Journal of Strategic Security最新文献

筛选
英文 中文
Disrupting Deterrence Signaling: Examining the Fifth Wave of Technology’s Impact 扰乱威慑信号:检查第五波技术的影响
Journal of Strategic Security Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2109
Brendan Balestrieri
{"title":"Disrupting Deterrence Signaling: Examining the Fifth Wave of Technology’s Impact","authors":"Brendan Balestrieri","doi":"10.5038/1944-0472.16.2.2109","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2109","url":null,"abstract":"A critical component of deterrence is signaling, or how states communicate desired images of themselves and their intentions.[i] While scholars advocate for a re-examination of classical deterrence theories in light of the emergence of artificial intelligence (AI) and autonomous systems, some view the impact of AI and autonomy as a force that will diminish human agency as a component of deterrence and interactions between nations. This article argues the contrary and posits that the emergence of AI and autonomous systems will magnify the importance of human agency by enabling decision-makers to more accurately gauge credibility, will-to-fight factors, and the national resolve of their opponents based on aggregated sentiment analysis and psychological profiling of civilian populations. Furthermore, this article contends that traditional forms of signaling are undermined by the pervasiveness of AI, autonomous systems, social media, metadata, and the ability of nation-state actors to more accurately surmise the credibility and national resolve of an opponent.\u0000[i] Robert Jervis, Perception and Misperception in International Politics, New Edition (Princeton: Princeton University Press, 1976), xvi, https://www.jstor.org/stable/j.ctvc77bx3.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48776858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Brave New World of Third Party Location Data 第三方位置数据的美丽新世界
Journal of Strategic Security Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2070
Shelby Brennan, Stephen Coulthart, Brian Nussbaum
{"title":"The Brave New World of Third Party Location Data","authors":"Shelby Brennan, Stephen Coulthart, Brian Nussbaum","doi":"10.5038/1944-0472.16.2.2070","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2070","url":null,"abstract":"The use of third-party location data (3PLD)—geospatial data captured by smart devices and sold by ‘data brokers’—for intelligence and investigations is increasing each year. This data source provides opportunities for analysts and decision makers to better understand as well as counter a host of security threats from common criminals to terrorists. However, and like other emerging and potent sources of intelligence like social media intelligence (SOCMINT), 3PLD must also be wielded legitimately by the government. We argue that the in the US context the legal framework surrounding these data is unclear. Due to the legal ambiguity as well as technological advancements, we note that misuse by the government is more likely to occur. Concurrently, malicious actors are using 3PLD in ways that threaten security. We argue action from a variety of stakeholders will be necessary to navigate these challenges in the brave new world of commercially available location data.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41821827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trafficking Data: How China is Winning the Battle for Digital Sovereignty. By Aynne Kokas. Oxford: Oxford University Press, 2022. 贩卖数据:中国如何赢得数字主权之战。安妮·科卡斯著。牛津:牛津大学出版社,2022。
Journal of Strategic Security Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2142
C. Bronk
{"title":"Trafficking Data: How China is Winning the Battle for Digital Sovereignty. By Aynne Kokas. Oxford: Oxford University Press, 2022.","authors":"C. Bronk","doi":"10.5038/1944-0472.16.2.2142","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2142","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41892911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fixing American Cybersecurity ed. Larry Clinton, Georgetown University Press, 2023. 《修复美国网络安全》,拉里·克林顿编,乔治城大学出版社,2023年。
Journal of Strategic Security Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2141
M. Peters
{"title":"Fixing American Cybersecurity ed. Larry Clinton, Georgetown University Press, 2023.","authors":"M. Peters","doi":"10.5038/1944-0472.16.2.2141","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2141","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42774037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resisting Exortion: Victims, Criminals, and States in Latin America. By Eduardo Moncada. Cambridge University Press, 2021. 抵制驱逐:拉丁美洲的受害者、罪犯和国家。作者:Eduardo Moncada。剑桥大学出版社,2021。
Journal of Strategic Security Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2144
N. Barnes
{"title":"Resisting Exortion: Victims, Criminals, and States in Latin America. By Eduardo Moncada. Cambridge University Press, 2021.","authors":"N. Barnes","doi":"10.5038/1944-0472.16.2.2144","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2144","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43069285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Taxonomy of Radiofrequency Jamming and Spoofing Strategies and Criminal Motives 射频干扰和欺骗策略与犯罪动机的分类
Journal of Strategic Security Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2081
Tegg Westbrook
