Cyber Conflict Research Papers - Academia.edu (original) (raw)
2025, SSRN Electronic Journal
Cyberwarfare now poses an existential threat to national security, with adversaries exploiting digital systems to disrupt economies and undermine democratic institutions. This article analyzes the strategic gap in the United States' cyber... more
Cyberwarfare now poses an existential threat to national security, with adversaries exploiting digital systems to disrupt economies and undermine democratic institutions. This article analyzes the strategic gap in the United States' cyber defense posture and proposes a bold solution: the creation of a Cyber Defense Reserve Corps. Modeled after the National Guard, this force would mobilize private-sector cybersecurity talent to respond to national-level cyber emergencies. The paper synthesizes current federal pilot programs, historical precedents, and geopolitical threat trends to argue for an urgent shift from reactive policies to proactive resilience. The framework presented is both timely and implementable, aligning national talent with national defense priorities.
2025, SSRN Electronic Journal
Cyberwarfare now poses an existential threat to national security, with adversaries exploiting digital systems to disrupt economies and undermine democratic institutions. This article analyzes the strategic gap in the United States' cyber... more
Cyberwarfare now poses an existential threat to national security, with adversaries exploiting digital systems to disrupt economies and undermine democratic institutions. This article analyzes the strategic gap in the United States' cyber defense posture and proposes a bold solution: the creation of a Cyber Defense Reserve Corps. Modeled after the National Guard, this force would mobilize private-sector cybersecurity talent to respond to national-level cyber emergencies. The paper synthesizes current federal pilot programs, historical precedents, and geopolitical threat trends to argue for an urgent shift from reactive policies to proactive resilience. The framework presented is both timely and implementable, aligning national talent with national defense priorities.
2025, Hasan Kalyoncu University
The emergence of the cyber domain and social media platforms has revolutionized the socio-political landscape, especially in the Middle East and the Arab countries. It provided a platform for dissent, advocacy, and communication amidst... more
The emergence of the cyber domain and social media platforms has revolutionized the socio-political landscape, especially in the Middle East and the Arab countries. It provided a platform for dissent, advocacy, and communication amidst protracted conflicts with authoritarian regimes and silencing voices of people. Cyber-activism has become a powerful tool for grassroots movements to reach a broader audience, mobilize support, and effect change. However, it faces challenges such as misinformation, censorship, and counter-activism. This research examines the role of cyber-activism in the Syrian context, focusing on its evolution, impact, challenges, and potential implications for future social movements. It also demystifies the trajectory of cyber-activism in Syria and helps to understand the circumstances surrounding the outcomes of cyber activists. The study employs a qualitative approach, integrating data gathered from professional reports, interviews with Syrian cyber-activists and cyber experts, and a scholarly literature review. The research delves into how online platforms have facilitated the mobilization, coordination, and dissemination of information among Syrian activists. Additionally, it investigates the challenges and risks cyber-activists face, including surveillance, censorship, security concerns, and cyberattacks. Also, this study explains the dynamics of cyber-activism within a heavily monitored and state-governed domain. The findings highlight the multifaceted nature of cyber-activism in Syria and its impact on shaping narratives, fostering solidarity, impacting the authoritarian regime, and influencing international perceptions. Ultimately, this study contributes to a more profound understanding of the complex dynamics of cyber-activism within the Syrian context. It sheds light on the transformative potential of digital platforms in amplifying voices, shaping narratives, fostering solidarity, and advocating for change in repressive environments.
2025
Various critical infrastructure are vulnerable to cyber-attack from state and non-state actors. These infrastructures include electrical power grid, water, and transportation and communication network system. Protecting these systems from... more
Various critical infrastructure are vulnerable to cyber-attack from state and non-state actors. These infrastructures include electrical power grid, water, and transportation and communication network system. Protecting these systems from cyber-attack is vital for the security of nation. The authors intend to highlight various ways we can prepare for cyber war by using national policy such as cyber war doctrine (CWD). 1. LITERATURE REVIEW Cyberspace is the notional environment in which communication over computer networks occurs. Before there was a rapidly expanding system of networks, collectively known as the internet, links millions of people together in new spaces that are changing the way we think, the nature of our sexuality the form of our communities and our very identities. As stated by (Sherry Turkle,1999) cyberspace change our way of living by living in another world which is virtual world [1]. Cyberspace is somehow the one that improve the lifestyle like stated by (Greg ...
2025, UP Center for Integrative and Development Studies SSP Discussion Paper
This paper draws on the literature on cyber strategy and policy and analyzes the factors that constrain the development of a cyber force in the Philippines. While other states are preparing to deploy its cyber forces, the Philippines is... more
This paper draws on the literature on cyber strategy and policy and analyzes the factors that constrain the development of a cyber force in the Philippines. While other states are preparing to deploy its cyber forces, the Philippines is still trying to make sense of how cyber power can be employed strategically to shape its diplomatic and military interactions. The increasing number of cyber intrusions against government agencies in the past three years has intensified discussions about creating a cyber force; however, a confluence of factors has impeded progress in the military’s attempt to build a cyber force (Crismundo 2023; Rosales 2023; Domingo 2024). In this context, this paper explores the prospects of developing a cyber force from a strategic perspective. It argues that the military’s struggle to build a cyber force is influenced by three internal factors: limited appreciation of cyber power, bureaucratic politics, and insular nature of Philippine strategic culture. The paper explores this argument by drawing on recently published government documents, existing work on the sources of military strategy in the Philippines as well as the emerging academic literature on military operations in cyberspace.
