2015
DOI: 10.5604/23008741.1209142
|View full text |Cite
|
Sign up to set email alerts
|

Special operations for disruption of state and military control system

Abstract: The article deals with the essence of special operations for implementation of destructive actions aimed at disruption of state and military control. Basic forms and methods of influence are described. The main ways of detection and response are proposed.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5

Relationship

3
2

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…Changes in the nature and characteristics of modern wars have a significant impact on the etiology of crisis situations syndromes [27,28].…”
Section: Discussion Of the Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Changes in the nature and characteristics of modern wars have a significant impact on the etiology of crisis situations syndromes [27,28].…”
Section: Discussion Of the Resultsmentioning
confidence: 99%
“…Generally, in modern conflicts, the achievement of the goal of aggression usually begins with non-force methods, mainly economic, political, diplomatic, informational, psychological, cybernetic, cognitive, etc. [28,35].…”
Section: Discussion Of the Resultsmentioning
confidence: 99%
“…At the same time both hybrid warfare and migration as the separate phenomena are subject to careful scrutiny in numerous scholarly works (Hoffman, 2009;Murray & Mansoor, 2012;Mattis, 2005;McCuen, 2008, Gorbulin, 2017. The same goes for the forecast views of the modern military conflicts peculiarities and their possible nature (Danyk, Telelym, Chmeljov (2008, 2010 as well as the other aspects of our study such as the migrants, internally displaced people and refugees' problems and needs (IOM, 2018a;Crawford & Campbell, 2012;Gibney, Claire, McCann, 1996;Poznjak & Libanova, 2010), horizontal inequality within and between states (Gurr, 1970;Ostby, 2008, Stewart, 2010, the manipulation of social consciousness (Miller, 1946;Shiller, 1980;Kara-Murza, 2005;Bojko, 2010;Danyk & Gudz, 2015;Danyk & Permiakov, 2018). We also have to mention the publications devoted to the consequences of being in a war zone for the personality and consciousness of individuals (Lazebnaia, 1999;Akhmedova, 2004).…”
Section: Methodsmentioning
confidence: 98%
“…Attackers can use information warfare to prepare for cyberattacks. For example, they may collect confidential information or conduct social engineering to gain access to a system (Danyk et al, 2017;Sumets et al, 2022).…”
Section: Social Consequencesmentioning
confidence: 99%