Preview

Journal of International Analytics

Advanced search

US Global Ambitions in Digital Age

https://doi.org/10.46272/2587-8476-2015-0-3-144-156

Abstract

The article investigates the political problem of U.S. domination in global cyberspace. The author deals with historical questions of U.S. Cybercommand build up and military strategies of cyberwarfare applications. Special attention attracted to political analysis of American information systems vulnerability.

About the Author

E. Rogovskii
Center for Military-Industrial Policy Studies, Institute for USA and Canada Studies, Russian Academy of Science
Russian Federation

Doctor of Sci. (Economics), Head

2/3 Khlebny per., Moscow, 123995



References

1. Europe faces a ‘real threat’ from Russia, warns US army commander. URL: http://www.telegraph. co.uk/news/worldnews/europe/russia/11547247/Europe-faces-a-real-threat-from-Russia-warnsUS-army-commander.html

2. URL: http://www.defense.gov/news/newsarticle.aspx?id=45289; URL: https://fas.org/irp/doddir/ army/pam525-7-8.pdf

3. URL: http://www.neogeography.ru/ru/2010–05–03–10–15–45/109-sao

4. Lynn W., III. Defending a New Domain: The Pentagon’s Cyberstrategy// Foreign Affairs. 2010. Sept./Oct. URL: http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-anew-domain

5. Air Force Cyber Command. «Air Force Cyber Command Strategic Vision». March. 2008. URL: http://www.afcyber.af.mil/shared/media/document/AFD-080303–054.pdf

6. Miles D. Gates Establishes New Cyber Subcommand. American Forces Press Service. – Wash. 2009. June 24. URL: http://www.defenselink.mil/ news/newsarticle.aspx?id=54890

7. URL: http://www.washingtonpost.com/wp-dyn/content/article/2009/06/23/AR2009062303492.html

8. URL: http://rnd.cnews.ru/army/news/top/index_science.shtml?2010/07/09/399982

9. Statement for the Record Lieutenant General Keith Alexander Commander Joint Functional Component Command for Network Warfare before the House Armed Services Committee Terrorism, Unconventional Threats, and Capabilities Subcommittee. 2009. 5 May.

10. US Department of Defense Cyber Command Fact Sheet. 2010. Oct. 13. URL: www.defense.gov/cyber

11. URL: http://fcw.com/Articles/2009/07/06/buzz-cyber-command.aspx?p=1.

12. Statement of General Keith B. Alexander Commander United States Cyber Command Before the House Committee on Armed Services Subcommittee on Emerging Threats and Capabilities. 2011. 16 March.

13. Daniel L. Lynn Outlines Cyber Threats, Defensive Measures // American Forces Press Service. URL: http://www.defense.gov/news/newsarticle. aspx?id=60600

14. Webster S. Pentagon May Apply Preemptive Warfare Policy to the Internet. 2010. Aug. 29. URL: http://www.rawstory.com/rs/2010/0829/pentagon-weighs-applying-preemptive-warfaretactics-internet/. (30.08.2010).

15. Department of Defense Strategy for Operating in Cyberspace. ‒Wash. D. C. 2011. July. URL: http://www.defense.gov/news/d20110714cyber.pdf

16. International Strategy for Cyberspace. Prosperity, Security, and Openness in a Networked World. 2011. May. URL: http://www.whitehouse.gov/sites/default/files/ rss_viewer/international_ strategy_for_cyberspace.pdf

17. 2010 Quadrennial Defense Review. URL: http://www.defense.gov/qdr /qdr%20as%20of%20 29jan10 %201600.PDF

18. URL: http://www.nextgov.com/defense/2010/09/defense-lacks-doctrine-to-guide-it-throughcyberwarfare/47575/

19. Foreign economic collection report 2011. URL: http://www.globalsecurity org/intell/library/ reports/2011/foreign-economic-collection_2011.pdf

20. Department of Defense Cyberspace Policy Report to Congress. 2011. Nov. URL: http://www. defense.gov/home/features/2011/0411_cyberstrategy/docs/NDAA%20Section%20934 %20 Report_For%20webpage.pdf.

21. Congress Sanctions Offensive Military Action in Cyberspace. 2011. Dec. 15. URL: https:// www.infosecisland.com/blogview/18769-Congress-Sanctions-Offensive-Military-Action-inCyberspace.html

22. Obama signs off on nomination of Rogers as NSA director. URL: http://www.washingtonpost.com/ world/national-security/obama-signs-off-on-nomination-of-rogers-as-nsa-director/2014/01/25/ bc54378c-85f7-11e3-801f-e3ff2ca3fab6_story.html?wpisrc=nl_headlines

23. Executive Order 13694 of April 1, 2015 Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities. URL: http://www.treasury.gov/resource-center/ sanctions/Programs/Documents/cyber_eo.pdf

24. URL: http://www.defense.gov/home/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf

25. Chinese hack of federal personnel files included security-clearance database. URL: https://www. google.ru/?gws_rd=ssl#newwindow=1&q=Chinese+hack+of+federal+personnel+files+included +security-clearance+database

26. Гринуолд Г. Новое крупное расширение «подразделения кибербезопасности» в Пентагоне предпринято вовсе не ради обороны. URL: http://www.inopressa.ru/article/29jan2013/ guardian/cyber.html

27. Sanger D.A.“U.S. Decides to Retaliate Against China’s Hacking.” NYT JULY 31, 2015 URL: http:// www.nytimes.com/2015/08/01/world/asia/us-decides-to-retaliate-against-chinas-hacking.html ?hp&action=click&pgtype=Homepage&module =first-column-region&region=top-news&WT. nav=top-news

28. Internet Freedom as a Global Human Rights Issue. URL: http://www.asil.org/ insights120524.cfm

29. Clinton H.R. Remarks on Internet Freedom. The Newseum Washington, DC January 21, 2010 www.state.gov/secretary/rm/2010/01/135519.htm

30. Clinton H.R. Internet Rights and Wrongs: Choises & Challenges in a Networked World / George Washington University Washington, DC. February 15, 2011. URL: washingtonpost.com/blog.../ clinton_internet_freedom_speec.html

31. ««Мы небудем извиняться за то, что помогаем людям пользоваться универсальными правами». Интервью старшего советника госсекретаря США по инновациям АЛЕКСА РОССА корреспонденту «Ъ» Елене Черненко, Газета «Коммерсантъ», № 172 (4713), 15.09.2011. URL: http://www.kommersant.ru/doc/1773260

32. President Obama at a Shanghai town hall with students, as provided by the White House. URL: http://latimesblogs.latimes.com/washington/2009/11/obama-china-townhall-text.html

33. Stross Ch. Why I want Bitcoin to die in a fire. URL: http://www.antipope.org/charlie/blogstatic/2013/12/why-i-want-bitcoin-to-die-in-a.html

34. URL: http://www.telegraph.co.uk/technology/internet/10018193/The-New-Digital-Age-by-Eric-Schmidt-and-Jared-Cohen-review.html


Review

For citations:


Rogovskii E. US Global Ambitions in Digital Age. Journal of International Analytics. 2015;(3):144-156. (In Russ.) https://doi.org/10.46272/2587-8476-2015-0-3-144-156

Views: 7626


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2587-8476 (Print)
ISSN 2541-9633 (Online)