ПРОБЛЕМИ ІНФОРМАЦІЙНОЇ БЕЗПЕКИ У РАМКАХ ТОРГОВЕЛЬНОЇ ВІЙНИ МІЖ СПОЛУЧЕНИМИ ШТАТАМИ АМЕРИКИ ТА КИТАЙСЬКОЮ НАРОДНОЮ РЕСПУБЛІКОЮ


Автор(ка)
Піддобрівна Марія Володимирівна

Ступінь
Бакалавр

Група
СКб-1-18-4.0д

Спеціальність
291 Міжнародні відносини, суспільні комунікації та регіональні студії

Кафедра
Кафедра міжнародних відносин та міжнародного права


Анотація

Актуальність теми дослідження. Стрімкий розвиток у сфері інформаційно-комунікаційних технологій та інформаційного середовища зробили інформаційну безпеку однією з ключових у системі інтересів усіх країн світу. Ерою інформаційних технологій поза жодними сумнівами можна назвати XXI століття. Інформаційних загроз та небезпек стає більше з новим технічним винаходом, а потреба у забезпеченні інформаційної безпеки - питання, яке стоїть на порядку денному кожної технічно розвиненої держави.
Американський філософ та політолог, Френсіс Фукуяма, явно помилявся у статті, а згодом книзі «Кінець історії», де під «кінцем» вбачав завершення не історії, а саме війн. Світові демократичні гіганти дійсно перестали розв’язувати повномасштабні війни у тому сенсі, якому ми звикли їх уявляти, та поступово переміщують зброю з фізичного виміру в інформаційний. Будь-який вид конфлікту, чи то війна, тероризм чи сепаратизм тепер містять в собі інформаційний чинник. У сучасному світі саме інформаційне середовище є найуразливішим з огляду на швидкість розвитку технологій. Воно уособлює головні загрози національної безпеки в різних сферах. Інформаційна безпека дійсно впливає на всі компоненти сучасної політики, тому в останні роки глобально важливого характеру набуло питання її забезпечення.
Угода першої фази, яка мала покращити як політичні, так і економічні відносини між США та КНР майже не принесла позитивних результатів, а тому з огляду на кількість взаємних кібератак можна сказати, що зараз відбувається перехід конкуренції між країнами у кіберпростір. В умовах торговельної війни загострилася потреба в детальному перегляді слабкостей інформаційної безпеки з урахуванням сучасних інформаційних викликів. Таких стало набагато більше, а їх наслідки важко передбачити. Тому варто дослідити підхід до розвитку правового аспекту у напрямку інформаційної безпеки Вашингтону та Пекіну.
Жодна з країн не може позбутися всіх проблем інформаційної безпеки, створивши при цьому середовище, у якому б суспільство та держава були повністю захищені від інформаційних загроз.

Зміст

ВСТУП 3
РОЗДІЛ 1. ТЕОРЕТИКО-МЕТОДИЧНІ АСПЕКТИ ПРОБЛЕМИ ДОСЛІДЖЕННЯ 5
1. 1 Стан наукової розробки та джерельна база проблеми 5
1. 2 Понятійно-категоріальний апарат та методи дослідження 8
РОЗДІЛ 2. ОСОБЛИВОСТІ ІНФОРМАЦІЙНОЇ БЕЗПЕКИ США ТА КНР
. 11
2. 1 Становлення і активний розвиток політики інформаційної безпеки США 11
2. 2 Політичний інтерес у інформаційній безпеці КНР 24
РОЗДІЛ 3. ЗАБЕЗПЕЧЕННЯ ІНФОРМАЦІЙНОЇ БЕЗПЕКИ У РАМКАХ ТОРГОВЕЛЬНОЇ ВІЙНИ МІЖ США ТА КНР 36
3. 1 Інформаційна безпека у рамках торговельної війни 36
3. 2 Проблеми та тенденції розвитку інформаційної безпеки 46
ВИСНОВКИ 53
СПИСОК ВИКОРИСТАНИХ ДЖЕРЕЛ ТА ЛІТЕРАТУРИ 57

