Secret Back Door in Some U.S. Phones Sent Data to China, Analysts Say // New Yors Times, Nov. 16, 2016.
https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-se-curity.html?_r=1
Smith, Allan. TikTok and China come under scrutiny in congressional hearing // NBCNews, Nov. 6, 2019.
https://www.nbcnews.com/politics/congress/hawley-takes-aim-tiktok-chi-na-congressional-hearing-n1076586
Sheth, Sonam. Foreign intelligence operatives are reportedly using online platforms and video-conferencing apps like Zoom to spy on Americans // BI, Apr 10, 2020.
https://www.businessinsider.com/foreign-intelligence-agents-china-spy-ing-on-americans-zoom-2020-4
Stone, Jeff. Accused Chinese hackers abandon techniques after U.S. indictments // Cyberscoop, Feb 26, 2020.
https://www.cyberscoop.com/china-pla-hacking-indictment-deterrence/
Waldman, Peter. The U.S. Is Purging Chinese Cancer Researchers From Top Institutions // Bloomberg, June 13, 2019.
https://www.bloomberg.com/news/features/2019-06-13/the-u-s-is-purging-chinese-americans-from-top-cancer-research
The National Security Commission on Artificial Intelligence. Interim Report. November 2019.
https://www.nscai.gov/about/reports-to-congress
Mazarr, Michael J. and Abigail Casey, Alyssa Demus, Scott W. Harold, Luke J. Matthews, Nathan Beauchamp-Mustafaga, James Sladden. Hostile Social Manipulation. Present Realities and Emerging Trends. RAND Corporation, 2019. p. 113.
Brady, Anne-Marie. Magic Weapons: China’s Political Influence Activities Under Xi Jinping, Washington, D.C.: Wilson Center, 2017.
Annual Report to Congress. Military and Security Developments Involving the People’s Republic of China, 2017.
https://www.defense.gov/Portals/1/Documents/pubs/2017_China_Military_ Power_Report.PDF?source=GovDelivery
Ibidem. p. 35.
Ibidem. p. 51.
Ibidem. p. 59.
Ibidem. p. 71.
Bebber, Jake. A Cyber-Information Operations Offset Strategy for Countering the Surge of Chinese Power // Cimces, April 20, 2016. http://cimsec.org/cyber-space-information-operations-strategy-countering-surge-chinese-power/24383
Lai, David. Learning from the Stones: A Go Approach to Mastering China’s Strategic Concept, Shi // U.S. Army War College Strategic Studies Institute. May 1, 2004. http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pu-bID=378
Brimley, Shawn W. The Third Offset Strategy: Security America’s Military-Technical Advantage. Testimony Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces. Washington, D.C., December 2, 2014.
Ochmanek, David. The Role of Maritime and Air Power in the DoD’s Third Offset Strategy. Testimoney Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces. Washington, D.C., December 2, 2014.
Список далеко не полный. Остальные предложения см. в: Brimley, Shawn W. The Third Offset Strategy: Security America’s Military-Technical Advantage. Testimony Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces. Washington, D.C., December 2, 2014; Martinage, Robert. Statement Before the House Armed Services Subcommittee on Seapower and Projection Forces on the Role of Maritime and Air Power in DoD’s Third Offset Strategy. Testimony Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces. Washington, D.C., December 2, 2014; Ochmanek, David. The Role of Maritime and Air Power in the DoD’s Third Offset Strategy. Testimoney Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces. Washington, D.C., December 2, 2014.
Vego, Milan N. Joint Operational Warfare – Theory and Practice. Newport, RI: Government Printing Office, 2007. VII-13-29.
Joint Chiefs of Staff. Joint Publication 5–0: Joint Operational Planning. Washington, D.C.: Department of Defense, 2011.
Vego, Milan N. Joint Operational Warfare – Theory and Practice, VII-15
Ibidem, VII-15.
Wines, Michael and Sharon LaFraniere, Jonathan Ansfield. China’s Censors Tackle and Trip Over the Internet // The New York Times, April 7, 2010. http:// www.nytimes.com/2010/04/08/world/asia/08censor.html
Xu, Biena. Media Censorship in China // CFR, February 2014. http://www. cfr. org/china/media-censorship-china/p11515
Ibidem.
