by


evidence.
Reliability of information wasn't considered as the source was
only used for an image.

Web article

BUZZLE, 2012

Web article

CENTER FOR STRATEGIC


AND INTERNATIONAL
STUDIES (CSIS), 2010

Web article

CIVIL LIBERTIES DEFENSE


CENTER, 2008

Online article

CLASSIC FM, 2012

Online news
article

CORNWELL, R., 2014

Encyclopaedia
entry

CRYSTAL, D., 2005

Online news
article

DANCHEV, D., 2008

Web article

DANKO, M., 2011

Online news

DELIO, M., 2001

Statistics probably based on a lot of secondary data


and research, so are as accurate as such statistics
will get.

Same statistics found (or very similar statistics, at


least) in various other sources so probably accurate.

Informative website, not media, no agenda or bias.

Writer is senior fellow and of CSIS, large think-tank.

Writer has lots of experience working for the US


government in intelligence and politico-military
areas.

He has spent much of his life doing research and has


a PhD from 1984.
Reliability of information wasn't considered as the source was
only used for an image.

Reliability of information wasn't considered as the source was


only used for an image.

The Independent is UK-based newspaper, so likely


to be influenced by British public opinion and
British government stance on foreign affairs issues
(in this case, would probably be biased against
China).

Reference encyclopaedia, probably deeply


researched with large team of researchers and
editors so reliable.

Website about computing technology, likely to have


lots of expertise in its team for research, discussion
and consultation.

No need to consider political bias as this is about


technical facts

Danchev is an experienced internet security analyst.


Reliability of information wasn't considered as the source was
only used for an image.

There is a note on the web page (recent) advising

QSIS use of the internet.


Lots of references to real actions like Twitter posts and online
videos.
A lot of factual information.
An image from this source was used in the report and the
presentation.
Carbon-fibre rotor tube inside Natanz, which exemplifies
those physically broken by Stuxnet.
Statistics about internet users.
Relatively recent, unlikely to have been massive changes since
2012.

Cyberwarfare threat to electrical power grid.


Aurora tests.
Differentiation between cyber espionage and cyberwar, legal
issues surrounding this.

An image from this source was used in the presentation.


Graphic made to represent lobbying in Americas
government.
An image from this source was used in the presentation.
Symphony orchestra used as visual aid.
Allegations of hacking by America against China.
Related information.
Very recent so up-to-date.

Definition of cyber-intelligence.
About ten years old, but not this is not relevant as definition
hasnt changed.
An image from this source was used in the report and the
presentation.
Compilation of the slides of the defacement on President
Saakashvilis website, comparing him to Hitler.
Georgia-Russia conflict of 2008, technical details.
Information about hackers, actions and effects.
An image from this source was used in the presentation.
Air traffic control tower used as visual aid.
Attack on Docomo users in Japan that jammed their

Extended Project 2014 | Maurice Yap 6946

Log and Evaluation of Resources


article

Online news
article
Magazine article

DEUTSCHE WELLE, 2014

DICKSON, J., 2014

Online news
article
Online news
article

FITZSIMMONS, E. G., 2013

FOSTER, P., 2013

GARDHAM, D., 2011

Web article

GREENBERG, A., 2012

Web article

GTECH, 2014

Web article

HARVISON, A., 2014

Encyclopaedia
entry

HIRSCH, E. D., et al., 2002

Online news
article

HORTEN, M., 2014

Telegraph is a reputable source of factual


information. Accurate and reliable.

Done by Google in China.

Google is a large company which heavily relies on


good public image, so source unlikely to be factually
inaccurate.

On Forbes magazine website.

Large and widely-known company, so likely to have


accurate information.
Reliability of information wasn't considered as the source was
only used for an image.
Reliability of information wasn't considered as the source was
only used for an image.

Web article

IMPERVA, 2012

Report

INFORMATION WARFARE

New York Times newspaper is a reputable large


newspaper. Likely accurate.
Telegraph is traditionally politically right-of-centre
(not relevant in this case).
Large UK-based newspaper, large team of editors
and journalists.
Likely accurate correct information.

Online news
article
Online video

GOOGLE VIDEOS. 2012

that the website hasnt been able to confirm some


sources.
Old article, but ok because it is about old event
which hasnt had any new information emerge.
Large German news agency, reputable, good
research facilities to verify facts.
Personal account to magazine, first-hand account,
not factually verified.

