 .  -
  


             .    ,    ,        ,        .                ,   ,    ,   ,  ,        .        ,     10   ,        ,    .      ,   .            ,   ,   .       ,  ,   ,  ,    .          DARPA.             ,    -.

  a4.pdf   .





 

 .  -



     ,   -       ,  - .








  , 2020

   , 2020

     -, 2020







? (?????????)           ,     .     ,  ,   .     ,       , ,   ,     .  , ,     ,               : ,   .

       .     :   ,     : -, , -, .    ,   ;      ,     .  ,        ,      .       ,   ,             ,      .      -,   ,          ,          .

    ,    ,   :            .

          .             1920.               ,      .

        ,     .  -    ,    ,        .  , -,     ,             ,  XXI ,         .

  ,     , ,    .      - (  )     ,    .          .

        ,          ,     .       ,     , ,        ,     ,    ,    ,    .

           2019.[1 - Cohen, Rachel S. CYBERCOM Chief: 133 Cyber Teams Will Be Insufficient as Adversaries Improve // Air Force Magazine, Feb. 14, 2019.https://www.airforcemag.com/CYBERCOM-Chief-133-Cyber-Teams-Will-Be-Insufficient-as-Adversaries-Improve/].         ,        [2 - https://www.washingtonpost.com/world/national-security/us-cyber-com-mand-operation-disrupted-internet-access-of-russian-troll-factory-on-day-of-2018-midterms/2019/02/26/1827fc9e-36d6-11e9-af5b-b51b7ff322e9_story.htm-l?noredirect=on].    2019.       ,            2020.       [3 - Frazin, Rachel. CyberCom mulls aggressive tactics if Russia interferes in next election: report // The Hill, 12.25.19.https://thehill.com/policy/cybersecurity/475921-cybercom-mulls-aggres-sive-tactics-if-russia-interferes-in-next-election].         :                  .

   ,           , , ,     ,       .      ,      ,     [4 - https://www.washingtonpost.com/national-security/us-cybercom-contem-plates-information-warfare-to-counter-russian-interference-in-the-2020-elec-tion/2019/12/25/21bb246e-20e8-11ea-bed5-880264cc91a9_story.html].  ,         .   , ,      ,         ,  .      ,     ,     ,      .

,     ,            90- .,      ,    ,   , ,   .  ,             .

         2010.,         2018.        ,       .     ,      .        ,     ,     .

        ,        .       [5 - Pernik, Piret. Preparing for Cyber Conflict: Case Studies of Cyber Command. Tallinn: International Centre for Defence and Security, 2018.].                .        .

          ,  ,            ,    ,    .               ,    .  ,  -      , ,       ,    .

            .      ,        .      ,  ,   .                  .       ,         ,     ,  -  .         .                  .              , , ,  ,   ,  .    ,      .                   ,    ,        .     ,      .      ,       .          .       ,            .           ,       .     ,      ,       .                  ,     ,   .

         ,   ,    ,    ,      .     .   ,        ,  ,         .        .




 1

 





 1

   



   ,          ,  -      .   .       ,     .            ,     , ,            .

         ,      ,         .        2020.       13abc   :     .    .     .    ,  -   .         ,    .    .   .   ,     ,   .   -  ,       .     .        ,   ,      [6 - EXCLUSIVE: Trump talks about Iran, trade and the importance of Toledo, Jan 09, 2020.https://www.13abc.com/content/news/EXCLUSIVE-Trump-talks-about-Iran-trade-and-the-importance-of-Toledo-566863691.html (https://www.13abc.com/content/news/EXCLUSIVE-Trump-talks-about-Iran-trade-and-the-importance-of-Toledo-566863691.html)].

 ,     ,            .  2018.              .      . ,    ,           ,     ,      ,      [7 - Vercellone, Chiara. Trump says US better at cyber than anyone in the world, 13.01.2020.https://www.fifthdomain.com/dod/2020/01/13/trump-says-us-better-at-cy-ber-than-anyone-in-the-world/].




  ?


       ,   ,     ,    .      ,           ,      ,   [8 - Saerchinger, Cesar. Radio, Censorship and Neutrality // Foreign Affairs, January 1940.http://www.foreignaffairs.com/articles/69970/cesar-saerchinger/radio-censor-ship-an d-neutrality].      1940.,       ,   ,  2040.    ,          .           .         !

,       ,      (   ,    ,    ..,      ,     ),         ,       ,      ,     .

 ,           1948.,                ,    .          .              ,    1934.       ,        .    ,   ,    .    ,    ,   .     ,  ,    ,         .  ,       ,       .     ,     .     .    ,       ,             [9 - Mindell D. Between Human and Machine: Feedback, Control, and Computing before Cybernetics. Baltimore: The John Hopkons University Press, 2002.].

   ,       ,     ,     1927.      ,       .                 [10 -               Digital Apollo: Human and Machine in Spaceflight,          ,   War, Technology, and Experience aboard the USS Monitor. Baltimore: The John Hopkons University Press, 2000.].

      .  1905.,  9        ,         .            ,    ,  ,   ,    ,     -  [11 - Steel Ships at Tsushima  Five Amazing Facts About Historys First Modern Sea Battle, 9 June, 2015.https://militaryhistorynow.com/2015/06/09/the-battleships-of-tsushima-five-amazing-facts-about-historys-first-modern-sea-battle/].

 10            ,        ,   ,       [12 - Worts, G. F. Directing the War by Wireless, Popular Mechanics, May 1915. . 650.].   ,    ,     ,     [13 -  .   :    // , 28.12.2017.https://www.geopolitica.ru/article/geopolitika-i-kiberprostranstvo-novaya-paradigma-bezopasnosti].

     80- .  ,      , , ,  ,    .    ,     ,   ,     ,              .               [14 - Virilio P. Speed and Politics. New York, Semiotext(e): Foreign Agents Services Andromeda, 1986. P. 23.].

,      - ,     , , ,        .    ,    ,          ,   ,     .                .        ,      ()   () [15 - Clynes, M.E.; Kline, N.S. Cyborgs and Space. Astronautics, 1960.].

    Signal   2010.  ,    ,             .    ,                 ()  ,        . -,    ,    , , ,   ,   .   ,      ,         ,      ,        [16 - Campen A. Cyberspace Spawns a New Fog of War // SIGNAL Magazine, September 2010.].

       RAND, ,  ,    .     !  1993.  ,      ,    ,      ;   ,   ,    ,       , ,  ,   .      .  ,  ,               .         ,    , ,   .   ,      ,          .     XXI. ,     XX.             .           ,   ,      ,           ,   ,         .   ,         ,  ,   ,    ,   [17 - Arquilla, John and Ronfeldt, David. Cyberwar Is Coming! RAND Corporation, 1993.https://www.rand.org/pubs/reprints/RP223.html].        ,        .

