TABLE OF CONTENTS 8 FOREWORD 10 EXECUTIVE SUMMARY 12 INTRODUCTION TO THREATCASTING 16 KEY TERMS AND ESSENTIAL CONTEXT 18 FINDINGS 30 FINDING 1: ATTACKS ON HVIS 31 FINDING 2: SOWING DECEPTION AND DISINFORMATION AMONG VULNERABLE POPULATIONS 34 FINDING 3: ATTACKS ON THE FIGHTING FORCE 36 FINDING 4: ATTACKS ON HVIS IN THE BUSINESS AND FINANCIAL COMMUNITIES 38 OUTLIERS 40 OUTLIER 1: SIMULATED INFAMY AND THE LOSS OF REPUTATIONAL SOVEREIGNTY 40 OUTLIER 2: AI CREATES TANGIBLE NEW (UN)REALITIES 43 FLAGS 44 TECHNOLOGICAL PROGRESSION 45 THE THREE SIDES OF NEXT GENERATION SECURITY 46 DEGRADING ECONOMIC AND SOCIAL CONDITIONS LEAD TO VULNERABILITIES 48 EXPANSION OF NEW INFLUENCER TYPES 49 GATES 50 DEVELOP AN ADVANCED DIGITAL DEFENSE POSTURE 50 USE HUMAN RIGHTS AS A SECURITY MEASURE 54 EXPAND EDUCATION 54 SUMMARY 56 APPENDIX A – ENGINEERING CONSENT: AN EARLY 20TH CENTURY GUIDE TO MANIPULATING THE MASSES 58附录B - 主题专家访谈68附录C-参考书目“工程同意:20世纪初的群众指南” 94
主要关键词