Pub Date : 2023-07-01DOI: 10.5038/1944-0472.16.2.2109
Brendan Balestrieri
A critical component of deterrence is signaling, or how states communicate desired images of themselves and their intentions.[i] While scholars advocate for a re-examination of classical deterrence theories in light of the emergence of artificial intelligence (AI) and autonomous systems, some view the impact of AI and autonomy as a force that will diminish human agency as a component of deterrence and interactions between nations. This article argues the contrary and posits that the emergence of AI and autonomous systems will magnify the importance of human agency by enabling decision-makers to more accurately gauge credibility, will-to-fight factors, and the national resolve of their opponents based on aggregated sentiment analysis and psychological profiling of civilian populations. Furthermore, this article contends that traditional forms of signaling are undermined by the pervasiveness of AI, autonomous systems, social media, metadata, and the ability of nation-state actors to more accurately surmise the credibility and national resolve of an opponent. [i] Robert Jervis, Perception and Misperception in International Politics, New Edition (Princeton: Princeton University Press, 1976), xvi, https://www.jstor.org/stable/j.ctvc77bx3.
{"title":"Disrupting Deterrence Signaling: Examining the Fifth Wave of Technology’s Impact","authors":"Brendan Balestrieri","doi":"10.5038/1944-0472.16.2.2109","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2109","url":null,"abstract":"A critical component of deterrence is signaling, or how states communicate desired images of themselves and their intentions.[i] While scholars advocate for a re-examination of classical deterrence theories in light of the emergence of artificial intelligence (AI) and autonomous systems, some view the impact of AI and autonomy as a force that will diminish human agency as a component of deterrence and interactions between nations. This article argues the contrary and posits that the emergence of AI and autonomous systems will magnify the importance of human agency by enabling decision-makers to more accurately gauge credibility, will-to-fight factors, and the national resolve of their opponents based on aggregated sentiment analysis and psychological profiling of civilian populations. Furthermore, this article contends that traditional forms of signaling are undermined by the pervasiveness of AI, autonomous systems, social media, metadata, and the ability of nation-state actors to more accurately surmise the credibility and national resolve of an opponent.\u0000[i] Robert Jervis, Perception and Misperception in International Politics, New Edition (Princeton: Princeton University Press, 1976), xvi, https://www.jstor.org/stable/j.ctvc77bx3.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48776858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-01DOI: 10.5038/1944-0472.16.2.2070
Shelby Brennan, Stephen Coulthart, Brian Nussbaum
The use of third-party location data (3PLD)—geospatial data captured by smart devices and sold by ‘data brokers’—for intelligence and investigations is increasing each year. This data source provides opportunities for analysts and decision makers to better understand as well as counter a host of security threats from common criminals to terrorists. However, and like other emerging and potent sources of intelligence like social media intelligence (SOCMINT), 3PLD must also be wielded legitimately by the government. We argue that the in the US context the legal framework surrounding these data is unclear. Due to the legal ambiguity as well as technological advancements, we note that misuse by the government is more likely to occur. Concurrently, malicious actors are using 3PLD in ways that threaten security. We argue action from a variety of stakeholders will be necessary to navigate these challenges in the brave new world of commercially available location data.
