Skip to content

  • Power Dynamics
  • Sovereignty
    • 1 Economy
    • 2 Security
    • 3 Cyber Security
    • 4 Psychological Warfare
  • Lobbying
  • By Automatically Hierarchic Categories in Menu Superb Pixels|Elegant News Magazine

Hacking

justicealliance, December 29, 2023January 2, 2024
  • Digital Warfare
    • This constant war is going to establish dominance of communications, info, etc
    • It is being used for spying by collecting user data
    • It is being used to hack other countries system and spoil, damage and access their systems. examples are cyber attacks.
    • The cyber attacks and digital damages cost the world around 600Billion$ per year, and this is just the beginning.
  • Attack opportunities:
    • Technologically advanced and powerful societies
    • Information-intensive military organizations
    • Globalization has dramatically increased international flows of goods, services, people and money, improving access to information, technology, and their military applications.
    • The rapid movement of currency in and out of countries by currency speculators can extract a devastating cost on countries that do not have large currency reserves.
  • Access Opportunities:
    • The truth.
    • Scientific research – The Internet allows a global scientific community to exchange information on topics that can be easily exploited by non-state actors.
    • Strategic information – the information that confers great advantage only if competitors do not possess it.
    • Encryption technologies which increase their anonymity and make it difficult for states to disrupt and dismantle their operations.
    • Communicate with wider audiences and with each other over greater distances, recruit new members, and diffuse and control their operations more widely and from afar.
    • Offensive information warfare capabilities because of their relative cheapness, accessibility and commercial origins.
    • Reliance on information technology also creates vulnerabilities for non-state actors.
  • Risks
    • Computers centralize information, and confiscation of them by law enforcement agencies can undercut terrorist operations.
    • Law enforcement and intelligence agencies are becoming increasingly adept at monitoring communications equipment – cell phones, satellite phones, and the Internet – for digital traces.
Print Friendly, PDF & Email
3 Cyber Security

Post navigation

Previous post
Next post

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Starlink and Digital Sovereignty: Key Issues and Implications
  • Reverse-Engineering the International System
  • US relationships with the world
  • The 24 Geopolitical Myths (By Adnan Khan)
  • World Export Value Profit Potential

Recent Comments

No comments to show.

Archives

  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • August 2024
  • July 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • July 2023
  • May 2023
  • April 2023
  • March 2023

Categories

  • 1 Economy
  • 2 Security
  • Power Dynamics
  • 3 Cyber Security
  • Lobbying
  • 4 Psychological Warfare
©2025 | WordPress Theme by SuperbThemes