Покликання

1. Бєлоусова Н. Б. Концептуальні засади стратегії інформаційної безпеки США за адміністрації Барака Обами. Проблеми міжнародних відносин.2011.
№2. С. 40-53.
2. Бусол О. Інформаційна безпека США: законодавче регулювання та перспективи співпраці для України. Центр досліджень соціальних комунікацій НБУВ. URL: https://bit.ly/3LijRFs (дата звернення: 15.05.2022).
3. Бусол О. Тенденції нормативно-правового забезпечення інформаційної безпеки США. Наукові праці Національної бібліотеки України імені ВІ Вернадського. 2017. №46. С. 92-106.
4. Голод К. Інформаційна безпека США: сучасний стан та уроки для України.
Геополітика України: історія і сучасність. 2017. №2. С. 91-107.
5. Дубов Д. Кібербезпекова політика в контексті трансформації політики безпеки США за адміністрації Б. Обами. Політичний менеджмент. 2010.
№ 1.С. 155-162.
6. Законодавство та стратегії у сфері кібербезпеки країн Європейського союзу США, Канади та інших. Європейський інформаційно-дослідницький центр. URL: https://infocenter.rada.gov.ua/uploads/documents/28982.pdf(дата звернення: 17.05.2022).
7. Концепція інформаційної безпеки України : проект / Organization for Security and Co-operation in Europe. OSCE. URL: https://www.osce.org/files/f/documents/0/2/175056.pdf (дата звернення: 15.05.2022).
8. Матвєєва А. Ю. Місце кібербезпеки в інформаційній політиці КНР. Актуальні проблеми сучасної наукової думки. 2014.С. 409-410.
9. Олійник О. В. Інформаційна безпека США. Боротьба з організованою злочинністю і корупцією (теорія і практика). 2012. № 1. С.280–288. URL: http://nbuv.gov.ua/UJRN/boz_2012_1_33 (дата звернення: 15.05.2022).
10. Черновол І. О. Інформаційна безпека США в контексті актуальних загроз і викликів. Сучасний міжнародний порядок: виклики, загрози, тенденції. 2020. С. 67-69.
11. Черновол І. О. Інформаційна безпека США: роз’єднанні штати Америки?. Вісник студентського наукового товариства ДонНУ імені Василя Стуса. 2021. №1(13). С.91-96.
12. Чесноков В. Інформаційна безпека уряду США. Шевченківська весна. 2013.
№ 11. С. 93–94. URL: http://www.iir.edu.ua/uploads/files/ШВ%2021-03- 12_2.pdf#page=93 (дата звернення: 15.05.2022).

13. 17 US utility firms targeted by mysterious state-sponsored group. URL: https://www.zdnet.com/article/17-us-utility-firm...- sponsored-group/(date of access: 17.05.2022).
14. 20 years of the Internet in China. China.org.cn.URL: https://on.china.cn/3wnw0o2(date of access: 17.05.2022).
15. 2006-2020 National Informatization Development Strategy. China Copyright and Media. URL: https://bit.ly/3lrwbs9(date of access: 17.05.2022).
16. 2009 Cyberspace policy review. CISA Central. 2009.
URL: https://www.cisa.gov/publication/2009-cyberspace-policy-review (date of access: 16.05.2022).
17. About DigiChina. Stanford University. 2022.
URL: https://digichina.stanford.edu/about/ (date of access: 15.05.2022).
18. Announcement of the Ministry of Public Security on Public Solicitation of Comments on the Regulations on the Graded Protection of Network Security (Draft for Comment) : June 27, 2018. URL: https://www.mps.gov.cn/n2254536/n4904355/c6159136/content.html(date of access: 17.05.2022).
19. Anti-Terrorism Act (2015).URL: https://www.chinalawtranslate.com/counter- terrorism-law-2015/(date of access: 17.05.2022).
20. Austin G. Cybersecurity in China. Cham : Springer International Publishing, 2018. https://doi.org/10.1007/978-3-319-68436-9
21. Bennett C. Federal data security bill heads to Obama’s desk. The Hill. URL: https://bit.ly/3Mk0o8p (date of access: 16.05.2022).
22. China bought none of the extra $200 billion of US exports in Trump's trade deal. URL: https://www.piie.com/blogs/realtime-economic-iss...- none-extra-200-billion-us-exports-trumps-trade(date of access: 17.05.2022).
23. China cybersecurity firm alleges US National Security Agency is behind hacking group that has stolen a mass of critical data. URL: https://finance.yahoo.com/news/china-cybersecuri...- 093000291.html(date of access: 17.05.2022).
24. China hacked a Navy contractor and secured a trove of highly sensitive data on submarine warfare. URL: https://wapo.st/3MskVHY (date of access: 17.05.2022).
25. China moves to block internet VPNs from 2018. The Guardian. URL: https://www.theguardian.com/world/2017/jul/11/ch...- vpns-from-2018(date of access: 17.05.2022).
26. China officially legalized the “Social Credit System”. Adware.Guru. URL:https://adware.guru/china-officially-legalized-t...(date of access: 17.05.2022).

