CYBER ESPIONAGE
653 Followers
Recent papers in CYBER ESPIONAGE
Traditionally, answers to the question “What causes a security breach in the intelligence community?” have tended to focus on individual-level factors including an individual’s economic circumstances and/or psychological health. But... more
China is one of the most pervasive actors conducting global cyber espionage, activities that have resulted in two indictments by the U.S. Department of Justice. One thing is clear-if a target or subject area is in China's strategic... more
Book review of Cyber Espionage and International Law by Russell Buchan
• Having carried out activities related to cyber defence and internet censorship until 2010, Iran has concentrated on operational cyber capabilities since 2010. • The National Internet Network project which the Iranian government has... more
The emerging of new technology is making easier for people to access things in seconds just like the platform of the internet as it has become a crucial part of everyone's life. It enables people to share information worldwide very... more
Our investigation into the GOSSIPGIRL Supra Threat Actor (STA) started with a REPLICANT FARM signature name that tentatively links the cryptonym GOSSIPGIRL to Flame. From there, 1 we investigated MiniFlame and Gauss-two families related... more
The KGB (Komitet Gosudarstvennoi Bezopasnosti or Committee of State Security) was the preeminent Soviet intelligence agency and Soviet equivalent of the American CIA. During the later Soviet period, the KGB served as organization... more
= A NEW DIGITAL VERSION [E-BOOK] OF THIS WORK IS AVAILABLE IN KINDLE STORE | WWW.AMAZON.COM THIS CONTENT IS SUPLYIED AS A COURTESY TO STUDENTS AND RESERCHERS. IF ADDITIONAL MATERIAL IS NEEDED, PLEASE CONTACT THE AUTHOR AT... more
*RUSA AWARD. K Lee Lerner was a substantial contributor to Science and its Times, the critically-acclaimed and RUSA award-winning series edited by Neil Schlager and published by Thomson | Gale. Across the eight volumes in the series,... more
Cyber Security is a modern challenge for governance. As the public and private sectors continue to deliver goods through digital means, the cyber domain will only continue to expand and become more relevant to the field of governance.... more
Cybersecurity is a global challenge as Cyberspace is never risk free. Cybersecurity ensures the attainment and maintenance of the security properties of the digital infrastructure and services against relevant security risks in the cyber... more
June 2013. The South China reports that US intelligence agencies have been hacking networks around the world. Der Spiegel publishes information showing that the National Security Agency (NSA) has been bugging the European Union’s offices.... more
The current consensus is that there is a worldwide gap in skills needed for a competent cybersecurity workforce. This skills gap has implications for the national security sector, both public and private. Although the view is that this... more
The global cybersecurity discourse has never proven more fragmented than in the aftermath of the failure of the last United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the... more
Much attention has been focused on the potential consequences of cyber attacks against critical infrastructure and the use of cyber weapons as an asymmetric equalizer. However, as a capability considered to be under the larger umbrella of... more
The global cybersecurity discourse has never proved more fragmented than in the aftermath of the failure of the last United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the... more
The U.S.-China bilateral agenda is dominated by issues like trade, intellectual property rights, monetary policy, human rights and security issues. However, given the fact that critical national infrastructures and the private sector are... more
The study is dedicated to the activities of the People's Republic of China in cyberspace, taken to acquire American military and civil technologies. The author claims that China is currently the only country that could challenge the... more
This piece, published in May 2016, has been voted as the #1 article published on ModernDiplomacy.eu for the entire 2016 calendar year.
The article presents the nuances of cyber espionage versus cyberattacks that are becoming more pervasive in the national security context. It defines the differences between the two, and proposes a method of analyzing cyber operations to... more
Debido a la ventaja que representa el internet para países y actores con una adecuación militar acelerada, o con pocos recursos, es innegable. Además de los planes que China lleva hoy en día en materia de militarización del ciberespacio,... more
The emerging of new technology is making easier for people to access things in seconds just like the platform of the internet as it has become a crucial part of everyone's life. It enables people to share information worldwide very fast.... more
Current International Affair on Cyber Space
During our research into the GossipGirl Supra Threat Actor (STA) cluster, we discovered a previously unknown relationship exemplified in an early Stuxnet component –built in part on the Flowershop malware framework. While other known... more
IN OUR THIRD VOLUME DEICATED TO CYBER TERRORISM, “SOCIAL MEDIA IN TIMES OF PEACE AND WAR”, WE WILL DEAL WITH AND EXPAND THIS NEW TERM, “CYBER WAR, INFO WAR AND CYBER TERRORISM, AS WEAPONS OF MASS HARDWARE DESTRUCTION [WMHD]”.
Curiosity is a funny thing. The need to know what something is can gnaw at us, making us hold onto a problem beyond what's considered reasonable. That sentiment is at the heart of the discovery of Duqu 1.5, a missing link in the... more
Words are the scaffold of our thinking. They allow us to climb conceptual heights, survey the land, to map concepts, and guide our understanding through conventional and unconventional pathways while retaining a semblance of structure and... more
The origins of digital espionage remain hidden in the dark. In most cases, codenames and fragments of stories are all that remains of the ‘prehistoric’ actors that pioneered the now- ubiquitous practice of computer network exploitation.... more
3-5 September 2015, Warwick Business School, Shard Building, London Keynote speakers: Prof. Phyllis Lassner (Northwestern University), Dr Rosie White (Northumbria University) and Prof. James Chapman (University of Leicester) 2015... more
O livro “O Escândalo da Espionagem no Brasil”, escrito pelo ex-Oficial de Inteligência brasileiro Jorge Bessa, versa sobre os impactos do Caso Snowden para as políticas interna e externa do Brasil, bem como investiga psicologicamente o... more