{"title":"A Taxonomy of Radiofrequency Jamming and Spoofing Strategies and Criminal Motives","authors":"Tegg Westbrook","doi":"10.5038/1944-0472.16.2.2081","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2081","url":null,"abstract":"This article provides a taxonomy of radiofrequency (RF) jamming and spoofing tactics and strategies associated with specific criminal objectives. This is based on the fact that the motivations and strategies of cyber-attackers – predominantly financial – is well-known, but the motivations behind specific electromagnetic interferences is lacking in the current literature. Previous research has also overlooked the motivations of other actors using jamming and spoofing devices.\u0000The objective is to identify the most desirable spoofing and jamming strategies, likely targets, and likely motivations. The article finds that (a) previous literature on the subject overlooks a number of non-state actor motives, and therefore this research aims to fill this gap in knowledge; (b) out of 8 actors identified, denial of service attacks (7 out of 8), as well as so-called decoy spoofing (6), trojan spoofing (5), and jamming-enabled crime (5) are the most desirable strategies utilized; (c) out of 11 strategies identified, grey and black hat hackers (11 out of 11), terrorists (11) and activists (8), are likely to take advantage of most identified.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48915254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Counterterrorism Law and Policy in the United Kingdom, Canada, and Australia: A Comparative Perspective 英国、加拿大和澳大利亚的反恐法律和政策:比较视角
Journal of Strategic Security Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2072
N. Morag
{"title":"Counterterrorism Law and Policy in the United Kingdom, Canada, and Australia: A Comparative Perspective","authors":"N. Morag","doi":"10.5038/1944-0472.16.2.2072","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2072","url":null,"abstract":"This article looks at the similarities and differences in British, Canadian, and Australian counterterrorism laws and policies. Canada and Australia are contrasted with the United Kingdom because their respective approaches to counterterrorism are based on the British approach, and yet have evolved to take into account differences in the nature and scope of the threat and the differing styles of governance in place in Canada and Australia. The article looks at each country in the context of: counterterrorism laws; detention and disruption practices; investigatory approaches; intelligence and law enforcement institutions; and the treatment of foreign fighters. The article then draws some conclusions regarding the evolution and divergence of counterterrorism law and policy in these countries and posits a question for future research.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43722512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
African Intelligence Services: Early Postcolonial and Contemporary Challenges. Edited by Ryan Shaffer. Lanham, MD: Rowman and Littlefield, 2021. 非洲情报机构:早期后殖民和当代挑战。Ryan Shaffer编辑。Lanham, MD: Rowman and Littlefield, 2021。
Journal of Strategic Security Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2143
Mitchel P. Roth,
{"title":"African Intelligence Services: Early Postcolonial and Contemporary Challenges. Edited by Ryan Shaffer. Lanham, MD: Rowman and Littlefield, 2021.","authors":"Mitchel P. Roth,","doi":"10.5038/1944-0472.16.2.2143","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2143","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135154683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
China's Strategic Devaluing of American Social Capital 中国对美国社会资本的战略性贬值
Journal of Strategic Security Pub Date : 2023-04-01 DOI: 10.5038/1944-0472.16.1.2026
Garrett Martin
{"title":"China's Strategic Devaluing of American Social Capital","authors":"Garrett Martin","doi":"10.5038/1944-0472.16.1.2026","DOIUrl":"https://doi.org/10.5038/1944-0472.16.1.2026","url":null,"abstract":"The information technology era has opened a myriad of new battlespaces through which nations engage each other. China has advanced their “three warfares” doctrine – political warfare, public opinion warfare, and legal warfare – behind a robust and aggressive economic agenda. Direct financial investment and tightly controlled access to both their large consumer market and cheap labor force has given them considerable leverage in key sectors of American industry, particularly those in the communication sphere. The narrative crafting capabilities increasingly acquired by China are beginning to appear as genuine cultural hegemony. This indicates an ability to shape the American collective consciousness by shifting values and behaviors, and ultimately weaken the social bonds within the population. This article thus frames the nature of warfare in the information age as the strategic devaluing of social capital. This reframing of adversarial strategies may be helpful to countering such efforts by providing new insight into the tactics currently employed.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47376969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modern Cognitive Operations and Hybrid Warfare 现代认知作战与混合战争
Journal of Strategic Security Pub Date : 2023-04-01 DOI: 10.5038/1944-0472.16.1.2032
Yuriy Danyk, Chad Briggs
{"title":"Modern Cognitive Operations and Hybrid Warfare","authors":"Yuriy Danyk, Chad Briggs","doi":"10.5038/1944-0472.16.1.2032","DOIUrl":"https://doi.org/10.5038/1944-0472.16.1.2032","url":null,"abstract":"Concepts of cognitive warfare and operations are explored in the context of hybrid warfare, including how cyber technologies promote greater asymmetric opportunities for influence, control, and undermining of one’s adversary. Research areas are analyzed in the interconnection with hybrid cognitive operations. The purpose of the article is to study the features and theoretical and applied substantiation of cognitive actions in cyberspace and through cyberspace and their possible consequences within the framework of hybrid conflicts.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135771493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信