Treść książki

Przejdź do opcji czytnikaPrzejdź do nawigacjiPrzejdź do informacjiPrzejdź do stopki
Introduction
fcialintelligenceintheactivitiesofdecision-makingcentresin
thenewwar.
Partthreeofthebook:CyberTreats:NightmareScenarios
forSecurityaddressestheissuesoftechnologicaldevelopment,
pointingoutthatthereiscurrentlynopossibilityof“cyberdeter-
rence”
.Atmost,onecanspeakofapolicyof“discouragement”
bymaintaininga“constantdefensiveposture”
.Teexperience
todateshowshowdifcultitistouseinternationallawtoclas-
sifyacyberattackasaggressionandcarryoutretaliatoryactions,
giventhatcyberviolence(cyber-attack)mayreachthethreshold
ofarmedaggressionandthestatewillbeforcedtorespondin
self-defense.Sofar,theinternationalcommunityhasnotman-
agedtodefinethescopeofaxionormativeregulationsincyber-
space(e.g.lackofagreementontheissueofsensitivedataofthe
combatspace).Similarproblemsoccurindefiningotherissues
relatedtocyberthreats:digitalstrategydestabilizingthepoliti-
calsituation(e.g.digitalinterferenceinelectioncampaigns),
cybercrime,digitalfraud,cyberdystopia(atoolforshapingbad
order,wickedness,dehumanization,ecologicaldisaster).Tese
andotherissueswereaddressedintheanalysesbyAleksandra
Kominek:Cyberterrorismasamodernthreattointernationalse-
curity,GrzegorzMąkosa:Teorganizationofthecybersecurity
systemoftheRepublicofPoland,andEdytaPankowska,Tools
andinstrumentsofcombat.Weaponsofthefuture
Tevastmajorityoftheworldcommunityexpectsthat,along
withunderstandingthegrowingsecuritythreatsduetotheac-
celerationoftechnologicalprogress,interalia,individualstates,
andaboveallsocialmovements,willabandonemptyrhetoric
andmovetothepracticeofpeacefulsolutionsforsustainable
developmentinahostileworld,whichresemblesGeorgeOr-
well’s1984descriptionsoftheworldoftheinformationage,in
whicheverythingis,infact,completelydińerentfromwhatit
wasassignedastobeginwith.
20