Книга: Стрелы кентавра. Кибервойна по-американски
Назад: Quod licet Jovi, non licet bovi?
Дальше: Примечания

Примечания

1

Cohen, Rachel S. CYBERCOM Chief: 133 Cyber Teams Will Be Insufficient as Adversaries Improve // Air Force Magazine, Feb. 14, 2019.

https://www.airforcemag.com/CYBERCOM-Chief-133-Cyber-Teams-Will-Be-Insufficient-as-Adversaries-Improve/

2

https://www.washingtonpost.com/world/national-security/us-cyber-com-mand-operation-disrupted-internet-access-of-russian-troll-factory-on-day-of-2018-midterms/2019/02/26/1827fc9e-36d6-11e9-af5b-b51b7ff322e9_story.htm-l?noredirect=on

3

Frazin, Rachel. CyberCom mulls aggressive tactics if Russia interferes in next election: report // The Hill, 12.25.19.

https://thehill.com/policy/cybersecurity/475921-cybercom-mulls-aggres-sive-tactics-if-russia-interferes-in-next-election

4

https://www.washingtonpost.com/national-security/us-cybercom-contem-plates-information-warfare-to-counter-russian-interference-in-the-2020-elec-tion/2019/12/25/21bb246e-20e8-11ea-bed5-880264cc91a9_story.html

5

Pernik, Piret. Preparing for Cyber Conflict: Case Studies of Cyber Command. Tallinn: International Centre for Defence and Security, 2018.

6

EXCLUSIVE: Trump talks about Iran, trade and the importance of Toledo, Jan 09, 2020.

7

Vercellone, Chiara. Trump says US ‘better at cyber than anyone in the world’, 13.01.2020.

https://www.fifthdomain.com/dod/2020/01/13/trump-says-us-better-at-cy-ber-than-anyone-in-the-world/

8

Saerchinger, Cesar. Radio, Censorship and Neutrality // Foreign Affairs, January 1940.

http://www.foreignaffairs.com/articles/69970/cesar-saerchinger/radio-censor-ship-an d-neutrality

9

Mindell D. Between Human and Machine: Feedback, Control, and Computing before Cybernetics. Baltimore: The John Hopkons University Press, 2002.

10

На тему взаимосвязи человеческого персонала и техники у Минделла вышло еще две книги – «Digital Apollo: Human and Machine in Spaceflight», посвященная взаимоотношениям человека и компьютера в космической программе США «Аполлон», а также «War, Technology, and Experience aboard the USS Monitor». Baltimore: The John Hopkons University Press, 2000.

11

Steel Ships at Tsushima – Five Amazing Facts About History’s First Modern Sea Battle, 9 June, 2015.

https://militaryhistorynow.com/2015/06/09/the-battleships-of-tsushima-five-amazing-facts-about-historys-first-modern-sea-battle/

12

Worts, G. F. Directing the War by Wireless, Popular Mechanics, May 1915. Р. 650.

13

Савин Л. Геополитика и киберпространство: новая парадигма безопасности // Геополитика, 28.12.2017.

https://www.geopolitica.ru/article/geopolitika-i-kiberprostranstvo-novaya-paradigma-bezopasnosti

14

Virilio P. Speed and Politics. New York, Semiotext(e): Foreign Agents Services Andromeda, 1986. P. 23.

15

Clynes, M.E.; Kline, N.S. Cyborgs and Space. Astronautics, 1960.

16

Campen A. Cyberspace Spawns a New Fog of War // SIGNAL Magazine, September 2010.

17

Arquilla, John and Ronfeldt, David. Cyberwar Is Coming! RAND Corporation, 1993.

https://www.rand.org/pubs/reprints/RP223.html

18

Flournoy, Michele and Sulmeyer, Michael. Battlefield Internet. A Plan for Securing Cyberspace // September/October 2018.

https://www.foreignaffairs.com/articles/world/2018-08-14/battlefield-internet

19

Ibidem.

20

Rid, Thomas. Cyber war will not take place. New York: Oxford University Press, 2013. Р. 3.

21

Если насчет насилия с Томасом Ридом можно согласиться, то два вторых – политический и инструментальный характер могут вполне соответствовать киберконфликту.

22

Calvo, Alex. Cyberwar is War // Small Wars Journal, Apr 6, 2014.

23

Weinbaum, Cortney and Shanahan, John N.T. Intelligence in a Data-Driven Age // Joint Force Quarterly, Vol. 90, 3rd Quarter 2018. Р. 5.

24

Libicki, Martin C. Cyberdeterrence and cyberwar. Santa Monica: RAND Corporation, 2009. р. 117.

25

Ibidem. р. 118.

26

Ibidem. р. 126.

27

Clarke, Richard A. and Knake, Robert. Cyber War. The Next Threat to National Security and What to Do About It. Harper Collins Publishers, 2010.