2025, AABHATH Review
The risk of cyberattacks in Armed Conflict has proven the evolving role of cyber operations in present day war inside the framework of international regulation. It delineates cyber assaults as planned movements geared toward compromising... more
The risk of cyberattacks in Armed Conflict has proven the evolving role of cyber operations in present day war inside the framework of international regulation. It delineates cyber assaults as planned movements geared toward compromising digital structures or data integrity, highlighting their strategic importance in achieving military targets with minimum bodily pressure. For that we attempt to examine the criminal situations, such as attribution and the software of international humanitarian law concepts like distinction and proportionality to cyber operations, and talk also the emerging norms and suggestions for regulating cyber war, emphasizing the want for enhanced global international and legal frameworks to mitigate risks and guard civilian infrastructure. Ultimately, we try to propose for a balanced approach that integrates technological advancements with moral and legal concerns to explore the evolving landscape of cyber struggle responsibly.
2025, Memorial del Ejército de Chile
Ensayo sobre el proceder de la diplomacia y decisiones políticas en una crisis internacional. El ejemplo de la Operación Fénix (Colombia/Ecuador).
2025, ORF Occasional Paper
As the Indian Army (IA) integrates new and emerging technologies, it will also need technical specialists for innovation and their effective application in peacetime and wartime. This analysis makes the case that the IA can create a... more
As the Indian Army (IA) integrates new and emerging technologies, it will
also need technical specialists for innovation and their effective application in peacetime and wartime. This analysis makes the case that the IA can create a technical reserve drawn from the Technical Entry Scheme (TES), Territorial Army (TA) and its Reserves, which can be merged to perform the missions and tasks of the IA. Any prospective technical reserve force that emerges must merge some of the functions and conditions of service of the TA and Reserves. Relaxing some of the conditions of service can also allow for combining the expertise of an older and a younger cohort of technologists. Drawing technologists from the commercial and civilian sector for service under the technical reserve force will enhance mission effectiveness and augment innovation during wartime and peacetime. Technical reservists may be part-time soldiers, but they bring value to the IA.
2025, Coleção Meira Mattos
¿Qué lecciones puede extraer el Ejército Brasileño del conflicto entre Rusia y Ucrania en materia de ciberdefensa ante ataques contra infraestructuras críticas? Con la evolución del uso del ciberespacio, se ha... more
¿Qué lecciones puede extraer el Ejército Brasileño del conflicto entre Rusia y Ucrania en materia de ciberdefensa ante ataques contra infraestructuras críticas? Con la evolución del uso del ciberespacio, se ha producido un aumento significativo de los ataques para afectar las infraestructuras críticas de un Estado. El objetivo de este trabajo es analizar qué lecciones puede extraer el Ejército Brasileño de los ataques rusos a infraestructuras críticas ucranianas. Así, por medio de una metodología exploratoria, el texto se centra en comprender cuáles fueron los antecedentes del conflicto, qué acciones está tomando Rusia para afectar a Ucrania y la manera en que las acciones en el teatro de operaciones pueden relacionarse con la estrategia nacional de ciberseguridad de Brasil. Por lo tanto, este texto señala los cambios en la estrategia rusa relacionados con el uso y la adaptación de los ciberataques a las infraestructuras críticas, abordando las posibles lecciones que el Ejército Brasileño puede extraer.
2025
This article argues that security studies have evolved from the primary concern about states and how to prevent them from military attacks to its current diversity in which environmental, economic, human, etc., stand alongside military... more
This article argues that security studies have evolved from the primary concern about states and how to prevent them from military attacks to its current diversity in which environmental, economic, human, etc., stand alongside military security. It begins by reviewing the traditional view of security before arguing that the security agenda has been broadened and deepened since the 1980s. 1 It becomes broader in that it includes not only military but also non-military security. It is deeper in that it moves down to look at individuals and groups within the state rather than the exclusive focus on the state. The article examines two influential perspectives labeled Critical Security Studies and Human Security which have made a considerable contribution to the development of the non-traditional security literature. Thus, the security agenda has embraced them as 'alternative approaches' to security. 2 Next, it provides China as empirical evidence to back up the assertion that se...
2025, El nuevo arte de la guerra
Este ensayo explora cómo la guerra ha evolucionado desde el enfrentamiento físico tradicional hacia un conflicto multifacético que abarca el ciberespacio, la manipulación de la información y el uso de tecnologías avanzadas como la... more
Este ensayo explora cómo la guerra ha evolucionado desde el enfrentamiento físico tradicional hacia un conflicto multifacético que abarca el ciberespacio, la manipulación de la información y el uso de tecnologías avanzadas como la inteligencia artificial y los sistemas autónomos. Inspirado en el legado de Clausewitz, pero adaptado a las dinámicas del siglo XXI, se analiza cómo los ciberataques, las narrativas mediáticas y la guerra psicológica redefinen las relaciones de poder y la soberanía estatal. El texto examina ejemplos contemporáneos, como los ataques cibernéticos de Rusia y China, y el uso de drones y algoritmos en estrategias militares, destacando cómo estas innovaciones alteran el equilibrio de poder global. Además, se aborda el rol de las noticias falsas y las redes sociales como armas estratégicas en un mundo interconectado. Este tratado busca contribuir al entendimiento de la guerra moderna como un fenómeno complejo donde las máquinas, los datos y las percepciones humanas se convierten en los campos de batalla más cruciales.
