Search results for ""Author Daniel Ventre""
ISTE Ltd and John Wiley & Sons Inc Cyber Conflict: Competing National Perspectives
Book SynopsisToday, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how cyberspace could be used to increase power. Through an empirical, conceptual and theoretical approach, Cyber Conflict has been written by researchers and experts in the fields of cyber security, cyber defense and information warfare. It aims to analyze the processes of information warfare and cyber warfare through historical, operational and strategic perspectives of cyber attack. It is original in its delivery because of its multidisciplinary approach within an international framework, with studies dedicated to different states – Canada, Cuba, France, Greece, Italy, Japan, Singapore, Slovenia and South Africa – describing the state’s application of information warfare principles both in terms of global development and “local” usage and examples. Contents 1. Canada’s Cyber Security Policy: a Tortuous Path Toward a Cyber Security Strategy, Hugo Loiseau and Lina Lemay. 2. Cuba: Towards an Active Cyber-defense, Daniel Ventre. 3. French Perspectives on Cyber-conflict, Daniel Ventre. 4. Digital Sparta: Information Operations and Cyber-warfare in Greece, Joseph Fitsanakis. 5. Moving Toward an Italian Cyber Defense and Security Strategy, Stefania Ducci. 6. Cyberspace in Japan’s New Defense Strategy, Daniel Ventre. 7. Singapore’s Encounter with Information Warfare: Filtering Electronic Globalization and Military Enhancements, Alan Chong. 8. A Slovenian Perspective on Cyber Warfare, Gorazd Praprotnik, Iztok Podbregar, Igor Bernik and Bojan Ticar. 9. A South African Perspective on Information Warfare and Cyber Warfare, Brett van Niekerk and Manoj Maharaj. 10. Conclusion, Daniel VentreTable of ContentsIntroduction xi Chapter 1. Canada’s Cyber Security Policy: a Tortuous Path Toward a Cyber Security Strategy 1 Hugo LOISEAU and Lina LEMAY 1.1. Introduction 1 1.2. Canada in North America: sovereign but subordinate? 4 1.3. Counter-terrorism for the improvement of national security 13 1.4. The long path to a national CI protection strategy and national cyber security strategy 25 1.5. The adoption of the current strategies for CI protection and cyber security 31 1.6. Conclusion 37 1.7. Bibliography 38 Chapter 2. Cuba: Towards an Active Cyber-defense 45 Daniel VENTRE 2.1. Cyberspace: statistics and history 47 2.2. Theoretical and practical considerations on information warfare and cyber-warfare 54 2.3. Cyber-warfare theories and practices 56 2.4. Regulations and ways around them 60 2.5. Capabilities of control, surveillance and interception 65 2.6. Enemies 66 2.7. Conclusion 70 2.8. Bibliography 73 Chapter 3. French Perspectives on Cyber-conflict 77 Daniel VENTRE 3.1. Cyberspace 79 3.2. Assessments, view on the world and awakening 88 3.3. Reaction, position of France and choice: theories, political strategies and military doctrines 100 3.4. Conclusion 127 3.5. Bibliography 131 Chapter 4. Digital Sparta: Information Operations and Cyber-warfare in Greece 135 Joseph FITSANAKIS 4.1. Geopolitical significance 136 4.2. Strategic concerns and internal balancing 139 4.3. Formative experiences in information operations: the Ergenekon conspiracy 141 4.4. Formative experiences in information operations: intensifying cyber-attacks 142 4.5. Formative experiences in information operations: the Öcalan affair 143 4.6. Formative experiences in information operations: the Greek wiretapping case of 2004–2005 145 4.7. Emerging civilian information operations strategies 148 4.8. Emerging military information operations strategies 152 4.9. The European Union dimension in Greek information operations 155 4.10. Conclusion 156 4.11. Bibliography 158 Chapter 5. Moving Toward an Italian Cyber Defense and Security Strategy 165 Stefania DUCCI 5.1. Information warfare and cyber warfare: what are they? 165 5.2. Understanding the current Italian geopolitical context 168 5.3. The Italian legal and organizational framework 172 5.4. The need for a national cyber-defense and -security strategy 177 5.5. Conclusion 188 5.6. Bibliography 188 Chapter 6. Cyberspace in Japan’s New Defense Strategy 193 Daniel VENTRE 6.1. Japan’s defense policy 194 6.2. Cyberspace in Japan’s defense strategy 197 6.3. Conclusion 217 6.4. Bibliography 221 Chapter 7. Singapore’s Encounter with Information Warfare: Filtering Electronic