National Security
Latest Publications


TOTAL DOCUMENTS

45
(FIVE YEARS 45)

H-INDEX

1
(FIVE YEARS 1)

Published By IGI Global

9781522579120, 9781522579137

2019 ◽  
pp. 880-897
Author(s):  
Michael Pittaro

Human trafficking is one of the fastest and continuously evolving transnational crimes of this century, preceded only slightly by gun and drug trafficking; yet it is projected that human trafficking will soon surpass both unless government and nongovernmental officials throughout the world take immediate, collaborative action to deter and punish traffickers and educate and protect prospective trafficking victims. For that reason, combating human trafficking requires ongoing national and international communication, cooperation, and collaboration, particularly amongst law enforcement leadership across the globe. Only then will law enforcement be able to limit the ability of traffickers to operate freely and help prevent future victims from being trafficked. The primary purpose of drawing international attention to this chapter is in illuminating the challenges of police leadership in combating incidents of transnational human trafficking as well as to propose plausible to assist and support future global leadership and collaboration within and across police agencies.


2019 ◽  
pp. 774-792
Author(s):  
Keith F. Snider

This chapter explores the relationship of U.S. defense management to public administration. It argues that public administration, as a field of study, plays a minor role in defense acquisition, because acquisition has unique characteristics that separate it from the mainstream of the field. The tenuous connections between acquisition and public administration have led to an issue of academic legitimacy in that the discipline has failed to respond to the needs of acquisition professionals. The chapter then presents a discussion and illustration of philosophical pragmatism as a potential contribution of administrative theory to acquisition practice, and it concludes with thoughts on the potential for acquisition to adopt pragmatism as a guiding way for thought and practice.


2019 ◽  
pp. 659-672
Author(s):  
Eugene de Silva ◽  
Eugenie de Silva

This chapter provides a discussion of the United States (U.S.) electrical grid. In particular, the chapter explicates the vulnerabilities of the electrical grid by placing a focus on public perception, cyber-attacks, and the inclement weather. The authors elaborate on the necessity of contingency plans, heightened security through the utilization of smart grids and microgrids, and improved cooperation between the Intelligence Community (IC) and the public. This chapter further expands on the importance of government agencies establishing community outreach programs to raise public awareness and build a strong relationship between U.S. security agencies and the public. Overall, this chapter highlights the key issues pertaining to the electrical grid, and provides solutions and strategies to resolve them.


2019 ◽  
pp. 590-613
Author(s):  
David Omand

This chapter examines digital intelligence and international views on its future regulation and reform. The chapter summarizes the lead up to the Snowden revelations in terms of how digital intelligence grew in response to changing demands and was enabled by private sector innovation and mediated through legal, Parliamentary and executive regulation. A common set of ethical principles based on human rights considerations to govern modern intelligence activity (both domestic and external) is proposed in the chapter. A three-layer model of security activity on the Internet is used: securing the use of the Internet for everyday economic and social life and for political and military affairs; the activity of law enforcement attempting to manage criminal threats on the Internet; and the work of secret intelligence and security agencies exploiting the Internet to gain information on their targets, including in support of law enforcement.


2019 ◽  
pp. 571-589
Author(s):  
Clay Wilson ◽  
Nicole Drumhiller

It is assumed by most observers that China is copying or stealing vast amounts of intellectual property from US military and private industry through its cyber espionage activities, and then sharing that information with state-owned industries, giving them unfair economic advantages. The US also conducts cyber espionage against China and other nations, but chooses to not share the vast collections of intellectual property and data with its own domestic industries. By choosing not to do the same thing as China, the US may be placing itself at an economic disadvantage, and may also mistakenly be accusing China of threatening cyber warfare. What is needed is a clearer understanding of differences in national cultures that contribute to intolerance between the US and China when it comes to economics, threats of war, and the evolving new role of cyber espionage.


2019 ◽  
pp. 545-570
Author(s):  
Hadj Ahmed Bouarara ◽  
Reda Mohamed Hamou ◽  
Abdelmalek Amine

In the last decade, surveillance camera technology has become widely practiced in public and private places to ensure the safety of individuals. Merely, face to limits of violation the private life of people and the inability to identify malicious persons that hid their faces, finding a new policy of surveillance video has become compulsory. The authors' work deals on the development of a suspicious person detection system using a new insect behaviour algorithm called artificial social cockroaches ASC based on a new image representation method (n-gram pixel). It has as input a set of artificial cockroaches (human images) to classify them (hide) into shelters (classes) suspicious or normal depending on a set of aggregation rules (shelter darkness, congener's attraction and security quality). Their experiments were performed on a modified MuHAVi dataset and using the validation measures (recall, precision, f-measure, entropy and accuracy), in order to show the benefit derived from using such approach compared to the result of classical algorithms (KNN and C4.5). Finally, a visualisation step was achieved to see the results in graphical form with more realism for the purpose to help policeman, security associations and justice in their investigation.


