{"title":"How Putin's Cyberwar Failed in Ukraine","authors":"Austen D. Givens, Max Gorbachevsky, Anita Biernat","doi":"10.5038/1944-0472.16.2.2099","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2099","url":null,"abstract":"As Russian military forces surged across the Ukrainian border in February 2022, cybersecurity analysts shared predictions about the ways in which the Russian government would use cyberattacks to thwart Ukrainian defenses. Some government agencies and private sector organizations forecast that the Russians would launch a blitz of devastating electronic attacks against Ukrainian critical infrastructure targets, such as electrical power plants and air traffic control networks, crippling the country. While Russian cyberattacks have played a role in the conflict, their effects to date have been significantly less than what some analysts anticipated. But why? This article examines how analysts’ most extreme predictions about Russia’s use of cyberattacks in Ukraine missed the mark, links these findings to the literatures on military and intelligence forecasting, and offers recommendations for additional research.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48198582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Brave New World of Third Party Location Data","authors":"Shelby Brennan, Stephen Coulthart, Brian Nussbaum","doi":"10.5038/1944-0472.16.2.2070","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2070","url":null,"abstract":"The use of third-party location data (3PLD)—geospatial data captured by smart devices and sold by ‘data brokers’—for intelligence and investigations is increasing each year. This data source provides opportunities for analysts and decision makers to better understand as well as counter a host of security threats from common criminals to terrorists. However, and like other emerging and potent sources of intelligence like social media intelligence (SOCMINT), 3PLD must also be wielded legitimately by the government. We argue that the in the US context the legal framework surrounding these data is unclear. Due to the legal ambiguity as well as technological advancements, we note that misuse by the government is more likely to occur. Concurrently, malicious actors are using 3PLD in ways that threaten security. We argue action from a variety of stakeholders will be necessary to navigate these challenges in the brave new world of commercially available location data.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41821827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trafficking Data: How China is Winning the Battle for Digital Sovereignty. By Aynne Kokas. Oxford: Oxford University Press, 2022.","authors":"C. Bronk","doi":"10.5038/1944-0472.16.2.2142","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2142","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41892911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fixing American Cybersecurity ed. Larry Clinton, Georgetown University Press, 2023.","authors":"M. Peters","doi":"10.5038/1944-0472.16.2.2141","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2141","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42774037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resisting Exortion: Victims, Criminals, and States in Latin America. By Eduardo Moncada. Cambridge University Press, 2021.","authors":"N. Barnes","doi":"10.5038/1944-0472.16.2.2144","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2144","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43069285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Taxonomy of Radiofrequency Jamming and Spoofing Strategies and Criminal Motives","authors":"Tegg Westbrook","doi":"10.5038/1944-0472.16.2.2081","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2081","url":null,"abstract":"This article provides a taxonomy of radiofrequency (RF) jamming and spoofing tactics and strategies associated with specific criminal objectives. This is based on the fact that the motivations and strategies of cyber-attackers – predominantly financial – is well-known, but the motivations behind specific electromagnetic interferences is lacking in the current literature. Previous research has also overlooked the motivations of other actors using jamming and spoofing devices.\u0000The objective is to identify the most desirable spoofing and jamming strategies, likely targets, and likely motivations. The article finds that (a) previous literature on the subject overlooks a number of non-state actor motives, and therefore this research aims to fill this gap in knowledge; (b) out of 8 actors identified, denial of service attacks (7 out of 8), as well as so-called decoy spoofing (6), trojan spoofing (5), and jamming-enabled crime (5) are the most desirable strategies utilized; (c) out of 11 strategies identified, grey and black hat hackers (11 out of 11), terrorists (11) and activists (8), are likely to take advantage of most identified.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48915254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Counterterrorism Law and Policy in the United Kingdom, Canada, and Australia: A Comparative Perspective","authors":"N. Morag","doi":"10.5038/1944-0472.16.2.2072","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2072","url":null,"abstract":"This article looks at the similarities and differences in British, Canadian, and Australian counterterrorism laws and policies. Canada and Australia are contrasted with the United Kingdom because their respective approaches to counterterrorism are based on the British approach, and yet have evolved to take into account differences in the nature and scope of the threat and the differing styles of governance in place in Canada and Australia. The article looks at each country in the context of: counterterrorism laws; detention and disruption practices; investigatory approaches; intelligence and law enforcement institutions; and the treatment of foreign fighters. The article then draws some conclusions regarding the evolution and divergence of counterterrorism law and policy in these countries and posits a question for future research.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43722512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"African Intelligence Services: Early Postcolonial and Contemporary Challenges. Edited by Ryan Shaffer. Lanham, MD: Rowman and Littlefield, 2021.","authors":"Mitchel P. Roth,","doi":"10.5038/1944-0472.16.2.2143","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2143","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135154683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"China's Strategic Devaluing of American Social Capital","authors":"Garrett Martin","doi":"10.5038/1944-0472.16.1.2026","DOIUrl":"https://doi.org/10.5038/1944-0472.16.1.2026","url":null,"abstract":"The information technology era has opened a myriad of new battlespaces through which nations engage each other. China has advanced their “three warfares” doctrine – political warfare, public opinion warfare, and legal warfare – behind a robust and aggressive economic agenda. Direct financial investment and tightly controlled access to both their large consumer market and cheap labor force has given them considerable leverage in key sectors of American industry, particularly those in the communication sphere. The narrative crafting capabilities increasingly acquired by China are beginning to appear as genuine cultural hegemony. This indicates an ability to shape the American collective consciousness by shifting values and behaviors, and ultimately weaken the social bonds within the population. This article thus frames the nature of warfare in the information age as the strategic devaluing of social capital. This reframing of adversarial strategies may be helpful to countering such efforts by providing new insight into the tactics currently employed.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47376969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modern Cognitive Operations and Hybrid Warfare","authors":"Yuriy Danyk, Chad Briggs","doi":"10.5038/1944-0472.16.1.2032","DOIUrl":"https://doi.org/10.5038/1944-0472.16.1.2032","url":null,"abstract":"Concepts of cognitive warfare and operations are explored in the context of hybrid warfare, including how cyber technologies promote greater asymmetric opportunities for influence, control, and undermining of one’s adversary. Research areas are analyzed in the interconnection with hybrid cognitive operations. The purpose of the article is to study the features and theoretical and applied substantiation of cognitive actions in cyberspace and through cyberspace and their possible consequences within the framework of hybrid conflicts.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135771493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}