2025, Book chapter in Brian C. H. Fong, Chong Ja Ian (eds.). The Routledge Handbook of Great Power Competition. Milton, Abingdon: Routledge
Cyberspace has evolved into a domain for hostile action, thereby amplifying the intensity of great power competition in the twenty-first century. While cyberspace was not intended to be a warfighting domain, great powers such as the... more
Cyberspace has evolved into a domain for hostile action, thereby amplifying the intensity of great power competition in the twenty-first century. While cyberspace was not intended to be a warfighting domain, great powers such as the People’s Republic of China (China), the Russian Federation (Russia), and the United States of America (USA) have created strategies and developed capabilities with the objective of harnessing the strategic advantages of cyber power. This chapter contributes to the existing literature on great power competition by exploring the historical context and dynamics of strategic competition in cyberspace. The author argues that cyberspace has become a prominent domain for strategic competition because it has expanded the opportunities for great powers to advance their national interests. The chapter first traces the history of great power competition in cyberspace in the twenty-first century and then examines the contemporary dynamics of this competition by looking into the strategies that states use for strategic competition. The last section discusses the implications of great power competition in cyberspace.
2024, Cayón Peña, Juan (editor). Security and Defense: Ethical and Legal Challenges in the Face of Current Conflicts.
During the second decade of current century, cybersecurity was consolidated as a priority issue of international security. With this framework, our objective is to identify and explain ten cyberattacks and cyberattacks that occurred in... more
During the second decade of current century, cybersecurity was consolidated as a priority issue of international security. With this framework, our objective is to identify and explain ten cyberattacks and
cyberattacks that occurred in the aforementioned period. Through our analysis, we will highlight the heterogeneity of the cybersecurity field, not only in terms of the form of those incidents and attacks, but also the identity of their perpetrators. At the end of the paper, we will highlight the lack of norms and agreements on the international system, to deal with threats and risk from the fifth domain.
2024
for serving on my Supervisory Committee and giving advice over the last year. Thanks is also given to Dr. Ross Burkhart who I've known from the very beginning of my collegiate career and who encouraged me to pursue my master's degree. I... more
for serving on my Supervisory Committee and giving advice over the last year. Thanks is also given to Dr. Ross Burkhart who I've known from the very beginning of my collegiate career and who encouraged me to pursue my master's degree. I would also like to acknowledge my fellow students in my cohort: Anna, Evan, Sally, and Tyler. It was a whirlwind of a year and I'm glad to have gone through this journey with you all. To my family, friends, and roommates, you all gave me so much unconditional support and love when I needed it. And to the Almighty, I thank Him for the blessings He has bestowed upon my life.
2024, ASIA-PACIFIC JOURNAL OF PUBLIC POLICY
Vietnam is a key player in the ASEAN digital economy, focusing on digital integration and collaboration. The ASEAN Digital Integration Framework Action Plan 2019-2025 and the ASEAN Digital Masterplan 2025 outline... more
Vietnam is a key player in the ASEAN digital economy,
focusing on digital integration and collaboration. The ASEAN
Digital Integration Framework Action Plan 2019-2025 and
the ASEAN Digital Masterplan 2025 outline the policy
landscape for digital integration. ASEAN member states have
signed agreements and memorandums of understanding to
foster cooperation in the digital economy. However,
challenges such as skill gaps, cyber security, and regulatory
gaps need to be addressed. The Digital Economy Partnership
Agreement (DEPA) is seen as a key venue for increasing
cooperation and consistency of digital trade rules in the Asia-
Pacific region. ASEAN has been actively involved in global
and regional discussions on cybersecurity, aiming to galvanize
regional states into collective action against malicious cyber
activities. The 20th Asian Economic Community council
adopted the Bandar Seri Begawan Roadmap (BSBR) to
accelerate ASEAN's economic recovery and digital economy
integration in October 2021. This article also applies a
qualitative method with secondary data. Modular Digital
Economy Agreements (DEA) may be an appropriate model for
facilitating digital trade alignment with international trading
partners.
2024, Memorias de la Décima Conferencia Nacional de Computación, Informática y Sistemas / CoNCISa 2024
Los sistemas tecnológicos críticos del ciberespacio soportan servicios y operaciones que inciden agudamente en el funcionamiento regular de nuestras sociedades modernas. Además, desde décadas atrás su buena operatividad está en la mira de... more
Los sistemas tecnológicos críticos del ciberespacio soportan servicios y operaciones que inciden agudamente en el funcionamiento regular de nuestras sociedades modernas. Además, desde décadas atrás su buena operatividad está en la mira de los conflictos políticos y bélicos de hoy. En consecuencia, su defensa resulta primordial y demanda una elaboración de un diseño robusto, privilegiando el rol de la ingeniería de seguridad en conjunto con el de la ingeniería de software. Las arquitecturas de sistemas que se defienden por sí mismas, son una aproximación alterna al esquema tradicional de asegurar el sistema conforme a la identificación y tratamiento de los servicios de seguridad. Este trabajo expone un conjunto de pautas organizadas, para guiar la construcción de un diseño de arquitecturas críticas con capacidad de defensa, que use el paradigma de Fitch y Muckin y deje espacio para aplicar variaciones en la implementación y ejecución del mismo.