27. China says U.S. addresses used its computers to launch cyberattacks on Russia, Ukraine. URL: https://www.reuters.com/article/china-cybersecur...- idCAKCN2L80ED(date of access: 17.05.2022).
28. China sees cyber espionage as a ‘necessary’ part of its national strategy, expert says. URL: https://www.cnbc.com/2018/12/21/doj-accuses-china-of-hacking-
.html (date of access: 17.05.2022).
29. China state-backed hackers compromised networks of at least 6 U.S. state governments, research finds. URL: https://www.cnbc.com/2022/03/09/china- state-backed-hackers-compromised-6-us-state-governments-report.html(date of access: 17.05.2022).
30. China’s Social Credit System: Speculation vs. Reality. How far along is China’s much-hyped social credit system – and where is it heading next? The Diplomat. URL:https://thediplomat.com/2021/03/chinas-social-cr...- vs-reality/(date of access: 17.05.2022).
31. China-based campaign breached satellite, defense companies: Symantec. URL: https://www.reuters.com/article/us-china-usa-cyber-idUSKBN1JF2X0(date of access: 17.05.2022).
32. Chinese cybersecurity company accuses CIA of 11-year-long hacking campaign.URL: https://www.reuters.com/article/us-china-usa-cia- idUSKBN20Q2SI(date of access: 17.05.2022).
33. Chinese Hackers Target Universities in Pursuit of Maritime Military Secrets. URL: https://www.wsj.com/articles/chinese-hackers-tar...- pursuit-of-maritime-military-secrets-11551781800(date of access: 17.05.2022).
34. Chinese Intelligence Officers and Their Recruited Hackers and Insiders Conspired to Steal Sensitive Commercial Aviation and Technological Data for Years. URL: https://www.justice.gov/opa/pr/chinese-intelligence-officers-and- their-recruited-hackers-and-insiders-conspired-steal(date of access: 17.05.2022)
35. Chinese State Hackers Suspected Of Malicious Cyber Attack On U.S. Utilities. URL: https://bit.ly/39zlbGM (date of access: 17.05.2022).
36. Computer Fraud and Abuse Act of 1984 : Introduced 25.07.1984. Congress.gov. URL: https://www.congress.gov/bill/98th-congress/senate-bill/2864 (date of access: 15.05.2022).
37. Computer Fraud and Abuse Act of 1986 : introduced 30.04.1986, public lаw № 99-474. Congress.gov. URL: https://www.congress.gov/bill/99th-congress/house- bill/4718/text (date of access: 15.05.2022).
38. Computer Information Network and Internet Security, Protection and Management Regulations – 1997. Lehman, Lee & Xu. URL: https://bit.ly/3wszZhW(date of access: 17.05.2022).

