Книга: Стрелы кентавра. Кибервойна по-американски
Назад: Примечания
На главную: Предисловие

608

Secret Back Door in Some U.S. Phones Sent Data to China, Analysts Say // New Yors Times, Nov. 16, 2016.

https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-se-curity.html?_r=1

609

Smith, Allan. TikTok and China come under scrutiny in congressional hearing // NBCNews, Nov. 6, 2019.

https://www.nbcnews.com/politics/congress/hawley-takes-aim-tiktok-chi-na-congressional-hearing-n1076586

610

Sheth, Sonam. Foreign intelligence operatives are reportedly using online platforms and video-conferencing apps like Zoom to spy on Americans // BI, Apr 10, 2020.

https://www.businessinsider.com/foreign-intelligence-agents-china-spy-ing-on-americans-zoom-2020-4

611

Stone, Jeff. Accused Chinese hackers abandon techniques after U.S. indictments // Cyberscoop, Feb 26, 2020.

https://www.cyberscoop.com/china-pla-hacking-indictment-deterrence/

612

Waldman, Peter. The U.S. Is Purging Chinese Cancer Researchers From Top Institutions // Bloomberg, June 13, 2019.

https://www.bloomberg.com/news/features/2019-06-13/the-u-s-is-purging-chinese-americans-from-top-cancer-research

613

The National Security Commission on Artificial Intelligence. Interim Report. November 2019.

https://www.nscai.gov/about/reports-to-congress

614

Mazarr, Michael J. and Abigail Casey, Alyssa Demus, Scott W. Harold, Luke J. Matthews, Nathan Beauchamp-Mustafaga, James Sladden. Hostile Social Manipulation. Present Realities and Emerging Trends. RAND Corporation, 2019. p. 113.

615

Brady, Anne-Marie. Magic Weapons: China’s Political Influence Activities Under Xi Jinping, Washington, D.C.: Wilson Center, 2017.

616

Annual Report to Congress. Military and Security Developments Involving the People’s Republic of China, 2017.

https://www.defense.gov/Portals/1/Documents/pubs/2017_China_Military_ Power_Report.PDF?source=GovDelivery

617

Ibidem. p. 35.

618

Ibidem. p. 51.

619

Ibidem. p. 59.

620

Ibidem. p. 71.

621

Bebber, Jake. A Cyber-Information Operations Offset Strategy for Countering the Surge of Chinese Power // Cimces, April 20, 2016. http://cimsec.org/cyber-space-information-operations-strategy-countering-surge-chinese-power/24383

622

Lai, David. Learning from the Stones: A Go Approach to Mastering China’s Strategic Concept, Shi // U.S. Army War College Strategic Studies Institute. May 1, 2004. http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pu-bID=378

623

Brimley, Shawn W. The Third Offset Strategy: Security America’s Military-Technical Advantage. Testimony Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces. Washington, D.C., December 2, 2014.

624

Ochmanek, David. The Role of Maritime and Air Power in the DoD’s Third Offset Strategy. Testimoney Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces. Washington, D.C., December 2, 2014.

625

Список далеко не полный. Остальные предложения см. в: Brimley, Shawn W. The Third Offset Strategy: Security America’s Military-Technical Advantage. Testimony Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces. Washington, D.C., December 2, 2014; Martinage, Robert. Statement Before the House Armed Services Subcommittee on Seapower and Projection Forces on the Role of Maritime and Air Power in DoD’s Third Offset Strategy. Testimony Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces. Washington, D.C., December 2, 2014; Ochmanek, David. The Role of Maritime and Air Power in the DoD’s Third Offset Strategy. Testimoney Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces. Washington, D.C., December 2, 2014.

626

Vego, Milan N. Joint Operational Warfare – Theory and Practice. Newport, RI: Government Printing Office, 2007. VII-13-29.

627

Joint Chiefs of Staff. Joint Publication 5–0: Joint Operational Planning. Washington, D.C.: Department of Defense, 2011.

628

Vego, Milan N. Joint Operational Warfare – Theory and Practice, VII-15

629

Ibidem, VII-15.

630

Wines, Michael and Sharon LaFraniere, Jonathan Ansfield. China’s Censors Tackle and Trip Over the Internet // The New York Times, April 7, 2010. http:// www.nytimes.com/2010/04/08/world/asia/08censor.html

631

Xu, Biena. Media Censorship in China // CFR, February 2014. http://www. cfr. org/china/media-censorship-china/p11515

632

Ibidem.