{"title":"The Brave New World of Third Party Location Data","authors":"Shelby Brennan, Stephen Coulthart, Brian Nussbaum","doi":"10.5038/1944-0472.16.2.2070","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2070","url":null,"abstract":"The use of third-party location data (3PLD)—geospatial data captured by smart devices and sold by ‘data brokers’—for intelligence and investigations is increasing each year. This data source provides opportunities for analysts and decision makers to better understand as well as counter a host of security threats from common criminals to terrorists. However, and like other emerging and potent sources of intelligence like social media intelligence (SOCMINT), 3PLD must also be wielded legitimately by the government. We argue that the in the US context the legal framework surrounding these data is unclear. Due to the legal ambiguity as well as technological advancements, we note that misuse by the government is more likely to occur. Concurrently, malicious actors are using 3PLD in ways that threaten security. We argue action from a variety of stakeholders will be necessary to navigate these challenges in the brave new world of commercially available location data.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41821827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-01DOI: 10.5038/1944-0472.16.2.2142
C. Bronk
{"title":"Trafficking Data: How China is Winning the Battle for Digital Sovereignty. By Aynne Kokas. Oxford: Oxford University Press, 2022.","authors":"C. Bronk","doi":"10.5038/1944-0472.16.2.2142","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2142","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41892911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-01DOI: 10.5038/1944-0472.16.2.2141
M. Peters
{"title":"Fixing American Cybersecurity ed. Larry Clinton, Georgetown University Press, 2023.","authors":"M. Peters","doi":"10.5038/1944-0472.16.2.2141","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2141","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42774037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-01DOI: 10.5038/1944-0472.16.2.2144
N. Barnes
{"title":"Resisting Exortion: Victims, Criminals, and States in Latin America. By Eduardo Moncada. Cambridge University Press, 2021.","authors":"N. Barnes","doi":"10.5038/1944-0472.16.2.2144","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2144","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43069285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-01DOI: 10.5038/1944-0472.16.2.2081
Tegg Westbrook
This article provides a taxonomy of radiofrequency (RF) jamming and spoofing tactics and strategies associated with specific criminal objectives. This is based on the fact that the motivations and strategies of cyber-attackers – predominantly financial – is well-known, but the motivations behind specific electromagnetic interferences is lacking in the current literature. Previous research has also overlooked the motivations of other actors using jamming and spoofing devices. The objective is to identify the most desirable spoofing and jamming strategies, likely targets, and likely motivations. The article finds that (a) previous literature on the subject overlooks a number of non-state actor motives, and therefore this research aims to fill this gap in knowledge; (b) out of 8 actors identified, denial of service attacks (7 out of 8), as well as so-called decoy spoofing (6), trojan spoofing (5), and jamming-enabled crime (5) are the most desirable strategies utilized; (c) out of 11 strategies identified, grey and black hat hackers (11 out of 11), terrorists (11) and activists (8), are likely to take advantage of most identified.
{"title":"A Taxonomy of Radiofrequency Jamming and Spoofing Strategies and Criminal Motives","authors":"Tegg Westbrook","doi":"10.5038/1944-0472.16.2.2081","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2081","url":null,"abstract":"This article provides a taxonomy of radiofrequency (RF) jamming and spoofing tactics and strategies associated with specific criminal objectives. This is based on the fact that the motivations and strategies of cyber-attackers – predominantly financial – is well-known, but the motivations behind specific electromagnetic interferences is lacking in the current literature. Previous research has also overlooked the motivations of other actors using jamming and spoofing devices.\u0000The objective is to identify the most desirable spoofing and jamming strategies, likely targets, and likely motivations. The article finds that (a) previous literature on the subject overlooks a number of non-state actor motives, and therefore this research aims to fill this gap in knowledge; (b) out of 8 actors identified, denial of service attacks (7 out of 8), as well as so-called decoy spoofing (6), trojan spoofing (5), and jamming-enabled crime (5) are the most desirable strategies utilized; (c) out of 11 strategies identified, grey and black hat hackers (11 out of 11), terrorists (11) and activists (8), are likely to take advantage of most identified.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48915254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-01DOI: 10.5038/1944-0472.16.2.2072
N. Morag
This article looks at the similarities and differences in British, Canadian, and Australian counterterrorism laws and policies. Canada and Australia are contrasted with the United Kingdom because their respective approaches to counterterrorism are based on the British approach, and yet have evolved to take into account differences in the nature and scope of the threat and the differing styles of governance in place in Canada and Australia. The article looks at each country in the context of: counterterrorism laws; detention and disruption practices; investigatory approaches; intelligence and law enforcement institutions; and the treatment of foreign fighters. The article then draws some conclusions regarding the evolution and divergence of counterterrorism law and policy in these countries and posits a question for future research.