28

Cahanin, Steven E. Principles of War for Cyberspace, Air War College, 15 January 2011. р. 2.

29

Rothkopf, David. The Cool War. February 20, 2013.

http://www.foreignpolicy.com/artides/2013/02/20/the_cool_war_china_

cyberwar?page=full

30

Libicki, Martin C. Don’t Buy the Cyberhype // Foreign Affairs, August 16, 2013. http://www.foreignaffairs.com/articles/139819/martin-c-libicki/ dont-buy-the-cyberhype

31

Brooks, Rosa. How Everything Became War and the Military Became Everything: Tales from the Pentagon. Simon Schuster, 2016.

32

Virtual Criminology Report 2009. McAfee, Inc. р. 33.

33

Wirtz, James J. Cyber War and Strategic Culture: The Russian Integration of Cyber Power into Grand Strategy // Kenneth Geers (Ed.), Cyber War in Perspective: Russian Aggression against Ukraine, NATO CCD COE Publications, Tallinn 2015. р. 29.

34

Rid, Thomas. Think Again: Cyberwar // Foreign Policy, March/April 2012. http://www.foreignpolicy.com/articles/2012/02/27/cyberwar#6

35

Fleck, Dieter (ed.), The Handbook of International Humanitarian Law. New York City: Oxford University Press, 2008. р. 44.

36

Здесь и далее при упоминании: организация запрещена на территории РФ.

37

Klare, Michael T. Cyber Battles, Nuclear Outcomes? Dangerous New Pathways to Escalation. November 2019.

https://www.armscontrol.org/act/2019-11/features/cyber-battles-nuclear-out-comes-dangerous-new-pathways-escalation

38

Kelly, Mary Louise. Rules for Cyberwarfare Still Unclear, Even As U.S. Engages in It. WABE, April 20, 2016.

https://www.wabe.org/rules-for-cyber-warfare-still-unclear-even-as-u-s-en-gages-in-it/

39

Warner M. Cybersecurity: A Pre-History // Intelligence & National Security 27(5), October 2012. p. 789.

40

Rona, Thomas P. Weapon Systems and Information War. Boeing Aerospace Co., Seattle, 1976.

41

Chairman of the Joint Chiefs of the Staff, Memorandum of Policy no. 30: Command and Control Warfare, 1993.

42

Air Intelligence Agency, “Air Force Information Warfare Center,” Air Force Intelligence Agency Almanac, no. 97 (August, 1997a). p. 20; Kuehl, Dan. Joint Information Warfare: An Information-Age Paradigm for Jointness, Strategic Forum Institute for National Strategic Studies, no. 105, March, 1997. p. 2.

43

Office of the Chief of Naval Operations, OPNAV Instruction 3430.26: Implementing Instruction for Information Warfare/Command and Control Warfare (IW/C2W), 1995. p. 8.

44

Sizer, Richard A. Land Information Warfare Activity, Military Intelligence Professional Bulletin. January-March, 1997.

45

United States Army, Field Manual no. 100-6: Information Operations. Washington, DC: U.S. Government Printing Office, 1996.

46

The Joint Chiefs of Staff, Joint Vision 2020: America’s Military – Preparing for Tomorrow // Joint Force Quarterly 2000, 57–76. p. 61.

47

The Chairman of the Joint Chiefs of Staff, The National Military Strategy for Cyberspace Operations. Washington, DC: Office of the Chairman, 2006. p. 3.

48

Office of the Chief of Naval Operations, OPNAV Instruction 3430.26: Implementing Instrution for Information Warfare/Command and Control Warfare (IW/C2W). Washington, D.C.: Department of the Navy, 1995; United States Army Training and Doctrine Command, TRADOC Pamphlet 525-69: Military Operations Concept for Information Operations. См. также: David and McKel-din III (eds.), Ideas as Weapons: Influence and Perception in Modern Warfare. pp. 7-12 and pp. 27–34; Arquilla and Borer (eds.), Information Strategy and Warfare: A Guide to Theory and Practice. pp. 56-230; Macdonald, Propaganda and Information Warfare in the Twenty-First Century. pp. 6-117; Ventre, Information Warfare.; Hirvela, “Discovering how Information Warfare Distorts the Information Environment.”.; Cordray III and Romanych, “Mapping the Information Environment.

49

The Joint Chiefs of Staff, Joint Publication 3-13: Joint Doctrine for Information Operations. pp. I-9, I-10.

50

United States Department of Defense, Information Operations Roadmap. Washington, D.C.: Department of Defense, 2003; United States Marine Corps Combat Development Command, A Concept for Information Operations. Quantico: United States Marine Corps, 2002; The Joint Chiefs of Staff, Joint Publication 3-51: Joint Doctrine for Electronic Warfare. Washington, D.C.: The Joint Chiefs of Staff, 2000.

