Connections the quarterly journal

Форма поиска

  • English
  • Русский
  • Журнал
    • Превью
    • Приоритетные темы на будущее
    • Будущие номера
    • Самые популярные статьи
    • Архив
  • Информация для авторов
  • Афина
Share/Save

Общая основа: отношения США и НАТО с Россией в киберпространстве

12.4.02_rus_van_epps.pdf

Вид публикации:

Journal Article

Авторы:

Geoff Van Epps

Источник:

Connections: The Quarterly Journal, Volume 12, № 4, p.17-59 (2013)
Tag: 
Information security
  • 13641 просмотр
  • Google Scholar(link is external)
  • DOI(link is external)
  • RTF
  • EndNote XML

References

Nye, Joseph S.. Understanding International Conflicts. Vol. 4th ed. New York: Longman, 2003.
Keohane, Robert O., and Joseph S. Nye. Power and Interdependence. Vol. 3rd ed. New York: Longman, 2001.
Nye, Joseph S.. "Independence and Interdependence." In Power in the Global Information Age, 154. New York: Routledge, 2004.
Angell, Norman. The Great Illusion: A Study of the Relation of Military Power in Nations to Their Economic and Social Advantage. New York: Putnam, 1910.
Nye, Joseph S.. "The Information Revolution and American Soft Power." In Power in the Global Information Age, 81-82. New York: Routledge, 2004.
Goodman, Will. "Cyber Deterrence: Tougher in Theory than in Practice?" Strategic Studies Quarterly 4, no. 3 (2010): 102-35.
Measuring the Information Society 2012 . Geneva: International Telecommunications Union, 2012.
Mulvenon, James C., and Gregory J. Rattray. Addressing Cyber Instability: Executive Summary(link is external). Cyber Conflict Studies Association Web Site, 2012.
Nye, Joseph S.. Cyber Power. Cambridge, MA: Belfer Center for Science and International Affairs, 2010.
Kuehl, Daniel T.. "From Cyberspace to Cyberpower: Defining the Problem." In Cyberpower and National Security. Washington, D.C.: National Defense University Press, 2009.
Betz, David J., and Tim Stevens. Cyberspace and the State: Toward a Strategy for Cyber-Power. New York: Routledge, 2011.
Dictionary of Military and Associated Terms In Joint Publication. Vol. 1-02. Washington, D.C.: United States Department of Defense, Government Printing Office, 2011.
Strategy for Operating in Cyberspace. Washington, DC: United States Department of Defense, Government Printing Office, 2011.
Kramer, Franklin D.. "Cyberpower and National Security: Policy Recommendations for a Strategic Framework." In Cyberpower and National Security, 12. Washington, D.C.: National Defense University Press, 2009.
Libicki, Martin. Cyberdeterrence and Cyberwarfare. Santa Monica, CA: RAND, 2009.
Panetta, Leon E.. America’s Pacific Rebalance(link is external) In Project Syndicate., 2012.
Stavridis, James C., and Elton C. Parker. "Sailing the Cyber Sea." Joint Forces Quarterly 65 (2012): 62.
Clarke, Richard A., and Robert K. Knake. Cyber War: The Next Threat to National Security and What to Do About It. New York: Harper Collins, 2010.
Geers, Kenneth. Strategic Cyber Security. Tallinn, Estonia: Cooperative Cyber Defence Center of Excellence, 2011.
Obama, Barack. Remarks by the President on Securing our Nation’s Cyber Infrastructure(link is external)., 2009.
Comprehensive National Cybersecurity Initiative(link is external). Washington, D.C.: The White House, 2009.
Active Engagement, Modern Defence: Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization(link is external). Brussels: NATO, 2010.
Concept of the Foreign Policy of the Russian Federation(link is external). Ministry of Foreign Affairs of the Russian Federation, 2013.
Spade, Jayson M.. China’s Cyber Power and America’s National Security. Carlisle, PA: U.S. Army War College, 2012.
Clarke, Richard A.. War from Cyberspace In The National Interest., 2009.
Wilson, Clay. "Cyber Crime." In Cyberpower and National Security, 415. Washington, D.C.: National Defense University Press, 2009.