Encyclopaedia, probably intensely researched with


large team of researchers and editors before
publication to ensure accuracy so reliable.
Writer has a PhD and is a visiting fellow of the
London School of Economics.
She is therefore very knowledgeable and has done a
lot of previous research.
Objective views are expressed, no underlying bias.
IT security company that protects businesses from
cyber-threats.
May be in its business interests to inflate (to gain
more clients) or downplay (to give the image that it
is doing its job well) threats, which may compromise
reliability.
Thoroughly researched investigative report

emergency phone network.

Fatal shooting of US soldiers at Frankfurt airport by Islamic


extremist in 2011.
Very short magazine article about the job of making sure
software is secure.
Irrelevant.
Alan Turing information.

An image from this source was used in the report and the
presentation.
Screenshot of the illegitimate tweet sent out by Associated
Press Twitter account as mentioned in report and
presentation.
Impact of this tweet on US stock markets.
MI6 attacks on al-Qaeda-supporting website (Operation
Cupcake).
Video demonstration of Chinas national internet filters.

Tor Projects OONI-Probe.

An image from this source was used in the presentation.


New York Times Logo used as visual aid.
An image from this source was used in the presentation.
Logo of the Guardian used as visual aid.
DDoS attack definition and explanation.

The deal agreed between British ISPs and entertainment


companies.
Issues and problems surrounding this.

How Anonymous attacks take place.

China and Shadow network.

Extended Project 2014 | Maurice Yap 6946

Log and Evaluation of Resources

Web page
Online news
article
Web site
Academic blog
post
Report

KARHULA, P., 2012

Web page

KEPHIR. 2012

Web article

KOPP, C., 2006

Web article

LINTNER, B., 2007

Web page

LOGOPEDIA, 2013

Report

LT CDR WESTWOOD USN, J.


T., n.d.

Web article

MALLET, P., 2010

Encyclopaedia
entry

MILLER, B. & DE LIA, P. J.,


2006

Web site

NATO COOPERATIVE CYBER


DEFENCE CENTRE OF
EXCELLENCE (CCDCOE),
n.d.
NATO, 2014

Web article
Online magazine
article

MONITOR &
SHADOWSERVER
FOUNDATION, 2010
INFORMATION WARFARE
MONITOR, 2011
INTERNATIONAL BUSINESS
TIMES, 2014
ITN PRODUCTIONS, 2014
JOHNSTON, P., 2013

NEW STATESMAN, 2013

produced by academic and consultancy organisation.

Source has verifiable primary investigative research.

Very likely to be reliable.


Reliability of information wasn't considered as the source was
only used for an image.

Seems reliable as it is a popular online business


newspaper.
Reliability of information wasn't considered as the source was
only used for an image.

Facts chosen to support writers arguments.


Accurate information, but consider bias.
Accurate and reliable because it is a published
academic essay.
Reliability of information wasn't considered as the source was
only used for an image.

Doesnt matter that its a few years old as it is a


report on the Gulf War of early 1990s.

Written by a knowledgeable defence analyst and


academic.

Website dedicated to North Korean issues, so


information is likely to be accurate and written
insightfully.

Reliable.

A couple of years old, so may be a bit out-of-date.


Reliability of information wasn't considered as the source was
only used for an image.

Very high ranking navy experience, so very


knowledgeable.
Undated.
Physics, science and technology website, so probably
reliable.

Encyclopaedia, probably intensely researched with


large team of researchers and editors before
publication to ensure accuracy so reliable.
Relatively recent.
Official website, so very reliable for factual
information.
Information is undated.

Official NATO website, primary information.


Very recent so very relevant to report.
Current affairs magazine.
Factually accurate but facts chosen in biased way in

Cyber-espionage.

An image from this source was used in the presentation.


Covers of two reports used as visual aids.
UK cyberwarfare simulation.

An image from this source was used in the presentation.


Truthloader logo used as visual aid.
Social media and propaganda.

Irrelevant

An image from this source was used in the presentation.


Anonymous logo used as visual aid.
Electronic warfare
Gulf War.

IT in North Korea.
North Korean intranet.

An image from this source was used in the presentation.


BBC News logo used as visual aid.
Electronic warfare in World War 1.
Largely irrelevant.

Stuxnet.
Origins of Stuxnet (US and Israel).
NATO reaction to Stuxnet.
Definition and brief explanation of electronic warfare.

Information about the activities of the CCDCoE in Estonia.


Member states.
Why it was set up.

How NATO deals and will deal with cyber-threats.


What it sees of cyberwarfare in the future.
The defences of the UK against cyber-attacks.
JCRU creation.