51

Navy Information Operations Command. NIOC Norfolk’s History, United States Navy. public.navy.mil/fcc-c10f/niocnorfolk/Pages/NIOCNorfolkHistory. aspx; United States Army Intelligence and Security Command, The INSCOM Story. INSCOM History Office. inscom.army.mil/organisation/History.aspx; 688th Cyberspace Wing, A Brief History of the 688th Cyberspace Wing. Joint Base San Antionio-Lackland: 688th Cyberspace Wing History Office, 2016.

52

The Joint Chiefs of Staff, Joint Publication 3-13: Information Operations. p. 3–14.

53

The Joint Chiefs of Staff, Joint Publication 3-13.1: Electronic Warfare. Washington, D.C.: The Joint Chiefs of Staff, 2007. pp. x-xi.

54

Field Manual 3-12: Cyberspace and Electronic Warfare Operations. Department of the Army, Washington, D.C. 05 February 2013.

55

U.S. reserves right to meet cyber attack with force. Nov 15, 2011. http:// www.reuters.com/article/2011/11/16/us-usa-defense-cybersecurity-idUSTRE-7AF02Y20111116

56

DoD Cyberspace Policy Report. Nov. 2011. p. 3. http://www.defense.gov/ home/features/2011/0411_cyberstrategy/docs/NDAA%20Section%20934%20 Report_For%20webpage.pdf

57

US launched cyber attacks on other nations. 24 January, 2012. http://rt.com/ usa/news/us-attacks-cyber-war-615/

58

The Joint Chiefs of Staff, Joint Vision 2020: America’s Military – Preparing for Tomorrow // Joint Force Quarterly 2000, 57–76. p. 61.

59

The Chairman of the Joint Chiefs of Staff, The National Military Strategy for Cyberspace Operations. Washington, DC: Office of the Chairman, 2006. p. 3.

60

Kuehl, Dan. From Cyberspace to Cyberpower: Defining the Problem, in Cyberpower and National Security, ed. Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz. Washington, DC: Potomac Books, 2009. p. 4.

61

Birdwell B., Mills R. War Fighting in Cyberspace. Evolving Force Presentation and Command and Control // Air Power. Spring 2011. p. 35.

62

Kissinger, Henry. World Order. Penguin Books Limited, 2014. p. 196.

63

Ibidem. p. 198.

64

Timcke, Scott. Capital, State, Empire: The New American Way of Digital Warfare. London: University of Westminster Press, 2017.

65

Lee, Robert M. The Interim Years of Cyberspace.// Air & Space Power Journal, January-February 2013. p. 58.

66

Birdwell B., Mills R. War Fighting in Cyberspace. Evolving Force Presentation and Command and Control. Air Power. Spring 2011. p. 4.

67

Nye, Joseph S. Jr. The Future of Power. New York: Public Affairs, 2011. p. 123.

68

Endsley, Mica R. Toward a Theory of Situation Awareness in Dynamic Systems, Human Factors 37, no. 1 (1995): 32–64.

69

Trias, Eric D. and Bell, Bryan M. Cyber This, Cyber That. . So What? // Air & Space Power Journal. Spring 2010. p. 91.

70

Allardice, Robert and Topic, George. Battlefield Geometry in our Digital Age. From Flash to Bang in 22 Milliseconds. PRISM 7, No. 2, 2017. p. 79.

71

Ibidem. p. 80.

72

Ibidem. p. 82.

73

The Joint Chiefs of Staff, Department of Defense Dictionary of Military and Associated Terms. Washington, D.C.: Joint Chiefs of Staff, 2017. p. 58.

74

Lee, Robert M. The Interim Years of Cyberspace // Air & Space Power Journal, January-February 2013. p. 63.

75

Trias, Eric D. and Bell, Bryan M. Cyber This, Cyber That. . So What? // Air & Space Power Journal. Spring 2010. p. 96–67.

76

Stewart, Kenneth. Cyber Security Hall of Famer Discusses Ethics of Cyber Warfare. America’s Navy, 6/4/2013. http://www.navy.mil/submit/display. asp?story_id=74613

77

Alfonso, Kristal L. M. A Cyber Proving Ground. The Search for Cyber Genius // Air & Space Power Journal. Spring 2010. p. 61

78

Ibidem. p. 64–66.

79

Arquilla J. Cyberwar Is Already Upon Us // Foreign Policy, March/April 2012. http://www.foreignpolicy.com/articles/2012/02/27/cyberwar_is_already_ upon_us

80

Trias, Eric D. and Bell, Bryan M. Cyber This, Cyber That. . So What? // Air & Space Power Journal. Spring 2010. p. 91.

81

Ibidem. pp. 92–97.