39. Computer Security Act of 1987 : introduced 06.01.1987, Statute at Large 101 Stat. 1724 - Public Law 100-235. Congress.gov. URL: https://www.congress.gov/bill/100th-congress/house-bill/145/text (date of access: 15.05.2022).
40. Conditt J. China just made VPNs illegal: The Great Firewall just got more impenetrable. URL: https://www.engadget.com/2017-01-23-china-vpn-illegal- internet-censorship-government-approval.html(date of access: 17.05.2022).
41. Constitution of the People's Republic of China. National People's Congress. URL: https://bit.ly/3sH9XXw(date of access: 17.05.2022).
42. Creemers Rogier, Triolo Paul, Webster Graham. Translation: Cybersecurity Law of the People’s Republic of China (Effective June 1, 2017). New America. 2018. (June). URL: https://bit.ly/3wsHmWY (date of access: 15.05.2022).
43. Cyber Security Research and Development Act. Communications and telecommunications : public low 107–305—Nov. 27, 2002. Congress.gov. URL:https://www.congress.gov/107/plaws/publ305/PLAW-107publ305.pdf(date of access: 16.05.2022).
44. Cybersecurity Information Sharing Act of 2015 Procedures and Guidance. CISA. URL: https://www.cisa.gov/publication/cybersecurity-i...- 2015-procedures-and-guidance (date of access: 16.05.2022).
45. Cybersecurity Law of the People’s Republic of China. New America. 2018. (June). URL: https://bit.ly/39X2bly(date of access: 17.05.2022).
46. Democrats Question Trump's Record on National Security, Helping Poor. VOA News. 2017. URL: https://www.voanews.com/a/democrats-question-trumps- record-on-national-security-helping-poor/3744766.html (date of access: 16.05.2022).
47. Department of Commerce regulations on export of encryption products. MIT CSAIL. URL: https://groups.csail.mit.edu/mac/classes/6.805/a...- regs-12-96.html (date of access: 16.05.2022).
48. Department of Defense Cyber Strategy. 2018. URL: https://media.defense.gov/2018/Sep/18/2002041658/-1/- 1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF (date of access:
14.05.2022).
49. Digital Signature Standard : FIPS № 186, date published: May 19, 1994. CSRC. URL: https://csrc.nist.gov/publications/detail/fips/1... (date of access: 16.05.2022).
50. Does This Look Infected? A Summary of APT41 Targeting U.S. State Governments. URL:https://www.mandiant.com/resources/apt41-us-state- governments(date of access: 17.05.2022).

51. Economic And Trade Agreement Between The Government Of The United States Of America And The Government Of The People’s Republic Of China Text. United States Trade Representative. URL: https://bit.ly/3whGcym (date of access: 15.05.2022).
52. Economic and trade agreement between thegovernment of the united states of america and thegovernment of the people’s republic of China. URL: https://ustr.gov/sites/default/files/files/agreements/phase%20one%20agreement/E conomic_And_Trade_Agreement_Between_The_United_States_And_China_Tex t.pdf(date of access: 17.05.2022).
53. E-Government Act of 2002 : introduced 11.07.2001, public law № 107-347. Congress.gov. URL: https://www.congress.gov/bill/107th-congress/house" class="hcphp-link">https://www.congress.gov/bill/107th-congress/house- bill/2458 (date of access: 16.05.2022).
54. Electronic Authentication Guideline of 2011 : special publication № 800-63-1. National Institute of Standards and Technology. URL: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nist...-
1.pdf (date of access: 16.05.2022).
55. Electronic Authentication Guideline of 2013 : special publication № 800-63-2. National Institute of Standards and Technology. URL: https://nvlpubs.nist.gov/nistpubs/specialpublica...-
2.pdf (date of access: 16.05.2022).
56. Electronic Authentication Guideline of 2017 : special publication № 800-63-3. National Institute of Standards and Technology. URL: https://nvlpubs.nist.gov/nistpubs/SpecialPublica...-
3.pdf (date of access: 16.05.2022).
57. Electronic Communications Privacy Act of 1986 : від 21.10.1986 р. № 99-508. URL: https://www.congress.gov/bill/99th-congress/house-bill/4952/text.
58. Electronic Communications Privacy Act of 1986. Bureau of Justice Assistance. URL: https://bja.ojp.gov/program/it/privacy-civil- liberties/authorities/statutes/1285 (date of access: 15.05.2022).
59. Electronic Signatures in Global and National Commerce Act : public law no: 106-
229 (06/30/2000). Congress.gov. URL: https://www.congress.gov/bill/106th- congress/senate-bill/761/text (date of access: 16.05.2022).
60. Electronic Transactions Act. Uniform Law Commission. URL: https://bit.ly/3yPcTou (date of access: 16.05.2022).
61. Executive Order on Improving the Nation's Cybersecurity. The White House. 2021.URL:https://www.whitehouse.gov/briefing-room/presidential- actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity (date of access: 16.05.2022).

