15. Hacquebord, Feike. “Pawn Storm’s Domestic Spying Campaign Revealed; Ukraine and US Top Global Targets.” Web log post. TrendLabs Security Intelligence Blog
. Trend Micro, 18 Aug. 2015. Web. 30 Aug. 2016. blog.trendmicro.com/trendlabs-security-intelligence/pawn-storms-domestic-spying-campaign-revealed-ukraine-and-us-top-global-targets/16. F-Secure Labs. THE DUKES: 7 Years of Russian Cyberespionage
. Rep. F-Secure, 5 Sept. 2015. Web. 30 Aug. 2016. www.f-secure.com/documents/996508/1030745/dukes_whitepaper.pdf17. Ibid.
18. Silva, Cristina. “Meet Turla, The Russian Hacking Group Using Commercial Satellites To Spy On US, Europe.”International Business Times
. IBT Media, 09 Sept. 2015. Web. 30 Aug. 2016. www.ibtimes.com/meet-turla-russian-hacking-group-using-commercial-satellites-spy-us-europe-208911619. “Breaking the Code on Russian Malware.” Web log post. The Recorded Future Blog
. Recorded Future, 20 Nov. 2016. Web. 28 Aug. 2016. www.recordedfuture.com/russian-malware-analysis/20. Ibid.
21. Nakashima, Ellen. “Cyber-intruder Sparks Response, Debate.” Washington Post
. The Washington Post Company, 8 Dec. 2011. Web. 28 Aug. 2016. www.washingtonpost.com/national/national-security/cyber-intruder-sparks-response-debate/2011/12/06/gIQAxLuFgO_story.html22. The Waterbug Attack Group
. Security Response. Symantec, 14 Jan. 2016. Web. 28 Aug. 2016. www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/waterbug-attack-group.pdf23. 2015 Global Threat Report
. Rep. CrowdStrike, 14 Jan. 2016. Web. 31 Aug. 2016. go.crowdstrike.com/rs/281-OBQ-266/images/15GlobalThreatReport.pdf24. “Denial-of-Service: The Estonian Cyberwar and Its Implications for U.S. National Security.” International Affairs Review
. Elliott School of International Affairs, n.d. Web. 30 Aug. 2016. www.iar-gwu.org/node/6525. Traynor, Ian. “Russia Accused of Unleashing Cyberwar to Disable Estonia.” The Guardian
. Guardian News and Media, 16 May 2007. Web. 29 Aug. 2016. www.theguardian.com/world/2007/may/17/topstories3.russia26. “Estonia Fines Man for ‘cyber War’” BBC News
. British Broadcasting Corporation, 25 Jan. 2008. Web. 29 Aug. 2016. news.bbc.co.uk/2/hi/technology/7208511.stm27. “Georgia: Avoiding War in South Ossetia”
. Rep. International Crisis Group, 26 Nov. 2014. Web. 29 Aug. 2016. unpan1.un.org/intradoc/groups/public/documents/UNTC/UNPAN019224.pdf28. “If Kosovo Goes Free.” The Economist
. The Economist Group, 29 Nov. 2007. Web. 29 Aug. 2016. www.economist.com/node/10225052.29. Hollis, David, “Cyberwar Case Study: Georgia 2008”, Small Wars Journal.
Small Wars Foundation, 6 Jan. 2011. Web 29 Aug. 2016. http://smallwarsjournal.com/blog/journal/docs-temp/639-hollis.pdf.30. Schachtman, Noah. “Top Georgian Official: Moscow Cyber Attacked Us – We Just Can’t Prove It.” Wired
. Conde Nast, 6 Jan. 2011. Web. 29 Aug. 2016. www.wired.com/2009/03/georgia-blames31. F-Secure Labs. BLACKENERGY & QUEDAGH: The Convergence of Crimeware and APT Attacks
. Rep. F-Secure, n.d. Web. 29 Aug. 2016. www.f-secure.com/documents/996508/1030745/blackenergy_whitepaper.pdf32. US-CCU. Overview by the US-CCU of the Cyber Campaign Against Georgia in August of 2008
. Campaign Overview. The U.S. Cyber Consequences Unit, Aug. 2009. Web. 29 Aug. 2016. www.registan.net/wp-content/uploads/2009/08/US-CCU-Georgia-Cyber-Campaign-Overview.pdf