Underground Economies: Intellectual Capital and Sensitive Corporate Data Now the Latest Cybercrime Currency(link is external). McAfee and SAIC, 2011.
Greenberg, Andy. McAfee Explains the Dubious Math behind Its ‘Unscientific’ $1 Trillion Data Loss Claim(link is external). Forbes, 2012.
2012 Norton Cybercrime Report(link is external). Symantec, 2012.
Lewis, James. "Five Myths about Chinese Hackers." Washington Post (2013).
Masters, Greg. "Global Cybercrime Treaty Rejected at U.N.(link is external)" SCMagazine (2010).
Cutts, Andrew. "Warfare and the Continuum of Cyber Risks: A Policy Perspective." In The Virtual Battlefield: Perspectives on Cyber Warfare, 69. Amsterdam: IOS Press, 2009.
Alexander, Keith. U.S. Cybersecurity Policy and the Role of U.S. CYBERCOM(link is external) In CSIS Cybersecurity Policy Debate Series., 2010.
Dion, Maeve. "Different Legal Constructs for State Responsibility." In International Cyber Security Legal & Policy Proceedings 2010, 69. Tallinn, Estonia: Cooperative Cyber Defence Center of Excellence, 2010.
Schmitt, Michael N.. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press, 2013.
Hughes, Rex. "A Treaty for Cyberspace." International Affairs 86, no. 2 (2010): 533.
Carr, Jeffrey. Inside Cyber Warfare. Sebastopol, CA: O’Reilly Media, 2010.
Carr, Jeffrey. The Myth of the CIA and the Trans-Siberian Pipeline Explosion(link is external). Digital Dao, 2012.
Geers, Kenneth. "Cyberspace and the Changing Nature of Warfare(link is external)." SC Magazine (2008).
Mazanec, Brian M.. "The Art of (Cyber) War(link is external)." Journal of International Security Affairs (2009).
S., Nye Joseph. "Nuclear Lessons for Cyber Security?" Strategic Studies Quarterly (2011): 31.
Häußler, Ulf. "Cyber Security and Defence from the Perspective of Articles 4 and 5 of the NATO Treaty." In International Cyber Security Legal & Policy Proceedings 2010, 104-5. Tallinn, Estonia: Cooperative Cyber Defence Center of Excellence, 2010.
Shackelford, Scott J.. "From Nuclear War to Net War: Analogizing Cyber Attacks in International Law." Berkeley Journal of International Law 27 (2009): 196-97.
Flook, Kara. Russia and the Cyber Threat(link is external). American Enterprise Institute Critical Threats, 2009.
Tikk, Eneken, Kadri Kaska, and Liis Vihul. International Cyber Incidents: Legal Considerations. Tallinn, Estonia: Cooperative Cyber Defence Center of Excellence, 2010.
Sanger, David E.. "Obama Order Sped Up Wave of Cyberattacks Against Iran." The New York Times (2012).
Blank, Stephen J.. "Introduction." In Prospects for U.S.-Russian Security Cooperation, 1. Carlisle Barracks, PA: Strategic Studies Institute, U.S. Army War College, 2009.
Churchill, Winston. "The War Memoirs of Winston Churchill." Life Magazine (1948): 63.
Greene, Samuel A., and Dmitri Trenin. (Re) Engaging Russia in an Era of Uncertainty In Policy Brief. Washington, D.C.: Carnegie Endowment for International Peace, 2009.
Shleifer, Andrei, and Daniel Treisman. "Why Moscow Says No." Foreign Affairs (2011): 122-38.
Kramer, David J.. The Russia Challenge: Prospects for US-Russian Relations In Policy Brief. Washington, D.C.: The German Marshall Fund, 2009.
Oliker, Olga, Keith Crane, Lowell H. Schwartz, and Catherine Yusupov. Russian Foreign Policy: Sources and Implications. Santa Monica, CA: RAND Project Air Force, 2009.
R. Nation, Craig. "Results of the “Reset”." In US-Russian Relations, 9. Vol. Russie.Nei.Visions No. 53 . Paris: IFRI, 2010.
Linkevicius, Linas. "Reset with Russia, but with Reassurance." International Herald Tribune.
The Right Direction for U.S. Policy toward Russia. Washington, D.C.: The Nixon Center, 2009.
Trenin, Dmitri. The Russian Awakening. Moscow: Carnegie Moscow Center, 2012.
Coalson, Robert. Former U.S. State Dep’t Official Pifer Asks, ‘Are the Russians Ready to Reengage?’. Radio Free Europe/Radio Liberty, 2012.
Whitlock, Craig. "‘Reset’ Sought on Relations with Russia, Biden Says." Washington Post (2009).