Globalization and Military Enhancements 223 Alan CHONG 7.1. Singapore: electronic globalization and its pitfalls 225 7.2. Cyberdefence in the private sector and society at large 228 7.3. The Singapore Armed Forces and the embrace of third-generation warfare 235 7.4. Conclusion 245 7.5. Bibliography 247 Chapter 8. A Slovenian Perspective on Cyber Warfare 251 Gorazd PRAPROTNIK, Iztok PODBREGAR, Igor BERNIK and Bojan TIÈAR 8.1. Introduction 251 8.2. Preparations for digital warfare 254 8.3. Specifics of technologically-advanced small countries 256 8.4. Geostrategic, geopolitics and the economic position of the Republic of Slovenia 258 8.5. Information and communication development in Slovenia 259 8.6. Cyber-threats in Slovenia 261 8.7. Slovenia in the field of information and communication security policy 264 8.8. Slovenia’s information and communication security policy strategy 266 8.9. Conclusion 274 8.10. Bibliography 276 Chapter 9. A South African Perspective on Information Warfare and Cyber Warfare 279 Brett VAN NIEKERK and Manoj MAHARAJ 9.1. The South African structure of information warfare 280 9.2. A South African perspective on cyber-warfare 283 9.3. The Southern African cyber-environment 284 9.4. Legislation 288 9.5. Cyber-security and information warfare organizations in South Africa 289 9.6. Estimated cyber-warfare capability in Africa 290 9.7. Conclusion 291 9.8. Bibliography 292 Chapter 10. Conclusion 297 Daniel VENTRE 10.1. Cyberspace 301 10.2. Bibliography 306 List of Authors 307 Index 309
£132.00
ISTE Ltd and John Wiley & Sons Inc Chinese Cybersecurity and Defense
Book SynopsisCyberdefense has become, over the past five years, a major issue on the international scene. China, by the place it occupies, is the subject of attention: it is observed, criticized, and designated by many states as a major player in the global cyber-insecurity. The United States is building their cyberdefense strategy against what they call the "Chinese threat." It is therefore important to better understand today's challenges related to cyber dimension in regard of the rise of China.Contributions from international researchers provide cross perspectives on China, its strategies and policies for cybersecurity and cyberdefense. These issues have now gained major strategic dimension: Is Cyberspace changing the scene of international relations? How China does apprehend cybersecurity and cyberdefense? What are the issues, challenges? What is the role of China in the global cyberspace?Table of ContentsAuthor Biographies xi Introduction xv Chapter 1 China's Internet Development and Cybersecurity - Policies and Practices 1Xu Longdi 1.1 Introduction 1 1.2 Internet development in China: an overview 2 1.3 China's policies towards Internet development 5 1.4 Cyber legislation and Internet administration 9 1.5 Cybersecurity and diplomacy: an international perspective 27 1.6 A cybersecurity strategy in the making? 41 1.7 Conclusion 53 Chapter 2 PLA Views on Informationized Warfare, Information Warfare and Information Operations 55Dean Cheng 2.1 The evolution of chinese military thinking 56 2.2 The growing importance of information 59 2.3 Information operations 64 2.4 Key types of information operations 72 2.5 Computer network warefare and information operations 79 Chapter 3 China's Adaptive Internet Management Strategy After the Emergence of Social Networks 81Alice Ekman 3.1 Weibo: the turning point 82 3.2 Latest adjustments under Xi Jinping 89 3.3 Bibliography 99 Chapter 4 India's Cybersecurity - The Landscape 101Cherian Samuel 4.1 A snapshot of Asian cyberspace 102 4.2 The Indian cyber landscape 114 4.3 The China challenge: a case study 117 4.4 Responses 121 4.5 Creating an institutional framework 123 4.6 Takeaways 126 Chapter 5 China and Southeast Asia: Offline Information Penetration and Suspicions of Online Hacking - Strategic Implications from a Singapore Perspective 129Alan Chong 5.1 Offline sphere: latent "diasporic" information power and official Chinese soft power 133 5.2 The online sphere: hacktivism as mostly projections 149 5.3 Conclusion: offline politics strategically obscure online projections 152 5.4 Bibliography 153 Chapter 6 Impact of Monogolia's Choices in International Politics on Cybersecurity 157Daniel Ventre 6.1 Mongolia's cyberspace 158 6.2 Cyberspace and political stakes 160 6.3 Information-space security policy 168 Chapter 7 China-Iran-Russia - A Cybercommunity of Information? 177Thomas Flichy De La Neuville 7.1 The hall marks of cyber-cooperation 178 7.2 The geopolitical bases for the cyber-mongol empire 181 7.3 Order in cyberspace: an absolute necessity within China 194 Chapter 8 Discourse Regarding China: Cyberspace and Cybersecurity 199Daniel Ventre 8.1 Identification of prevailing themes 203 8.2 The evolution of American discourse about China, cybersecurity and cyber defense 247 8.3 Conclusion 277 General Conclusion 283 List of Authors 295 Index 297
