Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Categorized data deduced from the Dissertation Questionnaire Survey administered by Elisha Ngwana, a Doctoral candidate at Marymount University, Arlington, VA, USA. The data is a summation of all qualified respondents after personally... more
Categorized data deduced from the Dissertation Questionnaire Survey administered by Elisha Ngwana, a Doctoral candidate at Marymount University, Arlington, VA, USA. The data is a summation of all qualified respondents after personally identifiable information (PII) has been stripped from the data. Data will be used for quantitive analysis, Spearman's Rank Correlation calculations, and to produce a Tableau Heat Map.
The paper dwells on China's online underground economy using a three-dimensional approach: examining the value chains, empirical and statistical analyses. These present a vivid picture of shadow players, their actions, recruitment... more
The paper dwells on China's online underground economy using a three-dimensional approach: examining the value chains, empirical and statistical analyses. These present a vivid picture of shadow players, their actions, recruitment process, targets, conversion of stolen digital currencies and limited government efforts to counter these actors. Expands on emerging cybercrime trends, overall damages caused and future threats.
The paper review critically analyses technologies deception, surveillance, and control as presented by Torin Monahan (2016). These include unreliable hotel and workplace thermostats, digital Spywares deployed on company computers, family... more
The paper review critically analyses technologies deception, surveillance, and control as presented by Torin Monahan (2016). These include unreliable hotel and workplace thermostats, digital Spywares deployed on company computers, family members, commercial purposes as well as law enforcement use of these surveillance technologies. The analysis will go further to account for data security concerns and how collected data could be vulnerable to cybercriminals or even become gateways to supply chain attacks carried out by APTs on critical infrastructures. The article review proceeds with comparatively assessing the national security necessity, implications, and potential outcomes of mass surveillance programs. Torin noted that if deception in itself is not the primary problem with such systems, then transparency cannot be the solution while also highlighting vulnerabilities that exist within such technologies: imbalances in power, unchecked powers accorded to collection agencies (employers, or law enforcement) which could result in abuse of trust, misuse, or control of the targeted individual(s). Thus, this paper seeks to propose checksand-balances of what kind of data should be mass collected, how the data should be stored, and in what instances can the data be accessed or transmitted to third parties. The paper uses a holistic approach to enhance the understanding of why public surveillance systems are deployed, prevailing ethical and legal concerns, how deception and mass surveillance systems support law enforcement activities and what measures can be put in place to guarantee the protection of data collected. The focus is more on surveillance systems than deceptive technologies.
KGB becomes FSB, inheriting all surveillance technology developed during the Soviet era. These include SORM tapping into the Russian internet traffic located in the building where half of the phone traffic passes through, Station M9 with... more
KGB becomes FSB, inheriting all surveillance technology developed during the Soviet era. These
include SORM tapping into the Russian internet traffic located in the building where half of the phone traffic passes through, Station M9 with critical Internet Exchange point MSK-IX. SORM intercepts calls, reads emails, monitors social media & all digital communications.
The book is in two parts, part one deals with the information environment after the collapse of the Soviet Union until the advent of Putin and the introduction of modern communication social media platforms in Russia. Part two handles the reign of assertive Putin, the coming of Snowden, and reprisal attacks, regulations, and monitoring in modern Russia. The desire for government information control clashes with modern-day desires for internet freedoms in an inter-connected Russia. This review starts with the book, then other opinions, and concluded with
an analysis.
Since the early 2000s, China has been an active participant in African developmental and security affairs. Billions of dollars have been given to African nations with less regard to their credit standings via bilateral agreements or the... more
Since the early 2000s, China has been an active participant in African developmental and security affairs. Billions of dollars have been given to African nations with less regard to their credit standings via bilateral agreements or the extension of One Belt and Road Initiative projects. There has also been security aid in form discounted military equipment, specialized software transfers and establishment of ICTs all over Africa. The exact resultant effects of this Chinese ‘largess’ needs to be researched with regards to geopolitical strategic interests of Africans nations, previous dominant players (Western partners) and China’s ultimate goals. Thus, the research seeks to understand the reasons behind China's successful engagements with the respective African nations.
The attached Survey Questionnaire is for an ongoing dissertation on "Cybercrimes, Supply Chain attacks and National Security ramifications" conducted by Doctoral in Cybersecurity candidate Elisha Ngwana attending Marymount University at... more
The attached Survey Questionnaire is for an ongoing dissertation on "Cybercrimes, Supply Chain attacks and National Security ramifications" conducted by Doctoral in Cybersecurity candidate Elisha Ngwana attending Marymount University at Arlington, VA.