Sestanovich, Stephen. Reassessing the U.S.-Russia ‘Reset’(link is external) In Interview by Bernard Gwertzman. Council on Foreign Relations Web Site, 2012.
Gearan, Anne. "Sour U.S.-Russia Relations Threaten Obama’s Foreign Policy Agenda." Washington Post (2013).
Graham, Thomas E., and Dmitri Trenin. "Why the Reset Should Be Reset." New York Times (2012).
Active Engagement, Modern Defence(link is external). Lisbon Summit, 2010.
Russia’s National Security Strategy to 2020(link is external). National Security Council of the Russian Federation, 2009.
Beyrle, John. Priorities for Russia-U.S. Relations: A Statement by Former Ambassadors to Washington and Moscow(link is external). Carnegie Endowment for International Peace Web Site, 2013.
Giles, Keir. "‘Information Troops’—A Russian Cyber Command?" In 3rd International Conference on Cyber Conflict, 50. Tallinn: CCD COE Publications, 2011.
Fallows, James. Cyber Warriors(link is external). The Atlantic, 2010.
Fulghum, David A.. "China Cyber-skills Are Improving But Still Don’t Top Russia and Israel." Aviation Week (2012).
McGee, Joshua. US-Russia Diplomacy -The “Reset” of Relations in Cyberspace(link is external). Center for Strategic and International Studies Web Site, 2011.
Healey, Jason. Comparing Norms for National Conduct in Cyberspace(link is external). New Atlanticist, 2011.
Boudreaux, Benjamin. "Cyber Diplomats." State Magazine (2013): 32.
Thomas, Timothy. "Nation-State Cyber Strategies: Examples From China and Russia." In Cyberpower and National Security, 475-76. Washington, D.C.: National Defense University Press, 2009.
Thomas, Timothy L.. Recasting the Red Star: Russia Forges Tradition and Technology through Toughness (link is external). Fort Leavenworth, KS: Foreign Military Studies Office, 2011.
Clinton, Hillary. Remarks on Internet Freedom(link is external)., 2010.
Healey, Jason. Breakthrough or Just Broken? China and Russia’s UNGA Proposal on Cyber Norms(link is external). New Atlanticist.
Convention on Cybercrime, Chart of Signatures and Ratifications(link is external). Council of Europe, 2013.
Grigoriev, Dmitry I.. "Russian Priorities and Steps Towards Cybersecurity." In Global Cyber Deterrence: Views of China, the U.S., Russia, India and Norway. New York: EastWest Institute, 2010.
Harris, Shane. "The Cyberwar Plan." National Journal (2009).
Dempsey, Martin E.. "From the Chairman: Making Strategy Work." Joint Forces Quarterly 66 (2012): 2-3.
Sherr, James. NATO and Russia: Doomed to Disappointment?(link is external). NATO Review, 2011.
Joint Statement on Common Security Challenges at the Threshold of the Twenty-First Century(link is external)., 1998.
Barr, Stephen. "U.S., Russia Agree to Establish Y2K Center." Washington Post (1999).
Becker, Elizabeth. "U.S. and Russia Agree on Joint Defense Against Y2K Debacles." New York Times (1999).
Bowman, Tom. "U.S., Russian Military Ally Against Y2K Bug." Baltimore Sun (1999).
Shogren, Elizabeth. "U.S., Russia Cooperate on Y2K Concerns." Los Angeles Times (1999).
Gady, Franz-Stefan, and Greg Austin. Russia, the United States, and Cyber Diplomacy. New York City: EastWest Institute, 2010.
Developments in the Field of Information and Telecommunications in the Context of International Security. United Nations General Assembly, 2009.
Nakashima, Ellen. "In U.S.-Russia Deal, Nuclear Communication System May Be Used for Cybersecurity." Washington Post (2012).
Schmidt, Howard. U.S. and Russia: Expanding the “Reset” to Cyberspace(link is external) In The White House Blog., 2011.
Joint Statement by Cybersecurity Coordinator Schmidt and Deputy Secretary Klimashin: U.S. and Russian Delegations Meet to Discuss Confidence-Building Measures in Cyberspace(link is external)., 2011.
About NRC(link is external). NATO-Russia Council Web Site, 2013.