82

Reed, Thomas C. At the Abyss: An Insider’s History of the Cold War. NY: Random House, 2004. https://archive.org/details/atabyssinsidersh00reed

83

Sebenius, Alyza. Writing the Rules of Cyberwar // The Atlantic, June 28, 2017.

https://www.theatlantic.com/international/archive/2017/06/cyberattack-rus-sia-ukraine-hack/531957/

84

Hersh, Seymour. The Online Threat. Should we be worried about a cyber war? // The New Yorker, November 1, 2010. http://www.newyorker.com/report-ing/2010/11/01/101101fa_fact_hersh?currentPage=all

85

Cyber Leaders: A Discussion with the Honorable Eric Rosenbach, panel discussion, Center for Strategic and International Studies, Washington, DC, October 2, 2014. http://csis.org/event/cyber-leaders.

86

Shachtman N. Military Networks ‘Not Defensible,’ Says General Who Defends Them. January 12, 2012. http://www.wired.com/dangerroom/2012/01/ nsa-cant-defend/

87

A New Information Paradigm? From Genes to “Big Data” and Instagram to Persistent Surveillance…Implications for National Security. 8th Annual Strategic Multi-Layer Assessment (SMA) Conference, Joint Base Andrews, 28–29 October 2014.

88

Стратегическая многоуровневая оценка (Strategic Multi-Layer Assessment, SMA) – обеспечивает поддержку планирования командам со сложными эксплуатационными императивами, требующими мультидисциплинарных и межведомственных решений, которые не входят в компетенцию службы / агентства. Решения и участники запрашиваются в правительстве США и других структурах. SMA принимается и синхронизируется Объединенным командованием.

89

Manning, Robert A. ENVISIONING 2030: US Strategy for a Post-Western World. Atlantic Council. Washington DC, 2012. pp. 55-56

90

Chen, Jim. Cyber Deterrence by. Engagement and Surprise // PRISM 7, NO. 2, 2017. Р. 6.

91

Singer, Peter W. and Friedman, Allan. What about deterrence in an era of cyberwar? // Armed Force Journal, January 9, 2014.

http://www.armedforcesjournal.com/what-about-deterrence-in-an-era-of-cy-berwar/

92

Lewis, James A. and Timlin, Katrina. Cybersecurity and Cyberwarfare. Preliminary Assessment of National Doctrine and Organization. Washington, D.C.: Center for Strategic and International Studies, 2011.

93

Richards, Julian. Cyber-War: The Anatomy of the Global Security Threat. Basingstoke: Palgrave Macmillan, 2014. p. 19.

94

Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. January 29, 2008. p. 3–4.

95

Courtney, William and Libicki, Martin C. How to Counter Putin’s Subversive War on the West. RAND, August 1, 2016. http://www.rand.org/blog/2016/08/ how-to-counter-putins-subversive-war-on-the-west.html

96

Internet of things, IoT – концепция вычислительной сети физических предметов («вещей»), оснащённых встроенными технологиями для взаимодействия друг с другом или с внешней средой…

97

Marks, Joseph. Lawmakers to Pentagon: Tell Us When You Use Cyber Weapons. June 8, 2017.

http://www.defenseone.com/politics/2017/06/lawmakers-want-no-tice-when-pentagon-uses-cyber-weapons/138539/?oref=d_brief_nl

98

https://www.washingtonpost.com/world/national-security/trump-

authorizes-offensive-cyber- operations-to-deter-foreign-adversaries-bolton-

says/2018/09/20/b5880578-bd0b-11e8-b7d2-0773aa1e33da_story.html

99

Klare, Michael T. Cyber Battles, Nuclear Outcomes? Dangerous New Pathways to Escalation. November 2019.

https://www.armscontrol.org/act/2019-11/features/cyber-battles-nuclear-out-comes-dangerous-new-pathways-escalation

100

https://www.congress.gov/

101

Solis, Gary D. Cyber Warfare // The Law of Armed Conflict. International Humanitarian Law in War. Cambridge University Press, 2016. pp. 673–709.

102

Waugh, Steve. Geneva Conventions for Cyber Warriors Long Overdue // National Defense, March 18, 2020.

https://www.nationaldefensemagazine.org/articles/2020/3/18/geneva-conven-tions-for-cyber-warriors-long-overdue

103

International Strategy for Operating in Cyberspace: Prosperity, Security, and Openness in a Networked World, May 2011.

https://publicintelligence.net/white-house-international-strategy-for-cyber-space/

104

Clinton, William J. Presidential Decision Directive 63, The White House, Washington, DC, 1998.

105

Securing America’s Cyberspace, National Plan for Information Systems Protection: An Invitation to a Dialogue. Washington, DC: The White House, 2000.

