Technophobia President Putin could be one of the reasons why the annexation of Crimea came as a surprise to Western countries. Earlier this month, when Russia began the invasion of Crimea, U.S. intelligence agencies found a worrying silence in the digital space around Russian President and the largest military officials. As reported by the Wall Street Journal, the American intelligence services could not intercept any message about the beginning of the invasion of the Crimea. One of the American officials called this situation a "classic camouflage". But, at least, part of radio silence can be explained by Putin, by his own admission, has no mobile phone.
25-03-2014 admin 2212 0
The recent revelation of former NSA employee Edward Snowden led to the fact that cyber security was at the center of public attention. As this topic is addressed in the policy? One look at the recent posts international journals enough to realize that beneath the headlines about cyber security discusses a variety of aspects, such as liberterian as a means of combating cyber attacks, Internet governance or the benefits of digital diplomacy as a preventive tool for greater cyber security.
06-02-2014 admin 1673 0
On serious threats to humanity posed by scientific and technological innovation, recently stated more and on different levels. Representatives of different professions analyze important aspects of this issue. In world famous publications in this regard, analytical materials are published. Against this background the conclusion about the need to think of global threats awaiting the world. But it seems that the problem is not as simple as it in some cases represent. For some reason the true causes are hidden.
17-01-2014 admin 2836 0
Saudi Arabia has all the vices and none of the advantages of the oil-rich state like Venezuela. The country is ruled by a family dictatorship which tolerates no opposition and severely cracked down on human rights defenders and political dissidents. Hundreds of billions of oil revenues are subject to Royal tyranny and fueled speculative investments worldwide. In the task of protect the ruling elite relies on Western weapons and American military bases. The wealth of Nations producers pumped out for the sake of increasing conspicuous consumption level of the Saudi ruling family. The elite in power finances the most fanatical, retrograde, sexist version of Islam, "Wahhabi" sect of Sunni Islam.
16-01-2014 admin 2399 0
The national security Agency of the United States uses special radio equipment for infection of computers and interception of information, writes The New York Times, citing NSA documents and the opinions of computer experts. This technology, primenyalsya at least since 2008, allows the Agency to conduct surveillance even on machines not connected to the Internet. To date, the NSA has already infected at least hundred thousand computers worldwide.
15-01-2014 admin 1898 0
The secret intelligence Agency of Belarus expanded the competence in the protection of state secrets. This conclusion follows from published on the National legal Internet portal of the law "On introducing amendments and addenda to the Law of the Republic of Belarus "On information, Informatization and information protection".
13-01-2014 admin 1957 0
Проект: Revolution of the XXI century: nonviolent methods
"Who is the provocateur I provocateur?!" – strained swinging, a large man in camouflage pants hit my a random stranger. The one standing on the parapet of the monument to Lenin (Bessarabka, Kiev), fell to the roadway. The big guy's name is Damian, he's covered with tattoos with tridents and very drunk. An hour later we were drinking vodka in a strange, similar to an off-shore betting office premises on Khreshchatyk.
02-12-2013 admin 1827 0
Проект: The future of Russia and the world: estimates and projections
The growth of drug-resistant infections can make the most common and simple operations deadly within a generation, experts warn.
20-11-2013 admin 1695 0
When buying an insurance policy, the company figured out how to protect yourself from liability and risks associated with fire. Now they began to think how similarly, you can protect yourself from cyber attacks.
14-11-2013 admin 1521 0