  ,        , ,     Foreign Affairs,    -  ,       ;      .   , ,   ,      ,    .   ,   ,     ,  ,  ,   .           . ,    ,    ,  .  ,       [18 - Flournoy, Michele and Sulmeyer, Michael. Battlefield Internet. A Plan for Securing Cyberspace // September/October 2018.https://www.foreignaffairs.com/articles/world/2018-08-14/battlefield-internet].

   ,    ,         ,        .      ,     : .   ,   ,         [19 - Ibidem.].

        ,         .  ,   ,      (    ),  ,   ,      ,   :          ?

  ,       , ,          ,         .    ,  , ,  ,   ,      ,   .  ,                 ,         [20 - Rid, Thomas. Cyber war will not take place. New York: Oxford University Press, 2013. . 3.].    ,         ,    [21 -        ,            .].

     , ,         ,           1982. ,      ,    ,      .   ,      ,           (),      ( , )[22 - Calvo, Alex. Cyberwar is War // Small Wars Journal, Apr 6, 2014.].

      ,     ,       ,           ,    ,       (   )        .

           , ,   ,    ,    .     ,           ,  ,     ,     .             [23 - Weinbaum, Cortney and Shanahan, John N.T. Intelligence in a Data-Driven Age // Joint Force Quarterly, Vol. 90, 3rd Quarter 2018. . 5.].      , ,           .




 ,   


             ,   RAND  2009.

   ,    ,        .              ,     ,        ,  ,          [24 - Libicki, Martin C. Cyberdeterrence and cyberwar. Santa Monica: RAND Corporation, 2009. . 117.].           .

       : -    .        ,       ,         (       ).           ,     (       ).      ,     .

  , ,       ,        .

    ,         ,     . ,  ,         ,       .   ,      ,      : ,    ,         .      .   ,      .

     .         (,      ).         ( ,   )     [25 - Ibidem. . 118.].

  ,                 .    .     ,          ,  ,       .            ,          .  , ,               ,         .             ,     ,        .   ,          ,      ,      ,         [26 - Ibidem. . 126.].

      2010.     ,            ,       [27 - Clarke, Richard A. and Knake, Robert. Cyber War. The Next Threat to National Security and What to Do About It. Harper Collins Publishers, 2010.].       , ,         ,           Stuxnet,  , , ,    ,      .

      2011.       ,  ,            [28 - Cahanin, Steven E. Principles of War for Cyberspace, Air War College, 15 January 2011. . 2.].

 2013.    ,     ,   (Cool War).   ,        ,  ,          ,      .     ,      .   ,   ,  ,       ,        ,                   .    ,   ,         ,        ,  -    ,  ,   ,     ,        .

        -    ,   ,        ,       .   ,  .

 , ,          .   ,            .            ,         ,        ,     ,    .      ,   ,      , , ,   .      ,      ,    

       ,       , ,   .     ,        ,   ,  ,   ,   .   , ,        ,     [29 - Rothkopf, David. The Cool War. February 20, 2013.http://www.foreignpolicy.com/artides/2013/02/20/the_cool_war_china_cyberwar?page=full].

    , ,                 ,       ,     .                 ,         .  , ,  ,        , ,     .     ,      ,  ,   [30 - Libicki, Martin C. Dont Buy the Cyberhype // Foreign Affairs, August 16, 2013. http://www.foreignaffairs.com/articles/139819/martin-c-libicki/ dont-buy-the-cyberhype].

           ,    ,   2016., :  ,       :      ,          : ,      -  , ,       ,  ,     [31 - Brooks, Rosa. How Everything Became War and the Military Became Everything: Tales from the Pentagon. Simon Schuster, 2016.].

        .  2009.  McAfee  ,  ,     ,      , ,                    , ,   ,       ,      .     ,       ,                  ,    ,        .      ,          ,   [32 - Virtual Criminology Report 2009. McAfee, Inc. . 33.].

        ,       ,    ,   -  ,     ,      ,    ,   ,             .    ,   ,           ,       [33 - Wirtz, James J. Cyber War and Strategic Culture: The Russian Integration of Cyber Power into Grand Strategy // Kenneth Geers (Ed.), Cyber War in Perspective: Russian Aggression against Ukraine, NATO CCD COE Publications, Tallinn 2015. . 29.].

,            ,           [34 - Rid, Thomas. Think Again: Cyberwar // Foreign Policy, March/April 2012. http://www.foreignpolicy.com/articles/2012/02/27/cyberwar#6].

             ..     ,        [35 - Fleck, Dieter (ed.), The Handbook of International Humanitarian Law. New York City: Oxford University Press, 2008. . 44.].     ,     ? ,       ?    ,        1999.       ,   ,       ,    .    ,          . 6 2007.           .      . ,        ,            .

 2016.  ,     , ,       [36 -     :     .] (   ,     )[37 - Klare, Michael T. Cyber Battles, Nuclear Outcomes? Dangerous New Pathways to Escalation. November 2019.https://www.armscontrol.org/act/2019-11/features/cyber-battles-nuclear-out-comes-dangerous-new-pathways-escalation].   ,                 ,     .           ,    ,    [38 - Kelly, Mary Louise. Rules for Cyberwarfare Still Unclear, Even As U.S. Engages in It. WABE, April 20, 2016.https://www.wabe.org/rules-for-cyber-warfare-still-unclear-even-as-u-s-en-gages-in-it/].




    


,    30     ,     .  90- .      ,    .             (19551975.),   []     ,          ,    [39 - Warner M. Cybersecurity: A Pre-History // Intelligence & National Security 27(5), October 2012. p. 789.].            ,         [40 - Rona, Thomas P. Weapon Systems and Information War. Boeing Aerospace Co., Seattle, 1976.].             .        1993.            [41 - Chairman of the Joint Chiefs of the Staff, Memorandum of Policy no. 30: Command and Control Warfare, 1993.].          [42 - Air Intelligence Agency, Air Force Information Warfare Center, Air Force Intelligence Agency Almanac, no. 97 (August, 1997a). p. 20; Kuehl, Dan. Joint Information Warfare: An Information-Age Paradigm for Jointness, Strategic Forum Institute for National Strategic Studies, no. 105, March, 1997. p. 2.].       1995.[43 - Office of the Chief of Naval Operations, OPNAV Instruction 3430.26: Implementing Instruction for Information Warfare/Command and Control Warfare (IW/C2W), 1995. p. 8.].     1995.        [44 - Sizer, Richard A. Land Information Warfare Activity, Military Intelligence Professional Bulletin. January-March, 1997.].  1996.        [45 - United States Army, Field Manual no. 100-6: Information Operations. Washington, DC: U.S. Government Printing Office, 1996.].