Extended Project 2014 | Maurice Yap 6946

Log and Evaluation of Resources


order to support editorial stance.
Reliability of information wasn't considered as the source was
only used for an image.

Views about the future of cyberwarfare.


An image from this source was used in the presentation.
Front page of Washington Post newspaper showing Edward
Snowden
Americas defences against cyber-attacks.
Measures taken by US to ensure good cybersecurity.
Counterintelligence.
Possible offensive operations.
Attacks on the US.
Use of censorship for child protection.
Views on this.
General censorship.
Types of censorship methods.
Views on censorship.
An extent of censorship in TPP plan.
Filtering to prevent digital piracy.

Filtering.
Types of censorship.
Censorship methods and control points.
Opinions of censorship.

An image from this source was used in the presentation.


Screenshot of SEAs hack on BBC Weathers Twitter account
used as visual aid.
An image from this source was used in the presentation.
Front cover image of Confront and Conceal (Sanger, D. E.,
2013) used as visual aid.
American government funding development to help bypass
censorship and filtering in foreign countries.
Arab Spring information warfare used.
An image from this source was used in the presentation.
Image of the alleged base of Unit 61398 of the PLA.
Air traffic control incident in central Europe.
Speculation about the cause of it.

Overview of effect of Stuxnet on Iran.


Geo-politics surrounding Iran and Stuxnet.

NGUYEN, V., 2013

Web article

OFFICE OF THE NATIONAL


COUNTERINETLLIGENCE
EXECUTIVE (NCIX), 2011

US governmental department official website, so


reliable primary information source.

Web article

OPEN RIGHTS GROUP, 2012

Web article

OPEN RIGHTS GROUP, 2014

Biased against censorship and in favour of privacy,


openness of the web and freedom of expression.
Considering this, large organisation, good reliability.

Web article

OPENMEDIA, 2013

Web article

OPENNET INITIATIVE, 2007

Online news
article

PALMER, A., 2013

Web page

RANDOM HOUSE, 2013

Reliability of information wasn't considered as the source was


only used for an image.

Online news
article

RASHID, F. Y., 2013

Online news
article
Online news
article

REUTERS, 2014a

Popular technology news site.

Recent so information is up-to-date.

Likely to be reliable.
Reliability of information wasn't considered as the source was
only used for an image.

REUTERS, 2014b

Biased against censorship and in favour of privacy,


openness of the web and freedom of expression.

Strong focus on research so taking bias into account,


the information given is reliable.

ONI is a research group that investigates filtering


and censorship.

Very strong academic backing.

Reliable.

Considered age of the article.


Reliability of information wasn't considered as the source was
only used for an image.

Reference annual
encyclopaedia
entry

Web article

SAGAR, D., 2011

The international news agency has a very strict


policy for objectivity in its reporting, so has less
susceptibility to political bias.
Good international reputation, large company which
employs thousands of journalists, so information is
likely to be better verified.
Annual reference journal, probably intensely
researched with large team of researchers and
editors before publication to ensure accuracy so
reliable.

Extended Project 2014 | Maurice Yap 6946

Log and Evaluation of Resources

Book

SANGER, D. E., 2013

Online news
article
Web article

SHANE, S., 2012

Online news
article

SMITH, T., 2001

Online news
article

SPARKES, M., 2014

Online news
article
Online news
article

STEELE, J., 2008

SIGMAN, A., 2008

STONE, M., 2014

Web article

STREAMUK, 2011

Online news
article

SWENEY, M., 2012

Lack of historical hindsight as events included took


place under a year beforehand.

Controversial book.

Researched by author.

Unidentified senior official sources used.

Possibly reliable but I have treated this source as


speculation, rather than hard fact.

New York Times newspaper is a reputable large


newspaper. Likely accurate.

Opinion column on censorship.

Deliberately biased in favour of information


controls.

Use source as a view, not for reliable factual


evidence.

Old news article.

Reliable as it is from a news agency. No agenda on


this kind of story.

Telegraph is a popular quality newspaper.

Factually accurate. Reliable as there is not much


sensationalism.
Reliability of information wasn't considered as the source was
only used for an image.

Sky News, like BBC, normally has a foreign affairs


agenda or bias to favour the UK and US
governments policy (so in this case, it is biased
against China).

Considering this, factual information should still be


reliable.
Reliability of information wasn't considered as the source was
only used for an image.

