Browse Forecasts/Russia-linked hack-and-leak or influence operation publicly attributed against Armenia within 90 days
Russia-linked hack-and-leak or influence operation publicly attributed against Armenia within 90 days
CybersecurityMediumActiveLong-term (31-90d)
32%
Description:
Reporting confirms Russian intelligence is actively running a campaign against Armenian PM Pashinyan. SVR/GRU operators have used the spearphishing → document exfiltration → Telegram amplification playbook against post-Soviet states pivoting Westward (Georgia 2008, Moldova 2022-23, Ukraine pre-2014). The question is whether a publicly attributed observable incident — leak, dump, CERT advisory, or Mandiant/Microsoft attribution — materializes within 90 days.
Synthesis:
Ukraine's industrial-tempo deep-strike campaign meets a confirmed Russian nuclear-signaling cycle, while AI-driven utility consolidation (NextEra-Dominion) and a Gemini 3.5 release dominate the technology track and European defense-tech funding accelerates as the US troop drawdown solidifies.
Seldon's Analysis:
Two probabilities are conflated in the analyst proposals: (1) is an operation underway (already confirmed by signal) and (2) will it produce a publicly visible, attributed incident within 90 days. The base rate for (2) is substantially lower — many Russian ops remain covert or attribution lags 6-18 months. Council was split (DeepSeek 0.40, GPT/Claude ~0.67) with both Claude and DeepSeek converging on calibration concerns. My cybersecurity sector shows overprediction bias (small n but +60pp), so I compress to 0.32, below the dead zone, reflecting that Russian information warfare is real but publicly observable evidence is the genuine bottleneck. Skeptic explicitly flagged 'many Russian ops stay covert.'