      . ,  : , , ,              2000.   2020.   :    []       , , ,   [46 - The Joint Chiefs of Staff, Joint Vision 2020: Americas Military  Preparing for Tomorrow // Joint Force Quarterly 2000, 5776. p. 61.].      ,     ,  2000- .[47 - The Chairman of the Joint Chiefs of Staff, The National Military Strategy for Cyberspace Operations. Washington, DC: Office of the Chairman, 2006. p. 3.].  ,  ,      ,        ,          , ,    [48 - Office of the Chief of Naval Operations, OPNAV Instruction 3430.26: Implementing Instrution for Information Warfare/Command and Control Warfare (IW/C2W). Washington, D.C.: Department of the Navy, 1995; United States Army Training and Doctrine Command, TRADOC Pamphlet 525-69: Military Operations Concept for Information Operations. . : David and McKel-din III (eds.), Ideas as Weapons: Influence and Perception in Modern Warfare. pp. 7-12 and pp. 2734; Arquilla and Borer (eds.), Information Strategy and Warfare: A Guide to Theory and Practice. pp. 56-230; Macdonald, Propaganda and Information Warfare in the Twenty-First Century. pp. 6-117; Ventre, Information Warfare.; Hirvela, Discovering how Information Warfare Distorts the Information Environment..; Cordray III and Romanych, Mapping the Information Environment.].

       :     [ ] ,     ,    ,  ,     /,         [49 - The Joint Chiefs of Staff, Joint Publication 3-13: Joint Doctrine for Information Operations. pp. I-9, I-10.].           ,      ,       (computer network operations, CNA)[50 - United States Department of Defense, Information Operations Roadmap. Washington, D.C.: Department of Defense, 2003; United States Marine Corps Combat Development Command, A Concept for Information Operations. Quantico: United States Marine Corps, 2002; The Joint Chiefs of Staff, Joint Publication 3-51: Joint Doctrine for Electronic Warfare. Washington, D.C.: The Joint Chiefs of Staff, 2000.].

  1990-   2000- .  ,   ,         .        ,    ,  ,       ,     [51 - Navy Information Operations Command. NIOC Norfolks History, United States Navy. public.navy.mil/fcc-c10f/niocnorfolk/Pages/NIOCNorfolkHistory. aspx; United States Army Intelligence and Security Command, The INSCOM Story. INSCOM History Office. inscom.army.mil/organisation/History.aspx; 688th Cyberspace Wing, A Brief History of the 688th Cyberspace Wing. Joint Base San Antionio-Lackland: 688th Cyberspace Wing History Office, 2016.].

 2010- .       .             :        ,              . []    ,              [52 - The Joint Chiefs of Staff, Joint Publication 3-13: Information Operations. p.314.].

 ,        ,   ,     ,   .     []            ,  [ ]   [   ],     [53 - The Joint Chiefs of Staff, Joint Publication 3-13.1: Electronic Warfare. Washington, D.C.: The Joint Chiefs of Staff, 2007. pp. x-xi.].           ,    (cyber electromagnetic activities, CEMA)[54 - Field Manual 3-12: Cyberspace and Electronic Warfare Operations. Department of the Army, Washington, D.C. 05 February 2013.].

2011.     ,      . 15  2011.       ,                     ,     .          , ,        ,  ,     [55 - U.S. reserves right to meet cyber attack with force. Nov 15, 2011. http:// www.reuters.com/article/2011/11/16/us-usa-defense-cybersecurity-idUSTRE-7AF02Y20111116].  ,         ,           ,   [56 - DoD Cyberspace Policy Report. Nov. 2011. p. 3. http://www.defense.gov/ home/features/2011/0411_cyberstrategy/docs/NDAA%20Section%20934%20 Report_For%20webpage.pdf].  ,         ,        .

-  Booz Allen Hamilton            .     2012. ,            [57 - US launched cyber attacks on other nations. 24 January, 2012. http://rt.com/ usa/news/us-attacks-cyber-war-615/].




  


      .     ,    ,    2000.  , , ,   [58 - The Joint Chiefs of Staff, Joint Vision 2020: Americas Military  Preparing for Tomorrow // Joint Force Quarterly 2000, 5776. p. 61.].  2006.           [59 - The Chairman of the Joint Chiefs of Staff, The National Military Strategy for Cyberspace Operations. Washington, DC: Office of the Chairman, 2006. p. 3.].

 ,    ,   , ,    [60 - Kuehl, Dan. From Cyberspace to Cyberpower: Defining the Problem, in Cyberpower and National Security, ed. Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz. Washington, DC: Potomac Books, 2009. p. 4.].

  ,          ,    Air Power ,      ,          2 (  )       . ,                    ,  [61 - Birdwell B., Mills R. War Fighting in Cyberspace. Evolving Force Presentation and Command and Control // Air Power. Spring 2011. p. 35.].

  ,       [62 - Kissinger, Henry. World Order. Penguin Books Limited, 2014. p. 196.].  ,          .       ,     ,              ,        ,  ,   .  ,         .        , ,    .          ?[63 - Ibidem. p. 198.].

,   ,                ,    .          ,      ,      .   -      ,      .

         ,        .        (Sea Power)    (Land Power),          ,             (Cyber Power).     .   ,          .        [64 - Timcke, Scott. Capital, State, Empire: The New American Way of Digital Warfare. London: University of Westminster Press, 2017.].

     ,        ,   - ,       ,        .       ,   ,             .    ,         .     ,             ,           ,       .      ,       ,   ,        .    ,         ,         [65 - Lee, Robert M. The Interim Years of Cyberspace.// Air & Space Power Journal, January-February 2013. p. 58.].

,          ,               .  -      .     ,        ,      ,            ,          ,    ,                    .     ,         1960- .,        [66 - Birdwell B., Mills R. War Fighting in Cyberspace. Evolving Force Presentation and Command and Control. Air Power. Spring 2011. p. 4.]. ,             .

               .         ,              [67 - Nye, Joseph S. Jr. The Future of Power. New York: Public Affairs, 2011. p. 123.].

     1995.,     ,         -    ,     ,    .              ,       [68 - Endsley, Mica R. Toward a Theory of Situation Awareness in Dynamic Systems, Human Factors 37, no. 1 (1995): 3264.].

  ,       ,      .           [69 - Trias, Eric D. and Bell, Bryan M. Cyber This, Cyber That. .So What? // Air & Space Power Journal. Spring 2010. p. 91.].

    ,        . -  ,     ,   ,   ,     ,     .    ,   ,     ,      ,         ,        [70 - Allardice, Robert and Topic, George. Battlefield Geometry in our Digital Age. From Flash to Bang in 22 Milliseconds. PRISM 7, No. 2, 2017. p. 79.].      .             ,      ,        ,         . ,       ,                . ,     ,     ,     ,       ,    . ,      ,    [71 - Ibidem. p. 80.].                       ,      [72 - Ibidem. p. 82.].

