Journal of Strategic Security最新文献

筛选
英文 中文
How Putin's Cyberwar Failed in Ukraine 普京在乌克兰的网络战是如何失败的
Journal of Strategic Security Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2099
Austen D. Givens, Max Gorbachevsky, Anita Biernat
{"title":"How Putin's Cyberwar Failed in Ukraine","authors":"Austen D. Givens, Max Gorbachevsky, Anita Biernat","doi":"10.5038/1944-0472.16.2.2099","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2099","url":null,"abstract":"As Russian military forces surged across the Ukrainian border in February 2022, cybersecurity analysts shared predictions about the ways in which the Russian government would use cyberattacks to thwart Ukrainian defenses. Some government agencies and private sector organizations forecast that the Russians would launch a blitz of devastating electronic attacks against Ukrainian critical infrastructure targets, such as electrical power plants and air traffic control networks, crippling the country. While Russian cyberattacks have played a role in the conflict, their effects to date have been significantly less than what some analysts anticipated. But why? This article examines how analysts’ most extreme predictions about Russia’s use of cyberattacks in Ukraine missed the mark, links these findings to the literatures on military and intelligence forecasting, and offers recommendations for additional research.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48198582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Brave New World of Third Party Location Data 第三方位置数据的美丽新世界
Journal of Strategic Security Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2070
Shelby Brennan, Stephen Coulthart, Brian Nussbaum
{"title":"The Brave New World of Third Party Location Data","authors":"Shelby Brennan, Stephen Coulthart, Brian Nussbaum","doi":"10.5038/1944-0472.16.2.2070","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2070","url":null,"abstract":"The use of third-party location data (3PLD)—geospatial data captured by smart devices and sold by ‘data brokers’—for intelligence and investigations is increasing each year. This data source provides opportunities for analysts and decision makers to better understand as well as counter a host of security threats from common criminals to terrorists. However, and like other emerging and potent sources of intelligence like social media intelligence (SOCMINT), 3PLD must also be wielded legitimately by the government. We argue that the in the US context the legal framework surrounding these data is unclear. Due to the legal ambiguity as well as technological advancements, we note that misuse by the government is more likely to occur. Concurrently, malicious actors are using 3PLD in ways that threaten security. We argue action from a variety of stakeholders will be necessary to navigate these challenges in the brave new world of commercially available location data.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41821827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trafficking Data: How China is Winning the Battle for Digital Sovereignty. By Aynne Kokas. Oxford: Oxford University Press, 2022. 贩卖数据:中国如何赢得数字主权之战。安妮·科卡斯著。牛津:牛津大学出版社,2022。
Journal of Strategic Security Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2142
C. Bronk
{"title":"Trafficking Data: How China is Winning the Battle for Digital Sovereignty. By Aynne Kokas. Oxford: Oxford University Press, 2022.","authors":"C. Bronk","doi":"10.5038/1944-0472.16.2.2142","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2142","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41892911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fixing American Cybersecurity ed. Larry Clinton, Georgetown University Press, 2023. 《修复美国网络安全》,拉里·克林顿编,乔治城大学出版社,2023年。
Journal of Strategic Security Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2141
M. Peters
{"title":"Fixing American Cybersecurity ed. Larry Clinton, Georgetown University Press, 2023.","authors":"M. Peters","doi":"10.5038/1944-0472.16.2.2141","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2141","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42774037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resisting Exortion: Victims, Criminals, and States in Latin America. By Eduardo Moncada. Cambridge University Press, 2021. 抵制驱逐:拉丁美洲的受害者、罪犯和国家。作者:Eduardo Moncada。剑桥大学出版社,2021。
Journal of Strategic Security Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2144
N. Barnes
{"title":"Resisting Exortion: Victims, Criminals, and States in Latin America. By Eduardo Moncada. Cambridge University Press, 2021.","authors":"N. Barnes","doi":"10.5038/1944-0472.16.2.2144","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2144","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43069285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Taxonomy of Radiofrequency Jamming and Spoofing Strategies and Criminal Motives 射频干扰和欺骗策略与犯罪动机的分类
Journal of Strategic Security Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2081
Tegg Westbrook