The purpose of posting the questionnaire is to provide a link to a group of selected individuals (sample population) that meet certain criteria. Only Cybersecurity and National Security experts with a proven track record of at least 5 years of experience have been chosen for this academic exercise.

Please note responses from the general public would not be considered or included in the final results of the study.
Within the last decade, there have been a proliferation of crypto (virtual)currencies and increasing consumer confidence accompanied by more acceptability by a growing number of merchants. This means cryptocurrencies are shifting from... more
Within the last decade, there have been a proliferation of crypto (virtual)currencies and increasing consumer confidence accompanied by more acceptability by a growing number of merchants. This means cryptocurrencies are shifting from niche legal tenders to the mainstream financial sector.
However, virtual currencies are largely unregulated as most governments have not yet developed regulations to govern them. Also, there is the issue of cryptos becoming potential safe havens for cybercriminals, organized criminal syndicates, and terrorists who want to remain under the radar of the governments. The main feature which attracts these rogue actors is anonymity – the ability to conduct financial transactions without being detected.
Traditional banking institutions collect a lot of personal information – names, addresses, guarantors, occupations, purpose, relationships, dates of birth, identification numbers, which are
valuable when tracking down a criminal group or tracing payments made to terrorist organizations.
Thousands of cybercriminals have been identified, arrested, or publicly shames thanks to the tracing of banking information. Unfortunately, virtual currencies eliminate these requirements, thereby providing a blanket of cover for overt criminals on the open Internet and covert actors on the dark web. This problem is exacerbated by the fact there is a significant increase in the number of digital payments as opposed to paper transactions the world over. Many people are becoming more comfortable with the digital economy – online buying, selling, and payments.
On the other hand, cryptocurrencies pose multiple issues. Sanctions imposed against adversarial nations (Iran, North Korea, Venezuela) could be circumvented using cryptos; criminals
are increasingly opting for cryptos, and there is volatility in the valuation of cryptos. Thus, how does a government regulate these unstable tenders?
The research will be designated in the below format outlining the focus of each chapter. As an overview, there will be an introduction to the topic areas, then followed by the Methodology of how the research will be conducted, followed by Qualitative/Quantitative Analysis with real-world examples, ending with a Research Findings/Conclusion chapter.
The thesis will focus on both academic theory and applicable analysis for a better understanding of how Cryptocurrencies could take center stage in world finance in the future if so, these virtual currencies need to be regulated in a manner that protects the National Security of nations. On the other hand, if the research finds out Cryptos are impossible to regulate and will remain the bread-and-butter of criminal syndicates, then appropriate recommendations will be made after this study. The goal is to keep the study academically honest, void of biases, or any external influences. Where these may exist, the author will highlight the extent to which the results
might be affected.
The relevance of this project depends on the reader’s point of interest, whether for further
research, as a government official, an investment or financial expert, a Nation Security expert, and for curious readers. The thesis is focused almost entirely on the Homeland Security and National
Security implications of Cryptocurrencies are not necessarily the Blockchain technology that forms
the basis of virtual currencies. This should give clear guidelines for the audience on the peculiarities of this research.

Keywords: Research Format, Research Focus, Research Relevance, Research Audience, Cryptocurrencies, Virtual Currencies, Rogue Actors, Adversaries, Regulation