Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Traditionally, answers to the question “What causes a security breach in the intelligence community?” have tended to focus on individual-level factors including an individual’s economic circumstances and/or psychological health. But... more
    • by 
    •   9  
      Public AdministrationIntelligenceIntelligence and EspionageCounter Espionage
    • by 
    •   7  
      Information SecurityComputer SecurityAsymmetryCyber Attack
Attribution is complicated under the best of circumstances. Sparse attributory indicators and the possibility of overt manipulation have proven enough for many researchers to shy away from the attribution space. And yet, we haven't even... more
    • by  and +1
    •   4  
      Intelligence and EspionageCyber SecuritySIGINTCYBER ESPIONAGE
China is one of the most pervasive actors conducting global cyber espionage, activities that have resulted in two indictments by the U.S. Department of Justice. One thing is clear-if a target or subject area is in China's strategic... more
    • by 
    •   3  
      ChinaCyberwarfareCYBER ESPIONAGE
    • by 
    •   12  
      International RelationsSocial SciencesInternational StudiesSurveillance Studies
El surgimiento de la pandemia Covid-19, en diciembre de 2019 en China y su posterior expansión a nivel mundial, representó un fuerte impacto en los hábitos de toda la población. Las relaciones sociales virtuales, que ya estaban... more
    • by  and +1
    •   13  
      CybercrimesCybersecurityPublic SecurityCybercrime
Book review of Cyber Espionage and International Law by Russell Buchan
    • by 
    •   11  
      International LawInternational Human Rights LawPublic International LawIntelligence and Espionage
    • by 
    •   8  
      Cyber WarfareCybersecurityAdvanced Persistent ThreatsCyber Security
• Having carried out activities related to cyber defence and internet censorship until 2010, Iran has concentrated on operational cyber capabilities since 2010. • The National Internet Network project which the Iranian government has... more
    • by 
    •   7  
      International RelationsSocial SciencesPolitical ScienceCyber Warfare
    • by 
    •   13  
      International RelationsNetwork SecurityInternational SecurityStrategic Studies
    • by 
    •   7  
      Computer ForensicsCybercrimesDigital ForensicsDigital Investigation,Computer Forensics, Computer security
    • by  and +2
    •   97  
      Information SystemsTelecommunications EngineeringPolitical SociologyEastern European Studies
The emerging of new technology is making easier for people to access things in seconds just like the platform of the internet as it has become a crucial part of everyone's life. It enables people to share information worldwide very... more
    • by 
    •   13  
      Risk and VulnerabilityComputer SecurityCyber crimeSocial Networking Security and Privacy
Our investigation into the GOSSIPGIRL Supra Threat Actor (STA) started with a REPLICANT FARM signature name that tentatively links the cryptonym GOSSIPGIRL to Flame. From there, 1 we investigated MiniFlame and Gauss-two families related... more
    • by 
    •   3  
      Intelligence and EspionageCyber SecurityCYBER ESPIONAGE
The KGB (Komitet Gosudarstvennoi Bezopasnosti or Committee of State Security) was the preeminent Soviet intelligence agency and Soviet equivalent of the American CIA. During the later Soviet period, the KGB served as organization... more
    • by 
    •   28  
      HistoryInternational RelationsSocial SciencesGlobalization
= A NEW DIGITAL VERSION [E-BOOK] OF THIS WORK IS AVAILABLE IN KINDLE STORE | WWW.AMAZON.COM THIS CONTENT IS SUPLYIED AS A COURTESY TO STUDENTS AND RESERCHERS. IF ADDITIONAL MATERIAL IS NEEDED, PLEASE CONTACT THE AUTHOR AT... more
    • by 
    •   26  
      HistoryCyberlawDemocracy and Cyber-Democracy Theory and PracticeSocial Sciences
*RUSA AWARD. K Lee Lerner was a substantial contributor to Science and its Times, the critically-acclaimed and RUSA award-winning series edited by Neil Schlager and published by Thomson | Gale. Across the eight volumes in the series,... more
    • by 
    •   16  
      HistoryPhysicsChemistryInternational Relations
Cyber Security is a modern challenge for governance. As the public and private sectors continue to deliver goods through digital means, the cyber domain will only continue to expand and become more relevant to the field of governance.... more
    • by 
    •   9  
      CybercrimesGovernanceCyber TerrorismCyber Warfare
Cybersecurity is a global challenge as Cyberspace is never risk free. Cybersecurity ensures the attainment and maintenance of the security properties of the digital infrastructure and services against relevant security risks in the cyber... more
    • by 
    •   10  
      Secure Software DevelopmentCybersecurityMalwareWebGIS
June 2013. The South China reports that US intelligence agencies have been hacking networks around the world. Der Spiegel publishes information showing that the National Security Agency (NSA) has been bugging the European Union’s offices.... more
    • by 
    •   9  
      CyberlawCybercrimesInternational LawRule of Law
The current consensus is that there is a worldwide gap in skills needed for a competent cybersecurity workforce. This skills gap has implications for the national security sector, both public and private. Although the view is that this... more
    • by 
    •   5  
      IntelligenceNational SecurityInsider ThreatCYBER ESPIONAGE
The global cybersecurity discourse has never proven more fragmented than in the aftermath of the failure of the last United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the... more
    • by 
    •   20  
      International RelationsInternet LawPublic International LawRussian Foreign Policy
    • by 
    •   329  
      Critical TheoryBusinessIndustrial And Labor RelationsInformation Systems
Much attention has been focused on the potential consequences of cyber attacks against critical infrastructure and the use of cyber weapons as an asymmetric equalizer. However, as a capability considered to be under the larger umbrella of... more
    • by 
    •   14  
      Information SecurityInformation WarfareCyber WarfareComputer Security
    • by 
    •   6  
      Military IntelligenceIntelligence StudiesChinaCybersecurity
The global cybersecurity discourse has never proved more fragmented than in the aftermath of the failure of the last United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the... more
    • by 
    •   20  
      International RelationsPolitical ScienceInternet LawPublic International Law
    • by 
    •   12  
      International RelationsInternational StudiesNetwork SecurityInternational Security
The U.S.-China bilateral agenda is dominated by issues like trade, intellectual property rights, monetary policy, human rights and security issues. However, given the fact that critical national infrastructures and the private sector are... more
    • by 
    •   34  
      International RelationsGeopoliticsInternational SecurityWar Studies
The study is dedicated to the activities of the People's Republic of China in cyberspace, taken to acquire American military and civil technologies. The author claims that China is currently the only country that could challenge the... more
    • by 
    •   12  
      Military IntelligenceCyber WarfareChinaChina studies
This piece, published in May 2016, has been voted as the #1 article published on ModernDiplomacy.eu for the entire 2016 calendar year.
