SlideShare a Scribd company logo
1 of 52
APT28:
A WINDOW INTO RUSSIA’S CYBER
ESPIONAGE OPERATIONS?
SPECIAL REPORT
SECURITY
REIMAGINED
2 fireeye.com
APT 28: A Window into Russia’s Cyber Espionage Operations?
EXECUTIVE SUMMARY
...............................................................................................
...............................................................................................
..................................................................................... 3
APT28 TARGETING REFLECTS RUSSIAN INTERESTS
...............................................................................................
......................................................................... 6
APT28 interest in the Caucasus, Particularly Georgia
...............................................................................................
............................................................ 7
APT28 Targeting of the Georgian Ministry of Internal Affairs
(MIA)
....................................................................................... 8
APT28 Targeting of the Georgian Ministry of Defense
...............................................................................................
........................................ 9
APT28 Targeting a Journalist Covering the Caucasus
...............................................................................................
....................................... 10
APT28’s Other Targets in the Caucasus
...............................................................................................
........................................................................................ 11
APT28 Targeting of Eastern European Governments and
Militaries
...............................................................................................
.... 12
APT28 Targeting of NATO and Other European Security
Organizations
............................................................................. ....... 14
APT28 Targets European Defense Exhibitions
...............................................................................................
................................................................ 16
Other APT28 Targets Are Consistent With Nation State
Interests
...............................................................................................
......... 17
APT28 MALWARE INDICATES SKILLED RUSSIAN
DEVELOPERS
...............................................................................................
......................... 19
Modular Implants Indicate a Formal Development
Environment............................................................................
................................... 24
APT28 Malware Indicates Russian Speakers in a Russian Time
Zone
...............................................................................................
. 25
Compile Times Align with Working Hours in Moscow and St.
Petersburg ............................................................... 27
CONCLUSION
...............................................................................................
...............................................................................................
...............................................................................................
.................... 28
APPENDIX A: DISTINGUISHING THREAT GROUPS
...............................................................................................
.......................................................................... 29
APPENDIX B: TIMELINE OF APT28 LURES
...............................................................................................
...............................................................................................
........... 30
APPENDIX C: SOURFACE/CORESHELL
...............................................................................................
...............................................................................................
....................... 31
APPENDIX D: CHOPSTICK
...............................................................................................
...............................................................................................
..................................................................... 35
APPENDIX E: OLDBAIT
...............................................................................................
...............................................................................................
.................................................................................. 43
CONTENTS
3 fireeye.com
APT 28: A Window into Russia’s Cyber Espionage Operations?
1 Markoff, John. “Before the Gunfire, Cyberattacks”. The New
York Times 12 August 2008. Web.
http://www.nytimes.com/2008/08/13/technology/13cyber.html
2 Knowlton, Brian. “Military Computer Attack Confirmed”.
The New York Times. 25 August 2010. Web.
http://www.nytimes.com/2010/08/26/
technology/26cyber.html
EXECUTIVE SUMMARY
In this paper we discuss a threat group whose
malware is already fairly well-known in the
cybersecurity community. This group, unlike the
China-based threat actors we track, does not
appear to conduct widespread intellectual
property theft for economic gain. Nor have we
observed the group steal and profit from
financial account information.
The activity that we profile in this paper
appears to be the work of a skilled team of
developers and operators collecting intelligence
on defense and geopolitical issues – intelligence
that would only be useful to a government. We
believe that this is an advanced persistent
threat (APT) group engaged in espionage
against political and military targets including
the country of Georgia, Eastern European
governments and militaries, and European
security organizations since at least 2007.
They compile malware samples with Russian
language settings during working hours
consistent with the time zone of Russia’s major
cities, including Moscow and St. Petersburg.
While we don’t have pictures of a building,
personas to reveal, or a government agency to
name, what we do have is evidence of long-
standing, focused operations that indicate a
government sponsor – specifically, a
government based in Moscow.
We are tracking this group as APT28.
Our clients often ask us to assess the threat Russia poses in
cyberspace. Russia has
long been a whispered frontrunner among capable nations for
performing
sophisticated network operations. This perception is due in part
to the Russian
government’s alleged involvement in the cyber attacks
accompanying its invasion of
Georgia in 2008, as well as the rampant speculation that
Moscow was behind a
major U.S. Department of Defense network compromise, also in
2008. These
rumored activities, combined with a dearth of hard evidence,
have made Russia into
something of a phantom in cyberspace.
4 fireeye.com
APT 28: A Window into Russia’s Cyber Espionage Operations?
KEY FINDINGS
GEORGIA EASTERN EUROPE SECURITY ORGANIZATIONS
APT28 likely seeks to collect intelligence
about Georgia’s security and political
dynamics by targeting officials working
for the Ministry of Internal Affairs and
the Ministry of Defense.
APT28 has demonstrated interest in
Eastern European governments and
security organizations. These victims
would provide the Russian government
with an ability to predict policymaker
intentions and gauge its ability to
influence public opinion.
APT28 appeared to target individuals
affiliated with European security
organizations and global multilateral
institutions. The Russian government
has long cited European security
organizations like NATO and the OSCE
as existential threats, particularly during
periods of increased tension in Europe.
APT28 targets insider information
related to governments, militaries, and
security organizations that would
likely benefit the Russian government.
5 fireeye.com
APT 28: A Window into Russia’s Cyber Espionage Operations?
KEY FINDINGS
• Malware compile times suggest that APT28 developers
have consistently updated their tools over the last
seven years.
• APT28 malware, in particular the family of modular
backdoors that we call CHOPSTICK, indicates
a formal code development environment. Such an
environment would almost certainly be required to
track and define the various modules that can be
included in the backdoor at compile time.
• APT28 tailors implants for specific victim
environments. They steal data by configuring their
implants to send data out of the network using a victim
network’s mail server.
• Several of APT28’s malware samples contain counter-
analysis capabilities including runtime checks to
identify an analysis environment, obfuscated strings
unpacked at runtime, and the inclusion of unused
machine instructions to slow analysis.
Indicators in APT28’s malware suggest that the group consists
of
Russian speakers operating during business hours in Russia’s
major cities.
More than half of the malware samples with Portable
Executable (PE) resources that we have attributed to APT28
included Russian language settings (as opposed to neutral or
English settings), suggesting that a significant portion of
APT28 malware was compiled in a Russian language build
environment consistently over the course of six years (2007
to 2013).
Over 96% of the malware samples we have attributed to APT28
were compiled between Monday and Friday. More than 89%
were compiled between 8AM and 6PM in the UTC+4 time zone,
which parallels the working hours in Moscow and St.
Petersburg. These samples had compile dates ranging from
mid-2007 to September 2014.
Since 2007, APT28 has systematically evolved its malware,
using flexible and lasting platforms indicative of plans for
long-term use. The coding practices evident in the group’s
malware suggest both a high level of skill and an interest in
complicating reverse engineering efforts.
Malware compile times suggest
that APT28 developers have
consistently updated their tools
over the last seven years.
6 fireeye.com
APT 28: A Window into Russia’s Cyber Espionage Operations?
Three themes in APT28’s targeting clearly
reflect areas of specific interest to an
Eastern European government, most likely
the Russian government.
7 Bloomberg. “Neiman Marcus Hackers Set Off 60,000 Alerts
While Bagging Credit Card Data.” February 2014.
8 Ibid.
9 Ibid.
APT28 TARGETING REFLECTS
M
any of APT28’s targets align generally
with interests that are typical of any
government. However, three themes in
APT28’s targeting clearly reflects areas of specific
interest to an Eastern European government, most
likely the Russian government. These include the
Caucasus (especially the Georgian government),
Eastern European governments and militaries, and
specific security organizations.
APT28 uses spearphishing emails to target its
victims, a common tactic in which the threat group
crafts its emails to mention specific topics (lures)
relevant to recipients. This increases the
likelihood that recipients will believe that the
email is legitimate and will be interested in
opening the message, opening any attached files,
or clicking on a link in the body of the email. Since
spearphishing lures are tailored to the recipients
whose accounts APT28 hopes to breach, the
subjects of the lures provide clues as to APT28’s
targets and interests. For example, if the group’s
lures repeatedly refer to the Caucasus, then this
most likely indicates that APT28 is trying to gain
access to the accounts of individuals whose work
pertains to the Caucasus. Similarly, APT28’s practice
of registering domains that mimic those of legitimate
news, politics, or other websites indicates topics that
are relevant to APT28’s targets.
We identified three themes in APT28’s lures and
registered domains, which together are
particularly relevant to the Russian government.
In addition to these themes, we have seen APT28
target a range of political and military
organizations. We assess that the work of these
organizations serves nation state governments.
RUSSIAN
INTERESTS
The Caucasus,
particularly the
country of Georgia
Eastern European
governments and
militaries
The North Atlantic
Treaty Organization
(NATO) and other
European security
organizations
APT 28: Three Themes
7 fireeye.com
APT 28: A Window into Russia’s Cyber Espionage Operations?
T
he Caucasus, a region that includes
Chechnya and other Russian republics and
the independent states of Georgia,
Armenia, and Azerbaijan, continues to experience
political unrest. The Georgian government’s
posture and ties to the West are a frequent
source of Moscow’s frustration, particularly after
the 2008 war. Overall, issues in the Caucasus
likely serve as focal points for Russian
intelligence collection efforts.
APT28 INTEREST IN
THE CAUCASUS,
PARTICULARLY GEORGIA
Since 2011, APT28 has used lures written in
Georgian that are probably intended to target
Georgian government agencies or citizens.
APT28 is likely seeking information on Georgia’s
security and diplomatic postures. Specifically,
the group has targeted the Georgian Ministry of
Internal Affairs (MIA) and the Ministry of
Defense (MOD). We also observed efforts to
target a journalist working on issues in the
Caucasus and a controversial Chechen news site.
RUSSIA
Chechnya
GEORGIA
Abkhazia
TURKEY
ARMENIA
AZERBAIJAN
Tbilisi
Armenian Military
Yerevan
Kavkaz Center
8 fireeye.com
APT28 Targeting of the Georgian
Ministry of Internal Affairs (MIA)
The MIA harbors sensitive information about the
inner workings of Georgia’s security operations, the
country’s engagement in multilateral institutions,
and the government’s communications backbone. It
is responsible for3:
• Policing, internal security, and border patrols
• Counterintelligence
• Counterterrorism
• International relations
• Defense of Georgia’s strategic facilities
and assets
• “Operative-Technical” tasks
APT28 made at least two specific attempts to
target the MIA. In one case, we identified an
APT28 lure from mid-2013 that referenced
MIA-related topics and employed malware that
attempted to disguise its activity as legitimate
MIA email traffic. The lure consisted of a
weaponized Excel file that presented a decoy
document containing a list of Georgian driver’s
3 Georgian Ministry of Internal Affairs website
http://police.ge/en/home
4 Queries on the author yielded a LinkedIn page for a person of
the same name who serves as a system administrator in Tbilisi.
license numbers. The backdoor attempted to
establish a connection to a Georgian MIA mail
server and communicate via MIA email addresses
ending with “@mia.ge.gov”. Once connected to the
mail server, APT28’s backdoor sent an email
message using a subject line related to driver’s
licenses (in Georgian), and attached a file
containing system reconnaissance information.
This tactic could allow APT28 to obtain data from
the MIA’s network through a less-monitored
route, limiting the MIA network security
department’s abilities to detect the traffic.
In the second example of MIA targeting, an APT28
lure used an information technology-themed decoy
document that included references to the Windows
domain “MIA UsersOrtachala…” (Figure 1).
This probably referred to the MIA facility in the
Ortachala district of Tbilisi, Georgia’s capital city.
The decoy document also contains metadata listing
“MIA” as the company name and “Beka Nozadze”4
as an author, a possible reference to a system
administrator in Tbilisi. The text of the document
purports to provide domain and user group setup
APT28 made at least two specific attempts to target
the Georgian Ministry of Internal Affairs.
Georgian Ministry of Internal Affairs (MIA)
APT 28: A Window into Russia’s Cyber Espionage Operations?
9 fireeye.com
APT 28: A Window into Russia’s Cyber Espionage Operations?
Figure 1: Georgian MIA-related decoy
information for internal Windows XP and Windows
7 systems. APT28 possibly crafted this document
to appear legitimate to all MIA system users and
intended to breach the MIA network specifically
using the embedded malware.
APT28 Targeting of the Georgian
Ministry of Defense
APT28 also appeared to target Georgia’s MOD
along with a U.S. defense contractor that was
training the Georgian military. APT28 used a lure
document that installed a SOURFACE downloader
(further discussed in the Malware section) and
contained a listing of birthdays for members of a
working group between the Georgian MOD and
the U.S. defense contractor. The U.S. contractor
was involved in a working group to advise the MOD
and Georgian Armed Forces, assess Georgia’s
military capabilities, and develop a military training
program for the country.
10 fireeye.com
APT 28: A Window into Russia’s Cyber Espionage Operations?
Figure 2: Excerpt of APT28’s letter to a journalist writing on
Caucasus-related issues
We believe that APT28’s targeting of the MOD
aligns with Russian threat perceptions. The
growing U.S.-Georgian military relationship has
been a source of angst for Russia. Georgia and
Russia severed diplomatic relations following the
Russia-Georgia War in 2008, and Georgia has
since sought to align itself more closely with
western security organizations. Additionally, in
June 2014, despite Russia’s vocal objections,
Georgia, along with Ukraine and Moldova, signed
association accords with the EU.5 This move
placed all three countries more firmly in the EU’s
political, economic, and security spheres of
influence. Georgian military security issues,
particularly with regard to U.S. cooperation and
NATO, provide a strong incentive for Russian
state-sponsored threat actors to steal information
that sheds light on these topics.
APT28 Targeting a Journalist Covering
the Caucasus
Another one of APT28’s lures appeared to target
a specific journalist covering issues in the
Caucasus region. In late 2013, APT28 used a lure
that contained a letter addressing a journalist by
his first name and claiming to originate from a
“Chief Coordinator” in Reason Magazine’s
“Caucasian Issues Department” - a division that
does not appear to exist.6 (Reason Magazine is a
US-based magazine) The letter welcomed the
individual as a contributor and requested topic
ideas and identification information in order to
establish him at the magazine. In the background,
the decoy document installed a SOURFACE
backdoor on the victim’s system.
We wish our cooperation will be both profitable and trusted.
Our aim in the Caucasian region is
to help people who struggle for their independence, liberty and
human rights. We all know, that
world is often unfair and cruel, but all together we can make it
better.
Send your articles on this email – in Russian or English, please.
There are some difficulties with
Caucasian languages, but we’ll solve the problem pretty soon, I
hope.
5 “The EU’s Association Agreements with Georgia, the
Republic of Moldova and Ukraine”. European Union Press
Release Database. 23 June 2014.
Web. http://e uropa.eu/rapid/press-release_MEMO-14-
430_en.htm
6 We attempted to identify candidate journalists in the country.
One of these was a Georgian national of Chechen descent,
whose work appears to center on
Chechen and human rights issues. Ultimately, however, we
cannot confirm the identity of the target(s).
Targeting journalists could provide APT28 and its sponsors
with a way to monitor public opinion, identify dissidents,
spread disinformation, or facilitate further targeting.
11 fireeye.com
APT 28: A Window into Russia’s Cyber Espionage Operations?
The body of the letter suggests that APT28 actors
are able to read at least two languages – Russian
and English. The grammar of the letter also
indicates that English is not the author’s first
language, despite it purportedly originating from a
US-based magazine. This implies that Russian may
be the APT28 author’s preferred language.
Targeting journalists could provide APT28 and its
sponsors with a way to monitor public opinion,
identify dissidents, spread disinformation, or
facilitate further targeting. Several other nation
states are suspected of targeting journalists and
dissidents to monitor their activity, including China
and Iran.7,8 Journalists in the Caucasus working on
Caucasus independence issues would be a prime
target for intelligence collection for Moscow.
Journalists critical of the Kremlin have long
been targets of surveillance and harassment,
and a number of governments and human
rights organizations have publicly criticized the
