Prominent Security Risks Stemming from Space Hybrid Operations

Author(s):  
Jana Robinson

To date, discussions concerning hybrid threats have been almost exclusively focused on the terrestrial and maritime domains, and space has been largely excluded from such international exchanges. This is despite the fact that, for the most part, the same actors, mindsets, and techniques are presently in play in the space domain as well. Moreover, hybrid operations conducted by adversaries in any of these domains have the potential to negate critical space systems. This chapter seeks to provide a better understanding of this complex new issue area for space and help identify and implement a more informed security policy framework. It suggests that strengthened resilience and deterrence, including through cross-domain response options, is required to protect against these space hybrid operations and the critical benefits and capabilities they target.

2018 ◽  
pp. 25-38
Author(s):  
Liudmila Kalinichenko

The article analyses the role of renewable energy in the process of the development of the energy market of the East African Community (EAC) . The author underlines the necessity of finding solutions for such challenges as rising wood and charcoal prices, deforestation, lack of affordable and reliable electricity for a large number of consumers. The study reveals that nowadays the percentage of people with access to modern sources of energy is very low, varying from 7 % in Burundi to 36% in Kenya, although the EAC countries made significant progress in 2000s. Most people in rural areas rely on traditional biomass for cooking and heating, which leads to ecological and health problems. The author concludes that renewable energy development is considered by the Community as one of the prospective ways for providing energy to remote regions in view of abundant solar, wind and geothermal resources. Their strategy aims at the construction of micro and mini hydro stations, stand-alone solar PV systems and off-grids for rural population usage. The study shows that the investment in off-grid renewables has been steadily rising in recent times . Analyzing grid-connected power generation electricity, the author elicits that it is also based on renewable electricity, which accounts for 65% of the total amount. Kenya, with the highest installed capacity in this sector, is investing mainly in geothermal, solar and wind sources of energy, while the others are focusing on hydropower and solar. For the purpose of attracting private investment, the EAC partner states adopted different regulations, including Feed-in Tariff, zero-VAT and GET FIT Programme. The author assumes that renewable energy financing is one of the main challenges despite the support of different international financial institutions, such as the World Bank, UNIDO, AfDB and others. Nowadays energy efficiency measures are becoming important instruments for the EAC countries resulted in power savings. The other important trend is increasing cooperation among them due to their grid-connected power systems in the East African Power Pool. In this context, in November 2017, the EAC Partner States adopted Energy Security Policy Framework, in order to ensure the sustainable development of their energy sector.


2021 ◽  
pp. 1-21
Author(s):  
Andrea Ghiselli ◽  
Pippa Morgan

Abstract The nexus between China's human and economic presence abroad and its security policy is increasingly important. Within this nexus, this study statistically explores whether and to what extent Chinese contractors reduce the number of Chinese nationals they send to work in North Africa, the Middle East and the Horn of Africa when the security situation in host states worsens. We find no significant evidence that either warnings from Chinese embassies and consulates to leave host countries or expert perceptions of host stability influence the number of Chinese workers. Worker numbers appear to decrease significantly only in the aftermath of large-scale violent events. These findings suggest that Chinese companies are relatively acceptant of security risks and uncertainties, despite the decade-long regulatory efforts of the Chinese government to make them more security-conscious overseas and, thus, to reduce pressure to use diplomatically and economically expensive military means for their protection.


2018 ◽  
Author(s):  
Peter M. Shane

This critique of Karson K. Thompson’s note, "Not Like an Egyptian: Cybersecurity and the Internet Kill Switch Debate," argues that the U.S. lacks a framework of laws and regulations, "smart" or otherwise, that adequately incentivizes the parties with the greatest capacity to improve our cyber security to do so. It attributes the poor state of U.S. cyber policy to the "bewildering array of overlapping responsibilities" scattered among government offices and departments; the difficult imperative of sharing responsibility among military and civilian authorities; the fact that most of the networks (and the dependent critical infrastructures) that need protecting are in private hands; and the lack of public understanding of the kinds of regulation that are necessary or appropriate. The essay argues that meaningful progress towards an adequate legal framework depends on a broad national debate aimed at defining the public good with regard to cyber-security, and the inevitable trade-offs among security, privacy, productivity, economic growth, organizational flexibility, military effectiveness, government transparency, and accountability that must be confronted in making sensible cyber-security policy.


2016 ◽  
Vol 12 (3) ◽  
pp. 1-20
Author(s):  
Eunjung Shin ◽  
Eric W. Welch

Concerns about electronic information security in government have increased alongside increased use of online media. However, to date, few studies have examined the social mechanisms influencing electronic information security. This article applies a socio-technical framework to model how technical, organizational and environmental complexities limit electronic information security perceived by local government managers. Furthermore, it examines to what extent organizational design buffers security risks. Using data from a 2010 national survey of local government managers, this article empirically tests the proposed model in the context of U.S. local government's online media use. Findings show that, in addition to technical complexity, organizational and environmental complexities are negatively associated with local managers' awareness of and confidence in electronic information security. On the other hand, internal security policy and decentralized decision-making appear to buffer security risks and enhance perceived information security.


CNS Spectrums ◽  
2017 ◽  
Vol 23 (2) ◽  
pp. 158-165
Author(s):  
Erich Vad

“Fighting terrorism is like eating soup with a fork” (Shimon Peres). Peres’s quote symbolically captures the key problem of countering terrorism. 9/11 proved to be a hallmark in the global perception of modern terrorism. The following questions form the framework of the present essay: What is the essence of modern terrorism? How did it develop during the past two decades? Who are the key players within the terror framework? What are the root causes for global terrorism? How are we to deal appropriately with the global phenomenon of terrorism? Are there any solutions (short-, medium-, long-term) to terrorism? If yes, where do we have to look for them? The underlying essay provides a strategic overview of antiterrorism policy that is based on the author’s years-long experience as a high-level expert and advisor within the security policy framework. For this reason, citations are expressly not included. The key target audience comprises laypersons interested in the phenomenon of global terrorism and its social interplay.


Kybernetes ◽  
2015 ◽  
Vol 44 (1) ◽  
pp. 77-88 ◽  
Author(s):  
Sung-Hwan Kim ◽  
Nam-Uk Kim ◽  
Tai-Myoung Chung

Purpose – The purpose of this paper is to provide a model for quantitatively analyzing the security profile of an organization’s IT environment. The model considers the security risks associated with stored data, as well as services and devices that can act as channels for data leakages. The authors propose a sensitive information (SI) leakage vulnerability model. Design/methodology/approach – Factors identified as having an impact on the security profile are identified, and scores are assigned based on detailed criteria. These scores are utilized by mathematical models that produce a vulnerability index, which indicates the overall security vulnerability of the organization. In this chapter, the authors verify the model result extracted from SI leakage vulnerability weak index by applying the proposed model to an actual incident that occurred in South Korea in January 2014. Findings – The paper provides vulnerability result and vulnerability index. They are depends on SI state in information systems. Originality/value – The authors identify and define four core variables related to SI leakage: SI, security policy, and leakage channel and value of SI. The authors simplify the SI leakage problem. The authors propose a SI leakage vulnerability model.


Sign in / Sign up

Export Citation Format

Share Document