62. Export Administration Regulations. URL: https://www.ecfr.gov/current/title- 15/subtitle-B/chapter-VII/subchapter-C (date of access: 16.05.2022).
63. FACT SHEET: President Signs Executive Order Charting New Course to Improve the Nation’s Cybersecurity and Protect Federal Government Networks. The White House. 2021. URL: https://bit.ly/3liDJ0E (date of access: 16.05.2022).
64. Fact Sheet: The Biden-Harris Administration’s New Approach to the U.S. – China Trade Relationship. URL: https://bit.ly/3ljkx2L (date of access: 17.05.2022).
65. Federal Computer Systems Protection Act : introduced 27.06.1977. Congress.gov. URL: https://www.congress.gov/bill/95th-congress/senate- bill/1766?r=5&s=1 (date of access: 15.05.2022).
66. Federal Information Security Management Act of 2002 : Introduced 05.03.2002. Congress.gov. URL: https://www.congress.gov/bill/107th-congress/house" class="hcphp-link">https://www.congress.gov/bill/107th-congress/house- bill/3844/text (date of access: 16.05.2022).
67. Federal Information Security Modernization Act of 2014 (FISMA 2014). CISA.
URL: https://bit.ly/3a5mbmc (date of access: 16.05.2022).
68. Federal Information Security Modernization Act of 2014 : introduced 24.06.2014, public law № 113-283. Congress.gov. URL: https://www.congress.gov/bill/113th-congress/sen... (date of access: 16.05.2022).
69. Financial Institutions Regulatory and Interest Rate Institutions Control Act of 1978 : public lаw 95-630—Nov. 10, 1978. GovTrack. URL: https://www.govtrack.us/congress/bills/95/hr14279/text (date of access: 15.05.2022).
70. Flowers A., Zeadally S., Murray A. Cybersecurity and US Legislative Efforts to address Cybercrime. Journal of Homeland Security and Emergency Management. 2013. Vol. 10, no. 1. https://doi.org/10.1515/jhsem-2012-000
71. Four Chinese Nationals Working with the Ministry of State Security Charged with Global Computer Intrusion Campaign Targeting Intellectual Property and Confidential Business Information, Including Infectious Disease Research. URL: https://www.justice.gov/opa/pr/four-chinese-nati...- security-charged-global-computer-intrusion(date of access: 17.05.2022).
72. Framework for Improving Critical Infrastructure Cybersecurity : revised December 5, 2017. URL: https://www.nist.gov/system/files/documents/2017...- 1_without-markup.pdf (date of access: 16.05.2022).
73. Freedom of Information Act : public lаw 89-487-July 4, 1966. U.S. Government Publishing Office. URL: https://www.govinfo.gov/content/pkg/STATUTE" class="hcphp-link">https://www.govinfo.gov/content/pkg/STATUTE- 80/pdf/STATUTE-80-Pg250.pdf (date of access: 15.05.2022).

74. From snail mail to 4G, China celebrates 20 years of Internet connectivity. URL: https://cnn.it/3FWNE5x(date of access: 17.05.2022).
75. Global Cybersecurity Index. ITU. 2020. URL: https://bit.ly/3NiExyl (date of access: 15.05.2022).
76. H.R.4943 — 115th Congress (2017-2018) : Introduced 02/06/2018. URL:https://www.congress.gov/bill/115th-congress/hou...(date of access: 17.05.2022).
77. Hackers have breached organizations in defense and other sensitive sectors, security firm says. URL: https://edition.cnn.com/2021/11/07/politics/hackers- defense-contractors-energy-health-care-nsa/index.html(date of access: 17.05.2022).
78. Homeland Security Act : 107–296—Nov. 25, 2002. URL: https://www.dhs.gov/sites/default/files/publicat... (date of access: 16.05.2022).
79. Improving the Nation’s Cybersecurity. The White House. 2021. (May). URL: https://bit.ly/3Ni2YvH (date of access: 16.05.2022).
80. Interim National Security Strategic Guidance : March, 2021. The White House.
URL: https://www.whitehouse.gov/wp-content/uploads/2021/03/NSC-1v2.pdf" class="hcphp-link">https://www.whitehouse.gov/wp-content/uploads/20...
81. International strategy for cyberspace. The White House. URL: https://obamawhitehouse.archives.gov/sites/defau... strategy_for_cyberspace.pdf (date of access: 16.05.2022).
82. International Strategy of Cooperation on Cyberspace : 2017-03-01. Ministry of Foreign Affairs. URL: https://bit.ly/3Npff1p(date of access: 17.05.2022).
83. ISO/IEC 27002:2013. Information technology — Security techniques — Code of practice for information security controls. ISO. URL: https://bit.ly/37UDNAA (date of access: 15.05.2022).
84. Laws of the People's Republic of China : 18.02.1994. URL: http://www.asianlii.org/cn/legis/cen/laws/rfspocis719(date of access: 17.05.2022).
85. Measures for the Security Review of Internet Products and Services (Opinion- seeking Draft). URL: https://chinacopyrightandmedia.wordpress.com/201...- security-review-of-internet-products-and-services-opinion-seeking-draft/htm (date of access: 17.05.2022).
86. Measures for the Security Review of Network Products and Services (for Trial Implementation). URL: http://www.cac.gov.cn/2017- 05/02/c_1120904567.htm(date of access: 17.05.2022).
87. Microsoft accuses China over email cyber-attacks/ URL: https://www.bbc.com/news/business-56261516(date of access: 17.05.2022).