government for its treatment of journalists and its
increasing consolidation of control over the media.9
APT28’s Other Targets in the Caucasus
We have seen APT28 register at least two
domains mimicking the domains of legitimate
organizations in the Caucasus, as shown in the
table below. One APT28 domain imitated a key
Chechen-focused news website, while the other
appeared to target members of the Armenian
military by hosting a fake login page.
Of particular note, the Kavkaz Center is a
Chechen-run website designed to present an
alternative view to the long-running conflict
between Russia and Chechen separatists. In
200410 and 2013,11 Russia’s Foreign Minister
voiced his displeasure that a Swedish company
continues to host the Kavkaz Center website.
7 Moran, Ned, Villeneuve, Nart, Haq, Thofique, and Scott,
Mike. “Operation Saffron Rose”. FireEye. 13 May 2014. Web.
http://www.fireeye.com/blog/technical/
malware-research/2014/05/operation-saffron-rose.html
8 The New York Times publicly disclosed their breach by
APT12, which they assess was motivated by the China-based
actors’ need to know what the
newspaper was publishing about a controversial topic related to
corruption and the Chinese Communist Party’s leadership.
9 “Russia”. Freedom House Press Release. 2013. Web.
http://www.freedomhouse.org/report/freedom-
press/2013/russia#.VD8fe9R4rew
10“Chechen website promotes terror: Lavrov”. UPI. 16
November 2014. Web.
http://www.upi.com/Top_News/2004/11/16/Chechen-website-
promotes-
terror-Lavrov/UPI-11601100627922/
11“Lavrov urges Sweden to ban Chechen website server” The
Voice of Russia. 15 May 2013. Web.
http://voiceofrussia.com/news/2013_05_15/Lavrov-urges-
Sweden-to-ban-Chechen-website-server/
Table 1: Examples of APT28 domains imitating organizations in
the Caucasus
APT28 Domain Real Domain
kavkazcentr[.]info The Kavkaz Center / The Caucasus Center,
an international Islamic news agency with coverage of Islamic
issues, particularly Russia and Chechnya (kavkazcenter.com)
rnil[.]am Armenian military (mil.am)
12 fireeye.com
APT 28: A Window into Russia’s Cyber Espionage Operations?
E
astern European countries’ political and
military postures are traditionally core Russian
government interests. The Kremlin has long
regarded the former Soviet Republics and satellite
states as in its sphere of economic, political, and
military interest. Over the past two decades, as many
of these states joined NATO and the EU, Russia has
attempted to regain its influence in the region. Many
of APT28’s targets parallel this continued focus on
Eastern European governments and militaries.
APT28 Targets Eastern European
Government Organizations
We have evidence that APT28 made at least two
attempts to compromise Eastern European
government organizations:
• In a late 2013 incident, a FireEye device
deployed at an Eastern European Ministry of
Foreign Affairs detected APT28 malware in
the client’s network.
• More recently, in August 2014 APT28 used a
lure (Figure 3) about hostilities surrounding a
Malaysia Airlines flight downed in Ukraine in
a probable attempt to compromise the Polish
government. A SOURFACE sample employed
in the same Malaysia Airlines lure was
referenced by a Polish computer security
company in a blog post.12 The Polish security
company indicated that the sample was “sent
to the government,” presumably the Polish
government, given the company’s location
and visibility.
12 “MHT, MS12-27 Oraz *malware*.info” [email protected] 11
August 2014. Web.
http://malware.prevenity.com/2014/08/malware-info.html
Figure 3: Decoy MH17
document probably sent
to the Polish government
APT28 TARGETING OF
EASTERN EUROPEAN
GOVERNMENTS AND
MILITARIES
13 fireeye.com
APT 28: A Window into Russia’s Cyber Espionage Operations?
APT28 has registered domains similar to those of
legitimate Eastern European news sites and
governments, listed in Table 2. These domain
registrations not only suggest that APT28 is
interested in Eastern European political affairs,
but also that the group targets Eastern European
governments directly.
In addition, APT28 used one domain for command
and control sessions (baltichost[.]org) that was
themed after the Baltic Host exercises. Baltic Host
is a multinational logistics planning exercise, hosted
annually since 2009 by one of the three Baltic
States (Estonia, Latvia, and Lithuania, all three of
which are on Russia’s border) on a rotational basis.
In June 2014, this event was integrated with a
larger U.S. Army training event, and focused on
exercises to improve interoperability with regional
allies and partners.13, 14
This domain registration suggests that APT28
sought to target individuals either participating in
the exercises or interested in Baltic military and
security matters. Such targets would potentially
provide APT28 with sensitive tactical and
strategic intelligence concerning regional military
capabilities and relationships. These exercises are
a particular point of interest in Moscow: pro-
Kremlin press cited Russia’s interpretation of
these military exercises and NATO’s involvement
as a “sign of aggression,” and Russia’s Foreign
Minister publicly stated that the exercise was “a
demonstration of hostile intention.”15
Table 2: Examples of APT28 domains imitating legitimate
Eastern European organization names
APT28 Domain Real Domain
standartnevvs[.]com Bulgarian Standart News website
(standartnews.com)
novinitie[.]com, n0vinite[.]com Bulgarian Sofia News Agency
website (novinite.com)
qov[.]hu[.]com Hungarian government domain (gov.hu)
q0v[.]pl, mail[.]q0v[.]pl Polish government domain (gov.pl) and
mail server domain (mail.gov.pl)
poczta.mon[.]q0v[.]pl Polish Ministry of Defense mail server
domain (poczta.mon.gov.pl)
13 “Saber Strike and Baltic Host kick off in Latvia, Lithuania
and Estonia’. Estonian Defense Forces. 9 June 2014. Web. 11
June 2014. http://www.mil.ee/en/
news/8251/saber-strike-and-baltic-host-kick-off-in-latvia,-
lithuania-and-estonia
14 “Baltic Host 2014 rendering host nation support for the
training audience of Exercise Saber Strike 2014 and repelling
faked cyber-attacks”. Republic of
Lithuania Ministry of National Defense. 12 June 2014. Web.
http://www.kam.lt/en/news_1098/current_issues/baltic_host_20
14_rendering_host_nation_
support_for_the_training_audience_of_exercise_saber_strike_20
14_and_repelling_faked_cyber-attacks.html
15 “Tanks, troops, jets: NATO countries launch full-scale war
games in Baltic”. Russia Today. 9 June 2014. Web.
http://rt.com/news/164772-saber-strike-
exercise-nato/
We have evidence that APT28 made at least two attempts
to compromise Eastern European government
organizations.
14 fireeye.com
APT 28: A Window into Russia’s Cyber Espionage Operations?
A
PT28’s lures and domain registrations also
demonstrate their interest in NATO and
other European security organizations.
NATO remains a chief Russian adversary, or in the
words of Russia’s 2010 military doctrine, a “main
external military danger” particularly as it moves
“closer to the borders of the Russian Federation.”16
As the traditional western counterweight to the
Soviet Union, Russia regards NATO, particularly
NATO’s eastward expansion, as a threat to Russia’s
strategic stability. APT28 also registered a domain
name imitating the Organization for Security
and Cooperation in Europe (OSCE), an
intergovernmental organization that has cited
widespread fraud in numerous Russian state
elections. Insider information about NATO, the
OSCE and other security organizations would
inform Russian political and military policy.
Several of the domains APT28 registered imitated
NATO domain names, including those of NATO
Special Operations Headquarters and the NATO
Future Forces Exhibition. We also observed a user
that we suspect works for NATO HQ submit an
APT28 sample to VirusTotal, probably as a result
of receiving a suspicious email.
Table 3: Examples of APT28 domains imitating legitimate
NATO and …
MLA 8th Edition Formatting and Style Guide
Purdue OWL Staff
Brought to you in cooperation with the Purdue Online Writing
Lab
Welcome to “MLA Formatting and Style Guide“. This Power
Point Presentation is designed to introduce your students to the
basics of MLA Formatting and Style. You might want to
supplement the presentation with more detailed information
available on the OWL’s “MLA Formatting and Style Guide“ at
http://owl.english.purdue.edu/owl/resource/747/01/
Designer: Ethan Sproat
Based on slide designs from the OWL “APA Formatting and
Style Guide “powerpoint by Jennifer Liethen Kunka and Elena
Lawrick.
Contributors: Tony Russell, Alllen Brizee, Jennifer Liethen
Kunka, Joe Barbato, Dave Neyhart, Erin E. Karper, Karl
Stolley, Kristen Seas, Tony Russell, and Elizabeth Angeli.
Revising Author: Arielle McKee, 2014
*
MLA (Modern Language Association) Style formatting is often
used in various humanities disciplines.
In addition to the handbook, MLA also offers The MLA Style
Center, a website that provides additional instruction and
resources for writing and formatting academic papers.
https://style.mla.org/
What is MLA?
The MLA Handbook for Writers of Research Papers, 8th ed.
supersedes both the 7th edition handbook and the MLA Style
Manual and Guide to Scholarly Publishing, 3rd ed. The style of
documentation outlined in the 8th edition serves the needs of
students who are writing research papers, as well as scholars
who publish professionally. This presentation will mostly focus
on MLA formatting and style concerns that affect writing
research papers.
MLA style is often used in the following disciplines:
humanities, languages, literature, linguistics, philosophy,
communication, religion, and others.
MLA format provides writers with a uniform format for
document layout and documenting sources. Proper MLA style
shows that writers are conscientious of the standards of writing
in their respective disciplines. Properly documenting sources
also ensures that an author is not plagiarizing.
*
MLA regulates:
document formatin-text citationsworks-cited list
What does MLA regulate?
This slide presents three basic areas regulated by MLA students
need to be aware of—document format, in-text citations, and
works cited. The following slides provide detailed explanations
regarding each area.
*
The 8th edition handbook introduces a new way to cite sources.
Instead of a long list of rules, MLA guidelines are now based on
a set of principles that may be used to cite any type of source.
The three guiding principles:
Cite simple traits shared by most works.Remember that there is
more than one way to cite the same source.Make your
documentation useful to readers.
MLA Update 2016
Principle 1: In previous versions of the MLA Handbook, an
entry in the works-cited list was based on the source’s
publication format (book, periodical, Web article, etc.). The
issue with that system is that a work in a new type of medium
could not be properly cited until MLA created a format for it. In
the current system, sources are documented based on facts that
are common to all types of publications, such as author, title,
and year. Now, in order to cite a source, a writer now must
examine it and document it based on a set of universal
principles (more about that to come).
Principle 2: Two scholars may use the same source differently.
Therefore, a writer who is working on a specialized topic in a
particular field will include documentation information that a
writer who is using the source more generally will not.
Principle 3: As a writer, you document sources so that your
readers may locate them and learn more about your particular
argument or essay. Proper citation demonstrates your credibility
by showing that you’ve thoroughly researched your topic. Your
citations must be comprehensive and consistent so that readers
may find the sources consulted and come to their own opinions
on your topic.
*
This presentation will cover:
How to format a paper in MLA style (8th ed.)General
guidelinesFirst page formatSection headings
In-text citationsFormatting quotations
Documenting sources in MLA style (8th ed.)Core elementsList
of works cited
Overview
This PPT will cover the 2016 updates to the 8th edition of the
MLA Handbook: how to format a paper, create in-text citations,
and document sources.
*
Basic rule for any formatting style:
Always
Follow your instructor’s
guidelines
Your Instructor Knows Best
Many instructors who require their students to use MLA
formatting and citation style have small exceptions to different
MLA rules. Every bit of instruction and direction given in this
presentation comes with this recommendation: ALWAYS follow
the specific instructions given by your instructor.
*
An MLA Style paper should: Be typed on white 8.5“ x 11“
paper Double-space everything Use 12 pt. Times New Roman
(or similar) font Leave only one space after punctuation Set all
margins to 1 inch on all sides Indent the first line of paragraphs
one half-inch
Format: General Guidelines
The entire document should be double-spaced, including the
heading, block quotations, footnotes/endnotes, and list of works
cited. There should be no extra space between paragraphs.Leave
only one space after periods or other punctuation marks (unless
otherwise instructed by your instructor).Set the margins of your
document to 1 inch on all sidesIndent the first line of
paragraphs one half-inch from the left margin. MLA
recommends that you use the Tab key as opposed to pushing the
Space Bar five times.
*
The first page of an MLA Style paper will:Have no title
pageDouble space everythingList your name, your instructor's
name, the course, and date in the upper left-hand cornerCenter
the paper title (use standard caps but no underlining, italics,
quote marks, or bold typeface)Use italics for titles
Formatting the 1st Page
・ Do not make a title page for your paper unless specifically
requested
・ In the upper left-hand corner of the first page, list your name,
your instructor's name, the course, and the date. Again, be sure
to use double-spaced text.
・ Double space again and center the title.
Do not underline, italicize, or place your title in quotation
marks; write the title in Title Case (standard capitalization), not
in all capital letters.
・ Use quotation marks and/or italics when referring to other
works in your title, just as you would in your text: Fear and
Loathing in Las Vegas as Morality Play; Human Weariness in
“After Apple Picking“
・ Double space between the title and the first line of the text.
・ Create a header in the upper right-hand corner that includes
your last name, followed by a space with a page number;
number all pages consecutively with Arabic numerals (1, 2, 3,
4, etc.), one-half inch from the top and flush with the right
margin. (Note: Your instructor or other readers may ask that
you omit last name/page number header on your first page.
Always follow instructor guidelines.)
*
Sample 1st Page
・ Do not make a title page for your paper unless specifically
requested
・ In the upper left-hand corner of the first page, list your name,
your instructor's name, the course, and the date. Again, be sure
to use double-spaced text.
・ Double space again and center the title.
Do not underline, italicize, or place your title in quotation
marks; write the title in Title Case (standard capitalization), not
in all capital letters.
・ Use quotation marks and/or italics when referring to other
works in your title, just as you would in your text: Fear and
Loathing in Las Vegas as Morality Play; Human Weariness in
“After Apple Picking“
・ Double space between the title and the first line of the text.
・ Create a header in the upper right-hand corner that includes
your last name, followed by a space with a page number;
number all pages consecutively with Arabic numerals (1, 2, 3,
4, etc.), one-half inch from the top and flush with the right
margin. (Note: Your instructor or other readers may ask that
you omit last name/page number header on your first page.
Always follow instructor guidelines.)
*
An in-text citation is a brief reference in your text that indicates
the source you consulted.
It should direct readers to the entry in your works-cited list for
that source.
It should be unobtrusive: provide the citation information
without interrupting your own text.
In general, the in-text citation will be the author’s last name (or
abbreviated title) with a page number, enclosed in parentheses.
In-Text Citations: the Basics
Basic In-Text Citation Rules
The source information in a parenthetical citation should direct
readers to the source’s entry in the works-cited list.
The in-text citation should be placed, if possible, where there is
a natural pause in your text. If the citation refers to a direct
quotation, it should be placed directly following the closing
quotation mark.
Any source information that you provide in-text must
correspond to the source information on the works-cited page.
More specifically, whatever signal word or phrase you provide
to your readers in the text, must be the first thing that appears
on the left-hand margin of the corresponding entry in the works-
cited list (so the author’s last name or the title, usually, with no
punctuation in between)
*
In-text Example:
Corresponding Works Cited Entry:
Wordsworth, William. Lyrical Ballads. Oxford UP, 1967.
Author-Page Style
Wordsworth stated that Romantic poetry was marked by a
“spontaneous overflow of powerful feelings” (263). Romantic
poetry is characterized by the “spontaneous overflow of
powerful feelings” (Wordsworth 263). Wordsworth extensively
explored the role of emotion in the creative process (263).
In-Text Citations: Author-Page Style
MLA format follows the author-page method of in-text citation.
This means that the author's last name and the page number(s)
from which the quotation or paraphrase is taken must appear in
the text, and a complete reference should appear in your works-
cited page. The author's name may appear either in the sentence
itself or in parentheses following the quotation or paraphrase,
but the page number(s) should always appear in the parentheses,
not in the text of your sentence.
The both citations in the in-text examples on this slide, (263)
and (Wordsworth 263), tell readers that the information in the
sentence can be located on page 263 of a work by the author,
William Wordsworth. If readers want more information about
this source, they can turn to the works-cited list, where, under
Wordsworth, they would find the information in the
corresponding entry also shown on this slide.
*
Print Source with Author
For the following print source
Burke, Kenneth. Language as Symbolic Action: Essays on Life,
Literature, and Method. U of California P, 1966.
If the essay provides a signal word or phrase—usually the
author’s last name—the citation does not need to also include
that information.
Examples:
Humans have been described by Kenneth Burke as “symbol-
using animals” (3).
Humans have been described as “symbol-using animals” (Burke
3).
In-text Citations for Print Sources with Known Author
For print sources like books, magazines, scholarly journal
articles, and newspapers, provide a signal word or phrase
(usually the author’s last name) and a page number. If you
provide the signal word/phrase in the sentence, you do not need
to include it in the parenthetical citation. These examples must
correspond to an entry that begins with Burke, which will be the
first thing that appears on the left-hand margin of an entry in
the works-cited list (as noted in the corresponding entry on this
slide). See comments from previous slide.
*
How to cite a work with no known author:
We see so many global warming hotspots in North America
likely because this region has “more readily accessible climatic
data and more comprehensive programs to monitor and study
environmental change…” (“The Impact of Global Warming” 6).
With Unknown Author
In-text Citations for Print Sources with No Known Author
When a source has no known author, use a shortened title of the
work instead of an author name. Place the title in quotation
marks if it's a short work (e.g. articles) or italicize it if it's a
longer work (e.g. plays, books, television shows, entire
websites) and provide a page number.
In this example, since the reader does not know the author of
the article, an abbreviated title of the article appears in the
parenthetical citation which corresponds to the full name of the
article which appears first at the left-hand margin of its