        : , , ,    .           (       ),               .                ,         ,  ,  ,  ,      [73 - The Joint Chiefs of Staff, Department of Defense Dictionary of Military and Associated Terms. Washington, D.C.: Joint Chiefs of Staff, 2017. p. 58.].     ,       .

              ,    ,                   ,     [74 - Lee, Robert M. The Interim Years of Cyberspace // Air & Space Power Journal, January-February 2013. p. 63.]. ,   ,             .       ,       , ,    .                      (..         )[75 - Trias, Eric D. and Bell, Bryan M. Cyber This, Cyber That. .So What? // Air & Space Power Journal. Spring 2010. p.9667.].

     ,  , ,            ,     .  -     ,             ,         ,  , , ,      [76 - Stewart, Kenneth. Cyber Security Hall of Famer Discusses Ethics of Cyber Warfare. Americas Navy, 6/4/2013. http://www.navy.mil/submit/display. asp?story_id=74613].

 ,                     .        ,    .  ,  ,    .          ,         ,   ,       ,      ,    [77 - Alfonso, Kristal L. M. A Cyber Proving Ground. The Search for Cyber Genius // Air & Space Power Journal. Spring 2010. p. 61].

,               .   ,      .              ,     .      ,    .      [78 - Ibidem. p. 6466.].




     


           ,          .        ,      (          2007.      2008.,     ,      Stuxnet    . . .)       ,         ,        .    ,          [79 - Arquilla J. Cyberwar Is Already Upon Us // Foreign Policy, March/April 2012. http://www.foreignpolicy.com/articles/2012/02/27/cyberwar_is_already_ upon_us].

         ,   ,        .

,           : , , ,    .  ,       ,                    ,            [80 - Trias, Eric D. and Bell, Bryan M. Cyber This, Cyber That. .So What? // Air & Space Power Journal. Spring 2010. p. 91.].     ,    .

, , ,   ,                      .         , ,           (countercyberspace): ,              ,        

             .                      (..         )[81 - Ibidem. pp. 9297.].

 ,       . ,       .   ,     .   , ..   ,     .   ,                 ,       .

  ,    ,          .  ,           ,    ,   ,          .         :         2011.,            .           2011.        .     ,               .

  ,            .            . ,       20 000              .         -          .      ?           ,          .

    :     .                ,   ,      ,      ,   .

     ,    :    ,     ,   , ,    ,   .      ,     ,    .

            .   -         .     :       [82 - Reed, Thomas C. At the Abyss: An Insiders History of the Cold War. NY: Random House, 2004. https://archive.org/details/atabyssinsidersh00reed]  ,    1982.              .           ,        1982.     ,       .       .            .  ,       ,     -        .        .

      ,          ,   .

 ,   ,    ,                    ,     [83 - Sebenius, Alyza. Writing the Rules of Cyberwar // The Atlantic, June 28, 2017.https://www.theatlantic.com/international/archive/2017/06/cyberattack-rus-sia-ukraine-hack/531957/].

     ,               . , ,      ,            ..,         ,       ,    ,            .      . ,  -     ,        ,         .       ,     .          ,    .

  -III       ,         .             ,             .     -,  ,         ,         ,              .

   ,  The New Yrker         2010.         .      ,  . ,    ,   , ,    ,  ,        .     -     .         ,  ,                  ,     .          ⅻ[84 - Hersh, Seymour. The Online Threat. Should we be worried about a cyber war? // The New Yorker, November 1, 2010. http://www.newyorker.com/report-ing/2010/11/01/101101fa_fact_hersh?currentPage=all]

 :       ,   .   ,           ,   .       .       ,     ,        .  ,   ,    ,        .

      , -, ,    ,     Stuxnet    . ,     ,        - .               ,   ,   .        ,   ,             1991.         1999.,       2003.  .       ,     ,   .  [. . .]     .

     .      ,   ,         ,     .                    .  ,              2011  2015.,   ,     : ,   ,        ,  ,     .      ?    ,   , ,     .     , ?     ,       ,       [85 - Cyber Leaders: A Discussion with the Honorable Eric Rosenbach, panel discussion, Center for Strategic and International Studies, Washington, DC, October 2, 2014. http://csis.org/event/cyber-leaders.].

       2012. ,       .  ,      ,      .        15  ,        .        15  3 ,      , ,   ,      [86 - Shachtman N. Military Networks Not Defensible, Says General Who Defends Them. January 12, 2012. http://www.wired.com/dangerroom/2012/01/ nsa-cant-defend/].

      ,     ,        .      A New Information Paradigm? From Genes to Big Data and Instagram to Persistent SurveillanceImplications for National Security,    2014.[87 - A New Information Paradigm? From Genes to Big Data and Instagram to Persistent SurveillanceImplications for National Security. 8th Annual Strategic Multi-Layer Assessment (SMA) Conference, Joint Base Andrews, 2829 October 2014.], -      ,       ,  - .      ,    .      ,    ,       .     ,         .       ,     0   1.   ,  ,  SMA[88 -    (Strategic Multi-Layer Assessment, SMA)        ,     ,       / .          . SMA     .],         .

               ,            ,    ,  ,       (,  ).           ,     .   ,    ,          ,       ,   , ,  , ,  ,    .     ,   SMA,  .

      ,         .                    .    ,        .     ,      ,              ,    [89 - Manning, Robert A. ENVISIONING 2030: US Strategy for a Post-Western World. Atlantic Council. Washington DC, 2012. pp. 55-56].     ,   ,   ,        ,  ,      ,  ,                .

  ,  ,        ,         .

           ,          :

   ,          .       ,     ,    ,         ;

   ,       .           ,   ,        .          ;

    . ,         ;

,  ,       ,   ;

    ,          .  ,                [90 - Chen, Jim. Cyber Deterrence by. Engagement and Surprise // PRISM 7, NO. 2, 2017. . 6.].

   ,       .

     ,          .     ,         ,             .  , ,    ,      :        ,     .  ,               .           ,  , , ,         ,     [91 - Singer, Peter W. and Friedman, Allan. What about deterrence in an era of cyberwar? // Armed Force Journal, January 9, 2014.http://www.armedforcesjournal.com/what-about-deterrence-in-an-era-of-cy-berwar/].

    2011.  33 ,       .           ,       ,      ,           .

         ,  ,      ,  ,           .          [92 - Lewis, James A. and Timlin, Katrina. Cybersecurity and Cyberwarfare. Preliminary Assessment of National Doctrine and Organization. Washington, D.C.: Center for Strategic and International Studies, 2011.].        ,   ,        .