£125.06
ISTE Ltd and John Wiley & Sons Inc Artificial Intelligence, Cybersecurity and Cyber
Book SynopsisThe aim of the book is to analyse and understand the impacts of artificial intelligence in the fields of national security and defense; to identify the political, geopolitical, strategic issues of AI; to analyse its place in conflicts and cyberconflicts, and more generally in the various forms of violence; to explain the appropriation of artificial intelligence by military organizations, but also law enforcement agencies and the police; to discuss the questions that the development of artificial intelligence and its use raise in armies, police, intelligence agencies, at the tactical, operational and strategic levels.Table of ContentsIntroduction ix Chapter 1. On the Origins of Artificial Intelligence 1 1.1. The birth of artificial intelligence (AI) 1 1.1.1. The 1950s–1970s in the United States 1 1.1.2. AI research in China 7 1.1.3. AI research in Russia 9 1.1.4. AI research in Japan 12 1.1.5. AI research in France 14 1.2. Characteristics of AI research 16 1.3. The sequences of AI history 19 1.4. The robot and robotics 23 1.5. Example of AI integration: the case of the CIA in the 1980s 27 1.5.1. The CIA’s instruments and methods for understanding and appropriating AI adapted to its needs 29 1.5.2. Focus groups, research, coordination 35 1.5.3. The network of interlocutors outside the intelligence community 36 1.5.4. What AI applications for what intelligence needs? 42 Chapter 2. Concepts and Discourses 45 2.1. Defining AI 47 2.1.1. AI 47 2.1.2. Expert systems 54 2.1.3. Machine learning and deep learning 56 2.1.4. The robot, robotics 57 2.2. Types of AI 60 2.3. Evolution of the themes over time 62 2.3.1. Google Trends 62 2.3.2. The AAAI magazine 63 2.4. The stories generated by artificial intelligence 67 2.4.1. The transformative power of AI 67 2.4.2. The absolute superiority of human intelligence over the machine 75 2.4.3. The replacement of humans by machines 76 2.4.4. AI as an existential threat 77 2.4.5. The place of AI and robotics in fiction: the example of Japan 80 2.5. Political considerations 82 2.5.1. National strategies for artificial intelligence 85 2.5.2. U.S. policy 97 Chapter 3. Artificial Intelligence and Defense Issues 105 3.1. Military policies and doctrines for AI: the American approach 105 3.1.1. American defense AI policy 105 3.1.2. AI in American military doctrines 114 3.2. Military AI in Russia 128 3.3. AI and the art of warfare 136 3.3.1. Manuel de Landa: war in the age of intelligent machines 136 3.3.2. AI announcing a new RMA? 139 3.3.3. Applications of AI in the military field 143 3.3.4. Expert systems in military affairs 146 3.3.5. Autonomous weapons 148 3.3.6. Robotics and AI 151 3.4. AI and cyber conflict 155 3.4.1. Malware, cybersecurity and AI 157 3.4.2. AI and cyberweapons 162 3.4.3. Offensive–defensive/security configurations 163 3.4.4. Adversarial AI and adversarial Machine Learning 171 3.4.5. AI and information warfare 173 3.4.6. Example 1: the war in Syria 179 3.4.7. Example 2: events in Hong Kong in 2019 181 3.4.8. Example 3: malicious AI attacks 183 3.4.9. Example 4: swarming attacks 184 3.4.10. Example 5: crossing universes with AI and without AI 185 Conclusion 187 Appendices 195 Appendix 1. A Chronology of AI 197 Appendix 2. AI in Joint Publications (Department of Defense, United States) 207 Appendix 3. AI in the Guidelines and Instructions of the Department of Defense (United States) 209 Appendix 4. AI in U.S. Navy Instructions 211 Appendix 5. AI in U.S. Marine Corps Documents 213 Appendix 6. AI in U.S. Air Force Documents 215 References 217 Index 235
£125.06
ISTE Ltd and John Wiley & Sons Inc Cyberwar and Information Warfare
