Размер шрифта
-
+

Войны новых технологий - стр. 4

» [31].

Мы видим, что военная ситуация повторяет ситуацию с терроризмом, делающим все новые и новые попытки обойти имеющуюся военную защиту теми силами, которые есть в его распоряжении и о которых никто не подумает как о военных.

Литература

1. Shurkin M. Meet France’s war philosophers // warontherocks.com/2018/01/meet-frances-war-philosophers/.

2. Vincent Desportes // en.wikipedia.org/wiki/Vincent_Desportes.

3. SWJ Interview: General Vincent Desportes // smallwarsjournal.com/jrnl/art/swj-interview-general-vincent-desportes.

4. Khanna P. Connectography. Mapping the Global Network Revolution. – New York, 2016.

5. Ханна П. В чем зло современной цивилизации и что ее спасет // snob.ru/selected/entry/126385.

6. Khanna P. Catalans And Kurds Are At The Forefront Of True Local Democracy // www.huffingtonpost.com/entry/catalonia-kurdistan-referendum-democracy_us_59c916e0e4b01cc57ff3f069?g9.

7. Trinchi O. Another government is possible. Interview to Parag Khanna // eastwest.eu/en/culture/another-government-is-possible-interview-to-parag-khanna.

8. Denning D.E. Information warfare and security. – New York, 1999.

9. Clarke R.A. Cyber war. The next threat to national security and what to do about it. – New York, 2010.

10. Libicki M.C. Conquest in cyberspace. National security and information warfare. – New York, 2007.

11. Carruthers C. Social engineering. A proactive security // www.mindpointgroup.com/wp-content/uploads/2017/08/Social-Engineering-Part-One-A-Dirty-Old-Trick.pdf.

12. Carr N. The limits of social engineering // www.technologyreview.com/s/526561/the-limits-of-social-engineering/.

13. O’Harrow R. Jr. In cyberattacks, hacking humans is highly effective way to access systems // www.washingtonpost.com/investigations/in-cyberattacks-hacking-humans-is-highly-effective-way-to-access-systems/ 2012/09/26/2da66866-ddab-11e1-8e43-4a3c4375504a_story.html?utm_term=.0257b22582d2.

14. Granger S. Social Engineering Fundamentals, Part I: Hacker Tactics // www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics.

15. Zamora W. Hacking your head: how cybercriminals use social engineering // blog.malwarebytes.com/101/2016/01/hacking-your-head-how-cybercriminals-use-social-engineering/.

16. Understanding Social Engineering Attacks // www.wordfence.com/learn/understanding-social-engineering-attacks/.

17. Background to “Assessing Russian Activities and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident Attribution // www.dni.gov/files/documents/ICA_2017_01.pdf.

18. Codebook – Russian Electoral Interventions – 1991–2017 // dataverse.scholarsportal.info/file.xhtml?fileId=61418&version=RELEASED&version=.0.

19. Greenberg A. The NSA confirms it: Russia hacked French election ‘infrastructure’ // www.wired.com/2017/05/nsa-director-confirms-russia-hacked-french-election-infrastructure/.

20. Haldewang de M. Russia’s meddling in the French election has backfired spectacularly // qz.com/978011/russias-intervention-in-emmanuel-macrons-election-campaign-was-a-foreign-policy-screw-up-of-astronomic-proportions/.

21. Murphy C. Russia tried to spy on Emmanuel Macron through Facebook: report // www.politico.eu/article/russia-tried-to-spy-on-emmanuel-macron-through-facebook-report/.

Страница 4