2019 ◽  
pp. 479-496
Author(s):  
Neal Duckworth ◽  
Eugenie de Silva

This chapter discusses how the basics of espionage have remained the same, even in the digital age. The pendulum of espionage--and protection from it--has swung wide over the past century. Different public and private sectors have renewed focus on not only cyber protections, but on increased physical protection of critical assets and ensuring trusted personnel in the workforce. Within this chapter, the authors review the basics of protecting critical assets to ensure that changes in espionage can be mitigated at an early stage. While the techniques of espionage have many variables, especially in a digital age, the authors have established that the use of a risk assessment that focuses on identifying the threats, the specific variables or methods of espionage, and developing and implementing mitigation measures is of the utmost importance.


2019 ◽  
pp. 408-425
Author(s):  
Kimberly Lukin

This article analyzes the similarities and differences between the EU's and Russia's cyber preparedness, management structures, governmental security controls and cyber strategies. In comparing the cyber capabilities of the EU and Russia, we use military tactics and criteria as a basis for evaluating tactical, operational and strategic maturity. Russia has implemented cyberwar part of military strategic movements and certain taxonomy can be recognized in Russian based cyberattacks. Furthermore this study evaluates the following criteria: what are the EU's and Russia's procedures to prevent cyberwar, how their situational awareness is gathered and shared and is cyber used alongside with other military weaponry and tactics. This study claims that Russia has a better cyber war fighting capability than the EU countries. Based on the findings and recommendations in our article information can be used to create new threat models, to detect cyberattacks and finally point towards action to develop governmental cybersecurity in the EU.


2019 ◽  
pp. 368-386
Author(s):  
Victor Jaquire ◽  
Basie von Solms

The objective of this paper is to provide a strategic framework for a secure cyberspace in developing countries, taking cognisance of the realities and constraints within a developing milieu; and to discuss if the risk of cyber warfare and related techniques against developing countries should be addressed within ‘The Framework'. Cybersecurity policies and related strategies are required for developing countries in order to effectively safeguard against cyber related threats (the same as for developed countries). These policies and strategies for developing countries will differ from those of developed countries due to the unique realities within a developing world. Africa in specific is presently seen as a hotbed for cybercrime, and one of the reasons is that many African countries do not have a proper framework, policies and procedures to properly protect cyberspace. Experience has also shown that a pure adoption by developing countries of the cyber frameworks of developed nations will not always be effective, especially due to the unique requirements and realities within developing worlds, such as limited resources, infrastructure, technologies, skills and experience. It is also necessary when talking about a strategic framework to secure cyberspace, to discuss cyber warfare, its general application and its possible utilisation as part of the strategy to protect national critical information infrastructure. This, as part of a developing country's national security strategy in addition to traditional cybersecurity defence measures. The approach taken for the research program, and discussed in this paper, is based on a comprehensive literature study on several existing cybersecurity policies and strategies from both developed and developing countries. From this the drivers / elements for national cybersecurity policies and strategies were identified. These drivers were than adapted to specifically relate to the requirements of developing countries, and then, utilising the identified and adapted drivers, our strategic framework for developing countries to secure their cyberspace was developed. This document will be very useful for those African countries venturing into defining relevant policies and procedures.


2019 ◽  
pp. 304-330
Author(s):  
Metodi Hadji-Janev

Many incidents in cyberspace and the response to those incidents by victim states prove that the cyber conflict is a reality. This new conflict is complex and poses serious challenges to national and international security. One way to protect the civilian populace is by deterring potential malicious actors (state and non-state) from exploiting cyberspace in a negative way. Given the changed reality and complexity that gravitates over the cyber conflict classical deterrence that have worked during the Cold War is not promising. The article argues that if the states are about to protect their civilians from the future cyber conflict by deterring potential attacker they need to change the approach to deterrence.


Sign in / Sign up

Export Citation Format

Share Document