2024, International Journal of Emerging Multidisciplinaries: Social Science
This research examines the implications of cyber warfare on international arms control, particularly in light of the SolarWinds hack, a pivotal event explaining the vulnerabilities in our increasingly digital world. Dependency on... more
This research examines the implications of cyber warfare on international arms control, particularly in light of the SolarWinds hack, a pivotal event explaining the vulnerabilities in our increasingly digital world. Dependency on cyberspace has rendered states susceptible to emerging threats, while existing arms control treaties, relics of the Cold War, have failed to adapt to contemporary realities. Employing an ex post facto research design, this study utilizes secondary data analysed through content analysis, grounded in Realism theory as the analytical framework. The findings reveal the multifaceted challenges posed by cyber warfare, including issues of attribution, pervasive mistrust among nation-states, economic repercussions, attacks on critical infrastructure, and intensified international rivalries. The SolarWinds hack serves as a case study that underscores the urgent need for modernizing arms control regimes to address these new dynamics. The study concludes that without proactive adaptations in international security frameworks, the risks associated with cyber warfare will continue to escalate, jeopardizing global stability and undermining cooperative efforts to ensure a secure future. This research calls for a reevaluation of arms control in the context of cyber threats, emphasizing the necessity for innovative strategies to enhance resilience and promote trust among states.
2024, Sada-e-jauhar 2023-2024
2024
Esta obra representa uma reflexao conjunta materializada por pesquisadores do Ipea e do Exercito com o intuito de pensar e debater a Forca Terrestre do pais. O livro sustenta-se em uma questao fundamental: quais os desafios impostos ao... more
Esta obra representa uma reflexao conjunta materializada por pesquisadores do Ipea e do Exercito com o intuito de pensar e debater a Forca Terrestre do pais. O livro sustenta-se em uma questao fundamental: quais os desafios impostos ao Exercito Brasileiro pelas politicas publicas voltadas para a defesa no contexto atual de uma sociedade democratica e globalmente integrada? Essa pergunta central subdivide-se em quatro ordens de questoes que orientaram a estruturacao desse compendio de estudos. A primeira esta implicita na concepcao da obra: a nocao de que, em uma sociedade democratica, a defesa e uma politica publica que rege a organizacao, o preparo e o emprego das Forcas Armadas, dentre elas o Exercito. Desse modo, tratar do tema nao e exclusividade castrense. Ao contrario, a questao demanda envolvimento amplo de civis e militares tanto em suas etapas de concepcao quanto de implementacao.
2024, Sensitive Issues
This study explores and compares sensitive issues in China and the United States, focusing on core areas of societal, political, and cultural tension. It highlights how each country's governmental responses shape domestic policies, civil... more
This study explores and compares sensitive issues in China and the United States, focusing on core areas of societal, political, and cultural tension. It highlights how each country's governmental responses shape domestic policies, civil liberties, and international relations. Key topics examined include political sensitivities such as Taiwan independence, Hong Kong protests, and human rights issues in Xinjiang, as well as economic sensitivities like wealth inequality and social welfare. In the U.S., sensitive topics include gun control, abortion rights, immigration, racial tensions, and LGBTQ+ rights. The research further analyzes government responses to these issues, the role of public discourse and media treatment, and the impact on civil liberties and international perception. By juxtaposing the authoritarian approach of China with the democratic framework of the U.S., this study provides insights into the broader implications of managing sensitive issues on political stability, civil liberties, and global image. It concludes by suggesting future research directions to investigate the evolving sensitivities influenced by globalization, digital media, and generational shifts.
2024, Migration letters
The emergence of this unusual occurrence necessitated the intervention of international law, which looked for to regulate it through the prohibition or discouragement of its employment through force, as expressed in Article 4/2 of the... more
The emergence of this unusual occurrence necessitated the intervention of international law, which looked for to regulate it through the prohibition or discouragement of its employment through force, as expressed in Article 4/2 of the United Nations Charter, Additionally, international law aimed to govern the permissible usage of technology in the civil and military fields. This action was undertaken as a reaction to the recent increase in cyberattacks and the growing reliance in all fields This paper aims to analyse the legal criteria surrounding the classification of cyberattacks as acts of military aggression, specifically focusing on the circumstances requiring the use of the right to justified defence against governments and other powerful bodies.
2024
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and... more
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number.
2024, Intelligent System for Measurement and Appreciate a Country Power, Capabilities
The paper aims to shed light the would illustrate how much Iran has developed and promoted its cyber-war capabilities. The study has reached numerous findings, most notably the fact that soon after the provision of Internet in the capital... more
The paper aims to shed light the would illustrate how much Iran has developed and promoted its cyber-war capabilities. The study has reached numerous findings, most notably the fact that soon after the provision of Internet in the capital Tehran in 1995, major Iranian universities started to play a key role in launching the nation's cyber security policy; teaching computer science students the basics of hacking, cyber security, and information security, which stimulated the Iranian National Security Council to form various Iranian institutions and external electronic agencies to act as Iranian offensive arms. Although Iran's cyber capabilities are weaker than those of Russia and China, it has become clear that Iran is an emerging cyber power that poses a real major threat to the United States and its allies. Iran's cyber-attacks primarily targeted Saudi Arabia, then they moved to Israel, and after that to the United States, Britain, Canada, and other Western countries. Later, Iran was subjected to fierce cyber-attacks by the United States and its allies, estimated at about 33 million attacks in 2019 alone. However, due to conflict of wills between Iran and the United States of America in the Persian Gulf and the Strait of Hormuz on the one hand, and between Iran and Israel on the other-on many regional files, most notably Iranian support for groups Israel classifies as terrorist organizations-the study suggests that cyber warfare is most likely to escalate between these parties within the coming period, in light of the low strategic costs of such confrontations.