Web article

TAKAHASHI, D., 2009

Online video

TED - LANGER,R. 2011

Guardian is traditionally politically left-of-centre


(not very relevant in this case).
Guardian is known as a quality newspaper, so
writing is not sensationalist.
Reliable.
Relatively recent.
VentureBeat is a popular technology news website.
Langer is co-founder and managing principal of the
Langer Group, a cyber-defence consultancy group. It
has been very influential to US government policy. It
also heavily contributed to the Aurora project tests.
From the leader of the group who reverse engineered
Stuxnet.
Very reliable.

Stuxnet was a CIA operation.


Had approval from Presidents Bush and Obama.
Israel was involved.
Stuxnet was meant to be concealed.

US cyber command
Pentagon using private companies for cyber-protection.
Using censorship for protection of children.

Boden sewage spillage incident.

Cyber Security Challenge.

An image from this source was used in the presentation.


Photo of the Natanz facility was displayed as a visual aid.
Very poorly written.
Chinese censorship of websites like Facebook, Twitter and
YouTube.
North Koreas lack of internet.
Egypt during Arab Spring.

An image from this source was used in the presentation.


Daily Telegraph logo used as visual aid.
Plan for UK ISPs to send letters to customers who commit
piracy.
Views from the music industry.

Hotspot Shield VPN.


Methods of bypassing censorship.
An image from this source was used in the presentation.
Sample of Stuxnets program code was used as a visual aid.
Background to Stuxnet.
Speculation about origin of Stuxnet.
Explanation of how Stuxnet was constructed.
Geo-politics regarding Iran, Israel and US.

Extended Project 2014 | Maurice Yap 6946

Log and Evaluation of Resources

Specific effects of Stuxnet.


Methodology of investigations.
North Korean intranet.
Absence of World Wide Web.
An image from this source was used in the presentation.
The Economists logo was used as a visual aid.
Activities of countries.
Secrecy and legislation.
Threat overrated?
Origin of Stuxnet
Debate about whether the threat of cyberwarfare is overrated.
Valuable expert insight.
Wider implications of Chinas censorship of the web.

Magazine article

THE ECONOMIST, 2007

Online journal
article
Magazine article

THE ECONOMIST, 2010

Online journal
article
Web article

THE ECONOMIST, 2012b

Online journal
article
Online journal
article
Magazine article
Web article

THE ECONOMIST, 2013b

THE ECONOMIST, 2013c

Chinese internet filtering.

Online censorship in Turkey.


Opinion on implications of Stuxnet and government/military
cyberwarfare policy discussion.
Irrelevant (had intended to write about the censorship of The
Anarchist Cookbook)

Online magazine
article

THE ECONOMIST, 2012a

THE ECONOMIST, 2013a

THE ECONOMIST, 2014


THE WASHINGTON POST,
2012
TIME MAGAZINE, 2008

Web article

TOR PROJECT, 2007

Web article

TRIPWIRE, 2014

Online video
Online video

TRUTHLOADER. 2013a
TRUTHLOADER. 2013b

Online video

TRUTHLOADER. 2013c

Online video

TRUTHLOADER. 2014a

Online video

TRUTHLOADER. 2014b

The Economist is a reliable source of information


and data but has a strong editorial stance in all its
articles.
It has a viewpoint on all issues it discusses, but these
opinions are always backed up by facts and evidence.
The Economist is normally quite discursive: it
discusses opinions and evidence that opposes it.
It openly has a classical liberal and radical centrist
editorial standpoint.
Foreign affairs bias that supports the USA.

Editorial piece, so highly opinionated.


The facts presented can be taken as reliable.
Opinion piece with facts.
Facts are reliable but it is important to differentiate
this with opinions, as it is ultimately a magazine
article.
Tor Projects own website, so information is likely to
be accurate and up-to-date.
Online computer security magazine, therefore has
lots of expertise in this area and is reliable as a
source.
Citizen journalism YouTube channel.
Has dedicated research team, so facts presented are
likely to be accurate.
No agenda, but its presenters have, in my opinion,
hints of anarchist undertones.
Socially liberal.
Its reporting on current affairs is fact-based but facts
are occasionally used just to reinforce its presenters
opinions.
It is selective of the facts it reports but is generally
reliable in the ones that they do.

Not relevant to report, but useful background to Tor Project

Cyber counterintelligence (CCI)


Defensive CCI
Offensive CCI
Information warfare in the Syrian Civil War.
The different and opposing opinions in this video gave a
valuable insight into new child-protection filter legislation
and its implications to society and future effects.
Facts supporting all sides of the argument were presented.
Experts in the field of cyberwarfare discussed its future,
danger and legal/political issues.
Very relevant and useful opinions used in report.
Recent so up-to-date information.
Snowden revelations relevant to information warfare.
Reset The Net campaign.
Recent. Therefore information is up-to-date.
Air traffic control incident in central Europe.
2014 World Cup Anonymous attacks.
Recent, so up-to-date information.