   


,           ,    ,         .       ,      ,       ,     [93 - Richards, Julian. Cyber-War: The Anatomy of the Global Security Threat. Basingstoke: Palgrave Macmillan, 2014. p. 19.].

       2008.  ,      ,  ,   , ,       ,        .             ,    ,                   .    ,                ,     .  ,        ,   ,   [94 - Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. January 29, 2008. p.34.].

   .   ,     .                  .             .

 2014.    ,     ,                 Sony.

   ,       ,      , ..       ,   .     -  ,        .

,    2016.        ,        ,             .     ,         .

   2016.                    2017 .          ,  ,   ,       [95 - Courtney, William and Libicki, Martin C. How to Counter Putins Subversive War on the West. RAND, August 1, 2016. http://www.rand.org/blog/2016/08/ how-to-counter-putins-subversive-war-on-the-west.html].

      , ,          ,      , , ,      ,    [96 - Internet of things, IoT       (),            ],   ,     .

8  2017.         ,             48       [97 - Marks, Joseph. Lawmakers to Pentagon: Tell Us When You Use Cyber Weapons. June 8, 2017.http://www.defenseone.com/politics/2017/06/lawmakers-want-no-tice-when-pentagon-uses-cyber-weapons/138539/?oref=d_brief_nl].

     ,     ,           ,      .       ,     ,   .  ,   Stuxnet    ,         ,  ,  ,  ,  ,     .

    ,                  .

                  ,  ,         .

      2017.    (, ),       2015.,      .     .

      ,             .   ,         ,               ,          .

11  2019.                 , ,    ,       .     NSPM-13    ,        2018 [98 - https://www.washingtonpost.com/world/national-security/trump-authorizes-offensive-cyber- operations-to-deter-foreign-adversaries-bolton-says/2018/09/20/b5880578-bd0b-11e8-b7d2-0773aa1e33da_story.html].

 ,     NSPM-13,  ,       ,                   .            ,                       [99 - Klare, Michael T. Cyber Battles, Nuclear Outcomes? Dangerous New Pathways to Escalation. November 2019.https://www.armscontrol.org/act/2019-11/features/cyber-battles-nuclear-out-comes-dangerous-new-pathways-escalation].

,           .

 20192020.      116-    40 ,    ,      ,   ,       .       [100 - https://www.congress.gov/]     ,    . ,       ,    ,     .

-,             .   ,      ,     ,    .  ,         .   ,         ,          .     ,        [101 - Solis, Gary D. Cyber Warfare // The Law of Armed Conflict. International Humanitarian Law in War. Cambridge University Press, 2016. pp. 673709.].     -  :   ,   ,   ,        ,   , .  -       :       10-  -            [102 - Waugh, Steve. Geneva Conventions for Cyber Warriors Long Overdue // National Defense, March 18, 2020.https://www.nationaldefensemagazine.org/articles/2020/3/18/geneva-conven-tions-for-cyber-warriors-long-overdue].             .        2011.                   .   ,         ,    [103 - International Strategy for Operating in Cyberspace: Prosperity, Security, and Openness in a Networked World, May 2011.https://publicintelligence.net/white-house-international-strategy-for-cyber-space/].




 2

  



   ,  ,    ,    ,  ,    .       .   ,        ,     .    .  ,          ,      ,        ,     ,        .         .          .             .                  .

   ,              ,       .

             .        ,      ,          .      ,       .




   


,     ,    𻠖    63  1998.     ,  , ,     .   ,             ,         ,    [104 - Clinton, William J. Presidential Decision Directive 63, The White House, Washington, DC, 1998.].

      ,      [105 - Securing Americas Cyberspace, National Plan for Information Systems Protection: An Invitation to a Dialogue. Washington, DC: The White House, 2000.].    33     -,      .     ,    .       ,    ,            .

  2000- .         .       (Information Assurance, IA)  2004.         2005.[106 - Information Assurance Workforce Improvement Program. DoD 8570.01M. https://fas.org/irp/doddir/dod/m8570_01.pdf].         ,     .       -   .

 2006.     ,   ,      [107 - Brookes, Adam. US plans to fight the net revealed // BBC, 27 January 2006. http://news.bbc.co.Uk/2/hi/americas/4655196.stm].    ,  ,       ,           .  ,  ,    ,     ,    ,                        ,     .      ,       ,        [108 - Information Operations Roadmap // BBC, 30 October 2003. http://news. bbc.co.uk/2/shared/bsp/hi/pdfs/27_01_06_psyops.pdf].  fight the net    .        ,   -,              ,      (,         ).

 ,    2006.   ,      --, ..   ,  ,  [109 - Raw obtains CENTCOM email to bloggers. October 16, 2006. http://www. rawstory.com/news/2006/Raw_obtains_CENTCOM_email_to_bloggers_1016. html]. ,            ,     ,        .    -   ,         .

     (Comprehensive National Cybersecurity Initiative, CNCI)     -       54 /      23 (NSPD-54 / HSPD-23)   2008 [110 - https://fas.org/irp/offdocs/nspd/nspd-54.pdf].         ,    ,          .

               ,  ,                 EINSTEIN 3        .              ,    ,             [111 - The Comprehensive National Cybersecurity Initiative, 2008. p. 3.https://fas.org/irp/eprint/cnci.pdf].

           2008.       273 [112 - Network Operations. FM 6-02.71. Headquarters Department of the Army Washington, DC. 19 November, 2008.].       ,  ,   ;    ,    ;  (,   , );        .

      ,      .

    , ,     ,   ,         .




  


 ,       ,    ,    2009.

  , :

           ;

              ;

   ,       ;

      ,      ,    ;

           .

          ,                           .

                .

           ,        ,    ,        .

             ,   , , ,    .             ,   .

      ,    ,     ,   , ,            ,      [113 - Deputy Assistant Secretary of Defense for Cyber, Identity, and Information Assurance Strategy, Office of the Assistant Secretary of Defense for Networks and Information Integration/DoD Chief Information Officer, August 2009. p. 4.https://dodcio.defense.goV/portals/0/documents/dod_ia_strategic_plan.pdf].

 2009.       .      12 ,                    .

,         :

       ;

          ,           ;

 , ,        ;

      ;

    ;

         ;

    ;

         ;

  ,      , ,   ;

     ,     ;

     ,       ;

               ;

        ,     ,   [114 - The United States Air Force Blueprint for Cyberspace. November 2, 2009. p.34.https://nsarchive2.gwu.edu//dc.html?doc=2692105-Document-4].

 ,    90%     ,        .               ,   ,           .        .

   ,    ,         - .      ,    ,  ,  ,   ,       ,    ,         [115 - Houten, Vincent Van. Space and Naval Warfare Systems Center Atlantic, An Overview of the Cyber Warfare, Exploitation & Information Dominance (CWEID) Lab, January 28, 2010. p. 4.https://assets.documentcloud.org/documents/3521680/Document-03-Vin-cent-Van-Houten-Space-and-Naval.pdf].

