【24h】

New Trends In Asymmetric Warfare Threats

机译:非对称战争威胁的新趋势

获取原文
获取原文并翻译 | 示例
       

摘要

In late 2017, the multi-faceted terrorist, guerrilla warfare, cyber-warfare, and information operation threats against Western nations and their allies by their smaller asymmetric warfare adversaries continue to evolve and proliferate. Change is so rapid, in fact, that new and unanticipated asymmetric actors and types of threats keep popping up, such as information operations. One recent example are the cyber-attacks, breaches, and information operations by alleged Russian government-directed sub-state cyber hacktivists against the Democratic candidate and the Democratic Party in the 2016 American presidential election that may have played some influence in its outcome. In a parallel sub-state attack, Russian sub-state actors reportedly placed fake avatars in American social media sites in order to sway public opinion in the presidential election, as well. Although the Democratic presidential candidate's own flaws likely played a major role in her electoral defeat, the fact remains that her candidacy was damaged to some extent by Russian hacktivist interference in which sensitive documents were allegedly leaked to WikiLeaks, which was asymmetric in how it was conducted because the perpetrators could not be directly traced to any sub-state actor.
机译:2017年底,规模较小的不对称战争对手对西方国家及其盟国的多面恐怖分子,游击战,网络战和信息作战威胁继续发展和扩散。实际上,变化是如此之快,以至于出现了新的,无法预料的不对称行为者和威胁类型,例如信息操作。最近的一个例子是在2016年美国总统大选中,据称俄罗斯政府控制的次州网络黑客主义者对民主党候选人和民主党的网络攻击,破坏和信息操作,可能对其结果产生了影响。据报道,在一次平行的次州攻击中,俄罗斯的次州演员在美国社交媒体网站上放置了假化身,以在总统选举中也影响公众舆论。尽管民主党总统候选人自身的缺陷可能在她的选举失败中发挥了重要作用,但事实仍然是,她的候选人资格在一定程度上受到俄罗斯黑客主义者的干预而受损,据称敏感文件被泄露给WikiLeaks,其行为方式不对称因为无法直接将肇事者追查到任何次国家行为者。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号