2024
The paper aims to shed light the would illustrate how much Iran has developed and promoted its cyber-war capabilities. The study has reached numerous findings, most notably the fact that soon after the provision of Internet in the capital... more
The paper aims to shed light the would illustrate how much Iran has developed and promoted its cyber-war capabilities. The study has reached numerous findings, most notably the fact that soon after the provision of Internet in the capital Tehran in 1995, major Iranian universities started to play a key role in launching the nation's cyber security policy; teaching computer science students the basics of hacking, cyber security, and information security, which stimulated the Iranian National Security Council to form various Iranian institutions and external electronic agencies to act as Iranian offensive arms. Although Iran's cyber capabilities are weaker than those of Russia and China, it has become clear that Iran is an emerging cyber power that poses a real major threat to the United States and its allies. Iran's cyber-attacks primarily targeted Saudi Arabia, then they moved to Israel, and after that to the United States, Britain, Canada, and other Western countries. Later, Iran was subjected to fierce cyber-attacks by the United States and its allies, estimated at about 33 million attacks in 2019 alone. However, due to conflict of wills between Iran and the United States of America in the Persian Gulf and the Strait of Hormuz on the one hand, and between Iran and Israel on the other-on many regional files, most notably Iranian support for groups Israel classifies as terrorist organizations-the study suggests that cyber warfare is most likely to escalate between these parties within the coming period, in light of the low strategic costs of such confrontations.
2024, Revista General de Marina
En "La adaptabilidad impuesta por la evolución de los conflictos se explora cómo la naturaleza cambiante de los conflictos contemporáneos obliga a las fuerzas armadas y a las organizaciones de seguridad a adaptarse rápidamente. Morales... more
En "La adaptabilidad impuesta por la evolución de los conflictos se explora cómo la naturaleza cambiante de los conflictos contemporáneos obliga a las fuerzas armadas y a las organizaciones de seguridad a adaptarse rápidamente. Morales destaca la transición de enfrentamientos convencionales a conflictos asimétricos y la creciente importancia de la tecnología y la ciberseguridad. También se aborda la necesidad de formación continua y la implementación de estrategias flexibles para enfrentar amenazas multidimensionales. Finalmente, se enfatiza la colaboración internacional y la inteligencia compartida como elementos cruciales para anticipar y mitigar riesgos emergentes.
2024, JOURNAL OF HIGH-FREQUENCY COMMUNICATION TECHNOLOGIES
Onion routing networks, or darknets, enable anonymous communication, protecting user privacy and attracting cybercriminals. This paper analyzes cybercrime in these networks, including drug trafficking, fraud, and hacking. The challenges... more
Onion routing networks, or darknets, enable anonymous communication, protecting user privacy and attracting cybercriminals. This paper analyzes cybercrime in these networks, including drug trafficking, fraud, and hacking. The challenges seen in the detection and mitigation of these crimes arising as the result of strong anonymity and explore countermeasures such as law enforcement, technological solutions, and policy interventions have been discussed, as also highlighting of the limitations of current measures and proposals for future research, with emphasis on the need for interdisciplinary approaches combining technical, legal, and social perspectives.
2024, "Ecos desde el Ciberconflicto: Estrategias de Disuasión entre ´el poder blando´ y ´el poder humanitario´ para superar los desafíos multipolares del nuevo milenio¨.
En el complejo y dinámico campo de la ciberseguridad global, la disuasión de los ciberataques ha emergido como un tema central de análisis y debate. Este libro, resultado de la colaboración entre 2 buenos colegas y amigos, Joseph Nye,... more
2024, Artículo
En el Ciberespacio se plantea nuevamente un escenario que remite a la historia de las naciones: se trazan líneas sobre un territorio, se pretenden soberanas y se empieza a defenderlas, o no. Esta idea resume la decisión que están tomando... more
En el Ciberespacio se plantea nuevamente un escenario que remite a la historia de las naciones: se trazan líneas sobre un territorio, se pretenden soberanas y se empieza a defenderlas, o no. Esta idea resume la decisión que están tomando los Estados en el escenario actual, donde hizo aparición un nuevo ambiente de interacción social referenciado en el significante Ciberespacio. Es interesante recordar que tal definición proviene de la literatura de Ciencia Ficción, en particular en obras del autor William Gibson, que luego encontró anclaje en las Tecnologías de la Información y la Comunicación (TIC). Pero, a diferencia de lo imaginado por Gibson, un ambiente enteramente simbólico a la postre, el de la realidad, el que usamos a diario tiene un enorme componente físico, palpable, amortizable en los balances. Ese componente físico, está conformado esencialmente por un conjunto de redes de comunicación y grandes centros de datos. Adicionalmente también por el conjunto de dispositivos que se conectan a él, computadoras, celulares, dispositivos del Internet de las Cosas (IoT), y otros. En ese escenario, Internet se constituye como la principal troncal de comunicaciones del Ciberespacio, que une sus partes y que contrariamente a lo promulgado, es decir, a una red libre, accesible, global, hoy se presenta como un nuevo factor de poder, y como tal, como nuevo escenario de conflictos, incluso armados.