88. National Cyber Security Index. NCSI. URL: https://ncsi.ega.ee/ncsi-index/ (date of access: 15.05.2022).
89. National Cyber Security Index. NCSI.URL: https://ncsi.ega.ee/compare/ (date of access: 17.05.2022).
90. National Cyber Strategy of the United States of America. Washington DC, September 2018. The White House. URL: https://www.whitehouse.gov/wp- content/uploads/2018/09/National-Cyber-Strategy.pdf (date of access: 16.05.2022).
91. National Security Strategy : May, 2010. The White House. URL: https://obamawhitehouse.archives.gov/sites/defau... rity_strategy.pdf (date of access: 14.05.2022).
92. National Security Strategy 2015 : рublished - February 6, 2015. National Security Strategy Archive. URL: https://nssarchive.us/national-security-strategy- 2015/ (date of access: 14.05.2022).
93. National Security Strategy of the United States of America : December, 2017. The White House. URL: https://trumpwhitehouse.archives.gov/wp- content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf (date of access: 14.05.2022).
94. National Strategy to Secure Cyberspace. 2003. (February). P. 10. URL: https://www.cisa.gov/uscert/sites/default/files/... tegy.pdf (date of access: 16.05.2022).
95. National Strategy to Secure Cyberspace. 2003. (February). Energy.gov. URL: https://bit.ly/3wjai4C (date of access: 16.05.2022).
96. Network Security Review Measures. URL: http://www.cac.gov.cn/2022- 01/04/c_1642894602182845.htm(date of access: 17.05.2022).
97. News Corp says journalists’ emails were hacked in an attack linked to China. URL: https://www.nytimes.com/2022/02/04/business/medi...- hack.html(date of access: 17.05.2022).
98. Notice of the Ministry of Industry and Information Technology and the State Internet Information Office of the Ministry of Public Security on Issuing the Regulations on the Management of Security Vulnerabilities of Network Products. URL:http://www.cac.gov.cn/2021-07/13/c_1627761607640342.htm(date of access: 17.05.2022).
99. Obama B. Remarks by the President on Securing Our Nation's Cyber Infrastructure. The White House. 2009. URL: https://bit.ly/3wjBwIj(date of access: 16.05.2022).
100. Opinions of the State Informatization Leading Group on Strengthening Information Security Guarantee. Zhongbanfa. 2003. No. 27. URL: http://www.rongzai.com.cn/standard/100G2020.html(date of access: 17.05.2022).

