INFORMATION SECURITY IN THE TERMS THE RUSSIAN-UKRAINIAN WAR: CHALLENGES AND THREATS
The need to create an effective mechanism for ensuring state information security is substantiated. It is noted that the blocking of true information about the role of the Armed Forces of Ukraine, actions of the leadership and power structures does not contribute to victory in the war waged by Russia against Ukraine.
The following main ways of disseminating unreliable information in the conditions of war have been identified. social networks; fake accounts of famous people, politicians, TV and radio channels; personal messages or in shared groups of Viber, Telegram, WhatsApp and other messengers.
It is indicated that in the aspect of ensuring information security, a significant place is occupied by the problems of spreading rumors, gossip, and fakes. The following types of fakes are highlighted. fake advertising, fake pseudo-expert, fake conspiracy, fake clickbait. To promote fake news, there are bot farms, «Internet troll factories», and pranking is practiced. In addition, fakes in the conditions of Russian aggression are also a battle of narratives and cultures.
Such components of information security as information-technical and information-psychological protection are highlighted.
The main mechanisms of combating false information in the conditions of war are disclosed, namely. formation of media literacy of the population; coverage of objective information through government Internet publications, mass media, e-government; establishment of responsibility for spreading fake news among the population; control of fake accounts; neutralization of fakes by special units in the cyber police.
The main directions of improving information security as a component of the state security of Ukraine have been identified and characterized.
Zaljevsjka, I., Udrenas, Gh.. 2022. Information security of Ukraine in the conditions of Russian military aggression, South Ukrainian legal journal. 1-2: 20–26 (in Ukrainian).
Bodruk, O. 2001. Structures of military security: national and international aspects: Monograph. Kyiv: NIPMB (in Ukrainian).
Constitution of Ukraine. URL: https://zakon.rada.gov.ua/laws/show/254%D0%BA/96-%D0%B2%D1%80 (in Ukrainian).
On the Doctrine of Information Security of Ukraine: Decree of the President of Ukraine No. 47/2017 «On the Decision of the National Security and Defense Council of Ukraine dated December 29, 2016 «On the Doctrine of Information Security of Ukraine». URL: https://www.president.gov.ua/documents/472017-21374 (in Ukrainian).
About the decision of the National Security and Defense Council of Ukraine 2021: Decree of the President of Ukraine No. 685/2021 dated October 15, 2021 «On Information Security Strategy». URL: https://www.president.gov.ua/documents/6852021-41069 (in Ukrainian).
Cymbaljuk, V. 2014. Legal regulation of information security in Ukraine։ problems of theory and practice, Administrative law and process 2(8): 22-30 (in Ukrainian).
Kochubej, L. 2015. State information security. tools for the protection of the Ukrainian information field (on the example of the features of information and communication technologies in modern Donbas), Scientific notes of the Institute of Political and Ethnonational Studies named after I.F. Kurasa. 3: 220-237 (in Ukrainian).
Ghoncharenko, O., Dzhanghuzhyn, R., Lysycyn, E. 2003. Civil control and the system of national security, National security of Ukraine. 1: 39–46 (in Ukrainian).
Parkhomenko-Kucevil, O. 2022. Ensuring information security during military operations and hostilities. Public management and administration in the conditions of war and in the post-war period in Ukraine: materials of Vseukr. science and practice conf. in three volumes. Kyiv: DZVO «University of Education Management» National Academy of Sciences of Ukraine 1: 39-43 (in Ukrainian).
Pysarenko, L.2022. Fakes as tools of information warfare, The European choice of Ukraine, the development of science and national security in the realities of large-scale military aggression and global challenges of the 21st century: in 2 volumes: materials of International Sciences.- practice conf. Ukraine, Odesa: «Helvetika» publishing house 1: 859–861 (in Ukrainian).
Cole, Samantha. 2020, New Deepfake Method Can Put Words In Anyone's Mouth, Tech by VICE 24.01.2020. URL: https://www.vice.com/en_us/article/g5xvk7/researchers-created-a-way-to-makerealistic-deepfakesfrom-audio-clips.
Author’s copyright and licensing.
License Terms: Authors retain copyright and also grant the Journal the right to publish original scientific articles that contain research results and are not under consideration for publication in other issues. All material is licensed under a Creative Commons Attribution License International CC-BY, which allows others to distribute their work with the copyright of this work and recognition of the first publication in this Journal.
If the article is taken for publishing in The Journal of V.N. Karazin Kharkov National University. “Political Science Issues”, the author must sign a copyright transfer agreement. The agreement is sent by post (original document) or by e-mail (scanned copy of the document) to the Editorial Board of the Journal.
By this agreement the author certifies that the submitted material:
- does not violate the copyrights of other people or organizations;
- has not been previously published in other issues and has not been given for publishing to other issues.
The author gives the editorial board the rights to:
- publish the article in Ukrainian (English and Russian) and distribute its printed version;
- translate the article into English (for articles in Ukrainian and Russian) and distribute the printed version of the translation;
- distribute the electronic version of the article, as well as the electronic version of the English-language translation of the article (for articles in Ukrainian and Russian), through any electronic means (placing on the official journal web site, in electronic databases, repositories, etc.).
The author reserves the right without the consent of the editorial board and the founders to:
- Completely or partly use the materials of the article for educational purposes.
- Completely or partly use the materials of the article for writing own theses.
- Use the materials of the article to prepare abstracts, conference reports, and oral presentations.
- Post electronic copies of the article (including the final electronic version downloaded from the journal's official website) to:
- personal web-resources of all authors (web sites, web pages, blogs, etc.);
- web-resources of institutions where authors work (including electronic institutional repositories);
- non-profit, open-source web resources (such as arXiv.org).