{"title":"Counterterrorism Law and Policy in the United Kingdom, Canada, and Australia: A Comparative Perspective","authors":"N. Morag","doi":"10.5038/1944-0472.16.2.2072","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2072","url":null,"abstract":"This article looks at the similarities and differences in British, Canadian, and Australian counterterrorism laws and policies. Canada and Australia are contrasted with the United Kingdom because their respective approaches to counterterrorism are based on the British approach, and yet have evolved to take into account differences in the nature and scope of the threat and the differing styles of governance in place in Canada and Australia. The article looks at each country in the context of: counterterrorism laws; detention and disruption practices; investigatory approaches; intelligence and law enforcement institutions; and the treatment of foreign fighters. The article then draws some conclusions regarding the evolution and divergence of counterterrorism law and policy in these countries and posits a question for future research.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43722512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-01DOI: 10.5038/1944-0472.16.2.2143
Mitchel P. Roth,
{"title":"African Intelligence Services: Early Postcolonial and Contemporary Challenges. Edited by Ryan Shaffer. Lanham, MD: Rowman and Littlefield, 2021.","authors":"Mitchel P. Roth,","doi":"10.5038/1944-0472.16.2.2143","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2143","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135154683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-01DOI: 10.5038/1944-0472.16.1.2026
Garrett Martin
The information technology era has opened a myriad of new battlespaces through which nations engage each other. China has advanced their “three warfares” doctrine – political warfare, public opinion warfare, and legal warfare – behind a robust and aggressive economic agenda. Direct financial investment and tightly controlled access to both their large consumer market and cheap labor force has given them considerable leverage in key sectors of American industry, particularly those in the communication sphere. The narrative crafting capabilities increasingly acquired by China are beginning to appear as genuine cultural hegemony. This indicates an ability to shape the American collective consciousness by shifting values and behaviors, and ultimately weaken the social bonds within the population. This article thus frames the nature of warfare in the information age as the strategic devaluing of social capital. This reframing of adversarial strategies may be helpful to countering such efforts by providing new insight into the tactics currently employed.
{"title":"China's Strategic Devaluing of American Social Capital","authors":"Garrett Martin","doi":"10.5038/1944-0472.16.1.2026","DOIUrl":"https://doi.org/10.5038/1944-0472.16.1.2026","url":null,"abstract":"The information technology era has opened a myriad of new battlespaces through which nations engage each other. China has advanced their “three warfares” doctrine – political warfare, public opinion warfare, and legal warfare – behind a robust and aggressive economic agenda. Direct financial investment and tightly controlled access to both their large consumer market and cheap labor force has given them considerable leverage in key sectors of American industry, particularly those in the communication sphere. The narrative crafting capabilities increasingly acquired by China are beginning to appear as genuine cultural hegemony. This indicates an ability to shape the American collective consciousness by shifting values and behaviors, and ultimately weaken the social bonds within the population. This article thus frames the nature of warfare in the information age as the strategic devaluing of social capital. This reframing of adversarial strategies may be helpful to countering such efforts by providing new insight into the tactics currently employed.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47376969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-01DOI: 10.5038/1944-0472.16.1.2032
Yuriy Danyk, Chad Briggs
Concepts of cognitive warfare and operations are explored in the context of hybrid warfare, including how cyber technologies promote greater asymmetric opportunities for influence, control, and undermining of one’s adversary. Research areas are analyzed in the interconnection with hybrid cognitive operations. The purpose of the article is to study the features and theoretical and applied substantiation of cognitive actions in cyberspace and through cyberspace and their possible consequences within the framework of hybrid conflicts.
{"title":"Modern Cognitive Operations and Hybrid Warfare","authors":"Yuriy Danyk, Chad Briggs","doi":"10.5038/1944-0472.16.1.2032","DOIUrl":"https://doi.org/10.5038/1944-0472.16.1.2032","url":null,"abstract":"Concepts of cognitive warfare and operations are explored in the context of hybrid warfare, including how cyber technologies promote greater asymmetric opportunities for influence, control, and undermining of one’s adversary. Research areas are analyzed in the interconnection with hybrid cognitive operations. The purpose of the article is to study the features and theoretical and applied substantiation of cognitive actions in cyberspace and through cyberspace and their possible consequences within the framework of hybrid conflicts.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135771493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}