respective entry in the works-cited list. Thus, the writer
includes the title in quotation marks as the signal phrase in the
parenthetical citation in order to lead the reader directly to the
source on the works-cited page. See comments from previous
slide.
*
Corresponding Entry in the List of Works Cited:
“The Impact of Global Warming in North America.” Global
Warming: Early Signs. 1999. Accessed 23 Mar. 2009.
With Unknown Author
And this is how the works-cited listing should look. While this
entry is technically correct, it would help your readers more
readily access the source if you include the URL here (it would
go before the access date).
*
Works with Multiple Editions
In-text example:
Marx and Engels described human history as marked by class
struggles (79; ch. 1).
Authors with Same Last Names
In-text example:
Although some medical ethicists claim that cloning will lead to
designer
children (R. Miller 12), others note that the advantages for
medical research outweigh this consideration (A. Miller 46).
Other In-Text Citations 1
In parenthetical citations of a literary work available in multiple
editions, such as a commonly studied novel, it is often helpful
to provide division numbers in addition to page numbers so that
your readers can find your references in any edition of the
work.
Make sure that your in-text citations refer unambiguously to the
entry in your works-cited list. If you are citing from the works
of two different authors with the same last name, include the
author’s first initial in your reference).
*
Work by Multiple Authors
In-text Examples:
Smith et al. argues that tougher gun control is not needed in the
United States (76).
The authors state: “Tighter gun control in the United States
erodes Second Amendment rights” (Smith et al. 76).
A 2016 study suggests that stricter gun control in the United
States will significantly prevent accidental shootings (Strong
and Ellis 23).
Other In-Text Citations 2
Citing a Work by Multiple Authors
If the entry in the works-cited list begins with the names of two
authors, include both last names in the in-text citation,
connected by and.
If the source has three or more authors, the entry in the works-
cited list should begin with the first author’s name followed by
et al. The in-text citation should follow suit.
*
Multiple Works by the Same Author
In-text examples:
Lightenor has argued that computers are not useful tools for
small children (“Too Soon” 38), though he has acknowledged
elsewhere that early exposure to computer games does lead to
better small motor skill development in a child's second and
third year (“Hand-Eye Development” 17).
Visual studies, because it is such a new discipline, may be “too
easy” (Elkins, “Visual Studies” 63).
Other In-Text Citations 3
Citing Multiple Works by the Same Author
If you cite more than one work by a particular author, include a
shortened title for the particular work from which you are
quoting to distinguish it from the others. This is illustrated in
the first example on this slide. Additionally, if the author's
name is not mentioned in the sentence, format your citation with
the author's name followed by a comma, followed by a
shortened title of the work, followed, when appropriate, by page
numbers. This is illustrated in the second example on this slide.
*
Works in time-based media
In-text example:
Buffy’s promise that “there’s not going to be any incidents like
at my old school” is obviously not one on which she can follow
through (“Buffy” 00:03:16-17).
Works-cited entry:
“Hush.” Buffy the Vampire Slayer, created by Joss Whedon,
performance by Sarah Michelle Gellar, season 4, episode 10,
Mutant Enemy,1999.
Other In-Text Citations 6
For works in time-based media, such as audio and video
recordings, cite the relevant time or range of times. Give the
numbers of the hours, minutes, and seconds as displayed in your
media player, separating the numbers with colons.
*
Sources without page numbers
In-text example:
Disability activism should work toward “creating a habitable
space for all beings” (Garland-Thomson).
Corresponding works-cited entry:
Garland-Thomson, Rosemarie. “Habitable Worlds.” Critical
Disability
Studies Symposium. Feb. 2016, Purdue University, Indiana.
Address.
Other In-Text Citations 7
When a source has no page numbers or any other kind of part
number, no number should be given in a parenthetical citation.
Do not count unnumbered paragraphs, pauses, or other parts.
This is an example of how to cite a direct quotation from an oral
address.
*
Short prose quotations
In-text example:
According to Foulkes's study, dreams may express “profound
aspects of personality” (184).
Is it possible that dreams may express “profound aspects of
personality” (Foulkes 184)?
Formatting Short Quotations (in Prose)
Short Quotations
If a prose quotation runs no more than four lines and requires
no special emphasis, put it in quotation marks and incorporate it
into the text.. Provide the author and specific page citation in
the text, and include a complete entry in the works-cited page.
Punctuation marks such as periods, commas, and semicolons
should appear after the parenthetical citation. Question marks
and exclamation points should appear within the quotation
marks if they are a part of the quoted passage but after the
parenthetical citation if they are a part of your text.
*
Quoting four or more lines of prose
In-text example:
Nelly Dean treats Heathcliff poorly and dehumanizes him
throughout her narration:
They entirely refused to have it in bed with them, or even
in their room,
and I had no more sense, so, I put it on the landing of the
stairs, hoping
it would be gone on the morrow. By chance, or else
attracted by hearing
his voice, it crept to Mr. Earnshaw's door, and there he
found it on
quitting his chamber. Inquiries were made as to how it
got there; I was
obliged to confess, and in recompense for my cowardice
and inhumanity
was sent out of the house. (Bronte 78)
Formatting Long Quotations (in Prose)
In quotations that are four or more lines of text, start the
quotation on a new line, with the entire quote indented half an
inch from the left margin; maintain double-spacing. Do not
indent the first line an extra amount or add quotation marks not
present in the original. Use a colon to introduce the quotation
(unless your introductory wording does not require
punctuation). Your parenthetical citation should come after the
closing punctuation mark. Note: If a new paragraph begins in
the middle of the quotation, indent its first line.
*
Each entry in the list of works cited is made up of core elements
given in a specific order.
The core elements should be listed in the order in which they
appear here. Each element is followed by the punctuation mark
shown here.
Works Cited: The Basics
While earlier editions of the MLA Handbook showed writers
how to create a works-cited entry based on the source’s
publication format (book, periodical, film, etc.), the updated 8th
edition demonstrates that documentation should be created by
consulting the list of core elements. Rather than asking: “how
do I cite a book, DVD, or webpage,” the writer now creates an
entry by looking at the list of core elements– which are facts
common to most works– and assembling them in a specific
order.
These changes have been made to reflect the differences in how
we consult works. In the updated model, the writer should ask:
“who is the author?” and “what is the title?”, regardless of the
nature of the source. The following slides will explain each of
the core elements, and how they might differ from one medium
to another.
*
Author.
Begin the entry with the author’s last name, followed by a
comma and the rest of the name, as presented in the work. End
this element with a period.
Examples:
Baron, Naomi S. “Redefining Reading: The Impact of Digital
Communication Media.” PMLA, vol. 128, no. 1, Jan. 2013,
pp.
193-200.
Jacobs, Alan. The Pleasures of Reading in an Age of
Distraction.
Oxford UP, 2011.
Works-cited List: Author
While these examples are in different mediums (the first one is
a periodical, the second is a printed book), they are both
formatted according to the list of key elements. Note: there are
other types of author situations, such as multiple authors,
translators, editors, corporate authors, performers, and
pseudonyms (such as online user names). Refer to the 8th
edition handbook or the MLA online Style Center
https://style.mla.org/ for more information.
*
Title of source.
Books and websites should be in italics:
Hollmichel, Stefanie. So Many Books. 2003-13,
somanybooksblog.com.
Linett, Maren Tova. Modernism, Feminism, and Jewishness.
Cambridge
UP, 2007.
Periodicals (journal, magazine, newspaper article), television
episodes, and songs should be in quotation marks:
Beyoncé. “Pretty Hurts.” Beyoncé, Parkwood
Entertainment, 2013,
Goldman, Anne. “Questions of Transport: Reading Primo
Levi Reading
Dante.” The Georgia Review, vol. 64, no. 1, 2010, pp.
69-88.
Works-cited List: Title of Source
The title of the source should follow the author’s name.
Depending upon the type of source, it should be listed in italics
or quotation marks.
*
Title of container,
Examples:
Bazin, Patrick. “Toward Metareading.” The Future of the Book,
edited by
Geoffrey Nunberg, U of California P, 1996, pp. 153-68.
Hollmichel, Stefanie. “The Reading Brain: Differences between
Digital
and Print.” So Many Books, 25 Apr. 2013,
“Under the Gun.” Pretty Little Liars, season 4, episode 6, ABC
Family,
Hulu, 16 July 2013.
Works-cited List: Title of Container
Containers are the larger wholes in which the source is located.
For example, if you want to cite a poem that is listed in a
collection of poems, the individual poem is the source, while
the larger collection is the container. The title of the container
is usually italicized and followed by a comma, since the
information that follows next describes the container.
In the first example, “Toward Metareading” is the title of an
essay, and The Future of the Book is the title of the edited
collection in which the essay appears.
The container may also be a website, which contains articles,
postings, and other works.
The container may also be a television series, which is made up
of episodes.
*
Other contributors,
Examples:
Chartier, Roger. The Order of Books: Readers, Authors, and
Libraries
in Europe between the Fourteenth and Eighteenth Centuries.
Translated by Lydia G. Cochrane, Stanford UP, 1994.
“Hush.” Buffy the Vampire Slayer, created by Joss Whedon,
performance by Sarah Michelle Gellar, season 4, episode 10,
Mutant Enemy, 1999.
Woolf, Virginia. Jacob’s Room. Annotated and with an
introduction by
Vara Neverow, Harcourt, Inc., 2008.
Works-cited List: Other Contributors
In addition to the author, there may be other contributors to the
source who should be credited, such as editors, illustrators,
performers, translators, etc. If their contributions are relevant to
your research, or necessary to identify the source, include their
names in your documentation.
Note: In the eighth edition, terms like editor, illustrator,
translator, etc., are no longer abbreviated.
*
Publisher,
The publisher produces or distributes the source to the public. If
there is more than one publisher, and they are all are relevant to
your research, list them in your citation, separated by a forward
slash (/).
Examples:
Harris, Charles “Teenie.” Woman in a Paisley Shirt behind
Counter in
Record Store. Teenie Harris Archive, Carnegie Museum of
Art, Pittsburgh, teenie.cmoa.org/interactive/index.html#date08.
Jacobs, Alan. The Pleasures of Reading in an Age of
Distraction.
Oxford UP, 2011.
Kuzui, Fran Rubel, director. Buffy the Vampire Slayer.
Twentieth
Century Fox, 1992.
Works-cited List: Publisher
Note: the publisher’s name need not be included in the
following sources: periodicals, works published by their author
or editor, a Web cite whose title is the same name as its
publisher, a Web cite that makes works available but does not
actually publish them (such as YouTube, WordPress, or
JSTOR).
*
Optional elements:
Date of original publication:
Franklin, Benjamin. “Emigration to America.” 1782. The
Faber Book of America, edited by Christopher Ricks
and William L. Vance, Faber and Faber, 1992, pp. 24-
26.
City of publication:
Goethe, Johann Wolfgang von. Conversations of Goethe
with Eckermann and Soret. Translated by John Oxenford,
new ed., London, 1875.
Works-cited List: Optional Elements
Date of original publication: If a source has been published on
more than one date, the writer may want to include both dates if
it will provide the reader with necessary or helpful information.
City of publication: this is only necessary in particular
instances, such as in a work published before 1900. Since pre-
1900 works were usually associated with the city in which they
were published, your documentation may substitute the city
name for the publisher’s name.
*
Optional elements:
URLs – NO URLs for my classes
DOIs (digital object identifier)
Chan, Evans. “Postmodernism and Hong Kong Cinema.”
Postmodern Culture, vol. 10, no. 3, May
2000. Project Muse, doi: 10.1353/pmc.2000.0021.
Date of access - INCLUDE
“Under the Gun.” Pretty Little Liars, season 4, episode 6,
ABC Family, 16 July 2013. Hulu, Accessed 23
July 2013.
Works-cited List: Optional Elements
URLs: use at your instructor’s discretion.
DOIs: a series of digits and letters that leads to the location of
an online source. Articles in journals are often assigned DOIs to
ensure that the source is locatable, even if the URL changes. If
your source is listed with a DOI, use that instead of a URL.
Date of access: When you cite an online source, always include
the date on which you accessed the material, since an online
work may change or move at any time.
*
Purdue University Writing Lab
Heavilon 226
Web: http://owl.english.purdue.edu/
Phone: (765) 494-3723
Email: [email protected]
Where to Go to Get More Help
Rationale: Purdue students are invited to meet with a tutor to
assist with writing challenges on an individual basis. Viewers
outside of Purdue may receive assistance through the OWL
(Online Writing Lab) and answers to quick questions through
the OWL email service.
*
The End
MLA 8th Edition Formatting Style Guide
Brought to you in cooperation with the Purdue Online Writing
Lab
Task: Fix what is wrong with the numbered/highlighted area or
explain what is wrong. For example, number 1 - the punctuation
is in the wrong place. It should go after the citation. All
citations as well as in text must follow the MLA format. There
is a total of 11 highlighted parts.
Technology Bettering Schools in Low Income Areas
With the country in a state of depression, public schools from
coast to coast are experiencing budget cuts which are preventing
children from getting the best education possible. Technology is
the future for most of these children and with public schools
providing more computers, iPads, SMARTboards and other
advanced technology it will help get them one step closer to
success.
In North Carolina alone, 46% of children live in low-income
families and have fewer opportunities to succeed because of
that. (Clayton) (1)____________ These children deserve just as
much as the other kids. Right now times are hard for alot of
people and sometimes parents forget what they do will affect
their children.
The exact problem of no technology is low-income areas has not
been addressed directly but some organizations such as the Best
Kids Foundation are reaching out to help poor student who need
help to get to college. Their theme is "Education: A Gift to
Children, A Better Future (James Anderson).” (2)____________
This foundation is more international and helps the poor kids
receive a better education.
Technology can actually improve kid’s grades. During a
study done by the Educational Testing Service the results said,
“Math achievement improved when computers were used to
address higher order thinking” (Computers Help Our Kids
Learn). (3)______________
“Technology has certainly changed family life in the past few
years. From the way we communicate, educate our children, and
socialize with friends, to the way we tend our personal business
and entertain ourselves, it's a bold new world” (“Connected
Kids”). (4)______________
The Wake County Public School system has 143,289 students in
163 schools. There are 20 high schools in the district in total
(Franks). Superintendent Anthony J. Tata says "Nobody is
happy with a 6 percent cut in funding [in Wake County public
schools], but there were a lot of rumors of 10 percent, and I
would just say, 'Steady in the foxhole; let's wait” (“Budget
Cuts”). (5)_______________
In an interview with Green Hope High School’s assistant
principle, I am able to prove exactly what technology has done
to make Green Hope one of the top schools in the county.
“Technology is used every day by every teacher to track, access
and direct students learning and progress” (email interview).
(6)__________________
The Argument of Technology in Low Income areas is that the
kids will not have good future when they grow up. It will stunt
there learning abilities because they will not learn as well on
computers. If a student graduates high school without at least a
rudimentary and working knowledge of new technologies, their
future starts looking a lot less bright” (The Benefit and Danger
of Education Technology). (7)__________
Work Cited
Anderson, James. “Technology Issues,” The Filipino Daily. 14
July 2013
Cindrich, Sharon M. "Connected Kids." (8)_ (what is
missing?)_________, 20 July 2013.
Clayton, Christopher. E-mail interview. 27 July 2013.
Franks, George. "High School Graduation."
CountyHealthRankings.gov. 21 Nov 2011. (9)______________
Langley, Jesse. The Benefit and Danger of Education
Technology, NWeducation.edu, 24 July 2013.
Minchin, Marty. "Budget Cuts Will Affect Schools State Wide."
Piedmont.com.
20 July 2013. (10)_____________
"Computers Help Our Kids Learn." Toronto Star, Editors: John
Schiefel and Howard Smith. 6 July 2013. (11)____________
CMIT 495, Paper Guidelines
This is applicable to ALL papers submitted during this class
session.Guidelines
· Every paper MUST conform to APA Standards and will be
graded as such. Below are additional requirements for every
paper.
· Resources for APA:
· UMGC Library -
https://sites.umgc.edu/library/libhow/gethelp-citing.cfm
· Purdue University -
https://owl.purdue.edu/owl/research_and_citation/apa_style/apa
_formatting_and_style_guide/general_format.html
· Publication Manual of the American Psychological
Association, 6th Edition – amazon . (If you continue with your
Master’s Program at UMGC, this book will be useful. Your
Professor owns it and will reference this book).
· Every submitted paper has a title, author, course and section,
followed by the Professors information on the first page. The
title is centered, three inches from top of the page. The title
must be centered in all caps and be the Title of the assignment
due. The course and section identifiers must be on the second
line below the title, centered.
· Every submitted paper should have a Table of Contents
(TOC). The second page is where the TOC should be next,
followed by the body and then the reference pages.
· Note: Only the Body of the paper (e.g. not the Title Page,
TOC, or Reference page) count towards page count.
· Text must be in Times or Times New Roman font, 11pt, 1.5
line or double spacing.
· In the Body of paper, pages must be numbered at the bottom,
with the page number centered right on the page.
· When the paper states page count, the paper must be a full
page to qualify -half pages do not count). Example if minimum
page count is 5, the body of the paper MUST BE a full/complete
five pages to count. It must also conform to APA standards.
· At least five authoritative/scholarly sources are a minimum
per paper. Outside references are required (anonymous authors,
Wikipedia, any news site/source, any blog site, etc. are not
acceptable as scholarly sources).
· Appropriate citations are required. See the syllabus regarding
plagiarism policies.
· Original Papers are to be submitted in word document format,
not pdf or alternate format.
· The Turnitin Originality ReportIN FULL must be submitted in
the assignments folder in Adobe .pdf format.
· This will be graded on quality of research topic, quality of
paper information, use of citations, grammar and sentence
structure, and creativity