Chang, Amy. Warring State: China’s Cybersecurity Strategy. Washginton, D.C.: Center for a New American Security, 2014. p. 12.
MacKinnon, Rebecca. Flatter World and Thicker Walls? Blogs, Censorship and Civic Discourse in China // Public Choice 134 (2008): 31–46.
Wines, Michael and Sharon LaFraniere, Jonathan Ansfield. China’s Censors Tackle and Trip Over the Internet.The New York Times, April 7, 2010.
Zittrain, Jonathan and Benjamin Edelman. Empirical Analysis of Internet Filtering in China // Harvard Law School Berkman Center for Internet and Society, March 20, 2003. http://cyber.law.harvard.edu/filtering/china/
Lum, Thomas and Patricia Moloney Figliona, Matthew C. Weed. China, Internet Freedom, and U.S. Policy. Report for Congress. Washington, D.C.: Congressional Research Service, 2013.
Chang, Amy. Warring State: China’s Cybersecurity Strategy. CNAS, 2014.
Р. 15.
Bebber, Jake. A Cyber-Information Operations Offset Strategy for Countering the Surge of Chinese Power // Cimces, April 20, 2016. http://cimsec.org/cyber-space-information-operations-strategy-countering-surge-chinese-power/24383
Pomerleau, Mark. China’s Achilles’ heel when it comes to cyberspace // Fifth Domain, November 18, 2019.
https://www.fifthdomain.com/international/2019/11/18/chinas-achilles-heel-when-it-comes-to-cyberspace/
https://www.usagm.gov/
https://www.bbg.gov/our-work/worldwide-operations/affiliates/
Georgia: Facebook Removes Hundreds Of Government Linked Pages For ‘Coordinated Inauthentic Behavior’ // Eurasia Review, December 21, 2019.
https://www.eurasiareview.com/21122019-georgia-facebook-removes-hun-dreds-of-government-linked-pages-for-coordinated-inauthentic-behavior/
Gleicher, Nathaniel. Removing Coordinated Inauthentic Behavior From Georgia, Vietnam and the US // Facebook, December 20, 2019.
https://about.ft.com/news/2019/12/removing-coordinated-inauthentic-be-havior-from-georgia-vietnam-and-the-us/
Pomerleau, Mark. For the first time, Cyber Command’s major exercise will use new training platform// Fifth Domain, June 15, 2020.
https://www.fifthdomain.com/dod/cybercom/2020/06/15/for-the-first-time-cyber-commands-major-exercise-will-use-new-training-platform/
Wilcox, John. The networks that special operators need, June 20, 2020.
https://www.c4isrnet.com/opinion/2020/06/19/the-networks-that-special-op-erators-need/
Cropsey, Seth. The Pentagon Must Not Falter in Its Drive To Network Its Weapons and Sensors // Defense One, June 19, 2020.
https://www.defenseone.com/ideas/2020/06/pentagon-must-not-falter-its-drive-network-its-weapons-and-sensors/166286/
Pomerleau, Mark. Cyber Command creates new malware sharing portal with National Guard // Fifth Domain, June 9, 2020.
https://www.fifthdomain.com/dod/cybercom/2020/06/09/cyber-command-creates-new-malware-sharing-portal-with-national-guard/
The Key To All-Domain Warfare Is ‘Predictive Analysis:’ Gen. O’Shaughnessy // Breaking Defense, May 05, 2020.
https://breakingdefense.com/2020/05/the-key-to-all-domain-warfare-is-pre-dictive-analysis-gen-oshaughnessy/
Esper Orders SDA To Link C2 Networks For All-Domain Ops // May 06, 2020.
https://breakingdefense.com/2020/05/esper-orders-sda-to-link-c2-networks-for-all-domain-ops
Adamczyk, Ed. Pentagon maps out defense space strategy // UPI, June 19, 2020.
https://www.upi.com/Defense-News/2020/06/19/Pentagon-maps-out-de-fense-space-strategy/3191592594867/
https://media.defense.goV/2020/Jun/17/2002317391/-1/-1/1/2020_DEFENSE_ SPACE_STRATEGY_SUMMARY.PDF
Lindsay, Jon R. Surviving the Quantum Cryptocalypse // Strategic Studies Quarterly, Summer 2020. Р. 51.