106

Information Assurance Workforce Improvement Program. DoD 8570.01M. https://fas.org/irp/doddir/dod/m8570_01.pdf

107

Brookes, Adam. US plans to ‘fight the net’ revealed // BBC, 27 January 2006. http://news.bbc.co.Uk/2/hi/americas/4655196.stm

108

Information Operations Roadmap // BBC, 30 October 2003. http://news. bbc.co.uk/2/shared/bsp/hi/pdfs/27_01_06_psyops.pdf

109

Raw obtains CENTCOM email to bloggers. October 16, 2006. http://www. rawstory.com/news/2006/Raw_obtains_CENTCOM_email_to_bloggers_1016. html

110

https://fas.org/irp/offdocs/nspd/nspd-54.pdf

111

The Comprehensive National Cybersecurity Initiative, 2008. p. 3.

https://fas.org/irp/eprint/cnci.pdf

112

Network Operations. FM 6-02.71. Headquarters Department of the Army Washington, DC. 19 November, 2008.

113

Deputy Assistant Secretary of Defense for Cyber, Identity, and Information Assurance Strategy, Office of the Assistant Secretary of Defense for Networks and Information Integration/DoD Chief Information Officer, August 2009. p. 4.

https://dodcio.defense.goV/portals/0/documents/dod_ia_strategic_plan.pdf

114

The United States Air Force Blueprint for Cyberspace. November 2, 2009. p. 3–4.

https://nsarchive2.gwu.edu//dc.html?doc=2692105-Document-4

115

Houten, Vincent Van. Space and Naval Warfare Systems Center Atlantic, An Overview of the Cyber Warfare, Exploitation & Information Dominance (CWEID) Lab, January 28, 2010. p. 4.

https://assets.documentcloud.org/documents/3521680/Document-03-Vin-cent-Van-Houten-Space-and-Naval.pdf

116

Ibidem. p. 5.

117

The United States Army’s Cyberspace Operations Concept Capability Plan, 2016–2028, U.S. Army Training and Doctrine Command, TRADOC Pamphlet 525-7-8. February 22, 2010. p. 6.

https://assets.documentcloud.org/documents/2700113/Document-33.pdf

118

Ibidem. p. 9.

119

Ibidem. p. 10.

120

Ibidem. p. 13.

121

Ibidem. p. 17.

122

Department of Defense Cyberspace Policy Report. A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934. November 2011. https://fas.org/irp/eprint/dod-cyber.pdf

123

Department of Defense Strategy for Operating in Cyberspace. DoD, July 2011. p. 4.

https://csrc.nist.gov/CSRC/media/Projects/ISPAB/documents/DOD-Strate-gy-for-Operating-in-Cyberspace.pdf

124

Ibidem. p. 13.

125

International Strategy for Operating in Cyberspace: Prosperity, Security, and Openness in a Networked World, May 2011.

https://publicinteUigence.net/white-house-international-strategy-for-cyber-space/

126

Presidential Policy Directive/PPD-20

https://fas.org/irp/offdocs/ppd/ppd-20.pdf

127

Electronic Warfare. Joint Publication 3-13.1. Joint Chiefs of Staff, February 8, 2012. p. ix.

128

Department of Defense Cyberspace Workforce Strategy. December 4, 2013.

https://dodcio.defense.gov/Portals/0/Documents/DoD%2 °Cyber-space%20Workforce%20Strategy_signed(final). pd

129

Ibidem. p. 12.

130

Cyberspace Operations. Joint Publication 3-12 (R), February 2013.

131

Cyber Electromagnetic Activities. Field Manual No. 3-38, Headquarters Department of the Army. Washington, DC, 12 February 2014.

https://fas.org/irp/doddir/army/fm3-38.pdf

132

Ibidem. p. 1–1.

133

Army Network Campaign Plan. The network of 2020 and Beyond. February 2015. p. 9.

134

The Department of Defense Cyber Strategy, Washington, D.C., April 2015. p. 18.

135

The Department of Defence Cyber Strategy, Washington, D.C. April 2015. p. 15.

136

Viebeck, Elise. Russians hacked DOD’s unclassified networks // The Hill, 04/23/15. http://thehill.com/policy/cybersecurity/239893-russians-hacked-dods-unclassified-networks

137

http://www.defense.gov/home/features/2015/0415_cyber-strategy/

138

Corrin, Amber. DISA’s reorg builds on cyber, collaboration and cloud, January 12, 2015.

http://www.c4isrnet.com/story/military-tech/disa/2015/01/12/disa-reorg-col-laboration-cyber/21656311/

139

Executive Order – Commission on Enhancing National Cybersecurity. February 09, 2016.

https://www.whitehouse.gov/the-press-office/2016/02/09/executive-or-der-commission-enhancing-national-cybersecurity

140

FACT SHEET: Cybersecurity National Action Plan. February 09, 2016.

https://www.whitehouse.gov/the-press-office/2016/02/09/fact-sheet-cyberse-

curity-national-action-plan

141

Corrin, Amber. DoD issues cybersecurity discipline guidance, C4ISR & Networks. March 7, 2016.

http://www.c4isrnet.com/story/military-tech/cyber/2016/03/07/dod-is-sues-cybersecurity-discipline-guidance/81451976/

142

The U.S. Army Concept for Cyberspace and Electronic Warfare Operations (2025–2040), TRADOC Pamphlet 525-8-6, Fort Eustis, Virginia. Department of the Army. Headquarters, United States Army Training and Doctrine Command, 9 January 2018.