    • by 
    •   288  
      BusinessInformation SystemsManagementReligion
The article presents the nuances of cyber espionage versus cyberattacks that are becoming more pervasive in the national security context. It defines the differences between the two, and proposes a method of analyzing cyber operations to... more
    • by 
    •   8  
      Intelligence and EspionageCyberwarfareEspionageCyber Security
    • by 
    •   9  
      International SecurityCybersecurityBrazilian Foreign policyCyber Security
Debido a la ventaja que representa el internet para países y actores con una adecuación militar acelerada, o con pocos recursos, es innegable. Además de los planes que China lleva hoy en día en materia de militarización del ciberespacio,... more
    • by 
    •   11  
      Cyber WarfareCyberspaceComputer and Network Security Information Assurance and Security Cyber Security Access Control in Collaborative, Mobile, Pervasive and Grid Systems Semantic Web and Security OntologiesCyber Security
The emerging of new technology is making easier for people to access things in seconds just like the platform of the internet as it has become a crucial part of everyone's life. It enables people to share information worldwide very fast.... more
    • by 
    •   12  
      Risk and VulnerabilityCyber crimeSocial Networking Security and PrivacySmart Cities
    • by 
    •   8  
      International RelationsSoutheast Asian StudiesCybercrimesInternational Law
Current International Affair on Cyber Space
    • by 
    •   4  
      CybercrimesCyber TerrorismCyber SecurityCYBER ESPIONAGE
    • by 
    •   11  
      International RelationsInternational StudiesNetwork SecurityInternational Security
During our research into the GossipGirl Supra Threat Actor (STA) cluster, we discovered a previously unknown relationship exemplified in an early Stuxnet component –built in part on the Flowershop malware framework. While other known... more
    • by 
    •   3  
      Intelligence and EspionageCyber SecurityCYBER ESPIONAGE
IN OUR THIRD VOLUME DEICATED TO CYBER TERRORISM, “SOCIAL MEDIA IN TIMES OF PEACE AND WAR”, WE WILL DEAL WITH AND EXPAND THIS NEW TERM, “CYBER WAR, INFO WAR AND CYBER TERRORISM, AS WEAPONS OF MASS HARDWARE DESTRUCTION [WMHD]”.
    • by 
    •   7  
      Information SystemsInformation SecurityCyber crimeCybersecurity
Curiosity is a funny thing. The need to know what something is can gnaw at us, making us hold onto a problem beyond what's considered reasonable. That sentiment is at the heart of the discovery of Duqu 1.5, a missing link in the... more
    • by 
    •   3  
      Intelligence and EspionageCyber SecurityCYBER ESPIONAGE
    • by 
    •   18  
      International RelationsSocial SciencesInternet StudiesInternational Studies
This paper takes a comprehensive look at the current state of attribution in targeted attack research and at deliberate attempts by the adversary to obstruct this process. The paper includes common bases for attribution, practical and... more
    • by  and +1
    •   4  
      Intelligence and EspionageCyber SecurityFalse Flag OperationsCYBER ESPIONAGE
    • by 
    •   284  
      BusinessBusiness AdministrationBusiness EthicsReligion
Words are the scaffold of our thinking. They allow us to climb conceptual heights, survey the land, to map concepts, and guide our understanding through conventional and unconventional pathways while retaining a semblance of structure and... more
    • by 
    •   3  
      Intelligence and EspionageCyber SecurityCYBER ESPIONAGE
The origins of digital espionage remain hidden in the dark. In most cases, codenames and fragments of stories are all that remains of the ‘prehistoric’ actors that pioneered the now- ubiquitous practice of computer network exploitation.... more
    • by 
    •   3  
      Intelligence and EspionageCyber SecurityCYBER ESPIONAGE
3-5 September 2015, Warwick Business School, Shard Building, London Keynote speakers: Prof. Phyllis Lassner (Northwestern University), Dr Rosie White (Northumbria University) and Prof. James Chapman (University of Leicester) 2015... more
    • by 
    •   32  
      Military HistoryMilitary ScienceMilitary IntelligenceComparative Literature
    • by 
    •   36  
      Industrial EcologyIndustrial and Organizational PsychologyFighting and Preventing Corruption through LawIndustrial Relations
O livro “O Escândalo da Espionagem no Brasil”, escrito pelo ex-Oficial de Inteligência brasileiro Jorge Bessa, versa sobre os impactos do Caso Snowden para as políticas interna e externa do Brasil, bem como investiga psicologicamente o... more
    • by 
    •   6  
      Intelligence StudiesIntelligence and EspionageEdward SnowdenCYBER ESPIONAGE