Advances in Digital Crime, Forensics, and Cyber Terrorism - National Security and Counterintelligence in the Era of Cyber Espionage
Latest Publications


TOTAL DOCUMENTS

15
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By IGI Global

9781466696617, 9781466696624

Author(s):  
Elena Mastors ◽  
Joseph H. Campos

The study of intelligence traditionally relies on descriptive and case study approaches. However, the study of intelligence should shift from this reliance on case study approaches to one grounded in multidisciplinary theory. In particular, social psychological approaches should be fully integrated into an intelligence studies curriculum. These theories inform our understanding of intergroup processes, specifically intergroup conflict, so that we can begin to develop appropriate conflict resolution strategies.


Author(s):  
Neal Duckworth ◽  
Eugenie de Silva

This chapter discusses how the basics of espionage have remained the same, even in the digital age. The pendulum of espionage--and protection from it--has swung wide over the past century. Different public and private sectors have renewed focus on not only cyber protections, but on increased physical protection of critical assets and ensuring trusted personnel in the workforce. Within this chapter, the authors review the basics of protecting critical assets to ensure that changes in espionage can be mitigated at an early stage. While the techniques of espionage have many variables, especially in a digital age, the authors have established that the use of a risk assessment that focuses on identifying the threats, the specific variables or methods of espionage, and developing and implementing mitigation measures is of the utmost importance.


Author(s):  
Shefali Virkar

The Information Revolution has greatly impacted how nation-states and societies relate to one another; particularly wherein new, or hitherto less powerful, actors have emerged to bypass and influence established channels of power, altering the manner in which nation-states define their interests, power bases, security, and increasingly, their innate ability to govern and control flows of information. This book chapter investigates the ‘winner-takes-all' hypothesis relative to how the Internet, its associated platforms, and technologies have been harnessed to enhance the activities of both transnational terrorist networks and the organisations, clusters, and individuals dedicated to researching and combating them. The issues covered by this research raise important questions about the nature and the use of technology by state and non-state actors in an asymmetric ‘information war'; of how ideas of terrorism, surveillance, and censorship are conceptualised, and manner in which the role of the nation-state in countering and pre-empting threats to national security has been redefined.


Author(s):  
Eugenie de Silva

This chapter presents a discussion of a new model titled, “DETECT (Determining and Evaluating Truthfulness through Explicit Cue Testing) which relies upon the assessment of verbal and non-verbal cues. The author presents the argument that the digital age has posed novel challenges to law enforcement and intelligence personnel; hence, the author further explains the ways in which the DETECT model (©, Eugenie de Silva, 2014) can be used to determine deceptive activities at the individual-level even in a technologically advanced society. The chapter touches upon Denial and Deception (D&D), and how the detection of deception must be carried out in the twenty-first century, especially through rigorous monitoring within the established legal framework.


Author(s):  
Eugenie de Silva ◽  
Eugene de Silva ◽  
Eriberta B. Nepomuceno

This chapter focuses on peace education as a vital resource to combat terrorism. It is herein established that an everlasting solution to terrorism could only be reasonably expected if individuals' states of minds are altered. Accordingly, it is further determined that such changes are feasible through peace education, which will ultimately provide a firm basis for fact-based, non-violent, analyses of situations, and resolutions of issues. Furthermore, the authors of this chapter have further incorporated how peace education through online educational classrooms and courses will be extremely useful in the twenty-first century as more activities are conducted through cyber systems.


Author(s):  
Marina Shorer-Zeltser ◽  
Galit Margalit Ben-Israel

Within context of multiculturalism and openness in Western countries, the work of terrorist activity recruiters can become easier and simple. In this framework, it's important to analyze techniques used by terrorists to manipulate support and good intentions of people inclined to sustain justice and peace into the radicalization and terrorist actions using interpersonal communication and Internet content. This article provides an overview on the Muslim minority in Western Europe, religious discourse and radicalization techniques used to incline religious content into terms of actions. It also suggests usage of inclusive cultural and religious policy to start an intra-community dialog and broaden de-radicalization.


Author(s):  
Tianxing Cai

The unpredictable damage caused by potential attack and natural disaster may impact the operation of energy infrastructure, which is vital to local and national security. Thus, mathematical modeling based decision making tools become a must, because they can provide the scientific strategy to enhance the security and intelligence of energy infrastructure. In this chapter, the preliminary framework of a mathematical model is introduced. It includes the definition and characterization of energy network with the capability of self-recovery and the efficacy of the road map generation to handle the uncertainty of identified damage. The new methodology is the preliminary study for the future work in this field.


Author(s):  
K.Y Williams ◽  
Dana-Marie Thomas ◽  
LaToya N. Johnson

Many cyber-attacks that result in data loss can be prevented if the target of the cyber-attack is properly prepared, has the necessary and latest defenses in place, and is constantly monitoring for attacks and intrusions. Whether those cyber-attacks occur as a result of user error; network issues (password files being created and distributed to a list of people); direct assaults (direct intrusion via a designed hack, system flaw, or exploitation of a known network/software issue); or due to an insider-threat (giving a password to a trusted co-worker who then uses it for other means) one aspect of prevention that must be addressed is the need for better security and additional layers of protection on the data that resides on the servers and in computing systems. With up-to-date protocols, reduced access to the system, and compartmentalization of information, it is possible to reduce the amount and type of data that is lost in many cyber-attacks. This chapter explores five types of information that are targeted during cyber-attacks, and discuss why this information is of importance.


Author(s):  
Kirk Y Williams

Individuals, groups, organizations, companies, and foreign government agencies that threaten the National Security of other countries, not only threaten their National Security but also threaten the security of state agencies, and the security of the individuals, groups, organizations, academic institutions that are consumers of those companies. Therefore, a National Data Breach Notification Law that would inform consumers once unwanted intrusions in the form of a cyber-attack occurs that results in the disclosure of their personal and financial information is needed. In the requests for a National Data Breach Notification Law suggestions have been made on what the law should include, and how the information should be reported to the public and to the individuals affected by the cyber-attack. This chapter explores how a National Data Breach Notification Law should be produced that would require uniformity across all states with guidelines that relate to the compliance of the law as it can affect individuals, organizations, academic institutions, companies, and governmental agencies.


Author(s):  
Eugene de Silva ◽  
Eugenie de Silva

This chapter provides a discussion of the United States (U.S.) electrical grid. In particular, the chapter explicates the vulnerabilities of the electrical grid by placing a focus on public perception, cyber-attacks, and the inclement weather. The authors elaborate on the necessity of contingency plans, heightened security through the utilization of smart grids and microgrids, and improved cooperation between the Intelligence Community (IC) and the public. This chapter further expands on the importance of government agencies establishing community outreach programs to raise public awareness and build a strong relationship between U.S. security agencies and the public. Overall, this chapter highlights the key issues pertaining to the electrical grid, and provides solutions and strategies to resolve them.


Sign in / Sign up

Export Citation Format

Share Document