143

Ibidem. p. 5.

144

Ibidem. p. 7.

145

Ibidem. p. 10.

146

Ibidem. p. 13.

147

Cyberspace Operations, Joint Publication 3-12. DoD. 8 June 2018. https:// fas.org/irp/doddir/dod/jp3_12.pdf

148

«Синее», «серое», «красное» пространства – традиционное обозначение в военных планах США «своего», «условно нейтрального» и «враждебного» пространств соответственно.

149

Ibidem. p. IV-20.

150

Achieve and Maintain Cyberspace Superiority. Command Vision for US Cyber Command, 2018. p. 6.

https://fas.org/irp/eprint/achieve.pdf

151

The Conduct of Information Operations. Army Techniques Publication No. 3-13.1. Headquarters, Department of the Army. Washington, DC. 04 October 2018.

152

Information Operations. Field Manual No. 100-6. Headquarters Department of the Army. Washington, DC. 27 August 1996. https://fas.org/irp/doddir/ army/fm100-6/in dex.html

153

Information Operations: Doctrine, Tactics, Techniques, and Procedures. FM 3-13 (FM 100-6). Headquarters Department of the Army. Washington, DC. 28 November 2003. https://fas.org/irp/doddir/army/fm3-13-2003.pdf

154

Military Information Support Operations. Joint Publication 3-13.2. 07 January 2010. Incorporating Change 1, 20 December 2011.

https://jfsc.ndu.edu/Portals/72/Documents/JC2IOS/Additional_Read-ing/1C1_JP_3-13-2.pdf

155

The Conduct of Information Operations. Army Techniques Publication No. 3-13.1. Headquarters, Department of the Army. Washington, DC, 04 October 2018. p. 1–1.

156

Ibidem. p. 1–3.

157

То есть все социальные группы, независимо от их статуса, роли и участия в конфликте.

158

Lynch, Justin. The new way the Army will conduct information operations // Fifth Domain, Nov. 19, 2018.

https://www.fifthdomain.com/dod/2018/11/19/the-new-way-the-army-will-conduct-information-operations/

159

National Cyber Strategy of the United States. Washington, DC. September, 2018. https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cy-ber-Strategy.pdf

160

Statement by Secretary Kirstjen M. Nielsen on the Release of the National Cyber Strategy, September 20, 2018. https://www.dhs.gov/news/2018/09/20/state-ment-secretary-kirstjen-m-nielsen-release-national-cyber-strategy

161

https://media.defense.gOv/2018/Sep/18/2002041658/-1/-1/1/CYBER

STRATEGY_SUMMARY_FINAL.PDF

162

Hawkins, Derek. The Cybersecurity 202: Trump administration seeks to project tougher stance in cyberspace with new strategy // Washington Post, September 21, 2018. https://www.washingtonpost.com/news/powerpost/ paloma/the-cybersecurity-202/2018/09/21/the-cybersecurity-202-trump-ad-ministration-seeks-to-project-tougher-stance-in-cyberspace-with-new-strate-gy/5ba3e85d1b326b7c8a8d158a/?noredirect=on&utm_term=.d7347110a2f3

163

President Donald J. Trump is Strengthening America’s Cybersecurity. September 20, 2018. https://www.globalsecurity.org/security/library/news/2018/09/ sec-180920-whitehouse01.htm?

164

https://media.defense.gov/2019/Jul/12/2002156622/-1/-1/1/DOD-DIGI-TAL-MODERNIZATION-STRATEGY-2019.PDF

165

https://www.globalsecurity.org/military/library/news/2019/07/mil-190715-dod02.htm

166

Vergun, David. Digital Modernization to Benefit Warfighters, DOD CIO Says. DoD, July 12, 2019. https://www.defense.gov/Explore/News/Article/Arti-cle/1903843/digital-modernization-to-benefit-warfighters-dod-cio-says/

167

Pomerleau, Mark. Joint Chiefs nominee wants to boost information warfare, July 11, 2019.

https://www.c4isrnet.com/information-warfare/2019/07/11/joint-chiefs-nominee-wants-to-boost-information-warfare/

168

https://www.c4isrnet.com/video/2019/06/07/deciphering-elecromagnetic-spectrum-operations/

169

Joint Statement from DOJ, DOD, DHS, DNI, FBI, NSA, and CISA on Ensuring Security of 2020 Elections. https://www.dni.gov/index.php/newsroom/ press-releases/item/2063-joint-statement-from-doj-dod-dhs-dni-fbi-nsa-and-ci-sa-on-ensuring-security-of-2020-elections