Book SynopsisIntegrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The aim of this book is to analyze the processes of information warfare and cyberwarfare through the historical, operational and strategic perspectives of cyberattacks. Cyberwar and Information Warfare is of extreme use to experts in security studies and intelligence studies, defense universities, ministries of defense and security, and anyone studying political sciences, international relations, geopolitics, information technologies, etc.Table of ContentsIntroduction ix Daniel VENTRE List of Acronyms xvii Chapter 1. Cyberwar and its Borders 1 François-Bernard HUYGHE 1.1. The seduction of cyberwar 2 1.2. Desirable, vulnerable and frightening information 4 1.3. Conflict and its dimensions 6 1.4. The Helm and space 8 1.5. Between knowledge and violence 11 1.6. Space, distance and paths 13 1.7. The permanency of war 16 1.8. No war without borders 22 1.9. The enemy and the sovereign 25 1.10. Strengths and weaknesses 27 1.11. Bibliography 29 Chapter 2. War of Meaning, Cyberwar and Democracies 31 François CHAUVANCY 2.1. Introduction 31 2.2. Informational environment, a new operating space for strategy 34 2.3. Influence strategy: defeating and limiting armed force physical involvement 59 2.4. Conclusion 78 2.5. Bibliography 79 Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise 83 Joseph HENROTIN 3.1. Information warfare, information and war 85 3.2. Intelligence and strategic surprise 90 3.3. Strategic surprise and information warfare 98 3.4. Concluding remarks: surprise in strategic studies 106 3.5. Bibliography 109 Chapter 4. Cyberconflict: Stakes of Power 113 Daniel VENTRE 4.1. Stakes of power 113 4.2. The Stuxnet affair 230 4.3. Bibliography 240 Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct 245 Eric FILIOL 5.1. Introduction 245 5.2. Towards a broader concept of cyberwar 247 5.3. Concept of critical infrastructure 253 5.4. Different phases of a cyberattack 260 5.5. A few “elementary building blocks” 268 5.6. Example scenario 273 5.7. Conclusion 281 5.8. Bibliography 282 Chapter 6. Riots in Xinjiang and Chinese Information Warfare 285 Daniel VENTRE 6.1. Xinjiang region: an explosive context 287 6.2. Riots, July 2009 291 6.3. Impacts on Chinese cyberspace: hacktivism and site defacing 303 6.4. Managing the “cyberspace” risk by the Chinese authorities 339 6.5. Chinese information warfare through the Xinjiang crisis 354 6.6. Conclusion 361 6.7. Bibliography 364 Chapter 7. Special Territories 367 Daniel VENTRE 7.1. Hong Kong: intermediate zone 367 7.2. North Korea: unknown figure of asymmetrical threat 379 7.3. Bibliography 393 Conclusion 395 Daniel VENTRE List of Authors 401 Index 403
£135.80
ISTE Ltd and John Wiley & Sons Inc Information Warfare
Book SynopsisCyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities. Cyberspace allows new power policy and strategy, broadens the scope of the actors of the conflict by offering to both state and non-state new weapons, new ways of offensive and defensive operations. This book deals with the concept of "information war", covering its development over the last two decades and seeks to answer the following questions: is the control of the information space really possible remains or she a utopia? What power would confer such control, what are the benefits? Table of ContentsIntroduction ix Chapter 1. The United States 1 1.1. Information warfare in the 1990s 1 1.1.1. Points of view from security experts 1 1.1.2. US Air Force Doctrine: AFDD 2-5 (1998) 7 1.1.3. The doctrine of the Joint Chiefs of Staff committee: JP 3-13 (1998) 10 1.1.4. Components of information warfare 14 1.2. Information warfare in the 2000s 23 1.2.1. Dictionary of the Department of Defense 23 1.2.2. US Air Force: AFDD 2-5 (2005) and AFPD 10-7 (2006) 24 1.2.3. The doctrine of the Joint Chiefs of Staff committee: JP 3-13 (2006) 26 1.3. Information warfare in the 2010s 28 1.4. Important concepts and reflections 43 1.4.1. Information operations 44 1.4.2. Information superiority 51 1.4.3. The “value” of information 62 1.4.4. Information system 65 1.4.5. Command and control warfare: C2W 66 1.4.6. Effect-based operations (EBOs) 68 1.4.7. The OODA loop 69 1.4.8. RMA 70 1.4.9. C4ISR 72 1.4.10. Network centric warfare (NCW) 73 1.4.11. ISR: intelligence, surveillance, reconnaissance 74 1.4.12. Cyberwar 75 1.4.13. Netwar 89 Chapter 2. China 91 2.1. Significant publications 91 2.2. Strategic and doctrinal thinking about information warfare. Genesis 96 2.2.1. General Wang Pufeng: one of the pioneers 97 2.2.2. Wang Baocun and Li Fei 100 2.2.3. Wei Jincheng 104 2.2.4. Colonels Qiao Liang and Wang Xiangsui: unrestricted warfare 105 2.2.5. General Dai Qingmin and Wang Baocun 111 2.2.6. General Niu Li, Colonel Li Jiangzhou and Major Xu Dehui 114 2.2.7. 