Search: Cyber-attacks (2 materials)

It’s Hard to Find a Black Cat in a Dark Room, Especially If It Isn’t There. RAND on the Search for Cyber Coercion

... inferred from practice) and claim that demands and threats expressed as part of such coercion are sometimes ambiguous, as identification of the threatening party can be. But what remains of coercion if its defining characteristics are removed? Large-scale cyber-attacks are not just a show of force but achievement of specific objectives, so they have nothing to do with coercion . The above seems to challenge the accuracy of the question asked at the beginning of the paper under review: “What is cyber ...

19.11.2019

Nuclear-Cybernetic Systems

... talking about the networks that are directly related to nuclear weapons and to the country’s survival (as per the modern approach to defining the role of nuclear weapons). The possible emergence of automated retaliatory strike systems triggered by cyber-attacks poses a separate threat, although any protection against an attack in cyberspace is, by default, of an active nature. In addition, in the past, the Pentagon confirmed its readiness to deliver pre-launch cyber-attacks on enemy missiles as ...

25.07.2017

Poll conducted

  1. In your opinion, what are the US long-term goals for Russia?
    U.S. wants to establish partnership relations with Russia on condition that it meets the U.S. requirements  
     33 (31%)
    U.S. wants to deter Russia’s military and political activity  
     30 (28%)
    U.S. wants to dissolve Russia  
     24 (22%)
    U.S. wants to establish alliance relations with Russia under the US conditions to rival China  
     21 (19%)
For business
For researchers
For students