170

NCSC Unveils the National Counterintelligence Strategy of the U.S. 20202022, Feb. 10, 2020.

https://www.odni.gov/index.php/newsroom/press-releases/item/2098-ncsc-unveils-the-national-counterintelligence-strategy-of-the-u-s-2020-2022

171

Pomerleau, Mark. Can ‘defend forward’ lead to greater cyber deterrence? // November 27, 2019.

https://www.fifthdomain.com/dod/2019/11/26/can-defend-forward-lead-to-greater-cyber-deterrence/

172

Передовая оборона описывается как сближение с противниками настолько близко, насколько это возможно, чтобы увидеть, что они замышляют и планируют, и в ответ подготовиться или принять соответствующие меры.

173

Sherman, Justin. Giant Report Lays Anvil on US Cyber Policy // Wired, 03.11.2020.

https://www.wired.com/story/opinion-giant-report-lays-anvil-on-us-cyber-policy/

174

Rogoway, Tyler. The Movie War Games Inspired President Reagan To Take Cybersecurity Seriously // The Drive, June 3, 2019.

https://www.thedrive.com/the-war-zone/28352/war-games-the-film-that-in-spired-reagan-to-take-cybersecurity-seriously-turns-36-today

175

National Security Decision Directive Number 145. Washington, September 17, 1984.

https://fas.org/irp/offdocs/nsdd145.htm

176

Tallinn Manual on the International Law Applicable to Cyber Warfare. Prepared by the International Group of Experts at the Invitation of The NATO Cooperative Cyber Defence Centre of Excellence. Michael N. Schmitt (ed.) Cambridge: Cambridge University Press, 2013. p. 19.

177

Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. February 2017. http://www.cambridge.org/us/academic/subjects/law/ humanitarian-law/tallinn-manual-20-international-law-applicable-cyber-opera-tions-2nd-edition?format=PB

178

https://ccdcoe.org/tallinn-manual-20-international-law-applicable-cy-ber-operations-be-launched.html

179

Defending Digital Democracy Project. Belfer Center for Science and International Affairs. Cambridge, February 2018. https://www.belfercenter.org/sites/ default/files/files/publication/StateLocalPlaybo ok%201.1.pdf

180

Alvarez, Priscilla and Hosking, Taylor. The Full Text of Mueller’s Indictment of 13 Russians // The Atlantic, February 16, 2018. https://www.theatlantic. com/politics/archive/2018/02/rosenstein-mueller-indictment-russia/553601/

181

https://www.justice.gov/file/1035457/download?utm_medium=email& utm_source=govdelivery

182

Marks, Joseph. Justice Launches Cyber Task Force // Nextgov, February

20, 2018. https://www.nextgov.com/cybersecurity/2018/02/justice-launches-cy-ber-task-force/146113/

183

Madrigal, Alexis. Russia’s Troll Operation Was Not That Sophisticated // NextGov. February 20, 2018.

https://www.nextgov.com/cybersecurity/2018/02/russias-troll-operation-was-not-sophisticated/146098/

184

Krull, Matthew. Foreign Disinformation is a Threat to Military Readiness, Too // Defense One, February 16, 2018.

https://www.defenseone.com/ideas/2018/02/foreign-disinformation-threat-military-readiness-too/146076/?oref=defenseone_today_nl

185

Atlantic Council’s Digital Forensic Research Lab. #ElectionWatch: Did Putin Elect Trump? Feb 20, 2018.

https://medium.com/dfrlab/electionwatch-did-putin-elect-trump-8babebe0800d

186

Crowley, Bo Julie, Greg Honan, Richard Kuzma, David Michelson, Jacqueline Parziale, Kathryn Reed, Ryan Solis, Tom Wester and William Wright. Defense Playbook for Campaigns. Edited by Casey Corcoran and Allison Lazarus. Paper, Belfer Center for Science and International Affairs, Harvard Kennedy School, March 2020.

https://www.belfercenter.org/sites/default/files/2020-03/DefensePlaybook-Campaigns.pdf

187

Frederick, Kara. The New War of Ideas. Counterterrorism Lessons for the Digital Disinformation Fight. CNAS, June 03, 2019. https://www.cnas.org/publi-cations/reports/the-new-war-of-ideas

188

International Security Cyber Issues Workshop Series: Managing the Spread of Cyber Tools for Malicious Purposes. Provisional Agenda. 15–16 June 2016, Palais des Nations, Geneva, Switzerland. https://www.unidir.org/files/medias/ pdfs/agen da-eng-0-678.pdf

189

https://www.unidir.org/programmes/emerging-security-issues/cyber-sta-bility-conference-series/cyber-stability-seminar-2016-taking-security-forward-building-on-the-2015-report-of-the-gge

190

Brent, Laura. NATO’s role in cyberspace // NATO, 12 February 2019.

https://www.nato.int/docu/review/articles/2019/02/12/natos-role-in-cyber-

space/index.html

191

NATO 2020: assured security; dynamic engagement. Analysis and recommendations of the group of experts on a new strategic concept for NATO. NATO Public Diplomacy Division, Brussels. 17 May, 2010. p. 45.

