Dmitry Kiselev, Director General of Russian government-controlled media Agency "Russia Today", said: "objectivity is a myth which is proposed and imposed on us." Today, thanks to the Internet and social media, the manipulation of our perception of the world before the unimaginable happens in time, space and internationally. This is the source of one of the biggest vulnerabilities that we as individual citizens and society as a whole must learn to cope. Today, many actors are using these vulnerabilities. The situation is complicated by the increasingly rapid development of technologies for the production and dissemination of information. For example, over the past year we have seen the transition from the dominance of text and images to the recorded video, and now even displaced live video. Vulnerabilities evolve with the technology, but it reduces the cost of the technology that makes possible the existence of a larger number of actors.
19-07-2017 admin 30916 0
The publication presents the theory and practice of "soft power" in modern conditions, a chronicle of current publications on international and domestic issues of the period a sharp exacerbation of information confrontation around Russia, starting with the events in Ukraine and Russian military presence in Syria.
The civil war in Syria has become one of the most cruel and prolonged conflict resulting from so-called "Arab spring" — a series of coups d'état that swept the Arab countries in spring 2011 and resulted in serious geopoliticheskiye not only in the Middle East and the world in General (in particular, the problem of refugees that has engulfed Europe today, there is also a result of those events).
20-04-2016 admin 7179 0
Was published the book of the known Russian scientist in the field of information security and theories of information warfare - Sergey p. Rastorguev. In the work we are talking about mathematical models in the field of information systems, whether computers, or social organizations, or people.
24-04-2014 admin 8032 0
In this paper we proposed and justified approach to building systems to identify information threats. Given the basic definitions and a study of special operations, information operations inherent in the Internet.
01-03-2014 admin 7342 0