Center for Strategic Assessment and forecasts

Autonomous non-profit organization

Home / Search
MATERIALS BY TAGS: information war
Найдено статей: 256
The Internet is preparing to return to anarchism
Проект: Future of the Information Society

According to the "founding fathers" of the Internet, to the present day, his idea was corrupted by dependence on corporations and the States which impose censorship and collect user data. So they are launching an alternative project of "anarchist". The problem is that it can be not only good but also a public threat. However, Russia has a response to it.

03-10-2018 admin 246 0

The political Department of the Ministry of defence will be engaged in propaganda and counter extremism
Проект:

Appeared in the defense Ministry Main military-political management will be engaged in the fight against drug addiction, religious conflicts, clarifying the military policy of the Russian authorities, as well as get control of the TV channel "Star".

04-09-2018 admin 320 0

Where the NSA monitors Internet users? Perhaps of eight skyscrapers that can withstand a nuclear strike
Проект:

Since Edward Snowden spoke about the activities of the national security Agency of the United States, it became clear that the Agency collects huge amounts of data about Internet users. The publication by The Intercept is interested in how to pass and where to store all this information, and found in large American cities high-rise buildings, generally without Windows, thus reinforced, so that it is able to withstand an earthquake or nuclear strike. It turned out that the NSA uses power of the largest telecommunication company in the world — AT&T.

27-06-2018 admin 508 0

Makarenko S. I., Ivanov M. S. "network-centric warfare principles, technologies, examples and perspectives"
Проект: New in the military

The monograph is the result of the authors ' synthesis of research in the field of warfare and command and control in terms of what happened in the beginning of XXI century information technology revolution. The result of introduction of achievements of information technology revolution in the practice of military Affairs was a dramatic synergistic increase in combat effectiveness of weapons, a fundamental review of the strategy and tactics of warfare, and approaches to the construction of the armed forces.

14-06-2018 admin 896 0

Market trillion: how to protect the smart house from hackers
Проект:

Want to check whether the light is off in the apartment, to clarify how much milk is left in the refrigerator? These problems are resolved by the market of the Internet of things, the turnover of which in 2020 will exceed $1 trillion.

05-05-2018 admin 981 0

More than 30 major IT companies sign "a digital Geneva Convention"
Проект: Future of the Information Society

The New York Times reports that more than 30 technology companies including Facebook and Microsoft plan to announce the statement, according to which they publicly refuse to participate in cyber attacks organized by the government of any country.

02-05-2018 admin 1050 0

Chinese companies monitor brain impulses and emotions of employees
Проект: New in Science

We already know how hard is the Internet censorship in China. In addition, there is a facial recognition system like the one which recently caught the criminal in Russia. The Chinese are not stopped, and now they're monitoring brainwaves to understand what emotions experienced by the employees of different enterprises.

01-05-2018 admin 1025 0

Hybrid repression on the Internet and outside of it in China. The template for the Kremlin?
Проект: New in the military

If there is a significant difference between the theft of confidential documents burglary of the office of the human rights organizations and using computer programs to steal from the opposition political party closed list of its members? According to international legislation on human rights, the first action is prohibited, and second, in General, valid. The reason? Activity in the offline world are much better than online activities. The national government noticed it, and the consequences of this gap in the legislation lead to astounding disorders. A good example is the strategy of the Chinese government in Xinjiang. She shows how the authoritarian government organically combine methods online and offline, resulting in a hybrid system of repression.

29-03-2018 admin 1387 0

Terabit death. The U.S. Department of defense under the threat of cyber attacks
Проект:

11 January 2018, the head of the Agency of protection of information systems of the Ministry of defense said that at present, the global network of the Department of defense are under constant threat, besides significantly increasing the sophistication of cyber attacks and usovershenstvuetsya technology attacks.

13-01-2018 admin 1186 0

The hole in the CPU: all the error that allows to steal passwords from almost any computer and smartphone
Проект:

The researchers found the security hole, which is contained in most modern processors, computers, laptops and even smartphones. Tell all that is known about vulnerabilities Meltdown and the Spectre, and how to live with them.

07-01-2018 admin 1260 0

Возрастное ограничение