2004 White Paper on national defense 115 2.3. Recent policies and strategies on information and cyber security 117 2.3.1. The Science of Military Strategy 2013 118 2.3.2. Defense White Paper 2013 118 2.3.3 Sino-Russian cybersecurity agreement 2015 119 2.3.4. PLA Daily editorial on 20 May 2015 121 2.3.5. Defense White Paper of 26 May 2015 122 2.3.6. The national cybersecurity bill of July 2015 125 2.4. Reflections 125 2.4.1. The American perspective on Chinese information warfare, modernization and informatization of the PLA 125 2.4.2. Evolution of analyses and discourse about Chinese strategy 163 2.4.3. China as a “victim” 172 2.4.4. The strategy of active defense 173 Chapter 3. Russia 177 3.1. Military doctrines and national security strategies 180 3.2. Information warfare in practice 185 3.2.1. Cyber attacks against Estonia. Who is the culprit? 186 3.2.2. The Russia–Georgia conflict 194 3.2.3. Ukraine 214 3.3. Comments 220 3.3.1. Characteristics of the Russian idea of information warfare 220 3.3.2. Aggressiveness 222 3.3.3. Type of Cold War 223 3.3.4. Challenges, objectives and targets 224 3.3.5. Psychological information warfare 229 3.3.6. Players of information warfare 233 3.3.7. Hybrid warfare and information warfare 236 3.3.8. Information warfare: what is new… 240 Chapter 4. Concepts and Theories: Discussions 247 4.1. Doctrines 247 4.2. Information warfare: definitions, models 256 4.2.1. The information environment 257 4.2.2. Definitions and models for information warfare 261 4.3. Information warfare or data warfare? 281 4.3.1. Defining data 284 4.3.2. Some theories about data 289 4.3.3. Visualization 296 4.3.4. Data warfare? 306 Conclusion 325 Index 329
£122.35
ISTE Ltd and John Wiley & Sons Inc Cybercrime During the SARS-CoV-2 Pandemic:
Book SynopsisThe SARS-CoV-2 pandemic has had an undeniable impact on cybercrime. The initial crisis quickly became a global catastrophe with multiple consequences in economics, health, and political and social fields. This book explores how this global emergency has influenced cybercrime. Indeed, since feeding off new vulnerabilities, thanks to the effects of the pandemic crisis in various states around the world, cybercrime has increased and evolved.In 2020, the world was already dealing with numerous tensions and the effects of the global crisis have therefore only tended to exacerbate the issues that relate to cybercrime. For example, radicalization and identity theft has found an environment in which they thrive: the Internet. Criminals have been able to adapt their modus operandi, their targets and their attack vectors. However, on the plus side, the response of law enforcement and public authorities, in terms of the legal, policing and policy side of cybercrime, has also been adapted in order to better combat the increase in this phenomenon.Table of ContentsIntroduction ixDaniel VENTRE and Hugo LOISEAU Chapter 1 The Evolution of Cybercrime During the Covid-19 Crisis 1Daniel VENTRE 1.1 Introduction 1 1.2 Observing the evolution of cybercrime 4 1.2.1 Leveraging annual data: the case of India 8 1.2.2 Leveraging monthly data 11 1.2.3 Leveraging weekly data: the case of China 21 1.3 Has the global geography of cyberattacks changed? 29 1.4 Conclusion 34 1.5 Appendix 39 1.5.1 Cybercrime tools: malware 39 1.5.2 CVSS as indicators of vulnerability levels 40 1.5.3 Heterogeneity and complexity of cybercrime typologies 41 1.5.4 Attitude of companies toward cyber risks: the case of the United Kingdom 46 1.6 References 47 Chapter 2 The SARS-CoV-2 Pandemic Crisis and the Evolution of Cybercrime in the United States and Canada 49Hugo LOISEAU 2.1 Introduction 49 2.2 The impacts of the SARS-CoV-2 pandemic 50 2.3 Cybercrime and SARS-CoV-2 52 2.3.1 Targets and victims 53 2.3.2 Malicious actors 57 2.3.3 Cyberspace: a propitious environment for cybercrime 58 2.4. The evolution of cybercrime in North America during the pandemic 61 2.4.1 The United States 62 2.4.2 Canada 67 2.5 Discussion 69 2.6 Conclusion 72 2.7 Acknowledgments 74 2.8 References 74 Chapter 3 Online Radicalization as Cybercrime: American Militancy During Covid-19 81Joseph FITSANAKIS and Alexa MCMICHAEL 3.1 Introduction 81 3.2 A new typology of cybercrime 83 3.3 Internet connectivity and violent militancy 85 3.4 The pre-pandemic domestic threat landscape 87 3.5 The domestic threat landscape of the pandemic 88 3.6 Pandemic accelerationism 91 3.7 From virtual to real-life criminality 93 3.8 Online radicalization during Covid-19 94 3.9 A new methodological paradigm for online radicalization? 