Social protests have multiplied across the world: a different kind of movement with a meaning "conquer!" replicated dozens – from the poorest to the richest and most developed countries.
19-05-2012 Имя Фамилия 4142 0
Book by American journalist Dan Percepta once again helps to understand the current balance of power in the global arena, where governments of the superpowers using all means to achieve even greater power – power over the mind.
17-05-2012 admin 3567 0
To date, cyber is not just the "world fence", on which a variety of "bullies" leave your message "to eternity". On the performance and predictability of cyberspace and, in particular, the Internet tied to the economy, the achievement of military superiority, political stability. In the US, the cyberspace official document generally fixed as of the fifth (after earth, water, air and space) a space in which the States have their own interests to be security at any cost.
18-04-2012 admin 4134 0
As a result of development of information and telecommunication technologies has changed not only the means of armed struggle, but also the strategy and tactics of modern wars, there was the concept of taking into account the informational vulnerability of the parties. In a respectable scientific publications in recent times against the information weapon even uses the term "weapons of mass destruction". The role of a leader in the use of this "weapon" belongs unquestionably and unreservedly the US, which formulated the basic strategies of information warfare in 1992.
03-05-2012 admin 5780 0
The Commission on U.S.-China relations in the field of Economics and security March 7, 2012 presented to the U.S. Congress a report entitled "Occupying the information high: opportunities in China for conducting computer network operations and cyber espionage -". The document details the activities of China in enhancing its capacity to conduct computer network attacks, organizations protect digital systems from external intrusion, and exploitation of network resources of foreign States in the interests of the country.
29-04-2012 admin 4671 0
After his departure from The Washington Post in 1977, Carl Bernstein (Carl Bernstein) for six months studied the relationship of the CIA and the press during the Cold war. His article, published in Rolling Stone magazine October 20, 1977, resulted in a shortened translation below.
27-04-2012 admin 6107 0
The world only wonders when will the bombing of Iran's nuclear facilities. Meanwhile, the war against the country in full swing. As expected, shocks originating from abroad. Only the fighting while there have been no explosions of rockets and howling shells - in cyberspace. The goal is to slow down an Iranian nuclear bomb. But this is not a bloodless war. First dead it already has.
23-03-2012 admin 3612 0
The problem of organizing and conducting information warfare (in the Western terminology "information warfare") has recently attracted increasing attention from both specialists and the General public. The reason is that many provisions of modern military science, which were previously exclusively theoretical groundwork, these days began to take practical implementation.
15-03-2012 Имя Фамилия 4329 0
High rates of development of information systems for various applications, computer networks such as the Internet and electronic media has led to the turn of the Millennium to the formation of global information space. Along with land, sea, air and outer space, information space in the armies of most developed countries has been actively used for a wide range of military tasks.
12-03-2012 admin 4923 0
In the context of exploring new forms, methods and techniques of information warfare is of interest, the developments related to the settlement of the situation around Iran's nuclear program. The analysis of the developments shows that the scenario information and psychological operations to discredit the political power of some of the objectionable countries, used the USA and their allies during previous armed conflicts and the "Arab spring" have similar features and are carried out using classical schemes.
11-03-2012 admin 5129 0