Extended Project 2014 | Maurice Yap 6946

Log and Evaluation of Resources


Online video

TRUTHLOADER. 2014c

Online video

TRUTHLOADER. 2014d

Online video

TRUTHLOADER. 2014e

Online image

ULLI1105. 2007

Reliability of information wasn't considered as the source was


only used for an image.

Censorship, examples in China and Russia.


Recent, so up-to-date information.
Views of Sir Tim Berners-Lee on internet spying and
censorship.
NSA and GCHQ spying on WikiLeaks and methods used.
Not relevant.
An image from this source was used in the report and the
presentation.
It exemplifies an industrial controller computer that was
attacked by Stuxnet.
An image from this source was used in the report and the
presentation.
A screenshot of a Koobface post used to exemplify one of its
techniques.
Koobface.
The use of malicious viruses for cybercrime.
Botnets.

Anonymous attacks during 2014 World Cup.

An image from this source was used in the presentation.


New Statesman logo used as visual aid.
Defining facts about cybercrime.

How internet users can get round information warfare


techniques that collect information about them.
Bypassing censorship.
Saudi Arabias and surrounding Arab states views and
concerns about Irans nuclear capabilities.

Web article

UWANG, 2011

Reliability of information wasn't considered as the source was


only used for an image.

Report

VILLENEUVE, N., 2010

Online news
article

VINTON, K., 2014

Web article

VOXEUROP, 2012

Encyclopaedia
entry

WALL, D., 2001

Thoroughly researched investigative report


produced by academic and consultancy organisation.

Nart Villeneuve is an expert on online information


warfare.

Very likely to be reliable.

On Forbes magazine website.

Large and widely-known company, so likely to have


accurate information.
Reliability of information wasn't considered as the source was
only used for an image.

Web article

WAYNER, P., 2012

Diplomatic cable

WIKILEAKS, 2010

Web article
Web article
US Congresscommissioned

WIKIPEDIA
CONTRIBUTORS, n.d.a.
WIKIPEDIA
CONTRIBUTORS, n.d.b.
WILSON, C., 2008

Encyclopaedia, probably intensely researched with


large team of researchers and editors before
publication to ensure accuracy so reliable.
Older but definitions remain more-or-less the same
over time.
Informative article, rather than factual.
Everything presented was probably reliable in terms
of information.
Primary leaked source within the US diplomatic
services.
Raw, unedited, very useful and reliable.
Shows true views and inner workings of the
American State Department without bias, as it is
unedited because it wasnt supposed to have been
published.
Wikipedia is not a totally reliable source of hard
information because of its ability to be easily edited
by any member of the public.
The writer is a specialist in military IT.
It was written for US politicians, so is likely to be

Useful background reading into cyberwarfare.

Internet statistics identical to Buzzle, 2012.


Useful to cross-verify.
Definitions.
Estonia incident, 2007, which triggered the establishment of

Extended Project 2014 | Maurice Yap 6946

Log and Evaluation of Resources


report

factually reliable.

Online news
article
Encyclopaedia
entry

WINTOUR, P., 2011

Online news
article
Personal
experience

ZETTER, K., 2007

WITHER, J., 2008

Reliability of information wasn't considered as the source was


only used for an image.

Encyclopaedia, probably intensely researched with


large team of researchers and editors before
publication to ensure accuracy so reliable.
Reliability of information wasn't considered as the source was
only used for an image.

My personal experiences, therefore reliable to me.

Screenshots of
three tweets by
Twitter users

10

Reliable because it is primary evidence.

NATOs CCDCoE.
Terrorism.
Cybercrime.
Social infrastructure and SCADA.
Relationship between cyberwarfare and national security.
An image from this source was used in the presentation.
An unrolled cannabis joint used as a visual aid.
Cyberwarfare definitions
A video still of the Aurora test from this source was used in
the report and the presentation.
The effect of Koobface on my Facebook friends at the time
of the incident many were affected.
The failure of family internet filters in particular, blocking
of sects.
Seen a lot of propaganda used on Facebook and Twitter,
particularly by QSIS and anti-government activists during the
Arab Spring.
The use of hashtags in Israel-Gaza conflict of 2014.
Empathy by internet users on all sides of the conflict.
Visible use of Twitter for public awareness raising and
expression of perceived truths by each user.

Extended Project 2014 | Maurice Yap 6946

You might also like