2024
at Madison. His last home institution was the University of Tennessee in Knoxville, where he served as dean of the College of Communications from 1991 to 2002 and continued to teach as a professor until he retired at the end of 2014. Dr.... more
at Madison. His last home institution was the University of Tennessee in Knoxville, where he served as dean of the College of Communications from 1991 to 2002 and continued to teach as a professor until he retired at the end of 2014. Dr. Teeter had a major impact on the lives of so many of his students and colleagues. With the announcement of his death, countless messages of mourning were shared at an interpersonal level and via social media. Some of the words or phrases used to describe Dr. Teeter were "witty," "genuine," "honest," "incredibly smart," and "class act." Many expressed how Dr. Teeter went beyond being an educator and was also a friend who often extended a helping hand and provided words of encouragement. Dr. Teeter genuinely cared about the well-being of others, and it was a great joy for him to see his students and mentees find success in life. Dr. Teeter was passionate about the issues of press freedom and government transparency. In the 13 th edition of his textbook Law of Mass Communications, Dr. Teeter expressed deep concern about the recent expansions of government secrecy and intrusions into privacy by the government, law enforcement agencies, and private businesses. This was a topic that he was looking forward to researching upon retirement. It is unfortunate that we will never have the opportunity to read the scholarly work that this brilliant scholar would have produced. Perhaps we may comfort ourselves with the knowledge that the many individuals inspired by Dr. Teeter's writings will in some way continue his work by asking difficult but important questions pertaining to the free flow of information and press freedom. Research that sought to reveal social injustices and protect vital social and political freedoms always brought a smile to Dr. Teeter's face. That smile will be profoundly missed, but fondly remembered.
2024, International Journal of Academic Research in Business and Social Sciences
Critical National Infrastructure (CNI) within Oman is becoming Inter-independent to each other, aiming to provide unified and faultless services from the perspective of economics, quality, and governance. The new structure of... more
Critical National Infrastructure (CNI) within Oman is becoming Inter-independent to each other, aiming to provide unified and faultless services from the perspective of economics, quality, and governance. The new structure of interconnectivity between the CNI organizations has allowed sharing critical factors in benefiting from other CNI resources and services. Since this interconnectivity has permitted services and system to be more communicative and accessible via the internet, this has allowed some of the cyber threats to create a challenge to secure. Allowing such services to be available via the internet will also add to the fact that this services would be vulnerable to a variety of existing attacks.The latest global events related to Cyberterrorist attacks, have shown to the world how serious this matter. In this article, we present a systematic approach after reviewing existing papers to building resilient cyber security networked systems. We first study fundamental elements of cyber security, cyberspace, CNI and its impact. Then we used qualitative methodology and case studies methods for better understanding the global incidents. This understanding drives the organizations of a distributed multilevel architecture that lets the network defend itself against, detect, and dynamically respond to upcoming challenges. The recent attacks like operation petrol besides financial sector attacks in Oman shown the vulnerability of CNI system. In this case, we take the bank Muscat Visa attack as an example where they have announced that there visa credit card have been violated and a group of hackers compromised the system. To have better control and to handle on this matter, the management of such incidents should have been treated by a Cyber Center, who is well equipped and trained to
2024, Cyberpower and National Security
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and... more
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number.
2024, Transformación Militar.
La internet es una herramienta que ha facilitado el intercambio de información, obtención de productos y ampliación de los medios de comunicación por dar unos ejemplos. Sin embargo, también ha permitido la expansión de la guerra y el... more
La internet es una herramienta que ha facilitado el
intercambio de información, obtención de productos
y ampliación de los medios de comunicación por dar
unos ejemplos. Sin embargo, también ha permitido
la expansión de la guerra y el terrorismo a medios
digitales. El artículo contempla de manera general
las principales características, particularidades
y desafíos que representan los nuevos teatros
estratégicos, tácticos y operacionales tanto para
las agencias y/o instituciones del Estado como
para grupos armados insurgentes, criminales o
terroristas. Así pues, el ciberespacio ha permitido
infiltrar, sabotear y destruir infraestructura crítica
de varios Estados gracias a las redes digitales que
conectan todo un sistema de seguridad, lo que
termina siendo un problema general para toda la
sociedad: dependencia a la tecnología y, por lo tanto,
ser extremadamente vulnerables ante una serie
de ataques capaces de afectar toda la estructura
comunicacional, económica y militar de un Estado.
No obstante, las ciberamenazas o los ciberataques
todavía están en un proceso de gestación porque
sus capacidades militares no han sido por ahora
capaces de sentenciar un ataque donde se afecten
un considerado número de personas y se limita a
compartir propaganda con el objetivo de perturbar
la percepción de algún tema a la población civil. Por
otra parte, es un tema necesario que hay que analizar
y profundizar porque las tecnologías digitales
avanzan cada día más rápido y están volviéndose
parte fundamental de la cotidianidad de los grandes
centros urbanos.
2024, IGI Global eBooks
This article describes how in recent years, Iran has joined the top ranks of the world powers in cyberspaceandhasdemonstratedtheabilitytoleveragecyberwarfareasasignificanttoolinitsarsenal... more
This article describes how in recent years, Iran has joined the top ranks of the world powers in cyberspaceandhasdemonstratedtheabilitytoleveragecyberwarfareasasignificanttoolinitsarsenal forpursuingitsnationalsecuritygoals.Whilethisincreaseincyberpowerisrelativelyrecent,some oftheincidentsandeventsthatserveasthecatalystforthesuddendigitalsurgegobackdecades.The reasonsfortheseincreasedcapabilitiesrevolvearoundhistoricmeansofpowerprojection,defense andpreservationoftheprinciplesoftheIranianRevolution,responsetoWesternaggressionand Iraniannationalism.Thisarticleexplorestheseideologicaldriversandeventstoprovidecontextfor theirtrajectoryandanalysisoftheirlikelyimplications.