   ,      :

   ;

    ,    ;




  .


   .

   ,     (https://www.litres.ru/leonid-savin/strely-kentavra-kibervoyna-po-amerikanski/)  .

      Visa, MasterCard, Maestro,    ,   ,     ,  PayPal, WebMoney, ., QIWI ,       .



notes








1


Cohen, Rachel S. CYBERCOM Chief: 133 Cyber Teams Will Be Insufficient as Adversaries Improve // Air Force Magazine, Feb. 14, 2019.

https://www.airforcemag.com/CYBERCOM-Chief-133-Cyber-Teams-Will-Be-Insufficient-as-Adversaries-Improve/




2


https://www.washingtonpost.com/world/national-security/us-cyber-com-mand-operation-disrupted-internet-access-of-russian-troll-factory-on-day-of-2018-midterms/2019/02/26/1827fc9e-36d6-11e9-af5b-b51b7ff322e9_story.htm-l?noredirect=on




3


Frazin, Rachel. CyberCom mulls aggressive tactics if Russia interferes in next election: report // The Hill, 12.25.19.

https://thehill.com/policy/cybersecurity/475921-cybercom-mulls-aggres-sive-tactics-if-russia-interferes-in-next-election




4


https://www.washingtonpost.com/national-security/us-cybercom-contem-plates-information-warfare-to-counter-russian-interference-in-the-2020-elec-tion/2019/12/25/21bb246e-20e8-11ea-bed5-880264cc91a9_story.html




5


Pernik, Piret. Preparing for Cyber Conflict: Case Studies of Cyber Command. Tallinn: International Centre for Defence and Security, 2018.




6


EXCLUSIVE: Trump talks about Iran, trade and the importance of Toledo, Jan 09, 2020.

https://www.13abc.com/content/news/EXCLUSIVE-Trump-talks-about-Iran-trade-and-the-importance-of-Toledo-566863691.html (https://www.13abc.com/content/news/EXCLUSIVE-Trump-talks-about-Iran-trade-and-the-importance-of-Toledo-566863691.html)




7


Vercellone, Chiara. Trump says US better at cyber than anyone in the world, 13.01.2020.

https://www.fifthdomain.com/dod/2020/01/13/trump-says-us-better-at-cy-ber-than-anyone-in-the-world/




8


Saerchinger, Cesar. Radio, Censorship and Neutrality // Foreign Affairs, January 1940.

http://www.foreignaffairs.com/articles/69970/cesar-saerchinger/radio-censor-ship-an d-neutrality




9


Mindell D. Between Human and Machine: Feedback, Control, and Computing before Cybernetics. Baltimore: The John Hopkons University Press, 2002.




10


              Digital Apollo: Human and Machine in Spaceflight,          ,   War, Technology, and Experience aboard the USS Monitor. Baltimore: The John Hopkons University Press, 2000.




11


Steel Ships at Tsushima  Five Amazing Facts About Historys First Modern Sea Battle, 9 June, 2015.

https://militaryhistorynow.com/2015/06/09/the-battleships-of-tsushima-five-amazing-facts-about-historys-first-modern-sea-battle/




12


Worts, G. F. Directing the War by Wireless, Popular Mechanics, May 1915. . 650.




13


 .   :    // , 28.12.2017.

https://www.geopolitica.ru/article/geopolitika-i-kiberprostranstvo-novaya-paradigma-bezopasnosti




14


Virilio P. Speed and Politics. New York, Semiotext(e): Foreign Agents Services Andromeda, 1986. P. 23.




15


Clynes, M.E.; Kline, N.S. Cyborgs and Space. Astronautics, 1960.




16


Campen A. Cyberspace Spawns a New Fog of War // SIGNAL Magazine, September 2010.




17


Arquilla, John and Ronfeldt, David. Cyberwar Is Coming! RAND Corporation, 1993.

https://www.rand.org/pubs/reprints/RP223.html




18


Flournoy, Michele and Sulmeyer, Michael. Battlefield Internet. A Plan for Securing Cyberspace // September/October 2018.

https://www.foreignaffairs.com/articles/world/2018-08-14/battlefield-internet




19


Ibidem.




20


Rid, Thomas. Cyber war will not take place. New York: Oxford University Press, 2013. . 3.




21


       ,            .




22


Calvo, Alex. Cyberwar is War // Small Wars Journal, Apr 6, 2014.




23


Weinbaum, Cortney and Shanahan, John N.T. Intelligence in a Data-Driven Age // Joint Force Quarterly, Vol. 90, 3rd Quarter 2018. . 5.




24


Libicki, Martin C. Cyberdeterrence and cyberwar. Santa Monica: RAND Corporation, 2009. . 117.




25


Ibidem. . 118.




26


Ibidem. . 126.




27


Clarke, Richard A. and Knake, Robert. Cyber War. The Next Threat to National Security and What to Do About It. Harper Collins Publishers, 2010.




28


Cahanin, Steven E. Principles of War for Cyberspace, Air War College, 15 January 2011. . 2.




29


Rothkopf, David. The Cool War. February 20, 2013.

http://www.foreignpolicy.com/artides/2013/02/20/the_cool_war_china_

cyberwar?page=full




30


Libicki, Martin C. Dont Buy the Cyberhype // Foreign Affairs, August 16, 2013. http://www.foreignaffairs.com/articles/139819/martin-c-libicki/ dont-buy-the-cyberhype




31


Brooks, Rosa. How Everything Became War and the Military Became Everything: Tales from the Pentagon. Simon Schuster, 2016.




32


Virtual Criminology Report 2009. McAfee, Inc. . 33.




33


Wirtz, James J. Cyber War and Strategic Culture: The Russian Integration of Cyber Power into Grand Strategy // Kenneth Geers (Ed.), Cyber War in Perspective: Russian Aggression against Ukraine, NATO CCD COE Publications, Tallinn 2015. . 29.




34


Rid, Thomas. Think Again: Cyberwar // Foreign Policy, March/April 2012. http://www.foreignpolicy.com/articles/2012/02/27/cyberwar#6




35


Fleck, Dieter (ed.), The Handbook of International Humanitarian Law. New York City: Oxford University Press, 2008. . 44.




36


    :     .




37


Klare, Michael T. Cyber Battles, Nuclear Outcomes? Dangerous New Pathways to Escalation. November 2019.

https://www.armscontrol.org/act/2019-11/features/cyber-battles-nuclear-out-comes-dangerous-new-pathways-escalation




38


Kelly, Mary Louise. Rules for Cyberwarfare Still Unclear, Even As U.S. Engages in It. WABE, April 20, 2016.

https://www.wabe.org/rules-for-cyber-warfare-still-unclear-even-as-u-s-en-gages-in-it/




39


Warner M. Cybersecurity: A Pre-History // Intelligence & National Security 27(5), October 2012. p. 789.




