Handbook Of Russian Information Warfare

Recent events surrounding the presidential election in the United States have thrown Russia's capabilities and intentions in the information domain into renewed focus.

The implications of facing a combined effort of cyber offensives with traditional subversion and active measures are critically important for all members of the alliance.

This makes the latest publication by NATO Defense College's Research Division especially topical.

The Handbook of Russian Information Warfare is an introductory guide to Russia's doctrine and activities in this field, including elements of cyber warfare.

The handbook’s target audience is NATO servicemen and officials who are unfamiliar with Russian principles of warfighting, but require an introduction to this essential element of how Russia projects state power.

This publication is based primarily on Russian sources. As such, it fills an important gap in the Western study of Russia's approach to this aspect of inter-state confrontation, representing the principles and practice of information warfare in Russia's own words.

Key concepts and approaches are illustrated and explained by direct quotations from senior members of the Russian defence and security communities.

The guide also functions as a source book for further detailed research as required; each section concludes with a list of recommended reading for deeper research on specific topics.

NDC.NATO

Russian General Brags About Cyberwar Successes:

Electoral Influence: 40yrs Of Kremlin Interference:

NATO Cyberwar: Establishing Rules Of Engagement:

 

« Snowden Says Report Proves He’s Not A Spy
Privacy Groups say FBI Hacking went too Far! »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

SSH Communications Security

SSH Communications Security

SSH Communications Security is a leading provider of enterprise cybersecurity solutions for controlling trusted access to information systems and data.

Rockwell Automation

Rockwell Automation

Rockwell Automation offer industrial security solutions to protect the integrity and availability of your complex automation solutions.

2Secure

2Secure

2Secure is one of Sweden's largest private security companies. Service inlcude personal security, corporate security, information and cyber security.

Nucleon

Nucleon

Nucleon enables cybersecurity tools, organizations and software developers to become proactive by blocking threats before they become breaches.

Relyum

Relyum

Relyum provides innovative solutions for networking, synchronization and cybersecurity in critical systems.

Cofrac

Cofrac

Cofrac is the national accreditation body for France. The directory of members provides details of organisations offering certification services for ISO 27001.

GlobalPlatform

GlobalPlatform

GlobalPlatform’s specifications are highly regarded as the international standard for enabling digital services and devices to be trusted and securely managed throughout their lifecycle.

Security Alliance

Security Alliance

Security Alliance provide bespoke cyber intelligence consulting and research services.

Kindus

Kindus

Kindus is an IT security, assurance and cyber security risk management consultancy.

Rhino Security Labs

Rhino Security Labs

Rhino Security Labs is a top penetration testing and security assessment firm, with a focus on cloud pentesting, network pentesting, web application pentesting, and phishing.

Trapp Technology

Trapp Technology

Trapp Technology combines the very best cloud, Internet, IT managed services, and IT consulting to provide a true all-in-one IT solution for small to mid-sized businesses.

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce has partnered with Purdue University and Carnegie Mellon University to create the Rolls-Royce Cybersecurity Technology Research Network.

Punk Security

Punk Security

Punk Security are specialists in integrating security into DevOps pipelines, enabling rapid and secure development.

TrustCloud

TrustCloud

TrustCloud is a global company specializing in the orchestration and custody of secure digital transactions including identification, signature, payments, and electronic custody.

Cybit

Cybit

Cybit is the one-stop-shop for digital transformation that scales in line with your growth.

Driven Technologies

Driven Technologies

Driven is a cloud native service provider transforming the way companies leverage technology to improve business by securing, modernizing, and connecting applications, users, and data.