2024, SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE
Cyber security is a sensitive issue that derives from recognizing the existence of some vulnerabilities within the system. The current study analyzes a number of five national cyber security strategies, with particular emphasis on the... more
Cyber security is a sensitive issue that derives from recognizing the existence of some vulnerabilities within the system. The current study analyzes a number of five national cyber security strategies, with particular emphasis on the specific features, in order to identify possible future directions. To identify the areas that need cyber defense improvement, based on the results of a benchmarking process, a simplified model is used, using cyber threats/ cyberattacks (CA) and information security (IS) as variables. By comparing national security strategies, it is desirable to disseminate best practices and integrate them on a global scale.
2024, Problemas abiertos en torno al principio de proporcionalidad: Un análisis desde el DIDH y el DIH
Surgido de la indeterminación acerca de cómo se aplica el principio de proporcionalidad en los ciberataques en medio de un conflicto armado internacional, este capítulo examina si dicho principio es pertinente en estos nuevos escenarios... more
Surgido de la indeterminación acerca de cómo se aplica el principio de proporcionalidad en los ciberataques en medio de un conflicto armado internacional, este capítulo examina si dicho principio es pertinente en estos nuevos escenarios de guerra cuando se despliegan operaciones militares. Para esto, analiza documentos físicos y digitales, bases de datos, revistas indexadas y disposiciones legales. Debido a los avances tecnológicos, hoy es más probable que se produzca una guerra cibernética que una guerra tradicional, ya que cuando se trata de ciberataques es más difícil seguir su rastro e identificar a sus responsables, por lo cual, al presentarse en medio de un conflicto armado, deben estar sometidos a los principios del Derecho Internacional Humanitario y, entre estos, el de necesidad, distinción y proporcionalidad.
2024
Profesor universitario a nivel de pregrado, especialización, maestría y doctorado en Colombia y varios países de Latinoamérica en temas como computación forense, evidencia digital, gobierno y gestión de la seguridad de la información,... more
Profesor universitario a nivel de pregrado, especialización, maestría y doctorado en Colombia y varios países de Latinoamérica en temas como computación forense, evidencia digital, gobierno y gestión de la seguridad de la información, gerencia de sistemas de información, criminalidad informática, auditoría de TI, ciberseguridad y protección de datos personales desde 1996 a la fecha. ORCID:
2024, Fulcrum
Small and vulnerable states like the Philippines have become a target of cyberattacks for quite some time. In the past decade, countering cybercrimes has main priority of the government, since most of the cybersecurity issuesin the... more
Small and vulnerable states like the Philippines have become a target of cyberattacks for quite some time. In the past decade, countering cybercrimes has main priority of the government, since most of the cybersecurity issuesin the country relate to criminal activities. Given that there has been appreciation in the role of cyberspace to advance state interests, the Philippines need to up its game and readjust its focus and efforts on state-sponsored cyber actors.
2024, European Journal of Communication
2024
Cybersecurity and Cyberwar-What everyone needs to know" written by P.W. Singer and Allan Friedman was issued at a time when the threats to personal and national security, determined by the uniqueness of information technology devices,... more
Cybersecurity and Cyberwar-What everyone needs to know" written by P.W. Singer and Allan Friedman was issued at a time when the threats to personal and national security, determined by the uniqueness of information technology devices, attain an unprecedented level of complexity and risk. The book constitutes an essential read for almost everybody concerned with the cyber phenomenon, no matter if they are working in business, military, media or are just simple citizens. The authors manage to fi nd the common denominator for all those categories of persons, wonderfully presenting the facts, analyses and explanations in a simple, enjoyable and smart way, thus enabling the achieving of a comprehensive knowledge about the too often hidden world of cybersecurity. Written in an accessible yet deeply informative style, the book captivates the lecturer from its introduction, where questions like why write such a book, and what the authors expect to accomplish are superbly addressed. The book is structured in three parts, suggestively named after the propellant questions of cybersecurity: Part I-How it all works, Part II-Why it all matters and Part III-What we can do. Special emphasis is placed on engaging stories and subjects like the Stuxnet computer virus, the "hacktivism" phenomenon, the "Anonymous" hacker group or the newly created Chinese and US military cyber units to name just a few.
2024, IGI Global eBooks
This chapter examines the emergence of social networks of non-state warriors launching cyber attacks for social and political reasons. It examines the origin and nature of these networks; their objectives, targets, tactics, and use of... more
This chapter examines the emergence of social networks of non-state warriors launching cyber attacks for social and political reasons. It examines the origin and nature of these networks; their objectives, targets, tactics, and use of online forums; and their relationship, if any, to their governments. General concepts are illustrated with case studies drawn from operations by Strano Net, the Electronic Disturbance Theater, the Electrohippies, and other networks of cyber activists; electronic jihad as practiced by those affiliated with al-Qa'ida and the global jihadist movement associated with it; and operations by patriotic hackers from China, Russia, and elsewhere.