40


Rona, Thomas P. Weapon Systems and Information War. Boeing Aerospace Co., Seattle, 1976.




41


Chairman of the Joint Chiefs of the Staff, Memorandum of Policy no. 30: Command and Control Warfare, 1993.




42


Air Intelligence Agency, Air Force Information Warfare Center, Air Force Intelligence Agency Almanac, no. 97 (August, 1997a). p. 20; Kuehl, Dan. Joint Information Warfare: An Information-Age Paradigm for Jointness, Strategic Forum Institute for National Strategic Studies, no. 105, March, 1997. p. 2.




43


Office of the Chief of Naval Operations, OPNAV Instruction 3430.26: Implementing Instruction for Information Warfare/Command and Control Warfare (IW/C2W), 1995. p. 8.




44


Sizer, Richard A. Land Information Warfare Activity, Military Intelligence Professional Bulletin. January-March, 1997.




45


United States Army, Field Manual no. 100-6: Information Operations. Washington, DC: U.S. Government Printing Office, 1996.




46


The Joint Chiefs of Staff, Joint Vision 2020: Americas Military  Preparing for Tomorrow // Joint Force Quarterly 2000, 5776. p. 61.




47


The Chairman of the Joint Chiefs of Staff, The National Military Strategy for Cyberspace Operations. Washington, DC: Office of the Chairman, 2006. p. 3.




48


Office of the Chief of Naval Operations, OPNAV Instruction 3430.26: Implementing Instrution for Information Warfare/Command and Control Warfare (IW/C2W). Washington, D.C.: Department of the Navy, 1995; United States Army Training and Doctrine Command, TRADOC Pamphlet 525-69: Military Operations Concept for Information Operations. . : David and McKel-din III (eds.), Ideas as Weapons: Influence and Perception in Modern Warfare. pp. 7-12 and pp. 2734; Arquilla and Borer (eds.), Information Strategy and Warfare: A Guide to Theory and Practice. pp. 56-230; Macdonald, Propaganda and Information Warfare in the Twenty-First Century. pp. 6-117; Ventre, Information Warfare.; Hirvela, Discovering how Information Warfare Distorts the Information Environment..; Cordray III and Romanych, Mapping the Information Environment.




49


The Joint Chiefs of Staff, Joint Publication 3-13: Joint Doctrine for Information Operations. pp. I-9, I-10.




50


United States Department of Defense, Information Operations Roadmap. Washington, D.C.: Department of Defense, 2003; United States Marine Corps Combat Development Command, A Concept for Information Operations. Quantico: United States Marine Corps, 2002; The Joint Chiefs of Staff, Joint Publication 3-51: Joint Doctrine for Electronic Warfare. Washington, D.C.: The Joint Chiefs of Staff, 2000.




51


Navy Information Operations Command. NIOC Norfolks History, United States Navy. public.navy.mil/fcc-c10f/niocnorfolk/Pages/NIOCNorfolkHistory. aspx; United States Army Intelligence and Security Command, The INSCOM Story. INSCOM History Office. inscom.army.mil/organisation/History.aspx; 688th Cyberspace Wing, A Brief History of the 688th Cyberspace Wing. Joint Base San Antionio-Lackland: 688th Cyberspace Wing History Office, 2016.




52


The Joint Chiefs of Staff, Joint Publication 3-13: Information Operations. p.314.




53


The Joint Chiefs of Staff, Joint Publication 3-13.1: Electronic Warfare. Washington, D.C.: The Joint Chiefs of Staff, 2007. pp. x-xi.




54


Field Manual 3-12: Cyberspace and Electronic Warfare Operations. Department of the Army, Washington, D.C. 05 February 2013.




55


U.S. reserves right to meet cyber attack with force. Nov 15, 2011. http:// www.reuters.com/article/2011/11/16/us-usa-defense-cybersecurity-idUSTRE-7AF02Y20111116




56


DoD Cyberspace Policy Report. Nov. 2011. p. 3. http://www.defense.gov/ home/features/2011/0411_cyberstrategy/docs/NDAA%20Section%20934%20 Report_For%20webpage.pdf




57


US launched cyber attacks on other nations. 24 January, 2012. http://rt.com/ usa/news/us-attacks-cyber-war-615/




58


The Joint Chiefs of Staff, Joint Vision 2020: Americas Military  Preparing for Tomorrow // Joint Force Quarterly 2000, 5776. p. 61.




59


The Chairman of the Joint Chiefs of Staff, The National Military Strategy for Cyberspace Operations. Washington, DC: Office of the Chairman, 2006. p. 3.




60


Kuehl, Dan. From Cyberspace to Cyberpower: Defining the Problem, in Cyberpower and National Security, ed. Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz. Washington, DC: Potomac Books, 2009. p. 4.




61


Birdwell B., Mills R. War Fighting in Cyberspace. Evolving Force Presentation and Command and Control // Air Power. Spring 2011. p. 35.




62


Kissinger, Henry. World Order. Penguin Books Limited, 2014. p. 196.




63


Ibidem. p. 198.




64


Timcke, Scott. Capital, State, Empire: The New American Way of Digital Warfare. London: University of Westminster Press, 2017.




65


Lee, Robert M. The Interim Years of Cyberspace.// Air & Space Power Journal, January-February 2013. p. 58.




66


Birdwell B., Mills R. War Fighting in Cyberspace. Evolving Force Presentation and Command and Control. Air Power. Spring 2011. p. 4.




67


Nye, Joseph S. Jr. The Future of Power. New York: Public Affairs, 2011. p. 123.




68


Endsley, Mica R. Toward a Theory of Situation Awareness in Dynamic Systems, Human Factors 37, no. 1 (1995): 3264.




69


Trias, Eric D. and Bell, Bryan M. Cyber This, Cyber That. .So What? // Air & Space Power Journal. Spring 2010. p. 91.




70


Allardice, Robert and Topic, George. Battlefield Geometry in our Digital Age. From Flash to Bang in 22 Milliseconds. PRISM 7, No. 2, 2017. p. 79.




71


Ibidem. p. 80.




72


Ibidem. p. 82.




73


The Joint Chiefs of Staff, Department of Defense Dictionary of Military and Associated Terms. Washington, D.C.: Joint Chiefs of Staff, 2017. p. 58.




74


Lee, Robert M. The Interim Years of Cyberspace // Air & Space Power Journal, January-February 2013. p. 63.




75


Trias, Eric D. and Bell, Bryan M. Cyber This, Cyber That. .So What? // Air & Space Power Journal. Spring 2010. p.9667.