More Related Content

Similar to APT28 A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS.docx

Pegasus Spyware Presentation.pptx
Pegasus Spyware Presentation.pptxPegasus Spyware Presentation.pptx
Pegasus Spyware Presentation.pptx02ckwani
 
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
4. Search the Web for uses of Big Data in homeland security. Specifi.pdfsktambifortune
 
Albert Helps Protect from Hacking JRN 4.docx
Albert Helps Protect from Hacking  JRN 4.docxAlbert Helps Protect from Hacking  JRN 4.docx
Albert Helps Protect from Hacking JRN 4.docxnettletondevon
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
Strategic perspectives 3
Strategic perspectives 3Strategic perspectives 3
Strategic perspectives 3archiejones4
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecurityIRJET Journal
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...Matthew Kurnava
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxcowinhelen
 
TOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation ModelTOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation ModelJohn Gerber
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxstilliegeorgiana
 
NIST - определения для Интернета вещей
NIST - определения для Интернета вещейNIST - определения для Интернета вещей
NIST - определения для Интернета вещейVictor Gridnev
 
7122017 cyber espionage is alive and well apt32 and the thr
7122017 cyber espionage is alive and well apt32 and the thr7122017 cyber espionage is alive and well apt32 and the thr
7122017 cyber espionage is alive and well apt32 and the thrsmile790243
 

Similar to APT28 A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS.docx (14)

Pegasus Spyware Presentation.pptx
Pegasus Spyware Presentation.pptxPegasus Spyware Presentation.pptx
Pegasus Spyware Presentation.pptx
 
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
 
Albert Helps Protect from Hacking JRN 4.docx
Albert Helps Protect from Hacking  JRN 4.docxAlbert Helps Protect from Hacking  JRN 4.docx
Albert Helps Protect from Hacking JRN 4.docx
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Strategic perspectives 3
Strategic perspectives 3Strategic perspectives 3
Strategic perspectives 3
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
 
Comodo 2017 report
Comodo 2017 reportComodo 2017 report
Comodo 2017 report
 
TOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation ModelTOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation Model
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
 
NIST - определения для Интернета вещей
NIST - определения для Интернета вещейNIST - определения для Интернета вещей
NIST - определения для Интернета вещей
 
7122017 cyber espionage is alive and well apt32 and the thr
7122017 cyber espionage is alive and well apt32 and the thr7122017 cyber espionage is alive and well apt32 and the thr
7122017 cyber espionage is alive and well apt32 and the thr
 
Pegasus, A spyware
Pegasus, A spywarePegasus, A spyware
Pegasus, A spyware
 

More from jewisonantone

art & science sexual healthUsing peer education projects t.docx
art & science sexual healthUsing peer education projects t.docxart & science sexual healthUsing peer education projects t.docx
art & science sexual healthUsing peer education projects t.docxjewisonantone
 
Arrive at Opera as we know it today Peri’s and Monteverdi’s ope.docx
Arrive at Opera as we know it today Peri’s and Monteverdi’s ope.docxArrive at Opera as we know it today Peri’s and Monteverdi’s ope.docx
Arrive at Opera as we know it today Peri’s and Monteverdi’s ope.docxjewisonantone
 
Arriving to California State University, NorthridgeChoosing un.docx
Arriving to California State University, NorthridgeChoosing un.docxArriving to California State University, NorthridgeChoosing un.docx
Arriving to California State University, NorthridgeChoosing un.docxjewisonantone
 
Arrington-Shaw 1 Bethany P. Arrington-Shaw Dr. K. L.docx
Arrington-Shaw 1  Bethany P. Arrington-Shaw Dr. K. L.docxArrington-Shaw 1  Bethany P. Arrington-Shaw Dr. K. L.docx
Arrington-Shaw 1 Bethany P. Arrington-Shaw Dr. K. L.docxjewisonantone
 
Ars PoeticaBY ARCHIBALD MACLEISHA poem should be palpabl.docx
Ars PoeticaBY ARCHIBALD MACLEISHA poem should be palpabl.docxArs PoeticaBY ARCHIBALD MACLEISHA poem should be palpabl.docx
Ars PoeticaBY ARCHIBALD MACLEISHA poem should be palpabl.docxjewisonantone
 
ArraysDefine an Array and why you would use one. Provide an exam.docx
ArraysDefine an Array and why you would use one. Provide an exam.docxArraysDefine an Array and why you would use one. Provide an exam.docx
ArraysDefine an Array and why you would use one. Provide an exam.docxjewisonantone
 
Arnelle HallThe resource I resonated with the most was the Ted t.docx
Arnelle HallThe resource I resonated with the most was the Ted t.docxArnelle HallThe resource I resonated with the most was the Ted t.docx
Arnelle HallThe resource I resonated with the most was the Ted t.docxjewisonantone
 
Arlene Blum Ascends AnnapurnaPaper should consist of the theorie.docx
Arlene Blum Ascends AnnapurnaPaper should consist of the theorie.docxArlene Blum Ascends AnnapurnaPaper should consist of the theorie.docx
Arlene Blum Ascends AnnapurnaPaper should consist of the theorie.docxjewisonantone
 
Arizona offers unique opportunities for direct democracy based on in.docx
Arizona offers unique opportunities for direct democracy based on in.docxArizona offers unique opportunities for direct democracy based on in.docx
Arizona offers unique opportunities for direct democracy based on in.docxjewisonantone
 
ARISTOTLEPoliticsARISTOTLEPoliticsTran.docx
ARISTOTLEPoliticsARISTOTLEPoliticsTran.docxARISTOTLEPoliticsARISTOTLEPoliticsTran.docx
ARISTOTLEPoliticsARISTOTLEPoliticsTran.docxjewisonantone
 
Arizona citizens retain several very progressive rights, namely the .docx
Arizona citizens retain several very progressive rights, namely the .docxArizona citizens retain several very progressive rights, namely the .docx
Arizona citizens retain several very progressive rights, namely the .docxjewisonantone
 
Arizona offers unique opportunities for direct democracy based o.docx
Arizona offers unique opportunities for direct democracy based o.docxArizona offers unique opportunities for direct democracy based o.docx
Arizona offers unique opportunities for direct democracy based o.docxjewisonantone
 