192

http://www.nato.int/cps/en/SID-9D10A430-A024EA9E/natolive/news_ 71432.htm?selectedLocale=en

193

Cyber Defence Pledge, Press Release (2016) 124, 08 July, 2016.

https://www.nato.int/cps/en/natohq/official_texts_133177.htm

194

Fertasi, Nadja El and Vivo, Diana De. Cyber resilience: protecting NATO’s nervous system // NATO, 12 August 2016.

https://www.nato.mt/docu/review/artides/2016/08/12/cyber-resilience-pro-tecting-natos-nervous-system/index.html

195

Shea, Jamie. How is NATO Meeting the Challenge of Cyberspace? // PRISM 7, NO. 2, 2017. p. 20.

196

Greenberg, Cybele. Rethink 2 %: NATO ‘Defense Spending’ Should Favor Cyber // Defense One, February 21, 2019.

https://www.defenseone.com/ideas/2019/02/rethink-2-nato-defense-spend-ing-should-include-cyber/155051/

197

Davis, Susan. NATO in the Cyber Age: Strengthening Security & Defence, Stabilising Deterrence. October 2019. Р. 4.

198

https://medium.com/dfrlab

199

https://s3.amazonaws.com/ims-2016/PDF/2016_Index_of_US_Military_ Strength_ESSAYS_HOFFMAN.pdf

200

Joint Operating Environment (JOE) 2035. The Joint Force in a Contested and Disordered World. p. 11.

http://www.dtic.mil/doctrine/concepts/joe/joe_2035_july16.pdf

201

Joint Operating Environment (JOE) 2035. The Joint Force in a Contested and Disordered World. pp. 33–36.

202

Schaus, John. Competing in the Gray Zone // CSIS, October 24, 2018.

https://www.csis.org/analysis/competing-gray-zone-0

203

Hicks, Kathleen H. and Alice Hunt Friend, Joseph Federici, Hijab Shah, Megan Donahoe, Matthew Conklin, Asya Akca, Michael Matlaga, Lindsey Sheppard. By Other Means Part I: Campaigning in the Gray Zone. Washington, DC: Center for Strategic and International Studies, July 8, 2019. p. 7.

204

Smith, Jessica “Zhanna” Malekos. Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations // Small Wars Journal, 10/27/2016.

https://smallwarsjournal.com/jrnl/art/twilight-zone-conflicts-employ-ing-gray-tactics-in-cyber-operations

205

Cook, James. ‘Cyberation’ and Just War Doctrine: A Response to Randall Dipert // Journal of Military Ethics 9(4):411–423, December 2010.

206

Deptula, David A. USAF (Ret.) and Heather Penney with Maj Gen Lawrence Stutzriem, USAF (Ret) and Mark Gunzinger. Mosaic Warfare // Air Force magazine, Nov. 1, 2019.

https://www.airforcemag.com/article/Mosaic-Warfare/

207

Morris, Lyle J. and Michael J. Mazarr, Jeffrey W. Hornung, Stephanie Pezard, Anika Binnendijk, Marta Kepe. Gaining Competitive Advantage in the Gray Zone. Response Options for Coercive Aggression Below the Threshold of Major War. Santa Monica: RAND, 2019. p. 61.

208

Wynne, Michael W Flying and Fighting in Cyberspace // Air and Space Power Journal 21, no. 1, Spring 2007. p. 3. http://www.airpower.au.af.mil/air-chronicles/apj/apj07/spr07/spr07.pdf

209

Кастельс М. Галактика Интернет. – Екатеринбург: У-Фактория, 2004. С. 23.

210

Stilwell, Blake. The worst cyber attack in DoD history came from a USB drive found in a parking lot // The Mighty, November 27, 2019.

https://www.wearethemighty.com/history/worst-cyber-attack-us

211

Memorandum to Secretaries of the Military Departments, Subject: Establishment of a Subordinate Unified U.S. Cyber Command Under U.S. Strategic Command for Military Cyberspace Operations, June 23, 2009.

https://nsarchive2.gwu.edu//dc.html?doc=2700109-Document-29

212

Secretary Napolitano Opens New National Cybersecurity and Communications Integration Center. Office of the Press Secretary. U.S. Department of Homeland Security. October 30, 2009. http://www.dhs.gov/ynews/releases/ pr_1256914923094.shtm

Назад: Quod licet Jovi, non licet bovi?
Дальше: Примечания