2024
Executive Summary The last decade witnessed the highest rise in state-sponsored Cybercriminal activities, with the most recent Russian-linked SolarWinds breach that impacted most of the US governmental and non-governmental organizations,... more
Executive Summary The last decade witnessed the highest rise in state-sponsored Cybercriminal activities, with the most recent Russian-linked SolarWinds breach that impacted most of the US governmental and non-governmental organizations, confirming how dangerous these threats can be. These types of attacks are performed by Advanced Persistent Threats (APT) groups, with specific missions on their target victims. APTs are hacking groups that are sponsored and funded by governments. The groups are well-organized, highly skilled, experienced, and determined. They have strategic modes of operations. It is publicly known that countries like Russia, China, Iran, , the USA, Israel, and North Korea, own hacking groups that are trained and well-resourced to carry out specific missions in the interest of their countries. This article takes an in-depth look at the cyber threats from the state-sponsored cybercriminal groups and cyber-espionage activities they are involved in. I must state that t...
2024
Cyber threats have been extraordinary increased in recent years. Cyber attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries... more
Cyber threats have been extraordinary increased in recent years. Cyber attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber threats Foresight. This research can prepare the country for countering cyber threats based on existing and potential attack Vectors. First of all, 18 major cyber threats drivers base on attack Vectors through reviewing resources and interviewing with seven experts were identified. We use cross-impact analysis Future studies method to indicate main drivers of future cyber threats such as social engineering, Denial of service, ransomwares, spoofing and fraud and non-state actors. Mic Mac software will be used for this step. Finally, future scenarios for cyber threats were identified by using scenario-based approach. Scenario Wizard software will be used. The results of the research include two strong scenarios and 18 possible scenarios, based on the strongest scenario, ransomware, spoofing, fraud, social engineering and Denial of service are the most likely cyber threats by non-state actors through in a limited level.
2024, NEGREI: Academic Journal of Law and Governance
In the 21stcentury, cyber attacks are one of the biggest threats to international peace. The aim of this paper are to compare responses of different governments in this case Australia, People's Republic of China and India. Literature... more
In the 21stcentury, cyber attacks are one of the biggest threats to international peace. The aim of this paper are to compare responses of different governments in this case Australia, People's Republic of China and India. Literature study provides a variety of information that is processed by comparative analysis. Three countries have their own approach to answer this cyber attacks issue by founded their own cyber security agencies. In recent years, these countries were able to develop and integrated strong defense mechanism against cyber attacks. While international cooperation and international laws against cyber attacks have not yet to be born, applying multi layered defense of active and passive defenses in their own country is the best option to choose so far. However, each country needs to evaluate the impact of cyber attacks and whether their responses have been effective in dealing with these cyber attacks using quantitative analyzes.
2024
La importancia del desarrollo de las funciones operacionales contra el crimen organizado en los espacios marítimos jurisdiccionales y de interés RESUMEN
2024, Interoperabilidad mas que operar en conjunto
A pesar que la Interoperabilidad y sus temáticas afines han venido incrementándose a lo largo de las últimas cinco décadas alrededor del mundo, aún continúan siendo temas un tanto desconocidos y tabúes, especialmente en los países que no... more
A pesar que la Interoperabilidad y sus temáticas afines han venido incrementándose a lo largo de las últimas cinco décadas alrededor del mundo, aún continúan siendo temas un tanto desconocidos y tabúes, especialmente en los países que no se encuentran asociados a la Organización para el Tratado del Atlántico Norte (OTAN), entre ellos los latinoamericanos. De hecho, el sentido literal de la interoperabilidad va más allá de operar en conjunto y de buscar el cumplimiento de objetivos comunes, abordando conceptos que abarcan enfoques técnicos, de planeación y de procedimientos para proporcionar un rendimiento eficiente a la organización militar, que, si llegasen a ser malentendidos, podrían limitar el uso de las capacidades operacionales en el campo de combate.
Bajo esta perspectiva, es indispensable identificar los conceptos clave de la interoperabilidad que sustentan la capacidad de diferentes sistemas, componentes, mecanismos, y ámbitos en los cuales las fuerzas puedan trabajar juntos de manera efectiva y compartir información de manera eficiente. Ser interoperable demanda un esfuerzo tanto en los ámbitos militar, político, económico, tecnológico y humano, como en los diferentes niveles de la guerra, en donde se presentan desafíos que impiden a las fuerzas una mayor coherencia, efectividad y eficiencia en el desarrollo de las operaciones. Uno de ellos, la evaluación y el seguimiento; siendo la medición de la interoperabilidad un factor importante para evaluar cuán efectivamente los sistemas, componentes o fuerzas pueden trabajar juntos. Finalmente, hay que considerar que la interoperabilidad requiere una orientación en la planificación estratégica a través de una estrategia integral de desarrollo.
2024
As more devices that affect their environment come into use, their proper functioning to protect the welfare of their charges is a concern. Examples include assistive transport devices, robotics, drug delivery systems, etc. Here privacy... more
As more devices that affect their environment come into use, their proper functioning to protect the welfare of their charges is a concern. Examples include assistive transport devices, robotics, drug delivery systems, etc. Here privacy is not the primary concern, instead it is safety. Given that there are many instances of medical devices not being developed to be secure, plus the standard of practice for security with robotics and other cyberphysical devices, the issue needs consideration. These systems are not only vulnerable to intentional attack, but can cause harm inadvertently by unexpected interaction from other systems. This paper discusses security challenges of expanded use of cyber-physical devices in assistive environments and provides suggestions to improve the security and safety of these devices in the future.