101. Percentage of households with a computer at home in the United States from 1984 to 2010. Statista. URL: https://bit.ly/3PmauYm(date of access: 17.05.2022).
102. Pompeo says China hacked Marriott. URL: https://www.politico.com/story/2018/12/12/pompeo...- 1059172(date of access: 17.05.2022).
103. Privacy Act of 1974 : public lаw 93-579-Dec. 31, 1974. U.S. Government Publishing Office. URL: https://www.govinfo.gov/content/pkg/STATUTE" class="hcphp-link">https://www.govinfo.gov/content/pkg/STATUTE- 88/pdf/STATUTE-88-Pg1896.pdf (date of access: 15.05.2022).
104. Race to the Bottom. Human Rights Watch. 2006. (August). URL: http://www.hrw.org/report/2006/08/09/race-bottom...- internet-censorship(date of access: 17.05.2022).
105. Read a Transcript of the First Presidential Debate Between Hillary Clinton and Donald Trump. URL: https://time.com/4508768/presidential-debate-trump- clinton-transcript/(date of access: 17.05.2022).
106. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (Text with EEA relevance). URL: https://eur-lex.europa.eu/eli/reg/2016/679/oj(date of access: 17.05.2022)
107. Regulation on Internet Information Service of the People's Republic of China. URL:
http://www.lawinfochina.com/display.aspx?lib=law&id=1668&CGid=(date of access: 17.05.2022).
108. Relyea H. C. Information policy, national security, and the Reagan administration. Government Information Quarterly. 1989. Т. 6, № 4. P. 365–
382. https://doi.org/10.1016/0740-624x(89)90004-x
109. Revealed: coordinated attempt to push pro-China, anti-Western narratives on social media. URL: https://bit.ly/3ll40LD (date of access: 17.05.2022).
110. Reveron D. S., Lindsay J. R., Cheung T. M. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press, Incorporated, 2015. 384 р..
111. Revised U.S. Encryption Export Control Regulations : this rule is effective January 10, 2000, № 3510 33-P.
URL: https://archive.epic.org/crypto/export_controls/regs_1_00.html (date of access: 16.05.2022).
112. Revised U.S. Encryption Export Control Regulations : this rule is effective October 19, 2000, № 3510 33-P.
URL: https://www.federalregister.gov/documents/2000/10/19/00- 26646/revisions-to-encryption-items (date of access: 16.05.2022).

113. Search Engine Market Share China : Apr 2021 - Apr 2022. URL: https://gs.statcounter.com/search-engine-market-share/all/china(date of access: 17.05.2022).
114. Seven International Cyber Defendants, Including “Apt41” Actors, Charged In Connection With Computer Intrusion Campaigns Against More Than 100 Victims Globally/ URL: https://www.justice.gov/opa/pr/seven-international- cyber-defendants-including-apt41-actors-charged-connection-computer(date of access: 17.05.2022).
115. Significant Cyber Incidents. URL: https://www.csis.org/programs/strategic- technologies-program/significant-cyber-incidents(date of access: 17.05.2022).
116. Spokesperson’s remarks on Beijing Qi An Pangu, a cybersecurity Lab’s report on cyberattack launched by the US government backed hacking group : 2022-2-
24. URL:
https://www.fmprc.gov.cn/mfa_eng/wjb_663304/zzjg... 665234/202203/t20220315_10651916.html(date of access: 17.05.2022).
117. Statement by President Biden on our Nation’s Cybersecurity. The White House.
2021. URL: https://bit.ly/3FRXWDE (date of access: 16.05.2022).
118. Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure : Executive Order 13800 of May 11, 2017. URL: https://bit.ly/3PsXbVY (date of access: 16.05.2022).
119. The Comprehensive National Cybersecurity Initiative. The White House. 2009. URL: https://obamawhitehouse.archives.gov/issues/foreign- policy/cybersecurity/national-initiative (date of access: 16.05.2022).
120. The M.T.A. Is Breached by Hackers as Cyberattacks Surge. URL: https://www.nytimes.com/2021/06/02/nyregion/mta-...(date of access: 17.05.2022).l
121. The Ministry of Public Security and other notices issued the "Administrative Measures for the Graded Protection of Information Security". China Government Network. URL: http://www.gov.cn/gzdt/2007-07/24/content_694380.htm(date of access:17.05.2022).
122. The National Security Strategy of the United States : рublished – September 17, 2002. National Security Strategy Archive. URL: https://nssarchive.us/national-security-strategy-2002/ (date of access: 16.05.2022).
123. The Threat Posed by the Chinese Government and the Chinese Communist Party to the Economic and National Security of the United States. URL: https://bit.ly/38u1cZX (date of access: 17.05.2022).

