Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
futures:conflict_going_unconventonal [2023/08/06 04:14] – richarderwin | futures:conflict_going_unconventonal [2023/08/06 05:04] (current) – richarderwin | ||
---|---|---|---|
Line 8: | Line 8: | ||
====Disinformation from Bad Actors / Vulnerability of Voting Systems==== | ====Disinformation from Bad Actors / Vulnerability of Voting Systems==== | ||
- | [[library: | + | [[library: |
- | The biggest trends right now in the future of government are disinformation and bad actors — people who want to harm others and interfere with other countries’ infrastructure and elections. All these problems that are caused by a global and open Internet are going to shape the Internet over the next decade, as countries try to respond. Some will be responding because they want to protect their citizens, and some will be responding because they want to protect their regimes. | + | Our voting system |
- | Further, our voting system is incredibly ripe for disruption. If governments moved their records to a blockchain, we could dramatically improve the voting process | + | ====Artificial Intelligence and Machine Learning==== |
+ | [[library: | ||
- | ====Geopolitical Vulnerabilities==== | + | That said, the most significant impact on the cyber threat landscape |
- | [[library: | + | |
- | + | ||
- | ====Conflict==== | + | |
- | [[library: | + | |
- | + | ||
- | ====Info-Flows Control and Opportunities==== | + | |
- | [[library: | + | |
- | + | ||
- | ====New types of security threats | + | |
- | [[library: | + | |
- | + | ||
- | ====Non-traditional threats defy conventional notions of security==== | + | |
- | [[library: | + | |
- | + | ||
- | ====Ransomware and Threats from Nations-States==== | + | |
- | [[library: | + | |
- | + | ||
- | ====Cyberspace as a New Battleground for Geostrategic Supremacy==== | + | |
- | [[library: | + | |
- | + | ||
- | ====Consumption and Production patterns==== | + | |
- | [[library: | + | |
- | political and economic power of China; 3) increasing urbanization across high- and middle-income economies; and 4) (violent and non-violent) conflict, contestation and cooperation between states. | + | |
- | + | ||
- | ====Empowerment of Individuals==== | + | |
- | [[library: | + | |
- | + | ||
- | ====Democratisation of Technology by Emerging Powers and Non-State Actors==== | + | |
- | [[library: | + | |
- | + | ||
- | ====New Vulnerabilities, | + | |
- | [[library: | + | |
- | + | ||
- | ====More Capabilities for Adversaries==== | + | |
- | [[library: | + | |
- | + | ||
- | ====Decreased Role of the State as the Main Security Provider==== | + | |
- | [[library: | + | |
- | + | ||
- | ====Outsourced Military Functions==== | + | |
- | [[library: | + | |
- | + | ||
- | ====Continued need to Work through Alliances, Partnerships and Networks==== | + | |
- | [[library: | + | |
- | + | ||
- | ====Blurring of Lines between Conventional, | + | |
- | [[library: | + | |
- | + | ||
- | ====The Growing Internationalization of Conflict==== | + | |
- | [[library: | + | |
- | + | ||
- | ====Quantum Security==== | + | |
- | [[library: | + | |
- | exploiting quantum effects. In the simplest terms, quantum-based technologies would reveal whether transmitted data had been intercepted or viewed by unintended parties. | + | |
- | + | ||
- | ====Artificial Intelligence | + | |
- | [[library: | + | |
- | ====Complex Synergies and Effects==== | + | ====New Vulnerabilities around Cybersecurity / Blurring of Lines regarding Warfare==== |
- | [[library:the_impact_of_new_and_emerging_technologies_on_the_cyber_threat_landscape_and_their_implications_for_nato|The Impact of New and Emerging Technologies on the Cyber Threat Landscape and Their Implications | + | [[library:exploring_europes_capability_requirements_for_2035_and_beyond|Exploring Europe' |
- | ====Complex Synergies | + | The overall character of war is unpredictable |
- | [[library: | + | |
====Transnational Security Challenges==== | ====Transnational Security Challenges==== | ||
- | [[library: | + | [[library: |
+ | [[library: | ||
Last modified: 2023/08/06 04:14 by richarderwin