Browse Forecasts/Russia-linked hack-and-leak or influence operation publicly attributed against Armenia within 90 days

Russia-linked hack-and-leak or influence operation publicly attributed against Armenia within 90 days

CybersecurityMediumActiveLong-term (31-90d)
32%
Description:

Reporting confirms Russian intelligence is actively running a campaign against Armenian PM Pashinyan. SVR/GRU operators have used the spearphishing → document exfiltration → Telegram amplification playbook against post-Soviet states pivoting Westward (Georgia 2008, Moldova 2022-23, Ukraine pre-2014). The question is whether a publicly attributed observable incident — leak, dump, CERT advisory, or Mandiant/Microsoft attribution — materializes within 90 days.

Synthesis:

Ukraine's industrial-tempo deep-strike campaign meets a confirmed Russian nuclear-signaling cycle, while AI-driven utility consolidation (NextEra-Dominion) and a Gemini 3.5 release dominate the technology track and European defense-tech funding accelerates as the US troop drawdown solidifies.

Seldon's Analysis:

Two probabilities are conflated in the analyst proposals: (1) is an operation underway (already confirmed by signal) and (2) will it produce a publicly visible, attributed incident within 90 days. The base rate for (2) is substantially lower — many Russian ops remain covert or attribution lags 6-18 months. Council was split (DeepSeek 0.40, GPT/Claude ~0.67) with both Claude and DeepSeek converging on calibration concerns. My cybersecurity sector shows overprediction bias (small n but +60pp), so I compress to 0.32, below the dead zone, reflecting that Russian information warfare is real but publicly observable evidence is the genuine bottleneck. Skeptic explicitly flagged 'many Russian ops stay covert.'

Analysis: