scholarly journals Programs and investments in disruptive technologies in defence

2021 ◽  
Vol 22 (1-2) ◽  
pp. 63-75
Author(s):  
Mirko Šundov

Hybrid Threats and Wars in 21st Century - Making Society and Critical Infrastructure Resilient are extremely important for us to respond to different future threats and challenges. Defence leadership has acknowledged that they must make significant and urgent changes to its people, processes, organisations and culture if they are to keep pace with its strategic competitors and sustain its national security posture.

2020 ◽  
Vol 45 ◽  
pp. 35-55
Author(s):  
Peter Poptchev

The article identifies the trends as well as documented instances of adversarial cyberattacks and hybrid warfare against NATO and EU Member States. It illustrates how these adversarial activities impact on the broader aspects of national security and defence, the socio-economic stability and the democratic order of the states affected, including on the cohesion of their respective societies. Cyberattacks by foreign actors—state and non-state—including state-sponsored attacks against democratic institutions, critical infrastructure and other governmental, military, economic, academic, social and corporate systems of both EU and NATO Member States have noticeably multiplied and have become more sophisticated, more destructive, more expensive and often indiscriminate. The cyber and hybrid threats are increasingly seen as a strategic challenge. The article presents some salient topics such as the nexus between cyberattacks and hybrid operations; the game-changing artificial intelligence dimension of the cyber threat; and the viability of public attributions in cases of cyberattacks. On the basis of analysis of the conceptual thinking and policy guide-lines of NATO, the European Union and of the U.S., the author makes the case that a resolute Trans-Atlantic cooperation in the cyber domain is good for the security of the countries involved and essential for the stability of today’s cyber-reliant world.


2001 ◽  
Author(s):  
Edward F. Smith ◽  
Bobbitt Jr. ◽  
Kreis Rosser ◽  
Olson John F. ◽  
Pechous Warren K. ◽  
...  

2008 ◽  
Author(s):  
PACIFIC AIR FORCES HICKAM AFB HI CHECO DIV

2021 ◽  
pp. 002193472110260
Author(s):  
Artwell Nhemachena

Colonially depicted as a region distinctive for fables and fabrications, Africa has ever since not been allowed to reclaim anything original. Dispossessed of their original wealth, Africans have been forced to live in fabled and fabricated houses, eating fabled, and fabricated food—closer to animals. Similarly, dispossessed of their original human identities, Africans have been forced to adopt fabricated identities. With the 21st century not promising any return to original African human identities, Africans are set to be further nanotechnologically (using tiny nanoparticles) fabricated into cyborgs that speak to ongoing posthumanist and transhumanist experiments with emergent disruptive technologies. Inhabiting not only fabricated houses but also increasingly inhabiting nanotechnologically fabled and fabricated bodies, Africans should learn to, in terms of the Shona (a people of Zimbabwe) proverb, hakuna mhou inokumira mhuru isiri yayo (no cow lows for a calf that is not its own), repossess original mastery over their own lives.


2021 ◽  
Vol 16 (3) ◽  
pp. 109-130
Author(s):  
A.S. MAKSIMOV ◽  

This article is devoted to identifying and characterizing the threat to national security of Russian Federation in the context of a hybrid war. The main aim of the study is to assume that the huge problem for national security of Russia today is the threat of a hybrid nature. This paper proposes the author's classification of hybrid threats, which made it possible to distinguish five functional groups of threats («triads») ‒ in the spiritual and socio-cultural, military-political, economic, information and international legal spheres. The specificity of the «triads» is that each of the three elements of the «triad» is capable of producing the appearance of the second and third elements of the «triad» and maintaining their activity. A variant of ranking «triads» according to the level of their threat intensity is presented, the rates of their intensification in the short term were determined. According to the author's conclusions, the synchronous activity of the «triads» creates a synergistic effect, exerting a complicated negative impact on the state of national security of Russia. The novelty of the research, the results of which are presented in the article, are the classification of hybrid threats and the verbal model of the functioning of the «triads» of threats. The findings of the study can contribute to the development of effective techniques and strategies for countering hybrid threats to national security of Russia.


2021 ◽  
pp. 648-658
Author(s):  
Yoko Nitta

This chapter studies how the significant cyberattacks perpetrated against the Japan Pension Services (JPS) served to heighten awareness of the significance of cyber threats among political and corporate executives. According to the Japanese cybersecurity strategy, cyberattacks constitute a global risk and remain a prime concern for the development of appropriate countermeasures. As a result, Japan has regarded the strengthening of cybersecurity as a priority and outlined this to the National Security Council in 2014. At present, information security institutions in Japan are chaperoned by the cybersecurity strategy headquarters, which aims to promote constructive and efficient cybersecurity policies. In addition, Japan has implemented its third action plan on information security for critical infrastructure and revised its cybersecurity strategy in 2015. By working in partnership with countries around the world, Japan pursues its own national security as well as the peace and stability of the international community. International cooperation and partnerships also contribute to the international campaign against cyberattacks, especially those in which foreign state actors may be implicated.


2018 ◽  
Vol 4 (2) ◽  
pp. 15
Author(s):  
Chris I. Nwagboso

This paper examines the various internal security challenges confronting Nigeria in the 21st century. The paper adopts historical method and content analysis to investigate how the abysmal failure of the poorly formulated and ineffectively implemented National Security Policy has hitherto exacerbated internal security challenges in Nigeria. The paper further attempts a critical review of major internal security challenges hitherto confronting the country; such as the Niger Delta crises, kidnapping in the South-East geo-political zone, Jos crises, Boko Haram crises and crises by Fulani Herdsmen in the Northern part of Nigeria. The result of the analysis shows that these internal security challenges have not only been difficult to address by the National Security Policy, but have also impacted negatively on the country's desired socio-economic development in the 21st century. The paper, therefore, recommends among others, the need for a careful review of the Nigeria's National Security Policy that will not only be integrative/comprehensive in outlook, but will also take cognizance of some domestic factors that are currently responsible for internal security problems in the country; such as unemployment, inequality, poverty, fraudulent electoral process, corruption, skewed federalism, porous nature of the Nigeria’s borders, sabotage among politicalelites, bad governance, religious intolerance, citizen-settler controversies, among others.


2020 ◽  
Vol 20 (3) ◽  
pp. 7-52
Author(s):  
Miroslav Tuđman

The author gives an overview of the history of National Security and the Future (NSF). The first editorial board accepted a clear vision and mission of the NSF. That is why the NSF had to react to the political circumstances in which the journal has operated for 20 years. In the first period, international circumstances and the policy of detuđmanization directly influenced the choice of topics and papers published in the journal. For the past five years, the NSF has paid particular attention to the security of national and European critical infrastructure. A total of 257 texts were published on more than 8,000 pages and authored by 134 authors from 25 countries. The NSF has published studies on historical forgery, information operations, production of "fake news" and contributions to the theory and methodology of intelligence activities.


Sign in / Sign up

Export Citation Format

Share Document