1. Notice on the Continuation of the National Emergency with Respect to Significant Malicious Cyber-Enabled Activities // The White House. 2023. March 29. URL: https://www.whitehouse.gov/briefing-room/presidential-actions/2023/03/29/notice-on-the-continuation-of-the-national-emergency-with-respect-to-significant-malicious-cyber-enabled-activities-3/ (дата обращения: 31.03.2023). Executive Order – «Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities» // The White House. 2015. April 1. URL: https://obamawhitehouse.archives.gov/the-press-office/2015/04/01/executive-order-blocking-property-certain-persons-engaging-significant-m (дата обращения: 12.04.2023).
2. The National Security Strategy // The White House. 2006. March. URL: https://georgewbush-whitehouse.archives.gov/nsc/nss/2006/ (дата обращения: 12.04.2023).
3. Annual Threat Assessment of the Intelligence Community for the Senate Armed Services Committee // Office of the Director of National Intelligence. 2008. February 27. P. 39. URL: https://www.dni.gov/files/documents/Newsroom/Testimonies/20080227_testimony.pdf (дата обращения: 12.04.2023).
4. The National Security Strategy // The White House. 2010. May. URL: https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/national_security_strategy.pdf (дата обращения: 12.04.2023).
5. 2011 DOD Strategy for Operating in Cyberspace // The Department of Defense. 2011. July. URL: https://dodcio.defense.gov/Portals/0/Documents/Cyber/DoD%20Strategy%20for%20Operating%20in%20Cyberspace%20July%202011.pdf (дата обращения: 31.03.2023).
6. Our History // U. S. Cyber Command. URL: https://www.cybercom.mil/About/History/ (дата обращения: 12.04.2023).
7. The National Security Strategy // The White House. 2015. February. URL: https://obamawhitehouse.archives.gov/sites/default/files/docs/2015_national_security_strategy_2.pdf (дата обращения: 12.04.2023).
8. DOD Cyber strategy // National Security Archive. URL: https://nsarchive.gwu.edu/document/21384-document-25 (дата обращения: 31.03.2023).
9. The National Security Strategy // The White House. 2017. December. URL: https://trumpwhitehouse.archives.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf (дата обращения: 18.04.2023).
10. Securing the Information and Communications Technology and Services Supply Chain (Executive Order 13873 of May 15, 2019) // Federal Register. 2019. May 17. URL: https://www.federalregister.gov/documents/2019/05/17/2019-10538/securing-the-information-and-communications-technology-and-services-supply-chain (дата обращения: 22.04.2023); Text of a Notice on the Continuation of the National Emergency on Securing the Information and Communications Technology and Services Supply Chain // The White House. 2020. May 13. URL: https://trumpwhitehouse.archives.gov/briefings-statements/text-notice-continuation-national-emergency-securing-information-communications-technology-services-supply-chain/ (дата обращения: 22.04.2023); TSMC reportedly stops taking orders from Huawei after new U.S. export controls // TechCrunch. 2020. May 18. URL: https://techcrunch.com/2020/05/18/tsmc-reportedly-stops-taking-orders-from-huawei-after-new-u-s-export-controls/ (дата обращения: 22.04.2023).
11. Defense Science Board (DSB) Task Force on Cyber Deterrence // Federation of American Scientists. URL: https://irp.fas.org/agency/dod/dsb/cyber-deter.pdf (дата обращения: 12.04.2023).
12. Summary of the 2018 National Defense Strategy of the United States of America // The Department of Defense. 2018. URL: https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf (дата обращения: 18.04.2023).
13. Summary: Department of Defense Cyber Strategy 2018 // The Department of Defense. 2018. URL: https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF (дата обращения: 18.04.2023).
14. Fact Sheet: 2018 DoD Cyber Strategy and Cyber Posture Review // The Department of Defense. 2018. URL: https://dodcio.defense.gov/Portals/0/Documents/Library/CyberStrategyFactsheet2018.pdf (дата обращения: 18.04.2023).
15. 2018 National Cyber Strategy of the United States of America // The White House. 2018. September. URL: https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf (дата обращения: 18.04.2023).
16. CSC Final report // Cyberspace Solarium Commission. 2020. March. URL: https://drive.google.com/file/d/1ryMCIL_dZ30QyjFqFkkf10MxIXJGT4yv/view (дата обращения: 18.04.2023).
17. 2021 Annual Report on Implementation // Cyberspace Solarium Commission. 2021. August. URL: https://drive.google.com/file/d/19V7Yfc5fvEE6dGIoU_7bidLRf5OvV2__/view (дата обращения: 14.05.2023).
18. Interim National Security Strategic Guidance // The White House. 2021. March 3. URL: https://www.whitehouse.gov/wp-content/uploads/2021/03/NSC-1v2.pdf (дата обращения: 19.04.2023).
19. The National Security Strategy // The White House. 2022. October. URL: https://www.whitehouse.gov/wp-content/uploads/2022/10/Biden-Harris-Administrations-National-Security-Strategy-10.2022.pdf (дата обращения: 19.04.2023).