633

Chang, Amy. Warring State: China’s Cybersecurity Strategy. Washginton, D.C.: Center for a New American Security, 2014. p. 12.

634

MacKinnon, Rebecca. Flatter World and Thicker Walls? Blogs, Censorship and Civic Discourse in China // Public Choice 134 (2008): 31–46.

635

Wines, Michael and Sharon LaFraniere, Jonathan Ansfield. China’s Censors Tackle and Trip Over the Internet.The New York Times, April 7, 2010.

636

Zittrain, Jonathan and Benjamin Edelman. Empirical Analysis of Internet Filtering in China // Harvard Law School Berkman Center for Internet and Society, March 20, 2003. http://cyber.law.harvard.edu/filtering/china/

637

Lum, Thomas and Patricia Moloney Figliona, Matthew C. Weed. China, Internet Freedom, and U.S. Policy. Report for Congress. Washington, D.C.: Congressional Research Service, 2013.

638

Chang, Amy. Warring State: China’s Cybersecurity Strategy. CNAS, 2014.

Р. 15.

639

Bebber, Jake. A Cyber-Information Operations Offset Strategy for Countering the Surge of Chinese Power // Cimces, April 20, 2016. http://cimsec.org/cyber-space-information-operations-strategy-countering-surge-chinese-power/24383

640

Pomerleau, Mark. China’s Achilles’ heel when it comes to cyberspace // Fifth Domain, November 18, 2019.

https://www.fifthdomain.com/international/2019/11/18/chinas-achilles-heel-when-it-comes-to-cyberspace/

641

https://www.usagm.gov/

642

https://www.bbg.gov/our-work/worldwide-operations/affiliates/

643

Georgia: Facebook Removes Hundreds Of Government Linked Pages For ‘Coordinated Inauthentic Behavior’ // Eurasia Review, December 21, 2019.

https://www.eurasiareview.com/21122019-georgia-facebook-removes-hun-dreds-of-government-linked-pages-for-coordinated-inauthentic-behavior/

644

Gleicher, Nathaniel. Removing Coordinated Inauthentic Behavior From Georgia, Vietnam and the US // Facebook, December 20, 2019.

https://about.ft.com/news/2019/12/removing-coordinated-inauthentic-be-havior-from-georgia-vietnam-and-the-us/

645

Pomerleau, Mark. For the first time, Cyber Command’s major exercise will use new training platform// Fifth Domain, June 15, 2020.

https://www.fifthdomain.com/dod/cybercom/2020/06/15/for-the-first-time-cyber-commands-major-exercise-will-use-new-training-platform/

646

Wilcox, John. The networks that special operators need, June 20, 2020.

https://www.c4isrnet.com/opinion/2020/06/19/the-networks-that-special-op-erators-need/

647

Cropsey, Seth. The Pentagon Must Not Falter in Its Drive To Network Its Weapons and Sensors // Defense One, June 19, 2020.

https://www.defenseone.com/ideas/2020/06/pentagon-must-not-falter-its-drive-network-its-weapons-and-sensors/166286/

648

Pomerleau, Mark. Cyber Command creates new malware sharing portal with National Guard // Fifth Domain, June 9, 2020.

https://www.fifthdomain.com/dod/cybercom/2020/06/09/cyber-command-creates-new-malware-sharing-portal-with-national-guard/

649

The Key To All-Domain Warfare Is ‘Predictive Analysis:’ Gen. O’Shaughnessy // Breaking Defense, May 05, 2020.

https://breakingdefense.com/2020/05/the-key-to-all-domain-warfare-is-pre-dictive-analysis-gen-oshaughnessy/

650

Esper Orders SDA To Link C2 Networks For All-Domain Ops // May 06, 2020.

https://breakingdefense.com/2020/05/esper-orders-sda-to-link-c2-networks-for-all-domain-ops

651

Adamczyk, Ed. Pentagon maps out defense space strategy // UPI, June 19, 2020.

https://www.upi.com/Defense-News/2020/06/19/Pentagon-maps-out-de-fense-space-strategy/3191592594867/

652

https://media.defense.goV/2020/Jun/17/2002317391/-1/-1/1/2020_DEFENSE_ SPACE_STRATEGY_SUMMARY.PDF

653

Lindsay, Jon R. Surviving the Quantum Cryptocalypse // Strategic Studies Quarterly, Summer 2020. Р. 51.

Назад: Примечания
На главную: Предисловие