98 3.10 Conclusion: meta-radicalization as cybercrime 100 3.11 References 102 Chapter 4 Cybercrime in Brazil After the Covid-19 Global Crisis: An Assessment of the Policies Concerning International Cooperation for Investigations and Prosecutions 109Alexandre VERONESE and Bruno CALABRICH 4.1 Introduction: Brazilian cybercrime and the Covid crisis impact 109 4.2 Cybercrime in the literature and the Brazilian case 112 4.3 A theoretical model for international cooperation 115 4.4 The evolution of cybercrime in Brazil 119 4.5 The evolution of the Brazilian legal system concerning cybercrime and its connection to the international regime 126 4.6 Managing international cooperation without having the best tools 133 4.7 Difficulties with cooperation: joints, mortises, and notches 137 4.8 Conclusion: what to expect from the future? 140 4.9 References 142 4.10 Appendix: List of interviews and questions 147 Chapter 5 Has Covid-19 Changed Fear and Victimization of Online Identity Theft in Portugal? 149Inês GUEDES, Joana MARTINS, Samuel MOREIRA and Carla CARDOSO 5.1 Introduction 149 5.2 The impact of the Covid-19 pandemic on cybercrime 150 5.3 Evolution of cybercrime in Portugal 153 5.4 Online identity theft (OIT) 155 5.4.1 Definition and modus operandi 155 5.4.2 RAT applied to cyberspace 156 5.4.3 Individual variables and OIT victimization 159 5.5 Fear of (online) crime 160 5.5.1 Determinants of fear of (online) crime 160 5.6 The present study 162 5.6.1 Measures 163 5.6.2 Results 165 5.6.3 Variables associated with online victimization and fear of identity theft 169 5.7 Conclusion 170 5.8 References 171 Chapter 6 A South African Perspective on Cybercrime During the Pandemic 177Brett VAN NIEKERK, Trishana RAMLUCKAN and Anna COLLARD 6.1 Introduction 177 6.1.1 Background to South Africa and the pandemic 178 6.1.2 Methodology 179 6.2 International rankings 180 6.3 Cybercrime and related legislation 183 6.4 Cybersecurity incidents 186 6.4.1 Ransomware 186 6.4.2 Scams and fraud 188 6.4.3 System intrusions and data breaches 190 6.4.4 Disinformation and malicious communications 192 6.4.5 Other 196 6.5 Discussion 197 6.6 Conclusion 199 6.7 References 199 List of Authors 211 Index 213
£118.80
ISTE Ltd and John Wiley & Sons Inc Electronic Communication Interception
Book SynopsisIn cyberspace, data flows transit massively and freely on a planetary scale. The generalization of encryption, made necessary by the need to protect these exchanges, has resulted in states and their intelligence services forgoing listening and interception missions. The latter have had to find ways to break or circumvent this protection. This book analyzes the evolution of the means of communication and interception, as well as their implementation since the advent of the telegraph in the 19th century. It presents this sensitive subject from a technical, historical and political perspective, and answers several questions: who are the actors of interception? Who has produced the recent technologies? How are the markets for interception means organized? Are the means of protecting communications infallible? Or what forms of power do interceptions confer?Table of ContentsIntroduction ix Chapter 1 History and Repertoire of Communication Interception Practices 1 1.1 Military interceptions during the war 7 1.1.1 The interception of telegraphic communications 7 1.1.2 The interception of radio communications 13 1.1.3 Telephone interception 16 1.1.4 The use of SIGINT capabilities 18 1.1.5 Wartime interceptions in cyberspace 21 1.1.6 Drones and interceptions 23 1.2 The interception of international communications: espionage, surveillance, war 23 1.2.1 The interception of telegrams 23 1.2.2 Espionage during the Cold War: satellite, radio, telephone interceptions 24 1.2.3 The interception of international communications: the Echelon program 25 1.2.4 Bulk cyber surveillance 27 1.2.5 Foreign companies in national telecommunication infrastructures 28 1.2.6 Actions over undersea Internet cables 29 1.2.7 Interceptions in planes and airports 30 1.2.8 International interceptions as a product of secret alliances 30 1.3 Interception of diplomatic