Lavrov, Sergey. Speech of and Answers to Questions of Mass Media by Russian Foreign Minister Sergey Lavrov Summarizing the Results of the Session of NATO-Russia Council at the Foreign Minister Level(link is external). Brussels, 2013.
Joubert, Vincent. Five Years after Estonia’s Cyber Attacks: Lessons Learned for NATO In NATO Defense College, Research Paper. Rome: Imprimerie Deltamedia Group, 2012.
Mullick, Haider Ali Hussei. "Catching the BUG (Belarus, Ukraine and Georgia)-Russia’s Buffer or NATO’s Annex? A New Framework for Euro-Atlantic-Russian Cooperation(link is external)." Georgetown Journal of International Affairs (2013).
Joint Statement on Bilateral Discussions on Cooperation in Cybersecurity, China Institute of International Relations (CICIR)–Center for Strategic and International Studies (CSIS)(link is external). Center for Strategic and International Studies, 2012.
Soboleva, Inna. NATO, Russia Consider Joint Missile-Defense System(link is external). Russia Beyond the Headlines, 2013.
No Clearance Required: Using Commercial Threat Intelligence in the Federal Space(link is external). Mandiant Web Site, 2013.
Sternstein, Aliya. U.S., Russia, Other Nations Near Agreement on Cyber Early-Warning Pact(link is external). Nextgov, 2012.
Carr, Jeffrey. OSCE’s Cyber Security Confidence Building Measures Revealed by Anonymous(link is external). Digital Dao, 2012.
Stavridis, James G.. Testimony before the 113th Congress, House and Senate Armed Services Committee Testimony., 2013.
NATO Team Wins the Locked Shields Cyber Defence Exercise(link is external). NATO Cooperative Cyber Defense Centre of Excellence Web Site, 2013.
International Law of Cyber Operations(link is external). NATO Cooperative Cyber Defense Centre of Excellence Web Site, 2013.
The Applicability of International Law in Cyberspace-From If to How?(link is external). Panel Three at the Georgetown University Conference on the International Law on Cyber, 2013.
Four Legal Experts Appointed as Centre’s Senior Fellows(link is external). NATO Cooperative Cyber Defense Centre of Excellence Web Site, 2013.
"Apply International Law to Cyber-Warfare? Good Luck." The Economist (2013).
International Strategy for Cyberspace: Prosperity, Security and Openness in a Networked World. Washington, D.C.: Government Printing Office, 2011.
Krastev, Nikola. In U.S. Cybercrime Case, Track Record Indicates Russia Willing to Cooperate(link is external). Radio Free Europe/Radio Liberty, 2010.
Hudson, Carl. Pacific Endeavor 2012 Begins(link is external). United States Pacific Command Web Site, 2012.
O’Dwyer, Gerald. Norway Hails Northern Eagle as Bridge-Builder(link is external). DefenseNews, 2012.
Essers, Loek. Russian Cybercriminals Earned $4.5 Billion in 2011(link is external). ComputerWorld, 2012.
The G8 24/7 Network of Contact Points Protocol Statement(link is external)., 2007.
Russia Calls for Cooperation in Combating Child Pornography(link is external). Voice Of Russia Radio, 2012.
Barry, Ellen. "After Boston Bombing, American Ties with Russia Improve." New York Times (2013).
Mutual Legal Assistance Treaty between the United States of America and the Russian Federation(link is external)., 1999.
Securing Cyberspace for the 44th Presidency. Report of the CSIS Commission on Cybersecurity for the 44th Presidency. Washington, D.C.: Center for Strategic and International Studies, 2008.
National Strategy for Trusted Identities in Cyberspace. Washington, D.C.: Government Printing Office, 2011.
Markoff, John, and Andrew E. Kramer. "U.S. and Russia Differ on a Treaty for Cyberspace." New York Times (2009).
PKI Cross-Certification Between CCEB Nations(link is external). Combined Communications-Electronics Board, 2007.
Rauscher, Karl Frederick, and Valery Yashchenko. Russia–U.S. Bilateral on Cyber Security: Critical Terminology Foundations(link is external). New York and Moscow: EastWest Institute and Moscow State University, 2011.

