Center for Strategic Assessment and forecasts

Autonomous non-profit organization

Home / Defence and security

Project working group
Project coordinator:

Experts:

PROJECT CONTENTS
Outreach activities of the terrorist organization ISIL: the basic ways of counteraction
Articles(145)

Studying various Islamic groups, their activities and methods of propaganda work, external and internal orientation, come to the conclusion that they affect human consciousness. Particular impact such work has on a believer. In this regard, it should be said that all known to us in the East, terrorist organizations have vivid religious orientation. And this despite the attempt of Western countries headed by USA to give them some "secular" sound [2]. However, these organizations did not hide its religious nature. This work is separately dedicated to the most influential, massive and rich world of the terrorist group – Islamic state of Iraq and the Levant (hereafter ISIL). The organization skillfully and effectively apply the methods and techniques of propaganda, drawing into its ranks all new and new adherents.

14-11-2017 701 0

Russia in the information war: the methods of confrontation

Multimedia round table on the topic: "Russia in the information war: the methods of confrontation." In connection with the events in Ukraine against Russia unleashed a real information war. The countries of the West, spreading rumors and distorted information, trying to isolate Russia politically and economically. All attempts of our country to resolve the situation in Ukraine is not taken into account. Russian reporters objectively covering events in the East of Ukraine and hinder the work. Still unknown the fate of the photographer MIA "Russia today" Andrew Stenina.

02-09-2014 2792 0

The militarization of information

Dmitry Kiselev, Director General of Russian government-controlled media Agency "Russia Today", said: "objectivity is a myth which is proposed and imposed on us." Today, thanks to the Internet and social media, the manipulation of our perception of the world before the unimaginable happens in time, space and internationally. This is the source of one of the biggest vulnerabilities that we as individual citizens and society as a whole must learn to cope. Today, many actors are using these vulnerabilities. The situation is complicated by the increasingly rapid development of technologies for the production and dissemination of information. For example, over the past year we have seen the transition from the dominance of text and images to the recorded video, and now even displaced live video. Vulnerabilities evolve with the technology, but it reduces the cost of the technology that makes possible the existence of a larger number of actors.

19-07-2017 1279 0

Makarenko S. I. "Information warfare and electronic warfare to network-centric wars of the early XXI century"

The monograph is the result of the author's works on synthesis of research in the fields of electronic warfare and information warfare in terms of what happened in the beginning of XXI century information technology revolution and the introduction of troops of the concept of network-centric warfare. In the monograph the analysis of the concept of network-centric warfare, identified the fundamental relationship of this concept with the increasing role of exposure to information circulating in the systems of control of troops and weapons. The analysis of electronic warfare, information warfare, technical and psychological fields, as well as methods of their use in modern network-centric warfare. The examples of the wars of the early XXI century, which were conducted in accordance with the network-centric concept, the contribution of electronic warfare and information warfare in the technical and psychological dimensions to achieve the military and information superiority. The basic tendencies of development of electronic warfare, as well as means and methods of information confrontation in the technical and psychological dimensions.

26-09-2017 1145 0

Malicious code written in the DNA that can infect computers
Other(13)

This was expected, since the moment when scientists learned howto upload digital information inside macromolecules of deoxyribonucleic acid. For the first time, researchers were able to infect the virus the computer, analyze the DNA, which had made the malicious code. It seems that all of us are waiting for a fascinating biankouma future where you can hack everything, including primary storage of genetic information of any biological organism.

15-08-2017 518 0

RELATED MATERIALS:Defence and security
Возрастное ограничение