20. The National Security Strategy // The White House. 2022. October. P. 22. URL: https://www.whitehouse.gov/wp-content/uploads/2022/10/Biden-Harris-Administrations-National-Security-Strategy-10.2022.pdf (дата обращения: 19.04.2023).
21. 2022 National Defense Strategy of the United States of America // The Department of Defense. 2022. October 27. URL: https://media.defense.gov/2022/Oct/27/2003103845/-1/-1/1/2022-NATIONAL-DEFENSE-STRATEGY-NPR-MDR.PDF (дата обращения: 18.04.2023).
22. Cyberattack on News Corp, Believed Linked to China, Targeted Emails of Journalists, Others // The Wall Street Journal. 2022. February 4. URL: https://www.wsj.com/articles/cyberattack-on-news-corp-believed-linked-to-china-targeted-emails-of-journalists-others-11643979328 (дата обращения: 26.04.2023); Взломан американский медиахолдинг News Corp // Хакер. 2022. 7 февраля. URL: https://xakep.ru/2022/02/07/news-corp-hack/ (дата обращения: 26.04.2023).
23. The Bvp47 – a Top-tier Backdoor of US NSA Equation Group // Beijing QI an Pangu Laboratory Technology CO. 2022. February 23. URL: https://www.pangulab.cn/en/post/the_bvp47_a_top-tier_backdoor_of_us_nsa_equation_group/ (дата обращения: 26.04.2023).
24. SockDetour – a Silent, Fileless, Socketless Backdoor – Targets U.S. Defense Contractors // Palo Alto Networks. 2022. February 24. URL: https://unit42.paloaltonetworks.com/sockdetour/ (дата обращения: 26.04.2023); APT-атаки на промышленные компании во второй половине 2021 года // Лаборатория Касперского. 2022. 28 февраля. URL: https://ics-cert.kaspersky.ru/publications/reports/2022/02/28/apt-attacks-on-industrial-companies-in-h2-2021/ (дата обращения: 26.04.2023).
25. Daxin: Stealthy Backdoor Designed for Attacks Against Hardened Networks // Broadcom. 2022. February 28. URL: https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/daxin-backdoor-espionage (дата обращения: 26.04.2023).
26. Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation // Cybereason. 2022. May 4. URL: https://www.cybereason.com/blog/operation-cuckoobees-cybereason-uncovers-massive-chinese-intellectual-property-theft-operation (дата обращения: 26.04.2023).
27. Sudworth J. The faces from China’s Uyghur detention camps // BBC. 2022. May 24. URL: https://www.bbc.co.uk/news/extra/85qihtvw6e/the-faces-from-chinas-uyghur-detention-camps (дата обращения: 26.04.2023).
28. H.R.3000 – FRIENDSHIP Act // Congress.gov. 1993. December 17. URL: https://www.congress.gov/bill/103rd-congress/house-bill/3000/text (дата обращения: 26.04.2023).
29. About // Victims of Communism Memorial Foundation. URL: https://victimsofcommunism.org/about/ (дата обращения: 27.04.2023).
30. Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years // SentinelOne. 2022. June 9. URL: https://www.sentinelone.com/labs/aoqin-dragon-newly-discovered-chinese-linked-apt-has-been-quietly-spying-on-organizations-for-10-years/ (дата обращения: 27.04.2023).
31. Rising Tide: Chasing the Currents of Espionage in the South China Sea // Proofpoint. 2022. August 30. URL: https://www.proofpoint.com/us/blog/threat-insight/chasing-currents-espionage-south-china-sea (дата обращения: 27.04.2023).
32. Rising Tide: Chasing the Currents of Espionage in the South China Sea // Proofpoint. 2022. August 30. URL: https://www.proofpoint.com/us/blog/threat-insight/chasing-currents-espionage-south-china-sea (дата обращения: 27.04.2023).
33. Pro-PRC DRAGONBRIDGE Influence Campaign Leverages New TTPs to Aggressively Target U.S. Interests, Including Midterm Elections // Mandiant. 2022. October 26. URL: https://www.mandiant.com/resources/blog/prc-dragonbridge-influence-elections (дата обращения: 27.04.2023).
34. Microsoft Digital Defense Report 2022 // Microsoft. 2022. URL: https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE5bUvv?culture=en-us&country=us (дата обращения: 31.01.2023)
35. Андрей Крутских: Тактика использования «киберудавки» стала неотъемлемым элементом западной политики санкций // Международная жизнь. 2022. 13 октября. URL: https://interaffairs.ru/news/show/37404 (дата обращения: 12.04.2023).
36. NSA creates assistant deputy director, other new entities focused on China // DefenseScoop. 2023. January 31. URL: https://defensescoop.com/2023/01/31/nsa-creates-assistant-deputy-director-other-new-entities-focused-on-china/ (дата обращения: 27.04.2023).
Комментарии
Сообщения не найдены