Use of IT for politico-military goals Position1 #121770 The use of information and telecommunication technologies for politico-military goals presents a threat to international security. |
|
+Citations (1)
- CitationsAdd new citationList by: CiterankMapLink[1] LondonCyber: on the ways to counter treats posed to cybersecurity
Author: Alexander Yakovenko - Ambassador of the Russian Federation to the UK Cited by: David Price 7:24 AM 28 October 2011 GMT
Citerank: (8) 121539International securityHow can problems between states be prevented and managed?8FFB597, 121541Cyber crimeHow can cyber crime be prevented and pursued more effectively?8FFB597, 121774Mutual notification of attacksSharing information about attempts of cyberattacks on infrastructures of critical units.959C6EF, 121775Sharing information on best practices959C6EF, 121776Joint pursuit of criminalsStates need to co-operate in the joint pursuit of the perpetrators of cyberspace-based criminal activities.959C6EF, 121815Prohibitions may vary across culturesThe forms of expression that should be prohibited or limited may vary across different cultures.8FFB597, 121818Use of IT for terrorist goalsThe use of information and telecommunication technologies for terrorist goals presents a threat to international security.959C6EF, 121819Use of IT for criminal activityThe use of information and telecommunication technologies for criminal activity presents a threat to international security.959C6EF URL: |
Excerpt / Summary The global peace and security are mainly endangered by the so-called hostile use of information and communication technologies, the politico-military aspect of which must be considered first of all.
It is remarkable that technology has gradually become a fundamentally new and potent instrument of destruction. It can affect governmental structures and military administration, industrial and economic entities, as well as social infrastructure. An extremely dangerous means of waging “power” war is emerging, and it may be potentially used as a part of intergovernmental confrontation or even become its main tool.
In its essence, this is a weapon, the destructive effect of which will be growing as it is being developed. Eventually this may lead to an omnipresent hidden use of such “weapon” with all the negative consequences involved.
It is significant that the agents using information and telecommunication technology for hostile purposes, their status (official or private) and liability for damage are impossible to identify.
Accordingly, we may state that there have emerged hazards that will become ever more serious in future. |