Стрелы кентавра. Кибервойна по-американски. Леонид Савин

Читать онлайн.
Название Стрелы кентавра. Кибервойна по-американски
Автор произведения Леонид Савин
Жанр Политика, политология
Серия
Издательство Политика, политология
Год выпуска 2020
isbn 978-5-901635-98-8



Скачать книгу

align="center">

      70

      Allardice, Robert and Topic, George. Battlefield Geometry in our Digital Age. From Flash to Bang in 22 Milliseconds. PRISM 7, No. 2, 2017. p. 79.

      71

      Ibidem. p. 80.

      72

      Ibidem. p. 82.

      73

      The Joint Chiefs of Staff, Department of Defense Dictionary of Military and Associated Terms. Washington, D.C.: Joint Chiefs of Staff, 2017. p. 58.

      74

      Lee, Robert M. The Interim Years of Cyberspace // Air & Space Power Journal, January-February 2013. p. 63.

      75

      Trias, Eric D. and Bell, Bryan M. Cyber This, Cyber That. . So What? // Air & Space Power Journal. Spring 2010. p. 96–67.

      76

      Stewart, Kenneth. Cyber Security Hall of Famer Discusses Ethics of Cyber Warfare. America’s Navy, 6/4/2013. http://www.navy.mil/submit/display. asp?story_id=74613

      77

      Alfonso, Kristal L. M. A Cyber Proving Ground. The Search for Cyber Genius // Air & Space Power Journal. Spring 2010. p. 61

      78

      Ibidem. p. 64–66.

      79

      Arquilla J. Cyberwar Is Already Upon Us // Foreign Policy, March/April 2012. http://www.foreignpolicy.com/articles/2012/02/27/cyberwar_is_already_ upon_us

      80

      Trias, Eric D. and Bell, Bryan M. Cyber This, Cyber That. . So What? // Air & Space Power Journal. Spring 2010. p. 91.

      81

      Ibidem. pp. 92–97.

      82

      Reed, Thomas C. At the Abyss: An Insider’s History of the Cold War. NY: Random House, 2004. https://archive.org/details/atabyssinsidersh00reed

      83

      Sebenius, Alyza. Writing the Rules of Cyberwar // The Atlantic, June 28, 2017.

      https://www.theatlantic.com/international/archive/2017/06/cyberattack-rus-sia-ukraine-hack/531957/

      84

      Hersh, Seymour. The Online Threat. Should we be worried about a cyber war? // The New Yorker, November 1, 2010. http://www.newyorker.com/report-ing/2010/11/01/101101fa_fact_hersh?currentPage=all

      85

      Cyber Leaders: A Discussion with the Honorable Eric Rosenbach, panel discussion, Center for Strategic and International Studies, Washington, DC, October 2, 2014. http://csis.org/event/cyber-leaders.

      86

      Shachtman N. Military Networks ‘Not Defensible,’ Says General Who Defends Them. January 12, 2012. http://www.wired.com/dangerroom/2012/01/ nsa-cant-defend/

      87

      A New Information Paradigm? From Genes to “Big Data” and Instagram to Persistent Surveillance…Implications for National Security. 8th Annual Strategic Multi-Layer Assessment (SMA) Conference, Joint Base Andrews, 28–29 October 2014.

      88

      Стратегическая многоуровневая оценка (Strategic Multi-Layer Assessment, SMA) – обеспечивает поддержку планирования командам со сложными эксплуатационными императивами, требующими мультидисциплинарных и межведомственных решений, которые не входят в компетенцию службы / агентства. Решения и участники запрашиваются в правительстве США и других структурах. SMA принимается и синхронизируется Объединенным командованием.

      89

      Manning, Robert A. ENVISIONING 2030: US Strategy for a Post-Western World. Atlantic Council. Washington DC, 2012. pp. 55-56

      90

      Chen, Jim. Cyber Deterrence by. Engagement and Surprise // PRISM 7, NO. 2, 2017. Р. 6.

      91

      Singer, Peter W. and Friedman, Allan. What about deterrence in an era of cyberwar? // Armed Force Journal, January 9, 2014.

      http://www.armedforcesjournal.com/what-about-deterrence-in-an-era-of-cy-berwar/

      92

      Lewis, James A. and Timlin, Katrina. Cybersecurity and Cyberwarfare. Preliminary Assessment of National Doctrine and Organization. Washington, D.C.: Center for Strategic and International Studies, 2011.

      93

      Richards, Julian. Cyber-War: The Anatomy of the Global Security Threat. Basingstoke: Palgrave Macmillan, 2014. p. 19.

      94

      Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. January 29, 2008. p. 3–4.

      95

      Courtney, William and Libicki, Martin C. How to Counter Putin’s Subversive War on the West. RAND, August 1, 2016. http://www.rand.org/blog/2016/08/ how-to-counter-putins-subversive-war-on-the-west.html

      96

      Internet of things, IoT – концепция вычислительной сети физических предметов («вещей»), оснащённых встроенными технологиями для взаимодействия друг с другом или с внешней средой…

      97

      Marks, Joseph. Lawmakers to Pentagon: Tell Us When You Use Cyber Weapons. June 8, 2017.

      http://www.defenseone.com/politics/2017/06/lawmakers-want-no-tice-when-pentagon-uses-cyber-weapons/138539/?oref=d_brief_nl

      98

      https://www.washingtonpost.com/world/national-security/trump-

      authorizes-offensive-cyber- operations-to-deter-foreign-adversaries-bolton-

      says/2018/09/20/b5880578-bd0b-11e8-b7d2-0773aa1e33da_story.html

      99

      Klare, Michael T. Cyber Battles, Nuclear Outcomes? Dangerous New Pathways to Escalation. November 2019.

      https://www.armscontrol.org/act/2019-11/features/cyber-battles-nuclear-out-comes-dangerous-new-pathways-escalation

      100

      https://www.congress.gov/

      101

      Solis,