The Future: six drivers of global change - novelonlinefull.com
You’re read light novel The Future: six drivers of global change Part 42 online at NovelOnlineFull.com. Please use the follow button to get notification about the latest chapter next time when you visit NovelOnlineFull.com. Use F11 button to read novel in full-screen(PC only). Drop by anytime you want to read free – fast – latest novel. It’s great if you could leave a comment, share your opinion about the new chapters, new novel with others on the internet. We’ll do our best to bring you the finest, latest novel everyday. Enjoy
174 corporations, government agencies, and organizations
Gross, "Enter the Cyber-Dragon."
175 "We don't do that"
Rosenbaum, "Richard Clarke on Who Was Behind the Stuxnet Attack."
176 373,000 jobs each year-and $16 billion in lost earnings-from the theft of intellectual property
Richard Adler, Report of the 26th Annual Aspen Inst.i.tute Conference on Communications Policy, Updating Rules of the Digital Road: Privacy, Security, Intellectual Property, 2012, p. 14.
177 worth $1 billion-in a single night
Richard A. Clarke, "How China Steals Our Secrets," New York Times, April 3, 2012.
178 examined one yet that has not been infected
Nicole Perlroth, "How Much Have Foreign Hackers Stolen?," New York Times, Bits blog, February 14, 2012, http://bits.blogs.nytimes.com/2012/02/14/how-much-have-foreign-hackers-stolen/?scp=7&sq=cyber%20security&st=cse.
179 "nearly four times the amount of data"
Ibid.
180 "cyberthreat will be the number one threat to the country"
J. Nicholas Hoover, "Cyber Attacks Becoming Top Terror Threat, FBI Says," Information Week, February 1, 2012.
181 thirteen U.S. defense contractors, and a large number of other corporations
Michael Joseph Gross, "Exclusive: Operation Shady Rat-Unprecedented Cyber-Espionage Campaign and Intellectual-Property Bonanza," Vanity Fair, August 2, 2011.
182 six weeks' worth of emails between the Chamber
Nicole Perlroth, "Traveling Light in a Time of Digital Thievery," New York Times, February 10, 2012.
183 still sending information over the Internet to China
Ibid.
184 individual packages containing the products they produce
Organisation for Economic Co-operation and Development, "Machine-to-Machine Communications: Connecting Billions of Devices," OECD Digital Economy Papers, No. 192, 2012, http://dx.doi.org/10.1787/5k9gsh2gp043-en.
185 dairy farmers in Switzerland are even connecting
John Tagliabue, "Swiss Cows Send Texts to Announce They're in Heat," New York Times, October 2, 2012.
186 "control systems that run these facilities, a nearly fivefold increase from 2010"
John O. Brennan, "Time to Protect Against Dangers of Cyberattack," Washington Post, April 15, 2012.
187 repeated cyberattacks from an unknown source
Thomas Erdbrink, "Iranian Officials Disconnect Some Oil Terminals from Internet," New York Times, April 24, 2012.
188 Aramco, was the victim of cyberattacks
Thom Shanker and David E. Sanger, "U.S. Suspects Iran Was Behind a Wave of Cyberattacks," New York Times, October 14, 2012.
189 The attack on Aramco
Nicole Perlroth, "In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back," New York Times, October 23, 2012.
190 Iranian gas centrifuges that were enriching uranium