Aristotle On the Soul (De Anima)trans. J.A. SmithBOOK ONE.docx
Aristotle On the Soul (De Anima)trans. J.A. SmithBOOK ONE.docxAristotle On the Soul (De Anima)trans. J.A. SmithBOOK ONE.docx
Aristotle On the Soul (De Anima)trans. J.A. SmithBOOK ONE.docxjewisonantone
 
Aristotle defined tyranny as an illegitimate form of government .docx
Aristotle defined tyranny as an illegitimate form of government .docxAristotle defined tyranny as an illegitimate form of government .docx
Aristotle defined tyranny as an illegitimate form of government .docxjewisonantone
 
ArgumentsA. Arguments are found in many texts and media .docx
ArgumentsA.   Arguments are found in many texts and media .docxArgumentsA.   Arguments are found in many texts and media .docx
ArgumentsA. Arguments are found in many texts and media .docxjewisonantone
 
Arguments of DefintionChapter 9Arguments of Defi.docx
Arguments of DefintionChapter 9Arguments of Defi.docxArguments of DefintionChapter 9Arguments of Defi.docx
Arguments of DefintionChapter 9Arguments of Defi.docxjewisonantone
 
Argumentative Position Paper (Essay 4)This project is the culm.docx
Argumentative Position Paper (Essay 4)This project is the culm.docxArgumentative Position Paper (Essay 4)This project is the culm.docx
Argumentative Position Paper (Essay 4)This project is the culm.docxjewisonantone
 
Argumentative Research EssayAssignment DescriptionIn upper lev.docx
Argumentative Research EssayAssignment DescriptionIn upper lev.docxArgumentative Research EssayAssignment DescriptionIn upper lev.docx
Argumentative Research EssayAssignment DescriptionIn upper lev.docxjewisonantone
 
Argumentative behavior, engagement in physical altercations, and e.docx
Argumentative behavior, engagement in physical altercations, and e.docxArgumentative behavior, engagement in physical altercations, and e.docx
Argumentative behavior, engagement in physical altercations, and e.docxjewisonantone
 
Argumentative essay with a stand that supports social robots MLA.docx
Argumentative essay with a stand that supports social robots MLA.docxArgumentative essay with a stand that supports social robots MLA.docx
Argumentative essay with a stand that supports social robots MLA.docxjewisonantone
 

More from jewisonantone (20)

art & science sexual healthUsing peer education projects t.docx
art & science sexual healthUsing peer education projects t.docxart & science sexual healthUsing peer education projects t.docx
art & science sexual healthUsing peer education projects t.docx
 
Arrive at Opera as we know it today Peri’s and Monteverdi’s ope.docx
Arrive at Opera as we know it today Peri’s and Monteverdi’s ope.docxArrive at Opera as we know it today Peri’s and Monteverdi’s ope.docx
Arrive at Opera as we know it today Peri’s and Monteverdi’s ope.docx
 
Arriving to California State University, NorthridgeChoosing un.docx
Arriving to California State University, NorthridgeChoosing un.docxArriving to California State University, NorthridgeChoosing un.docx
Arriving to California State University, NorthridgeChoosing un.docx
 
Arrington-Shaw 1 Bethany P. Arrington-Shaw Dr. K. L.docx
Arrington-Shaw 1  Bethany P. Arrington-Shaw Dr. K. L.docxArrington-Shaw 1  Bethany P. Arrington-Shaw Dr. K. L.docx
Arrington-Shaw 1 Bethany P. Arrington-Shaw Dr. K. L.docx
 
Ars PoeticaBY ARCHIBALD MACLEISHA poem should be palpabl.docx
Ars PoeticaBY ARCHIBALD MACLEISHA poem should be palpabl.docxArs PoeticaBY ARCHIBALD MACLEISHA poem should be palpabl.docx
Ars PoeticaBY ARCHIBALD MACLEISHA poem should be palpabl.docx
 
ArraysDefine an Array and why you would use one. Provide an exam.docx
ArraysDefine an Array and why you would use one. Provide an exam.docxArraysDefine an Array and why you would use one. Provide an exam.docx
ArraysDefine an Array and why you would use one. Provide an exam.docx
 
Arnelle HallThe resource I resonated with the most was the Ted t.docx
Arnelle HallThe resource I resonated with the most was the Ted t.docxArnelle HallThe resource I resonated with the most was the Ted t.docx
Arnelle HallThe resource I resonated with the most was the Ted t.docx
 
Arlene Blum Ascends AnnapurnaPaper should consist of the theorie.docx
Arlene Blum Ascends AnnapurnaPaper should consist of the theorie.docxArlene Blum Ascends AnnapurnaPaper should consist of the theorie.docx
Arlene Blum Ascends AnnapurnaPaper should consist of the theorie.docx
 
Arizona offers unique opportunities for direct democracy based on in.docx
Arizona offers unique opportunities for direct democracy based on in.docxArizona offers unique opportunities for direct democracy based on in.docx
Arizona offers unique opportunities for direct democracy based on in.docx
 
ARISTOTLEPoliticsARISTOTLEPoliticsTran.docx
ARISTOTLEPoliticsARISTOTLEPoliticsTran.docxARISTOTLEPoliticsARISTOTLEPoliticsTran.docx
ARISTOTLEPoliticsARISTOTLEPoliticsTran.docx
 
Arizona citizens retain several very progressive rights, namely the .docx
Arizona citizens retain several very progressive rights, namely the .docxArizona citizens retain several very progressive rights, namely the .docx
Arizona citizens retain several very progressive rights, namely the .docx
 
Arizona offers unique opportunities for direct democracy based o.docx
Arizona offers unique opportunities for direct democracy based o.docxArizona offers unique opportunities for direct democracy based o.docx
Arizona offers unique opportunities for direct democracy based o.docx
 
Aristotle On the Soul (De Anima)trans. J.A. SmithBOOK ONE.docx
Aristotle On the Soul (De Anima)trans. J.A. SmithBOOK ONE.docxAristotle On the Soul (De Anima)trans. J.A. SmithBOOK ONE.docx
Aristotle On the Soul (De Anima)trans. J.A. SmithBOOK ONE.docx
 
Aristotle defined tyranny as an illegitimate form of government .docx
Aristotle defined tyranny as an illegitimate form of government .docxAristotle defined tyranny as an illegitimate form of government .docx
Aristotle defined tyranny as an illegitimate form of government .docx
 
ArgumentsA. Arguments are found in many texts and media .docx
ArgumentsA.   Arguments are found in many texts and media .docxArgumentsA.   Arguments are found in many texts and media .docx
ArgumentsA. Arguments are found in many texts and media .docx
 
Arguments of DefintionChapter 9Arguments of Defi.docx
Arguments of DefintionChapter 9Arguments of Defi.docxArguments of DefintionChapter 9Arguments of Defi.docx
Arguments of DefintionChapter 9Arguments of Defi.docx
 
Argumentative Position Paper (Essay 4)This project is the culm.docx
Argumentative Position Paper (Essay 4)This project is the culm.docxArgumentative Position Paper (Essay 4)This project is the culm.docx
Argumentative Position Paper (Essay 4)This project is the culm.docx
 
Argumentative Research EssayAssignment DescriptionIn upper lev.docx
Argumentative Research EssayAssignment DescriptionIn upper lev.docxArgumentative Research EssayAssignment DescriptionIn upper lev.docx
Argumentative Research EssayAssignment DescriptionIn upper lev.docx
 
Argumentative behavior, engagement in physical altercations, and e.docx
Argumentative behavior, engagement in physical altercations, and e.docxArgumentative behavior, engagement in physical altercations, and e.docx
Argumentative behavior, engagement in physical altercations, and e.docx
 
Argumentative essay with a stand that supports social robots MLA.docx
Argumentative essay with a stand that supports social robots MLA.docxArgumentative essay with a stand that supports social robots MLA.docx
Argumentative essay with a stand that supports social robots MLA.docx
 

Recently uploaded

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptxPoojaSen20
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................MirzaAbrarBaig5
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17Celine George
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi RajagopalEADTU
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnershipsexpandedwebsite
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismDabee Kamal
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptxPoojaSen20
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...Nguyen Thanh Tu Collection
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Mohamed Rizk Khodair
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17Celine George
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxheathfieldcps1
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesAmanpreetKaur157993
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxMarlene Maheu
 

Recently uploaded (20)