Active calls for articles

Hybrid Operations

Deadline:
15.09.2025

Check also our Google Scholar profile(link is external)

  • Downloads
  • How to cite
  • File Name: 12.4.02_rus_van_epps.pdf
    Size: 812.6 КБ
    Number of Downloads: 8345
APA style: Van Epps, G. (2013).  Общая основа: отношения США и НАТО с Россией в киберпространстве. Connections: The Quarterly Journal. 12(4), 17-59.
Chicago style: Van Epps, Geoff. "Общая основа: отношения США и НАТО с Россией в киберпространстве." Connections: The Quarterly Journal 12, no. 4 (2013): 17-59.
IEEE style: Van Epps, G., "Общая основа: отношения США и НАТО с Россией в киберпространстве", Connections: The Quarterly Journal, vol. 12, issue 4, pp. 17-59, Осень 2013.
DOI http://dx.doi.org/10.11610/Connections.rus.12.4.02(link is external)

Related Publications

Вброс нарративов в информационное поле боя
  • Trending
  • Latest(активная вкладка)
  • Most cited
  • Борьба с преступностью, ненавистью и дезинформацией в киберпространстве (1,001)
  • Дальнейшее развитие квантовых вычислений и их важность для НАТО (999)
  • Как сети социального взаимодействия масштабируются в цивилизации (881)
  • Дезинформация: Политическая реакция для повышения устойчивости граждан (865)
  • Последствия русско-украинской войны для права, экономики и региональной безопасности (849)
view all
  • Модернизация управления кадрами в Вооружённых силах Украины в период военного конфликта: Подготовка новых офицеров
  • Русско-украинская война и цена удобрений
  • Влияние русско-украинской гибридной войны на политику и правила кибербезопасности Европейского Союза
  • Вторжение России в Украину и новейшая история белорусской государственности
  • Женщины, мир и безопасность в войне в Украине
view all
Introduction to Program-based Defense Resource Management (8)
The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms) (6)
NATO and the South Caucasus: Armenia, Azerbaijan, and Georgia on Different Tracks (5)
Terror-Crime Nexus? Terrorism and Arms, Drug, and Human Trafficking in Georgia (4)
Terrorist Routes in Central Asia: Trafficking Drugs, Humans, and Weapons (4)
view all

© Консорциум военных академий и институтов исследования безопасности Партнерства ради мира(link is external), 2012-2024
Этот сайт был разработан и поддерживается Procon Ltd.(link is external), исполнительным издателем журнала Connections: The Quarterly Journal