Hidden Threats from Foreign Software
... ever more noticeably shifting from open confrontation, including wars, to the reliance on various forms of control over and management of nations’ information resources. They use for the purpose, highly effective and hidden penetration of the software run on the government’s information and management systems, and the tie-in with foreign vendors’ IT technologies that are being imposed with all means available. As a result, the information infrastructure of the nation may become ...
09.10.2012