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 

APT28 A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS.docx

  • 1. APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS? SPECIAL REPORT SECURITY REIMAGINED 2 fireeye.com APT 28: A Window into Russia’s Cyber Espionage Operations? EXECUTIVE SUMMARY ............................................................................................... ............................................................................................... ..................................................................................... 3 APT28 TARGETING REFLECTS RUSSIAN INTERESTS ............................................................................................... ......................................................................... 6 APT28 interest in the Caucasus, Particularly Georgia ............................................................................................... ............................................................ 7 APT28 Targeting of the Georgian Ministry of Internal Affairs (MIA) ....................................................................................... 8
  • 2. APT28 Targeting of the Georgian Ministry of Defense ............................................................................................... ........................................ 9 APT28 Targeting a Journalist Covering the Caucasus ............................................................................................... ....................................... 10 APT28’s Other Targets in the Caucasus ............................................................................................... ........................................................................................ 11 APT28 Targeting of Eastern European Governments and Militaries ............................................................................................... .... 12 APT28 Targeting of NATO and Other European Security Organizations ............................................................................. ....... 14 APT28 Targets European Defense Exhibitions ............................................................................................... ................................................................ 16 Other APT28 Targets Are Consistent With Nation State Interests ............................................................................................... ......... 17 APT28 MALWARE INDICATES SKILLED RUSSIAN DEVELOPERS ............................................................................................... ......................... 19 Modular Implants Indicate a Formal Development
  • 3. Environment............................................................................ ................................... 24 APT28 Malware Indicates Russian Speakers in a Russian Time Zone ............................................................................................... . 25 Compile Times Align with Working Hours in Moscow and St. Petersburg ............................................................... 27 CONCLUSION ............................................................................................... ............................................................................................... ............................................................................................... .................... 28 APPENDIX A: DISTINGUISHING THREAT GROUPS ............................................................................................... .......................................................................... 29 APPENDIX B: TIMELINE OF APT28 LURES ............................................................................................... ............................................................................................... ........... 30 APPENDIX C: SOURFACE/CORESHELL ............................................................................................... ............................................................................................... ....................... 31 APPENDIX D: CHOPSTICK ............................................................................................... ............................................................................................... ..................................................................... 35
  • 4. APPENDIX E: OLDBAIT ............................................................................................... ............................................................................................... .................................................................................. 43 CONTENTS 3 fireeye.com APT 28: A Window into Russia’s Cyber Espionage Operations? 1 Markoff, John. “Before the Gunfire, Cyberattacks”. The New York Times 12 August 2008. Web. http://www.nytimes.com/2008/08/13/technology/13cyber.html 2 Knowlton, Brian. “Military Computer Attack Confirmed”. The New York Times. 25 August 2010. Web. http://www.nytimes.com/2010/08/26/ technology/26cyber.html EXECUTIVE SUMMARY In this paper we discuss a threat group whose malware is already fairly well-known in the cybersecurity community. This group, unlike the China-based threat actors we track, does not appear to conduct widespread intellectual property theft for economic gain. Nor have we observed the group steal and profit from financial account information. The activity that we profile in this paper appears to be the work of a skilled team of developers and operators collecting intelligence
  • 5. on defense and geopolitical issues – intelligence that would only be useful to a government. We believe that this is an advanced persistent threat (APT) group engaged in espionage against political and military targets including the country of Georgia, Eastern European governments and militaries, and European security organizations since at least 2007. They compile malware samples with Russian language settings during working hours consistent with the time zone of Russia’s major cities, including Moscow and St. Petersburg. While we don’t have pictures of a building, personas to reveal, or a government agency to name, what we do have is evidence of long- standing, focused operations that indicate a government sponsor – specifically, a government based in Moscow. We are tracking this group as APT28. Our clients often ask us to assess the threat Russia poses in cyberspace. Russia has long been a whispered frontrunner among capable nations for performing sophisticated network operations. This perception is due in part to the Russian government’s alleged involvement in the cyber attacks accompanying its invasion of Georgia in 2008, as well as the rampant speculation that Moscow was behind a major U.S. Department of Defense network compromise, also in 2008. These rumored activities, combined with a dearth of hard evidence,
  • 6. have made Russia into something of a phantom in cyberspace. 4 fireeye.com APT 28: A Window into Russia’s Cyber Espionage Operations? KEY FINDINGS GEORGIA EASTERN EUROPE SECURITY ORGANIZATIONS APT28 likely seeks to collect intelligence about Georgia’s security and political dynamics by targeting officials working for the Ministry of Internal Affairs and the Ministry of Defense. APT28 has demonstrated interest in Eastern European governments and security organizations. These victims would provide the Russian government with an ability to predict policymaker intentions and gauge its ability to influence public opinion. APT28 appeared to target individuals affiliated with European security organizations and global multilateral institutions. The Russian government has long cited European security organizations like NATO and the OSCE as existential threats, particularly during periods of increased tension in Europe.
  • 7. APT28 targets insider information related to governments, militaries, and security organizations that would likely benefit the Russian government. 5 fireeye.com APT 28: A Window into Russia’s Cyber Espionage Operations? KEY FINDINGS • Malware compile times suggest that APT28 developers have consistently updated their tools over the last seven years. • APT28 malware, in particular the family of modular backdoors that we call CHOPSTICK, indicates a formal code development environment. Such an environment would almost certainly be required to track and define the various modules that can be included in the backdoor at compile time. • APT28 tailors implants for specific victim environments. They steal data by configuring their implants to send data out of the network using a victim network’s mail server. • Several of APT28’s malware samples contain counter- analysis capabilities including runtime checks to identify an analysis environment, obfuscated strings unpacked at runtime, and the inclusion of unused machine instructions to slow analysis.
  • 8. Indicators in APT28’s malware suggest that the group consists of Russian speakers operating during business hours in Russia’s major cities. More than half of the malware samples with Portable Executable (PE) resources that we have attributed to APT28 included Russian language settings (as opposed to neutral or English settings), suggesting that a significant portion of APT28 malware was compiled in a Russian language build environment consistently over the course of six years (2007 to 2013). Over 96% of the malware samples we have attributed to APT28 were compiled between Monday and Friday. More than 89% were compiled between 8AM and 6PM in the UTC+4 time zone, which parallels the working hours in Moscow and St. Petersburg. These samples had compile dates ranging from mid-2007 to September 2014. Since 2007, APT28 has systematically evolved its malware, using flexible and lasting platforms indicative of plans for long-term use. The coding practices evident in the group’s malware suggest both a high level of skill and an interest in complicating reverse engineering efforts. Malware compile times suggest that APT28 developers have consistently updated their tools over the last seven years. 6 fireeye.com
  • 9. APT 28: A Window into Russia’s Cyber Espionage Operations? Three themes in APT28’s targeting clearly reflect areas of specific interest to an Eastern European government, most likely the Russian government. 7 Bloomberg. “Neiman Marcus Hackers Set Off 60,000 Alerts While Bagging Credit Card Data.” February 2014. 8 Ibid. 9 Ibid. APT28 TARGETING REFLECTS M any of APT28’s targets align generally with interests that are typical of any government. However, three themes in APT28’s targeting clearly reflects areas of specific interest to an Eastern European government, most likely the Russian government. These include the Caucasus (especially the Georgian government), Eastern European governments and militaries, and specific security organizations. APT28 uses spearphishing emails to target its victims, a common tactic in which the threat group crafts its emails to mention specific topics (lures) relevant to recipients. This increases the likelihood that recipients will believe that the email is legitimate and will be interested in opening the message, opening any attached files, or clicking on a link in the body of the email. Since spearphishing lures are tailored to the recipients
  • 10. whose accounts APT28 hopes to breach, the subjects of the lures provide clues as to APT28’s targets and interests. For example, if the group’s lures repeatedly refer to the Caucasus, then this most likely indicates that APT28 is trying to gain access to the accounts of individuals whose work pertains to the Caucasus. Similarly, APT28’s practice of registering domains that mimic those of legitimate news, politics, or other websites indicates topics that are relevant to APT28’s targets. We identified three themes in APT28’s lures and registered domains, which together are particularly relevant to the Russian government. In addition to these themes, we have seen APT28 target a range of political and military organizations. We assess that the work of these organizations serves nation state governments. RUSSIAN INTERESTS The Caucasus, particularly the country of Georgia Eastern European governments and militaries The North Atlantic Treaty Organization (NATO) and other European security organizations
  • 11. APT 28: Three Themes 7 fireeye.com APT 28: A Window into Russia’s Cyber Espionage Operations? T he Caucasus, a region that includes Chechnya and other Russian republics and the independent states of Georgia, Armenia, and Azerbaijan, continues to experience political unrest. The Georgian government’s posture and ties to the West are a frequent source of Moscow’s frustration, particularly after the 2008 war. Overall, issues in the Caucasus likely serve as focal points for Russian intelligence collection efforts. APT28 INTEREST IN THE CAUCASUS, PARTICULARLY GEORGIA Since 2011, APT28 has used lures written in Georgian that are probably intended to target Georgian government agencies or citizens. APT28 is likely seeking information on Georgia’s security and diplomatic postures. Specifically, the group has targeted the Georgian Ministry of Internal Affairs (MIA) and the Ministry of Defense (MOD). We also observed efforts to target a journalist working on issues in the Caucasus and a controversial Chechen news site.
  • 12. RUSSIA Chechnya GEORGIA Abkhazia TURKEY ARMENIA AZERBAIJAN Tbilisi Armenian Military Yerevan Kavkaz Center 8 fireeye.com APT28 Targeting of the Georgian Ministry of Internal Affairs (MIA) The MIA harbors sensitive information about the inner workings of Georgia’s security operations, the country’s engagement in multilateral institutions, and the government’s communications backbone. It is responsible for3: • Policing, internal security, and border patrols • Counterintelligence • Counterterrorism • International relations
  • 13. • Defense of Georgia’s strategic facilities and assets • “Operative-Technical” tasks APT28 made at least two specific attempts to target the MIA. In one case, we identified an APT28 lure from mid-2013 that referenced MIA-related topics and employed malware that attempted to disguise its activity as legitimate MIA email traffic. The lure consisted of a weaponized Excel file that presented a decoy document containing a list of Georgian driver’s 3 Georgian Ministry of Internal Affairs website http://police.ge/en/home 4 Queries on the author yielded a LinkedIn page for a person of the same name who serves as a system administrator in Tbilisi. license numbers. The backdoor attempted to establish a connection to a Georgian MIA mail server and communicate via MIA email addresses ending with “@mia.ge.gov”. Once connected to the mail server, APT28’s backdoor sent an email message using a subject line related to driver’s licenses (in Georgian), and attached a file containing system reconnaissance information. This tactic could allow APT28 to obtain data from the MIA’s network through a less-monitored route, limiting the MIA network security department’s abilities to detect the traffic. In the second example of MIA targeting, an APT28 lure used an information technology-themed decoy document that included references to the Windows domain “MIA UsersOrtachala…” (Figure 1).
  • 14. This probably referred to the MIA facility in the Ortachala district of Tbilisi, Georgia’s capital city. The decoy document also contains metadata listing “MIA” as the company name and “Beka Nozadze”4 as an author, a possible reference to a system administrator in Tbilisi. The text of the document purports to provide domain and user group setup APT28 made at least two specific attempts to target the Georgian Ministry of Internal Affairs. Georgian Ministry of Internal Affairs (MIA) APT 28: A Window into Russia’s Cyber Espionage Operations? 9 fireeye.com APT 28: A Window into Russia’s Cyber Espionage Operations? Figure 1: Georgian MIA-related decoy information for internal Windows XP and Windows 7 systems. APT28 possibly crafted this document to appear legitimate to all MIA system users and intended to breach the MIA network specifically using the embedded malware. APT28 Targeting of the Georgian Ministry of Defense APT28 also appeared to target Georgia’s MOD along with a U.S. defense contractor that was training the Georgian military. APT28 used a lure document that installed a SOURFACE downloader
  • 15. (further discussed in the Malware section) and contained a listing of birthdays for members of a working group between the Georgian MOD and the U.S. defense contractor. The U.S. contractor was involved in a working group to advise the MOD and Georgian Armed Forces, assess Georgia’s military capabilities, and develop a military training program for the country. 10 fireeye.com APT 28: A Window into Russia’s Cyber Espionage Operations? Figure 2: Excerpt of APT28’s letter to a journalist writing on Caucasus-related issues We believe that APT28’s targeting of the MOD aligns with Russian threat perceptions. The growing U.S.-Georgian military relationship has been a source of angst for Russia. Georgia and Russia severed diplomatic relations following the Russia-Georgia War in 2008, and Georgia has since sought to align itself more closely with western security organizations. Additionally, in June 2014, despite Russia’s vocal objections, Georgia, along with Ukraine and Moldova, signed association accords with the EU.5 This move placed all three countries more firmly in the EU’s political, economic, and security spheres of influence. Georgian military security issues, particularly with regard to U.S. cooperation and NATO, provide a strong incentive for Russian state-sponsored threat actors to steal information that sheds light on these topics.
  • 16. APT28 Targeting a Journalist Covering the Caucasus Another one of APT28’s lures appeared to target a specific journalist covering issues in the Caucasus region. In late 2013, APT28 used a lure that contained a letter addressing a journalist by his first name and claiming to originate from a “Chief Coordinator” in Reason Magazine’s “Caucasian Issues Department” - a division that does not appear to exist.6 (Reason Magazine is a US-based magazine) The letter welcomed the individual as a contributor and requested topic ideas and identification information in order to establish him at the magazine. In the background, the decoy document installed a SOURFACE backdoor on the victim’s system. We wish our cooperation will be both profitable and trusted. Our aim in the Caucasian region is to help people who struggle for their independence, liberty and human rights. We all know, that world is often unfair and cruel, but all together we can make it better. Send your articles on this email – in Russian or English, please. There are some difficulties with Caucasian languages, but we’ll solve the problem pretty soon, I hope. 5 “The EU’s Association Agreements with Georgia, the Republic of Moldova and Ukraine”. European Union Press Release Database. 23 June 2014. Web. http://e uropa.eu/rapid/press-release_MEMO-14- 430_en.htm
  • 17. 6 We attempted to identify candidate journalists in the country. One of these was a Georgian national of Chechen descent, whose work appears to center on Chechen and human rights issues. Ultimately, however, we cannot confirm the identity of the target(s). Targeting journalists could provide APT28 and its sponsors with a way to monitor public opinion, identify dissidents, spread disinformation, or facilitate further targeting. 11 fireeye.com APT 28: A Window into Russia’s Cyber Espionage Operations? The body of the letter suggests that APT28 actors are able to read at least two languages – Russian and English. The grammar of the letter also indicates that English is not the author’s first language, despite it purportedly originating from a US-based magazine. This implies that Russian may be the APT28 author’s preferred language. Targeting journalists could provide APT28 and its sponsors with a way to monitor public opinion, identify dissidents, spread disinformation, or facilitate further targeting. Several other nation states are suspected of targeting journalists and dissidents to monitor their activity, including China and Iran.7,8 Journalists in the Caucasus working on Caucasus independence issues would be a prime target for intelligence collection for Moscow. Journalists critical of the Kremlin have long been targets of surveillance and harassment,
