Center for Strategic Assessment and forecasts

Autonomous non-profit organization

Home / Search
MATERIALS BY TAGS: information war
Найдено статей: 260
Chinese companies monitor brain impulses and emotions of employees
Проект: New in Science

We already know how hard is the Internet censorship in China. In addition, there is a facial recognition system like the one which recently caught the criminal in Russia. The Chinese are not stopped, and now they're monitoring brainwaves to understand what emotions experienced by the employees of different enterprises.

01-05-2018 admin 1222 0

Hybrid repression on the Internet and outside of it in China. The template for the Kremlin?
Проект: New in the military

If there is a significant difference between the theft of confidential documents burglary of the office of the human rights organizations and using computer programs to steal from the opposition political party closed list of its members? According to international legislation on human rights, the first action is prohibited, and second, in General, valid. The reason? Activity in the offline world are much better than online activities. The national government noticed it, and the consequences of this gap in the legislation lead to astounding disorders. A good example is the strategy of the Chinese government in Xinjiang. She shows how the authoritarian government organically combine methods online and offline, resulting in a hybrid system of repression.

29-03-2018 admin 1639 0

Terabit death. The U.S. Department of defense under the threat of cyber attacks
Проект:

11 January 2018, the head of the Agency of protection of information systems of the Ministry of defense said that at present, the global network of the Department of defense are under constant threat, besides significantly increasing the sophistication of cyber attacks and usovershenstvuetsya technology attacks.

13-01-2018 admin 1319 0

The hole in the CPU: all the error that allows to steal passwords from almost any computer and smartphone
Проект:

The researchers found the security hole, which is contained in most modern processors, computers, laptops and even smartphones. Tell all that is known about vulnerabilities Meltdown and the Spectre, and how to live with them.

07-01-2018 admin 1449 0

If 2017 was the "full version" that will bring 2018?
Проект:

History, which was earlier seen only in suspense novels have become a reality in the world of cybersecurity. That is the lesson of the last year.

01-01-2018 admin 1897 0

Rastorguev S. P. "Practical aspects of the theory of nested spaces"
Проект:

The material in this book – the chapters of unfinished books in the direction that Sergey Rastorguev did in the last years of his life. What can be the best memory for a scientist who devoted his life to science? Only edition of all his works, which have not been published, on which the author worked in the last weeks and days allotted to his earthly life...

20-12-2017 admin 2080 0

Artificial intelligence transformerait information security, but do not expect instant changes
Проект:

Though artificial intelligence and appeared as far back as the 50s, to this day it is one of the most talked about, interesting and controversial technologies in the world. Artificial intelligence is a universal term that describes a set of technologies that allow computer to perform various functions like man, for example, the processing and speech synthesis, natural language processing, computer vision.

15-12-2017 admin 1468 0

The basics of information security in 2017
Проект:

In today's world it is difficult to keep any information secret. Especially if it is of value to someone and you need to convey. No matter what your reasons for concealing certain information, this article will cover the basic methods and software tools to keep the information confidential.

13-12-2017 admin 1638 0

Conspiracy theory Russian-Venezuelan hackers: the enemy simulacrum
Проект:

Unit of the European Union, analysing Russian propaganda, have not found a single case of interference in Catalan a subject, contrary to the assertions by the government and close to it the media.

05-12-2017 admin 1468 0

The fake news sites are leased
Проект:

The news, which many are published every day — to put it mildly, not always true. In some cases, this is anecdotal, which can be used as a tool to achieve a variety of purposes, political and commercial. This tool is used by both individuals and large corporations.

27-11-2017 admin 1474 0

Возрастное ограничение