correspondence 31 1.4 Political surveillance: targeted and bulk interceptions 33 1.4.1 Interception of correspondence 33 1.4.2 Bulk domestic surveillance in East Germany 36 1.4.3 Cyber surveillance in Russia: the SORM system 36 1.4.4 Fixed and mobile telephone tapping 37 1.4.5 The interception of electronic communications in the political sphere 40 1.5 Criminal interceptions 42 1.6 Police, justice: the fight against crime, lawful interceptions 44 1.7 On the usefulness and effectiveness of interceptions 45 Chapter 2 The Central Issue of Encryption 55 2.1 The capabilities required for interceptions 55 2.1.1 Material, technological capabilities 56 2.1.2 Human resources 79 2.2 Protecting yourself against the threat of interceptions: encryption 87 2.2.1 The public key revolution 88 2.2.2 Advances in factorization 89 2.2.3 Shor’s quantum algorithm 91 2.2.4 The evolution of computing capabilities 93 2.2.5 The evolution of etching precision 94 2.3 Attacking encrypted communications, circumventing the hurdle of encryption 94 2.3.1 Interceptions on encrypted messaging 95 2.3.2 The attacks against keys and PKIs 104 2.3.3 The use of backdoors 108 Chapter 3 Power Struggles 131 3.1 State pressure on the industry: cooperation or coercion logics? 131 3.2 The accounts of whistleblowers and their analyses of the balance of power between the state, the citizen and companies 136 3.2.1 The account of Herbert O Yardley 136 3.2.2 The account of Perry Fellwock (also known as Winslow Peck) 137 3.2.3 The account of Mark Klein 138 3.2.4 The account of James Bamford 142 3.2.5 The account of Babak Pasdar 145 3.2.6 The account of Joseph Nacchio 146 3.2.7 The account of Edward Snowden 146 3.2.8 The account of Julian Assange 148 3.3 Limits imposed on the state’s power to control technology 149 3.3.1 The difficult and fragile international regulation of technologies 149 3.3.2 Illicit markets and the circumvention of laws 154 3.4 Trust 162 3.4.1 How much confidence in encryption? 163 3.4.2 The acceleration of calculations as a factor of confidence 164 3.4.3 Abandoning secret methods 165 3.4.4 Provable security 167 3.4.5 The worlds of Impagliazzo 169 3.4.6 The contribution of quantum computing 172 3.5 Conclusion 173 3.5.1 Technologies 173 3.5.2 Actors 174 3.5.3 Interactions or relationships 175 Appendices 179 References 201 Index 217
£118.80
ISTE Ltd and John Wiley & Sons Inc Cybersecurity in Humanities and Social Sciences:
Book SynopsisThe humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies, polemology. There is, however, no actual cybersecurity studies. After two decades of scientific production on this subject, we thought it essential to take stock of the research methods that could be mobilized, imagined and invented by the researchers. The research methodology on the subject "cybersecurity" has, paradoxically, been the subject of relatively few publications to date. This dimension is essential. It is the initial phase by which any researcher, seasoned or young doctoral student, must pass, to define his subject of study, delimit the contours, ask the research questions, and choose the methods of treatment. It is this methodological dimension that our book proposes to treat. The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity? How are the research topics chosen, the questions defined? How, concretely, to study cybersecurity: tools, methods, theories, organization of research, research fields, data ...? How are discipline-specific theories useful for understanding and studying cybersecurity? Has cybersecurity had an impact on scientific theories?Table of ContentsIntroduction ixDaniel VENTRE, Hugo LOISEAU and Hartmut ADEN Chapter 1 The “Science” of Cybersecurity in the Human and Social Sciences: Issues and Reflections 1Hugo LOISEAU 1.1 Introduction 1 1.2 A method? 4 1.3 Data? 11 1.4 One or more definition(s)? 16 1.5 Conclusion 20 1.6 References 21 Chapter 2 Definitions, Typologies, Taxonomies and Ontologies of Cybersecurity 25Daniel VENTRE 2.1 Introduction 25 2.2 Definition 27 2.2.1 What is a definition? 27 2.2.2 Usefulness of definitions 29 2.2.3 Rules for constructing definitions 29 2.2.4 Definitions of cybersecurity 32 2.3 Typology 43 2.3.1 What is a typology? 44 2.3.2 Usefulness of typologies 44 2.3.3 Rules for the construction of typologies 45 2.3.4 Cybersecurity typologies 46 2.4 Taxonomy 48 2.4.1 What is a taxonomy? 