  • 18. and a number of governments and human rights organizations have publicly criticized the government for its treatment of journalists and its increasing consolidation of control over the media.9 APT28’s Other Targets in the Caucasus We have seen APT28 register at least two domains mimicking the domains of legitimate organizations in the Caucasus, as shown in the table below. One APT28 domain imitated a key Chechen-focused news website, while the other appeared to target members of the Armenian military by hosting a fake login page. Of particular note, the Kavkaz Center is a Chechen-run website designed to present an alternative view to the long-running conflict between Russia and Chechen separatists. In 200410 and 2013,11 Russia’s Foreign Minister voiced his displeasure that a Swedish company continues to host the Kavkaz Center website. 7 Moran, Ned, Villeneuve, Nart, Haq, Thofique, and Scott, Mike. “Operation Saffron Rose”. FireEye. 13 May 2014. Web. http://www.fireeye.com/blog/technical/ malware-research/2014/05/operation-saffron-rose.html 8 The New York Times publicly disclosed their breach by APT12, which they assess was motivated by the China-based actors’ need to know what the newspaper was publishing about a controversial topic related to corruption and the Chinese Communist Party’s leadership. 9 “Russia”. Freedom House Press Release. 2013. Web. http://www.freedomhouse.org/report/freedom- press/2013/russia#.VD8fe9R4rew
  • 19. 10“Chechen website promotes terror: Lavrov”. UPI. 16 November 2014. Web. http://www.upi.com/Top_News/2004/11/16/Chechen-website- promotes- terror-Lavrov/UPI-11601100627922/ 11“Lavrov urges Sweden to ban Chechen website server” The Voice of Russia. 15 May 2013. Web. http://voiceofrussia.com/news/2013_05_15/Lavrov-urges- Sweden-to-ban-Chechen-website-server/ Table 1: Examples of APT28 domains imitating organizations in the Caucasus APT28 Domain Real Domain kavkazcentr[.]info The Kavkaz Center / The Caucasus Center, an international Islamic news agency with coverage of Islamic issues, particularly Russia and Chechnya (kavkazcenter.com) rnil[.]am Armenian military (mil.am) 12 fireeye.com APT 28: A Window into Russia’s Cyber Espionage Operations? E astern European countries’ political and military postures are traditionally core Russian government interests. The Kremlin has long regarded the former Soviet Republics and satellite states as in its sphere of economic, political, and
  • 20. military interest. Over the past two decades, as many of these states joined NATO and the EU, Russia has attempted to regain its influence in the region. Many of APT28’s targets parallel this continued focus on Eastern European governments and militaries. APT28 Targets Eastern European Government Organizations We have evidence that APT28 made at least two attempts to compromise Eastern European government organizations: • In a late 2013 incident, a FireEye device deployed at an Eastern European Ministry of Foreign Affairs detected APT28 malware in the client’s network. • More recently, in August 2014 APT28 used a lure (Figure 3) about hostilities surrounding a Malaysia Airlines flight downed in Ukraine in a probable attempt to compromise the Polish government. A SOURFACE sample employed in the same Malaysia Airlines lure was referenced by a Polish computer security company in a blog post.12 The Polish security company indicated that the sample was “sent to the government,” presumably the Polish government, given the company’s location and visibility. 12 “MHT, MS12-27 Oraz *malware*.info” [email protected] 11 August 2014. Web. http://malware.prevenity.com/2014/08/malware-info.html Figure 3: Decoy MH17 document probably sent
  • 21. to the Polish government APT28 TARGETING OF EASTERN EUROPEAN GOVERNMENTS AND MILITARIES 13 fireeye.com APT 28: A Window into Russia’s Cyber Espionage Operations? APT28 has registered domains similar to those of legitimate Eastern European news sites and governments, listed in Table 2. These domain registrations not only suggest that APT28 is interested in Eastern European political affairs, but also that the group targets Eastern European governments directly. In addition, APT28 used one domain for command and control sessions (baltichost[.]org) that was themed after the Baltic Host exercises. Baltic Host is a multinational logistics planning exercise, hosted annually since 2009 by one of the three Baltic States (Estonia, Latvia, and Lithuania, all three of which are on Russia’s border) on a rotational basis. In June 2014, this event was integrated with a larger U.S. Army training event, and focused on exercises to improve interoperability with regional allies and partners.13, 14 This domain registration suggests that APT28 sought to target individuals either participating in the exercises or interested in Baltic military and
  • 22. security matters. Such targets would potentially provide APT28 with sensitive tactical and strategic intelligence concerning regional military capabilities and relationships. These exercises are a particular point of interest in Moscow: pro- Kremlin press cited Russia’s interpretation of these military exercises and NATO’s involvement as a “sign of aggression,” and Russia’s Foreign Minister publicly stated that the exercise was “a demonstration of hostile intention.”15 Table 2: Examples of APT28 domains imitating legitimate Eastern European organization names APT28 Domain Real Domain standartnevvs[.]com Bulgarian Standart News website (standartnews.com) novinitie[.]com, n0vinite[.]com Bulgarian Sofia News Agency website (novinite.com) qov[.]hu[.]com Hungarian government domain (gov.hu) q0v[.]pl, mail[.]q0v[.]pl Polish government domain (gov.pl) and mail server domain (mail.gov.pl) poczta.mon[.]q0v[.]pl Polish Ministry of Defense mail server domain (poczta.mon.gov.pl) 13 “Saber Strike and Baltic Host kick off in Latvia, Lithuania and Estonia’. Estonian Defense Forces. 9 June 2014. Web. 11 June 2014. http://www.mil.ee/en/ news/8251/saber-strike-and-baltic-host-kick-off-in-latvia,- lithuania-and-estonia
  • 23. 14 “Baltic Host 2014 rendering host nation support for the training audience of Exercise Saber Strike 2014 and repelling faked cyber-attacks”. Republic of Lithuania Ministry of National Defense. 12 June 2014. Web. http://www.kam.lt/en/news_1098/current_issues/baltic_host_20 14_rendering_host_nation_ support_for_the_training_audience_of_exercise_saber_strike_20 14_and_repelling_faked_cyber-attacks.html 15 “Tanks, troops, jets: NATO countries launch full-scale war games in Baltic”. Russia Today. 9 June 2014. Web. http://rt.com/news/164772-saber-strike- exercise-nato/ We have evidence that APT28 made at least two attempts to compromise Eastern European government organizations. 14 fireeye.com APT 28: A Window into Russia’s Cyber Espionage Operations? A PT28’s lures and domain registrations also demonstrate their interest in NATO and other European security organizations. NATO remains a chief Russian adversary, or in the words of Russia’s 2010 military doctrine, a “main external military danger” particularly as it moves “closer to the borders of the Russian Federation.”16 As the traditional western counterweight to the
  • 24. Soviet Union, Russia regards NATO, particularly NATO’s eastward expansion, as a threat to Russia’s strategic stability. APT28 also registered a domain name imitating the Organization for Security and Cooperation in Europe (OSCE), an intergovernmental organization that has cited widespread fraud in numerous Russian state elections. Insider information about NATO, the OSCE and other security organizations would inform Russian political and military policy. Several of the domains APT28 registered imitated NATO domain names, including those of NATO Special Operations Headquarters and the NATO Future Forces Exhibition. We also observed a user that we suspect works for NATO HQ submit an APT28 sample to VirusTotal, probably as a result of receiving a suspicious email. Table 3: Examples of APT28 domains imitating legitimate NATO and … MLA 8th Edition Formatting and Style Guide Purdue OWL Staff Brought to you in cooperation with the Purdue Online Writing Lab Welcome to “MLA Formatting and Style Guide“. This Power Point Presentation is designed to introduce your students to the
  • 25. basics of MLA Formatting and Style. You might want to supplement the presentation with more detailed information available on the OWL’s “MLA Formatting and Style Guide“ at http://owl.english.purdue.edu/owl/resource/747/01/ Designer: Ethan Sproat Based on slide designs from the OWL “APA Formatting and Style Guide “powerpoint by Jennifer Liethen Kunka and Elena Lawrick. Contributors: Tony Russell, Alllen Brizee, Jennifer Liethen Kunka, Joe Barbato, Dave Neyhart, Erin E. Karper, Karl Stolley, Kristen Seas, Tony Russell, and Elizabeth Angeli. Revising Author: Arielle McKee, 2014 * MLA (Modern Language Association) Style formatting is often used in various humanities disciplines. In addition to the handbook, MLA also offers The MLA Style Center, a website that provides additional instruction and resources for writing and formatting academic papers. https://style.mla.org/ What is MLA? The MLA Handbook for Writers of Research Papers, 8th ed. supersedes both the 7th edition handbook and the MLA Style Manual and Guide to Scholarly Publishing, 3rd ed. The style of documentation outlined in the 8th edition serves the needs of students who are writing research papers, as well as scholars who publish professionally. This presentation will mostly focus on MLA formatting and style concerns that affect writing research papers.
  • 26. MLA style is often used in the following disciplines: humanities, languages, literature, linguistics, philosophy, communication, religion, and others. MLA format provides writers with a uniform format for document layout and documenting sources. Proper MLA style shows that writers are conscientious of the standards of writing in their respective disciplines. Properly documenting sources also ensures that an author is not plagiarizing. * MLA regulates: document formatin-text citationsworks-cited list What does MLA regulate? This slide presents three basic areas regulated by MLA students need to be aware of—document format, in-text citations, and works cited. The following slides provide detailed explanations regarding each area. * The 8th edition handbook introduces a new way to cite sources. Instead of a long list of rules, MLA guidelines are now based on a set of principles that may be used to cite any type of source. The three guiding principles: Cite simple traits shared by most works.Remember that there is more than one way to cite the same source.Make your
  • 27. documentation useful to readers. MLA Update 2016 Principle 1: In previous versions of the MLA Handbook, an entry in the works-cited list was based on the source’s publication format (book, periodical, Web article, etc.). The issue with that system is that a work in a new type of medium could not be properly cited until MLA created a format for it. In the current system, sources are documented based on facts that are common to all types of publications, such as author, title, and year. Now, in order to cite a source, a writer now must examine it and document it based on a set of universal principles (more about that to come). Principle 2: Two scholars may use the same source differently. Therefore, a writer who is working on a specialized topic in a particular field will include documentation information that a writer who is using the source more generally will not. Principle 3: As a writer, you document sources so that your readers may locate them and learn more about your particular argument or essay. Proper citation demonstrates your credibility by showing that you’ve thoroughly researched your topic. Your citations must be comprehensive and consistent so that readers may find the sources consulted and come to their own opinions on your topic. * This presentation will cover:
  • 28. How to format a paper in MLA style (8th ed.)General guidelinesFirst page formatSection headings In-text citationsFormatting quotations Documenting sources in MLA style (8th ed.)Core elementsList of works cited Overview This PPT will cover the 2016 updates to the 8th edition of the MLA Handbook: how to format a paper, create in-text citations, and document sources. * Basic rule for any formatting style: Always Follow your instructor’s guidelines Your Instructor Knows Best Many instructors who require their students to use MLA formatting and citation style have small exceptions to different MLA rules. Every bit of instruction and direction given in this presentation comes with this recommendation: ALWAYS follow the specific instructions given by your instructor. * An MLA Style paper should: Be typed on white 8.5“ x 11“ paper Double-space everything Use 12 pt. Times New Roman
  • 29. (or similar) font Leave only one space after punctuation Set all margins to 1 inch on all sides Indent the first line of paragraphs one half-inch Format: General Guidelines The entire document should be double-spaced, including the heading, block quotations, footnotes/endnotes, and list of works cited. There should be no extra space between paragraphs.Leave only one space after periods or other punctuation marks (unless otherwise instructed by your instructor).Set the margins of your document to 1 inch on all sidesIndent the first line of paragraphs one half-inch from the left margin. MLA recommends that you use the Tab key as opposed to pushing the Space Bar five times. * The first page of an MLA Style paper will:Have no title pageDouble space everythingList your name, your instructor's name, the course, and date in the upper left-hand cornerCenter the paper title (use standard caps but no underlining, italics, quote marks, or bold typeface)Use italics for titles Formatting the 1st Page ・ Do not make a title page for your paper unless specifically requested ・ In the upper left-hand corner of the first page, list your name, your instructor's name, the course, and the date. Again, be sure to use double-spaced text. ・ Double space again and center the title. Do not underline, italicize, or place your title in quotation marks; write the title in Title Case (standard capitalization), not
  • 30. in all capital letters. ・ Use quotation marks and/or italics when referring to other works in your title, just as you would in your text: Fear and Loathing in Las Vegas as Morality Play; Human Weariness in “After Apple Picking“ ・ Double space between the title and the first line of the text. ・ Create a header in the upper right-hand corner that includes your last name, followed by a space with a page number; number all pages consecutively with Arabic numerals (1, 2, 3, 4, etc.), one-half inch from the top and flush with the right margin. (Note: Your instructor or other readers may ask that you omit last name/page number header on your first page. Always follow instructor guidelines.) * Sample 1st Page ・ Do not make a title page for your paper unless specifically requested ・ In the upper left-hand corner of the first page, list your name, your instructor's name, the course, and the date. Again, be sure to use double-spaced text. ・ Double space again and center the title. Do not underline, italicize, or place your title in quotation marks; write the title in Title Case (standard capitalization), not in all capital letters. ・ Use quotation marks and/or italics when referring to other works in your title, just as you would in your text: Fear and Loathing in Las Vegas as Morality Play; Human Weariness in “After Apple Picking“ ・ Double space between the title and the first line of the text.
  • 31. ・ Create a header in the upper right-hand corner that includes your last name, followed by a space with a page number; number all pages consecutively with Arabic numerals (1, 2, 3, 4, etc.), one-half inch from the top and flush with the right margin. (Note: Your instructor or other readers may ask that you omit last name/page number header on your first page. Always follow instructor guidelines.) * An in-text citation is a brief reference in your text that indicates the source you consulted. It should direct readers to the entry in your works-cited list for that source. It should be unobtrusive: provide the citation information without interrupting your own text. In general, the in-text citation will be the author’s last name (or abbreviated title) with a page number, enclosed in parentheses. In-Text Citations: the Basics Basic In-Text Citation Rules The source information in a parenthetical citation should direct readers to the source’s entry in the works-cited list. The in-text citation should be placed, if possible, where there is a natural pause in your text. If the citation refers to a direct quotation, it should be placed directly following the closing quotation mark. Any source information that you provide in-text must correspond to the source information on the works-cited page. More specifically, whatever signal word or phrase you provide to your readers in the text, must be the first thing that appears on the left-hand margin of the corresponding entry in the works- cited list (so the author’s last name or the title, usually, with no
  • 32. punctuation in between) * In-text Example: Corresponding Works Cited Entry: Wordsworth, William. Lyrical Ballads. Oxford UP, 1967. Author-Page Style Wordsworth stated that Romantic poetry was marked by a “spontaneous overflow of powerful feelings” (263). Romantic poetry is characterized by the “spontaneous overflow of powerful feelings” (Wordsworth 263). Wordsworth extensively explored the role of emotion in the creative process (263). In-Text Citations: Author-Page Style MLA format follows the author-page method of in-text citation. This means that the author's last name and the page number(s) from which the quotation or paraphrase is taken must appear in the text, and a complete reference should appear in your works- cited page. The author's name may appear either in the sentence itself or in parentheses following the quotation or paraphrase, but the page number(s) should always appear in the parentheses, not in the text of your sentence.
  • 33. The both citations in the in-text examples on this slide, (263) and (Wordsworth 263), tell readers that the information in the sentence can be located on page 263 of a work by the author, William Wordsworth. If readers want more information about this source, they can turn to the works-cited list, where, under Wordsworth, they would find the information in the corresponding entry also shown on this slide. * Print Source with Author For the following print source Burke, Kenneth. Language as Symbolic Action: Essays on Life, Literature, and Method. U of California P, 1966. If the essay provides a signal word or phrase—usually the author’s last name—the citation does not need to also include that information. Examples: Humans have been described by Kenneth Burke as “symbol- using animals” (3). Humans have been described as “symbol-using animals” (Burke 3). In-text Citations for Print Sources with Known Author For print sources like books, magazines, scholarly journal articles, and newspapers, provide a signal word or phrase
  • 34. (usually the author’s last name) and a page number. If you provide the signal word/phrase in the sentence, you do not need to include it in the parenthetical citation. These examples must correspond to an entry that begins with Burke, which will be the first thing that appears on the left-hand margin of an entry in the works-cited list (as noted in the corresponding entry on this slide). See comments from previous slide. * How to cite a work with no known author: We see so many global warming hotspots in North America likely because this region has “more readily accessible climatic data and more comprehensive programs to monitor and study environmental change…” (“The Impact of Global Warming” 6). With Unknown Author In-text Citations for Print Sources with No Known Author When a source has no known author, use a shortened title of the work instead of an author name. Place the title in quotation marks if it's a short work (e.g. articles) or italicize it if it's a longer work (e.g. plays, books, television shows, entire websites) and provide a page number. In this example, since the reader does not know the author of the article, an abbreviated title of the article appears in the parenthetical citation which corresponds to the full name of the article which appears first at the left-hand margin of its respective entry in the works-cited list. Thus, the writer includes the title in quotation marks as the signal phrase in the parenthetical citation in order to lead the reader directly to the source on the works-cited page. See comments from previous