76


Stewart, Kenneth. Cyber Security Hall of Famer Discusses Ethics of Cyber Warfare. Americas Navy, 6/4/2013. http://www.navy.mil/submit/display. asp?story_id=74613




77


Alfonso, Kristal L. M. A Cyber Proving Ground. The Search for Cyber Genius // Air & Space Power Journal. Spring 2010. p. 61




78


Ibidem. p. 6466.




79


Arquilla J. Cyberwar Is Already Upon Us // Foreign Policy, March/April 2012. http://www.foreignpolicy.com/articles/2012/02/27/cyberwar_is_already_ upon_us




80


Trias, Eric D. and Bell, Bryan M. Cyber This, Cyber That. .So What? // Air & Space Power Journal. Spring 2010. p. 91.




81


Ibidem. pp. 9297.




82


Reed, Thomas C. At the Abyss: An Insiders History of the Cold War. NY: Random House, 2004. https://archive.org/details/atabyssinsidersh00reed




83


Sebenius, Alyza. Writing the Rules of Cyberwar // The Atlantic, June 28, 2017.

https://www.theatlantic.com/international/archive/2017/06/cyberattack-rus-sia-ukraine-hack/531957/




84


Hersh, Seymour. The Online Threat. Should we be worried about a cyber war? // The New Yorker, November 1, 2010. http://www.newyorker.com/report-ing/2010/11/01/101101fa_fact_hersh?currentPage=all




85


Cyber Leaders: A Discussion with the Honorable Eric Rosenbach, panel discussion, Center for Strategic and International Studies, Washington, DC, October 2, 2014. http://csis.org/event/cyber-leaders.




86


Shachtman N. Military Networks Not Defensible, Says General Who Defends Them. January 12, 2012. http://www.wired.com/dangerroom/2012/01/ nsa-cant-defend/




87


A New Information Paradigm? From Genes to Big Data and Instagram to Persistent SurveillanceImplications for National Security. 8th Annual Strategic Multi-Layer Assessment (SMA) Conference, Joint Base Andrews, 2829 October 2014.




88


   (Strategic Multi-Layer Assessment, SMA)        ,     ,       / .          . SMA     .




89


Manning, Robert A. ENVISIONING 2030: US Strategy for a Post-Western World. Atlantic Council. Washington DC, 2012. pp. 55-56




90


Chen, Jim. Cyber Deterrence by. Engagement and Surprise // PRISM 7, NO. 2, 2017. . 6.




91


Singer, Peter W. and Friedman, Allan. What about deterrence in an era of cyberwar? // Armed Force Journal, January 9, 2014.

http://www.armedforcesjournal.com/what-about-deterrence-in-an-era-of-cy-berwar/




92


Lewis, James A. and Timlin, Katrina. Cybersecurity and Cyberwarfare. Preliminary Assessment of National Doctrine and Organization. Washington, D.C.: Center for Strategic and International Studies, 2011.




93


Richards, Julian. Cyber-War: The Anatomy of the Global Security Threat. Basingstoke: Palgrave Macmillan, 2014. p. 19.




94


Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. January 29, 2008. p.34.




95


Courtney, William and Libicki, Martin C. How to Counter Putins Subversive War on the West. RAND, August 1, 2016. http://www.rand.org/blog/2016/08/ how-to-counter-putins-subversive-war-on-the-west.html




96


Internet of things, IoT       (),            




97


Marks, Joseph. Lawmakers to Pentagon: Tell Us When You Use Cyber Weapons. June 8, 2017.

http://www.defenseone.com/politics/2017/06/lawmakers-want-no-tice-when-pentagon-uses-cyber-weapons/138539/?oref=d_brief_nl




98


https://www.washingtonpost.com/world/national-security/trump-

authorizes-offensive-cyber- operations-to-deter-foreign-adversaries-bolton-

says/2018/09/20/b5880578-bd0b-11e8-b7d2-0773aa1e33da_story.html




99


Klare, Michael T. Cyber Battles, Nuclear Outcomes? Dangerous New Pathways to Escalation. November 2019.

https://www.armscontrol.org/act/2019-11/features/cyber-battles-nuclear-out-comes-dangerous-new-pathways-escalation




100


https://www.congress.gov/




101


Solis, Gary D. Cyber Warfare // The Law of Armed Conflict. International Humanitarian Law in War. Cambridge University Press, 2016. pp. 673709.




102


Waugh, Steve. Geneva Conventions for Cyber Warriors Long Overdue // National Defense, March 18, 2020.

https://www.nationaldefensemagazine.org/articles/2020/3/18/geneva-conven-tions-for-cyber-warriors-long-overdue




103


International Strategy for Operating in Cyberspace: Prosperity, Security, and Openness in a Networked World, May 2011.

https://publicintelligence.net/white-house-international-strategy-for-cyber-space/




104


Clinton, William J. Presidential Decision Directive 63, The White House, Washington, DC, 1998.




105


Securing Americas Cyberspace, National Plan for Information Systems Protection: An Invitation to a Dialogue. Washington, DC: The White House, 2000.




106


Information Assurance Workforce Improvement Program. DoD 8570.01M. https://fas.org/irp/doddir/dod/m8570_01.pdf




107


Brookes, Adam. US plans to fight the net revealed // BBC, 27 January 2006. http://news.bbc.co.Uk/2/hi/americas/4655196.stm




108


Information Operations Roadmap // BBC, 30 October 2003. http://news. bbc.co.uk/2/shared/bsp/hi/pdfs/27_01_06_psyops.pdf




109


Raw obtains CENTCOM email to bloggers. October 16, 2006. http://www. rawstory.com/news/2006/Raw_obtains_CENTCOM_email_to_bloggers_1016. html




110


https://fas.org/irp/offdocs/nspd/nspd-54.pdf




111


The Comprehensive National Cybersecurity Initiative, 2008. p. 3.

https://fas.org/irp/eprint/cnci.pdf




112


Network Operations. FM 6-02.71. Headquarters Department of the Army Washington, DC. 19 November, 2008.




113


Deputy Assistant Secretary of Defense for Cyber, Identity, and Information Assurance Strategy, Office of the Assistant Secretary of Defense for Networks and Information Integration/DoD Chief Information Officer, August 2009. p. 4.

https://dodcio.defense.goV/portals/0/documents/dod_ia_strategic_plan.pdf




114


The United States Air Force Blueprint for Cyberspace. November 2, 2009. p.34.

https://nsarchive2.gwu.edu//dc.html?doc=2692105-Document-4




115


Houten, Vincent Van. Space and Naval Warfare Systems Center Atlantic, An Overview of the Cyber Warfare, Exploitation & Information Dominance (CWEID) Lab, January 28, 2010. p. 4.

https://assets.documentcloud.org/documents/3521680/Document-03-Vin-cent-Van-Houten-Space-and-Naval.pdf