{"title":"A Taxonomy of Radiofrequency Jamming and Spoofing Strategies and Criminal Motives","authors":"Tegg Westbrook","doi":"10.5038/1944-0472.16.2.2081","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2081","url":null,"abstract":"This article provides a taxonomy of radiofrequency (RF) jamming and spoofing tactics and strategies associated with specific criminal objectives. This is based on the fact that the motivations and strategies of cyber-attackers – predominantly financial – is well-known, but the motivations behind specific electromagnetic interferences is lacking in the current literature. Previous research has also overlooked the motivations of other actors using jamming and spoofing devices.\u0000The objective is to identify the most desirable spoofing and jamming strategies, likely targets, and likely motivations. The article finds that (a) previous literature on the subject overlooks a number of non-state actor motives, and therefore this research aims to fill this gap in knowledge; (b) out of 8 actors identified, denial of service attacks (7 out of 8), as well as so-called decoy spoofing (6), trojan spoofing (5), and jamming-enabled crime (5) are the most desirable strategies utilized; (c) out of 11 strategies identified, grey and black hat hackers (11 out of 11), terrorists (11) and activists (8), are likely to take advantage of most identified.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48915254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Counterterrorism Law and Policy in the United Kingdom, Canada, and Australia: A Comparative Perspective 英国、加拿大和澳大利亚的反恐法律和政策:比较视角
Journal of Strategic Security Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2072
N. Morag
{"title":"Counterterrorism Law and Policy in the United Kingdom, Canada, and Australia: A Comparative Perspective","authors":"N. Morag","doi":"10.5038/1944-0472.16.2.2072","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2072","url":null,"abstract":"This article looks at the similarities and differences in British, Canadian, and Australian counterterrorism laws and policies. Canada and Australia are contrasted with the United Kingdom because their respective approaches to counterterrorism are based on the British approach, and yet have evolved to take into account differences in the nature and scope of the threat and the differing styles of governance in place in Canada and Australia. The article looks at each country in the context of: counterterrorism laws; detention and disruption practices; investigatory approaches; intelligence and law enforcement institutions; and the treatment of foreign fighters. The article then draws some conclusions regarding the evolution and divergence of counterterrorism law and policy in these countries and posits a question for future research.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43722512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
African Intelligence Services: Early Postcolonial and Contemporary Challenges. Edited by Ryan Shaffer. Lanham, MD: Rowman and Littlefield, 2021. 非洲情报机构:早期后殖民和当代挑战。Ryan Shaffer编辑。Lanham, MD: Rowman and Littlefield, 2021。
Journal of Strategic Security Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2143
Mitchel P. Roth,
{"title":"African Intelligence Services: Early Postcolonial and Contemporary Challenges. Edited by Ryan Shaffer. Lanham, MD: Rowman and Littlefield, 2021.","authors":"Mitchel P. Roth,","doi":"10.5038/1944-0472.16.2.2143","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2143","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135154683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
China's Strategic Devaluing of American Social Capital 中国对美国社会资本的战略性贬值
Journal of Strategic Security Pub Date : 2023-04-01 DOI: 10.5038/1944-0472.16.1.2026
Garrett Martin
{"title":"China's Strategic Devaluing of American Social Capital","authors":"Garrett Martin","doi":"10.5038/1944-0472.16.1.2026","DOIUrl":"https://doi.org/10.5038/1944-0472.16.1.2026","url":null,"abstract":"The information technology era has opened a myriad of new battlespaces through which nations engage each other. China has advanced their “three warfares” doctrine – political warfare, public opinion warfare, and legal warfare – behind a robust and aggressive economic agenda. Direct financial investment and tightly controlled access to both their large consumer market and cheap labor force has given them considerable leverage in key sectors of American industry, particularly those in the communication sphere. The narrative crafting capabilities increasingly acquired by China are beginning to appear as genuine cultural hegemony. This indicates an ability to shape the American collective consciousness by shifting values and behaviors, and ultimately weaken the social bonds within the population. This article thus frames the nature of warfare in the information age as the strategic devaluing of social capital. This reframing of adversarial strategies may be helpful to countering such efforts by providing new insight into the tactics currently employed.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47376969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modern Cognitive Operations and Hybrid Warfare 现代认知作战与混合战争
Journal of Strategic Security Pub Date : 2023-04-01 DOI: 10.5038/1944-0472.16.1.2032
Yuriy Danyk, Chad Briggs
{"title":"Modern Cognitive Operations and Hybrid Warfare","authors":"Yuriy Danyk, Chad Briggs","doi":"10.5038/1944-0472.16.1.2032","DOIUrl":"https://doi.org/10.5038/1944-0472.16.1.2032","url":null,"abstract":"Concepts of cognitive warfare and operations are explored in the context of hybrid warfare, including how cyber technologies promote greater asymmetric opportunities for influence, control, and undermining of one’s adversary. Research areas are analyzed in the interconnection with hybrid cognitive operations. The purpose of the article is to study the features and theoretical and applied substantiation of cognitive actions in cyberspace and through cyberspace and their possible consequences within the framework of hybrid conflicts.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135771493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信