Leakage of information as a technology of information operations.
Creating the appearance of an accidental or purposeful leakage of information (document, letter, correspondence archive, etc.) is actively used to disguise an information operation. Allegedly, hackers stole something and posted it. Or an unknown well-wisher, seeing the imperfection of this world, became disillusioned with life and thus decided to restore justice. Or a sleepy c…
Read More “Leakage of information as a technology of information operations.” »

You must be logged in to post a comment.