124. Transcript of the First Presidential Debate Between Hillary Clinton and Donald Trump. URL: https://time.com/4508768/presidential-debate-trump-clinton- transcript/(date of access: 17.05.2022).
125. Translation: Critical Information Infrastructure Security Protection Regulations. Stanford University. URL:https://digichina.stanford.edu/work/translation-critical- information-infrastructure-security-protection-regulations-effective-sept-1- 2021/(date of access: 17.05.2022).
126. Translation: Data Security Law of the People’s Republic of China. URL:https://digichina.stanford.edu/work/translation-...- peoples-republic-of-china/(date of access: 17.05.2022).
127. Translation: Data Security Law of the People's Republic of China (Effective Sept. 1, 2021). Stanford University. 2021. (June). URL: https://stanford.io/3Pou3iP (date of access: 15.05.2022).
128. Translation: Personal Information Protection Law of the People’s Republic of China. URL: https://digichina.stanford.edu/work/translation-personal- information-protection-law-of-the-peoples-republic-of-china-effective-nov-1- 2021/(date of access: 17.05.2022).
129. Trautman L. J. Cybersecurity: What About U.S. Policy? SSRN Electronic Journal. 2015. https://doi.org/10.2139/ssrn.2548561
130. Trump: "Trade wars are good, and easy to win". URL: https://twitter.com/i/events/969519906097106944?lang=en(date of access: 17.05.2022).U.S.-China trade war has cost up to 245,000 U.S. jobs: business group study. URL: https://www.reuters.com/article/us-usa-trade-china-jobs- idUSKBN29J2O9(date of access: 17.05.2022).
131. Two Chinese Hackers Working with the Ministry of State Security Charged with Global Computer Intrusion Campaign Targeting Intellectual Property and Confidential Business Information, Including COVID-19 Research. URL: https://www.justice.gov/opa/pr/two-chinese-hacke...- security-charged-global-computer-intrusion(date of access: 17.05.2022).
132. U.S. Code § 1029 - Fraud and Related Activity in Connection with Access devices. Cornell. URL:https://www.law.cornell.edu/uscode/text/18/1029
133. U.S. Code § 1030 – Fraud and related activity in connection with computers.
Cornell. URL:https://www.law.cornell.edu/uscode/text/18/1030
134. U.S. Code § 1037 – Fraud and related activity in connection with electronic mail. Cornell. URL: https://www.law.cornell.edu/uscode/text/18/1037(date of access: 17.05.2022).
135. U.S. Code Chapter 103 - Controlling the Assault of Non-Solicited Pornography and Marketing. Cornell. URL: https://www.law.cornell.edu/uscode/text/15/chapter-103

136. U.S. CodeChapter 119 – Wire and electronic communications in terception and interception of oral communications. Cornell. URL: https://www.law.cornell.edu/uscode/text/18/part-I/chapter-119(date of access: 17.05.2022).
137. U.S. CodeChapter 121 – Stored wire and electronic communications and transactional records access. Cornell. URL: https://www.law.cornell.edu/uscode/text/18/part-I/chapter-121(date of access: 17.05.2022).
138. U.S. federal cybersecurity - A look at the computer security act of 1987. The State of Security. URL: https://www.tripwire.com/state-of- security/featured/computer-security-act-of-1987/ (date of access: 16.05.2022).
139. U.S. Trade Deficit Hit Record in 2021 as Americans Spent on Computers, Games. URL: https://www.wsj.com/articles/economic-recovery-pushes-2021-u-s- trade-deficit-to-record-level-11644328979(date of access: 17.05.2022).
140. United States Trade Summary 2016. URL: https://wits.worldbank.org/CountryProfile/en/Cou... ext(date of access: 17.05.2022).
141. US charges 'China government hackers'. URL: https://www.bbc.com/news/world-us-canada-46638323(date of access: 17.05.2022).
142. White paper: The Internet in China. URL: https://www.mfa.gov.cn/ce/cgvan//eng/news/t707957.htm(date of access: 17.05.2022).
143. Xinhua Commentary: America, an empire of lies. URL: https://english.news.cn/20220310/0b5e47674f394fd...(d ate of access: 17.05.2022).
144. Ye Josh. China tightens Great Firewall by declaring unauthorised VPN services illegal. South China Morning Post. 2017. URL: https://www.scmp.com/news/china/policies-politic...-
move-clean-vpns-and-strengthen-great-firewall(date of access: 17.05.2022).