48 2.4.2 Usefulness of taxonomy 49 2.4.3 Rules for the construction of taxonomies 49 2.4.4 Taxonomies of cybersecurity 50 2.5 Ontologies 51 2.5.1 What is ontology? 52 2.5.2 Usefulness of ontologies 53 2.5.3 Rules for construction of ontologies 53 2.5.4 Cybersecurity ontologies 54 2.6 Conclusion 56 2.7 References 57 Chapter 3 Cybersecurity and Data Protection – Research Strategies and Limitations in a Legal and Public Policy Perspective 67Hartmut ADEN 3.1 Introduction 67 3.2 Studying the complex relationship between cybersecurity and data protection: endangering privacy by combating cybercrime? 68 3.2.1 Potential tensions between cybersecurity and data protection 69 3.2.2 Potential synergies between cybersecurity and data protection 72 3.3 Methodological approaches and challenges for the study of cybersecurity – legal and public policy perspectives 74 3.3.1 Legal interpretation and comparison as methodological approaches to the study of cybersecurity 74 3.3.2 Public policy approaches to the study of cybersecurity 77 3.3.3 Transdisciplinary synergies between legal and public policy perspectives 78 3.4 Conclusion and outlook 80 3.5 References 81 Chapter 4 Researching State-sponsored Cyber-espionage 85Joseph FITSANAKIS 4.1 Defining cybersecurity and cyber-espionage 85 4.2 Taxonomies of cyber-threats 87 4.3 The structure of this chapter 88 4.4 The significance of state-sponsored cyber-espionage 90 4.5 Research themes in state-sponsored cyber-espionage 94 4.6 Theorizing state-sponsored cyber-espionage in the social sciences 98 4.7 Research methodologies into state-sponsored cyber-espionage 104 4.8 Intellectual precision and objectivity in state-sponsored cyber-espionage research 106 4.9 Detecting state actors in cyber-espionage research 110 4.10 Identifying specific state actors in cyber-espionage research 112 4.11 Conclusion: researching a transformational subject 116 4.12 References 118 Chapter 5 Moving from Uncertainty to Risk: The Case of Cyber Risk 123Michel DACOROGNA and Marie KRATZ 5.1 Introduction 123 5.2 The scientific approach to move from uncertainty to risk 124 5.3 Learning about the data: the exploratory phase 126 5.4 Data cleansing 128 5.5 Statistical exploration on the various variables of the dataset 130 5.6 Univariate modeling for the relevant variables 134 5.7 Multivariate and dynamic modeling 139 5.7.1 A fast-changing environment: time dependency 140 5.7.2 Causal relations 143 5.7.3 Models for prediction 147 5.8 Conclusion 149 5.9 Acknowledgments 151 5.10 References 151 Chapter 6 Qualitative Document Analysis for Cybersecurity and Information Warfare Research 153Brett VAN NIEKERK and Trishana RAMLUCKAN 6.1 Introduction 153 6.1.1 Previous research 154 6.2 Information warfare and cybersecurity 154 6.3 Researching information warfare and cybersecurity 156 6.4 Qualitative research methodologies for information warfare and cybersecurity 157 6.4.1 Clustering of documents 159 6.4.2 Clustering of words 159 6.4.3 Word frequencies and word clouds 159 6.4.4 Text search and word trees 159 6.4.5 Example use cases of qualitative document analysis 160 6.5 An analysis of national cybersecurity strategies 161 6.5.1 Selection process for the documents 161 6.5.2 Analysis 162 6.5.3 Discussion 167 6.6 An analysis of the alignment of South Africa’s Cybercrimes Bill to international legislation 169 6.6.1 Background to the documents 169 6.6.2 Analysis 170 6.6.3 Discussion 174 6.7 An analysis of the influence of classical military philosophy on seminal information warfare texts 176 6.8 Reflections on qualitative document analysis for information warfare and cybersecurity research 177 6.9 Conclusion 179 6.10 References 180 Chapter 7 Anti-feminist Cyber-violence as a Risk Factor: Analysis of Cybersecurity Issues for Feminist Activists in France 185Elena WALDISPUEHL 7.1 Introduction 185 7.2 Localization of an online field 187 7.2.1 Online ethnographic work and empathy 192 7.2.2 Cybersecurity issues of an online field 193 7.3 Online–offline continuum 194 7.4 Continuum between security and insecurity 199 7.5 Conclusion 204 7.6 References 205 List of Authors 211 Index 213
£125.06
ISTE Editions Ltd Ã000volutions Du Cybercrime Durant La PandãcMie
Book Synopsis
£74.10
Hermes Science Publishing Ltd Intelligence artificielle, cybersécurité et
Book Synopsis
£85.50
ISTE Editions Ltd Interceptions des communications électroniques:
Book Synopsis
£98.80
Hermes Science Publishing Ltd La cybersécurité en sciences humaines et
Book Synopsis
£67.45