  • 35. slide. * Corresponding Entry in the List of Works Cited: “The Impact of Global Warming in North America.” Global Warming: Early Signs. 1999. Accessed 23 Mar. 2009. With Unknown Author And this is how the works-cited listing should look. While this entry is technically correct, it would help your readers more readily access the source if you include the URL here (it would go before the access date). * Works with Multiple Editions In-text example: Marx and Engels described human history as marked by class struggles (79; ch. 1). Authors with Same Last Names In-text example: Although some medical ethicists claim that cloning will lead to designer children (R. Miller 12), others note that the advantages for medical research outweigh this consideration (A. Miller 46). Other In-Text Citations 1 In parenthetical citations of a literary work available in multiple editions, such as a commonly studied novel, it is often helpful
  • 36. to provide division numbers in addition to page numbers so that your readers can find your references in any edition of the work. Make sure that your in-text citations refer unambiguously to the entry in your works-cited list. If you are citing from the works of two different authors with the same last name, include the author’s first initial in your reference). * Work by Multiple Authors In-text Examples: Smith et al. argues that tougher gun control is not needed in the United States (76). The authors state: “Tighter gun control in the United States erodes Second Amendment rights” (Smith et al. 76). A 2016 study suggests that stricter gun control in the United States will significantly prevent accidental shootings (Strong and Ellis 23). Other In-Text Citations 2 Citing a Work by Multiple Authors If the entry in the works-cited list begins with the names of two authors, include both last names in the in-text citation, connected by and. If the source has three or more authors, the entry in the works- cited list should begin with the first author’s name followed by et al. The in-text citation should follow suit. *
  • 37. Multiple Works by the Same Author In-text examples: Lightenor has argued that computers are not useful tools for small children (“Too Soon” 38), though he has acknowledged elsewhere that early exposure to computer games does lead to better small motor skill development in a child's second and third year (“Hand-Eye Development” 17). Visual studies, because it is such a new discipline, may be “too easy” (Elkins, “Visual Studies” 63). Other In-Text Citations 3 Citing Multiple Works by the Same Author If you cite more than one work by a particular author, include a shortened title for the particular work from which you are quoting to distinguish it from the others. This is illustrated in the first example on this slide. Additionally, if the author's name is not mentioned in the sentence, format your citation with the author's name followed by a comma, followed by a shortened title of the work, followed, when appropriate, by page numbers. This is illustrated in the second example on this slide. * Works in time-based media In-text example: Buffy’s promise that “there’s not going to be any incidents like at my old school” is obviously not one on which she can follow through (“Buffy” 00:03:16-17).
  • 38. Works-cited entry: “Hush.” Buffy the Vampire Slayer, created by Joss Whedon, performance by Sarah Michelle Gellar, season 4, episode 10, Mutant Enemy,1999. Other In-Text Citations 6 For works in time-based media, such as audio and video recordings, cite the relevant time or range of times. Give the numbers of the hours, minutes, and seconds as displayed in your media player, separating the numbers with colons. * Sources without page numbers In-text example: Disability activism should work toward “creating a habitable space for all beings” (Garland-Thomson). Corresponding works-cited entry: Garland-Thomson, Rosemarie. “Habitable Worlds.” Critical Disability Studies Symposium. Feb. 2016, Purdue University, Indiana. Address. Other In-Text Citations 7 When a source has no page numbers or any other kind of part number, no number should be given in a parenthetical citation. Do not count unnumbered paragraphs, pauses, or other parts.
  • 39. This is an example of how to cite a direct quotation from an oral address. * Short prose quotations In-text example: According to Foulkes's study, dreams may express “profound aspects of personality” (184). Is it possible that dreams may express “profound aspects of personality” (Foulkes 184)? Formatting Short Quotations (in Prose) Short Quotations If a prose quotation runs no more than four lines and requires no special emphasis, put it in quotation marks and incorporate it into the text.. Provide the author and specific page citation in the text, and include a complete entry in the works-cited page. Punctuation marks such as periods, commas, and semicolons should appear after the parenthetical citation. Question marks and exclamation points should appear within the quotation marks if they are a part of the quoted passage but after the parenthetical citation if they are a part of your text. * Quoting four or more lines of prose In-text example: Nelly Dean treats Heathcliff poorly and dehumanizes him throughout her narration: They entirely refused to have it in bed with them, or even
  • 40. in their room, and I had no more sense, so, I put it on the landing of the stairs, hoping it would be gone on the morrow. By chance, or else attracted by hearing his voice, it crept to Mr. Earnshaw's door, and there he found it on quitting his chamber. Inquiries were made as to how it got there; I was obliged to confess, and in recompense for my cowardice and inhumanity was sent out of the house. (Bronte 78) Formatting Long Quotations (in Prose) In quotations that are four or more lines of text, start the quotation on a new line, with the entire quote indented half an inch from the left margin; maintain double-spacing. Do not indent the first line an extra amount or add quotation marks not present in the original. Use a colon to introduce the quotation (unless your introductory wording does not require punctuation). Your parenthetical citation should come after the closing punctuation mark. Note: If a new paragraph begins in the middle of the quotation, indent its first line. * Each entry in the list of works cited is made up of core elements given in a specific order. The core elements should be listed in the order in which they appear here. Each element is followed by the punctuation mark shown here.
  • 41. Works Cited: The Basics While earlier editions of the MLA Handbook showed writers how to create a works-cited entry based on the source’s publication format (book, periodical, film, etc.), the updated 8th edition demonstrates that documentation should be created by consulting the list of core elements. Rather than asking: “how do I cite a book, DVD, or webpage,” the writer now creates an entry by looking at the list of core elements– which are facts common to most works– and assembling them in a specific order. These changes have been made to reflect the differences in how we consult works. In the updated model, the writer should ask: “who is the author?” and “what is the title?”, regardless of the nature of the source. The following slides will explain each of the core elements, and how they might differ from one medium to another. * Author. Begin the entry with the author’s last name, followed by a
  • 42. comma and the rest of the name, as presented in the work. End this element with a period. Examples: Baron, Naomi S. “Redefining Reading: The Impact of Digital Communication Media.” PMLA, vol. 128, no. 1, Jan. 2013, pp. 193-200. Jacobs, Alan. The Pleasures of Reading in an Age of Distraction. Oxford UP, 2011. Works-cited List: Author While these examples are in different mediums (the first one is a periodical, the second is a printed book), they are both formatted according to the list of key elements. Note: there are other types of author situations, such as multiple authors, translators, editors, corporate authors, performers, and pseudonyms (such as online user names). Refer to the 8th edition handbook or the MLA online Style Center https://style.mla.org/ for more information. * Title of source. Books and websites should be in italics: Hollmichel, Stefanie. So Many Books. 2003-13, somanybooksblog.com. Linett, Maren Tova. Modernism, Feminism, and Jewishness.
  • 43. Cambridge UP, 2007. Periodicals (journal, magazine, newspaper article), television episodes, and songs should be in quotation marks: Beyoncé. “Pretty Hurts.” Beyoncé, Parkwood Entertainment, 2013, Goldman, Anne. “Questions of Transport: Reading Primo Levi Reading Dante.” The Georgia Review, vol. 64, no. 1, 2010, pp. 69-88. Works-cited List: Title of Source The title of the source should follow the author’s name. Depending upon the type of source, it should be listed in italics or quotation marks. * Title of container, Examples: Bazin, Patrick. “Toward Metareading.” The Future of the Book, edited by Geoffrey Nunberg, U of California P, 1996, pp. 153-68. Hollmichel, Stefanie. “The Reading Brain: Differences between Digital and Print.” So Many Books, 25 Apr. 2013, “Under the Gun.” Pretty Little Liars, season 4, episode 6, ABC
  • 44. Family, Hulu, 16 July 2013. Works-cited List: Title of Container Containers are the larger wholes in which the source is located. For example, if you want to cite a poem that is listed in a collection of poems, the individual poem is the source, while the larger collection is the container. The title of the container is usually italicized and followed by a comma, since the information that follows next describes the container. In the first example, “Toward Metareading” is the title of an essay, and The Future of the Book is the title of the edited collection in which the essay appears. The container may also be a website, which contains articles, postings, and other works. The container may also be a television series, which is made up of episodes. * Other contributors, Examples: Chartier, Roger. The Order of Books: Readers, Authors, and Libraries in Europe between the Fourteenth and Eighteenth Centuries. Translated by Lydia G. Cochrane, Stanford UP, 1994. “Hush.” Buffy the Vampire Slayer, created by Joss Whedon, performance by Sarah Michelle Gellar, season 4, episode 10,
  • 45. Mutant Enemy, 1999. Woolf, Virginia. Jacob’s Room. Annotated and with an introduction by Vara Neverow, Harcourt, Inc., 2008. Works-cited List: Other Contributors In addition to the author, there may be other contributors to the source who should be credited, such as editors, illustrators, performers, translators, etc. If their contributions are relevant to your research, or necessary to identify the source, include their names in your documentation. Note: In the eighth edition, terms like editor, illustrator, translator, etc., are no longer abbreviated. * Publisher, The publisher produces or distributes the source to the public. If there is more than one publisher, and they are all are relevant to your research, list them in your citation, separated by a forward slash (/). Examples: Harris, Charles “Teenie.” Woman in a Paisley Shirt behind Counter in Record Store. Teenie Harris Archive, Carnegie Museum of Art, Pittsburgh, teenie.cmoa.org/interactive/index.html#date08. Jacobs, Alan. The Pleasures of Reading in an Age of Distraction. Oxford UP, 2011.
  • 46. Kuzui, Fran Rubel, director. Buffy the Vampire Slayer. Twentieth Century Fox, 1992. Works-cited List: Publisher Note: the publisher’s name need not be included in the following sources: periodicals, works published by their author or editor, a Web cite whose title is the same name as its publisher, a Web cite that makes works available but does not actually publish them (such as YouTube, WordPress, or JSTOR). * Optional elements: Date of original publication: Franklin, Benjamin. “Emigration to America.” 1782. The Faber Book of America, edited by Christopher Ricks and William L. Vance, Faber and Faber, 1992, pp. 24- 26. City of publication: Goethe, Johann Wolfgang von. Conversations of Goethe with Eckermann and Soret. Translated by John Oxenford, new ed., London, 1875.
  • 47. Works-cited List: Optional Elements Date of original publication: If a source has been published on more than one date, the writer may want to include both dates if it will provide the reader with necessary or helpful information. City of publication: this is only necessary in particular instances, such as in a work published before 1900. Since pre- 1900 works were usually associated with the city in which they were published, your documentation may substitute the city name for the publisher’s name. * Optional elements: URLs – NO URLs for my classes DOIs (digital object identifier) Chan, Evans. “Postmodernism and Hong Kong Cinema.” Postmodern Culture, vol. 10, no. 3, May 2000. Project Muse, doi: 10.1353/pmc.2000.0021. Date of access - INCLUDE “Under the Gun.” Pretty Little Liars, season 4, episode 6, ABC Family, 16 July 2013. Hulu, Accessed 23 July 2013.
  • 48. Works-cited List: Optional Elements URLs: use at your instructor’s discretion. DOIs: a series of digits and letters that leads to the location of an online source. Articles in journals are often assigned DOIs to ensure that the source is locatable, even if the URL changes. If your source is listed with a DOI, use that instead of a URL. Date of access: When you cite an online source, always include the date on which you accessed the material, since an online work may change or move at any time. * Purdue University Writing Lab Heavilon 226 Web: http://owl.english.purdue.edu/ Phone: (765) 494-3723 Email: [email protected] Where to Go to Get More Help Rationale: Purdue students are invited to meet with a tutor to assist with writing challenges on an individual basis. Viewers outside of Purdue may receive assistance through the OWL (Online Writing Lab) and answers to quick questions through the OWL email service. *
  • 49. The End MLA 8th Edition Formatting Style Guide Brought to you in cooperation with the Purdue Online Writing Lab Task: Fix what is wrong with the numbered/highlighted area or explain what is wrong. For example, number 1 - the punctuation is in the wrong place. It should go after the citation. All citations as well as in text must follow the MLA format. There is a total of 11 highlighted parts. Technology Bettering Schools in Low Income Areas With the country in a state of depression, public schools from coast to coast are experiencing budget cuts which are preventing children from getting the best education possible. Technology is the future for most of these children and with public schools providing more computers, iPads, SMARTboards and other advanced technology it will help get them one step closer to success. In North Carolina alone, 46% of children live in low-income families and have fewer opportunities to succeed because of that. (Clayton) (1)____________ These children deserve just as much as the other kids. Right now times are hard for alot of people and sometimes parents forget what they do will affect their children. The exact problem of no technology is low-income areas has not been addressed directly but some organizations such as the Best Kids Foundation are reaching out to help poor student who need help to get to college. Their theme is "Education: A Gift to Children, A Better Future (James Anderson).” (2)____________
  • 50. This foundation is more international and helps the poor kids receive a better education. Technology can actually improve kid’s grades. During a study done by the Educational Testing Service the results said, “Math achievement improved when computers were used to address higher order thinking” (Computers Help Our Kids Learn). (3)______________ “Technology has certainly changed family life in the past few years. From the way we communicate, educate our children, and socialize with friends, to the way we tend our personal business and entertain ourselves, it's a bold new world” (“Connected Kids”). (4)______________ The Wake County Public School system has 143,289 students in 163 schools. There are 20 high schools in the district in total (Franks). Superintendent Anthony J. Tata says "Nobody is happy with a 6 percent cut in funding [in Wake County public schools], but there were a lot of rumors of 10 percent, and I would just say, 'Steady in the foxhole; let's wait” (“Budget Cuts”). (5)_______________ In an interview with Green Hope High School’s assistant principle, I am able to prove exactly what technology has done to make Green Hope one of the top schools in the county. “Technology is used every day by every teacher to track, access and direct students learning and progress” (email interview). (6)__________________ The Argument of Technology in Low Income areas is that the kids will not have good future when they grow up. It will stunt there learning abilities because they will not learn as well on computers. If a student graduates high school without at least a rudimentary and working knowledge of new technologies, their future starts looking a lot less bright” (The Benefit and Danger of Education Technology). (7)__________ Work Cited Anderson, James. “Technology Issues,” The Filipino Daily. 14
  • 51. July 2013 Cindrich, Sharon M. "Connected Kids." (8)_ (what is missing?)_________, 20 July 2013. Clayton, Christopher. E-mail interview. 27 July 2013. Franks, George. "High School Graduation." CountyHealthRankings.gov. 21 Nov 2011. (9)______________ Langley, Jesse. The Benefit and Danger of Education Technology, NWeducation.edu, 24 July 2013. Minchin, Marty. "Budget Cuts Will Affect Schools State Wide." Piedmont.com. 20 July 2013. (10)_____________ "Computers Help Our Kids Learn." Toronto Star, Editors: John Schiefel and Howard Smith. 6 July 2013. (11)____________ CMIT 495, Paper Guidelines This is applicable to ALL papers submitted during this class session.Guidelines · Every paper MUST conform to APA Standards and will be graded as such. Below are additional requirements for every paper. · Resources for APA: · UMGC Library - https://sites.umgc.edu/library/libhow/gethelp-citing.cfm · Purdue University - https://owl.purdue.edu/owl/research_and_citation/apa_style/apa _formatting_and_style_guide/general_format.html · Publication Manual of the American Psychological Association, 6th Edition – amazon . (If you continue with your Master’s Program at UMGC, this book will be useful. Your Professor owns it and will reference this book). · Every submitted paper has a title, author, course and section, followed by the Professors information on the first page. The title is centered, three inches from top of the page. The title must be centered in all caps and be the Title of the assignment due. The course and section identifiers must be on the second
  • 52. line below the title, centered. · Every submitted paper should have a Table of Contents (TOC). The second page is where the TOC should be next, followed by the body and then the reference pages. · Note: Only the Body of the paper (e.g. not the Title Page, TOC, or Reference page) count towards page count. · Text must be in Times or Times New Roman font, 11pt, 1.5 line or double spacing. · In the Body of paper, pages must be numbered at the bottom, with the page number centered right on the page. · When the paper states page count, the paper must be a full page to qualify -half pages do not count). Example if minimum page count is 5, the body of the paper MUST BE a full/complete five pages to count. It must also conform to APA standards. · At least five authoritative/scholarly sources are a minimum per paper. Outside references are required (anonymous authors, Wikipedia, any news site/source, any blog site, etc. are not acceptable as scholarly sources). · Appropriate citations are required. See the syllabus regarding plagiarism policies. · Original Papers are to be submitted in word document format, not pdf or alternate format. · The Turnitin Originality ReportIN FULL must be submitted in the assignments folder in Adobe .pdf format. · This will be graded on quality of research topic, quality of paper information, use of citations, grammar and sentence structure, and creativity