cyber security http://archive.smallwarsjournal.com/ en What is cyber-terrorism, and is it a threat to U.S. national security? http://archive.smallwarsjournal.com/jrnl/art/what-cyber-terrorism-and-it-threat-us-national-security <span>What is cyber-terrorism, and is it a threat to U.S. national security?</span> <span><span>Riley.C.Murray</span></span> <span>Thu, 11/04/2021 - 2:32am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">The primary defense and security concerns of the 21st-century have been and will continue to be driven by the strategic phenomena of cyberspace and terrorism.[i] However, there are several competing definitions of both cyberspace and terrorism, and there is no universally accepted definition for many cyber-related activities (i.e. cyber-terrorism, cyber-warfare, and cyber-crime). Cyber-terrorism is often loosely defined as the “convergence of terrorism and cyberspace,” which allows for a wide range of interpretation and confusion.[ii] This paper provides a more pragmatic definition of cyber-terrorism by addressing the nuances of previously proposed definitions in order to help the U.S. national security apparatus address current and future threats. Additionally, it will discuss what constitutes a cyber-terror attack and how it differs from other cyber-crimes. Lastly, it will then determine what threat, if any, cyber-terrorism poses to U.S. national security. To do so, I will first provide definitions for both cyberspace and terrorism which are helpful for understanding the distinct phenomenon of cyber-terrorism.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/what-cyber-terrorism-and-it-threat-us-national-security" rel="tag" title="What is cyber-terrorism, and is it a threat to U.S. national security?" hreflang="en">Read more<span class="visually-hidden"> about What is cyber-terrorism, and is it a threat to U.S. national security?</span></a></li><li class="comment-forbidden"></li><li></li></ul> Thu, 04 Nov 2021 06:32:40 +0000 Riley.C.Murray 140048 at http://archive.smallwarsjournal.com Disrupting digital harms in Central Asia http://archive.smallwarsjournal.com/blog/disrupting-digital-harms-central-asia <span>Disrupting digital harms in Central Asia</span> <div class="field field--name-field-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Disrupting digital harms in Central Asia</strong></p> <p>Robert Muggah and Rafal Rohozinski </p> <p>Central Asia is the staging ground for a new digital Great Game. The key players include Russia, China, Europe, and the US, along with a rash of Central Asian actors. What happens there has implications not just for the region, but the future of the Internet. One of the reasons why Central Asia’s assuming more strategic importance is because of the digital transformation occurring across the region. Their digitalization is part of a deeper historical commitment to technology-driven modernization stretching back to the twentieth century Soviet Union. Today, the region is registering a dramatic increase in internet roll-out, mobile broadband connections and social media users.</p> <img alt="Centro Asia" data-entity-type="file" data-entity-uuid="e1a430ed-8d0f-4122-b33b-483f5e1954d2" src="/sites/default/files/inline-images/Central%20Asia%20_0.jpg" class="align-center" /><p class="text-align-center">Central Asia (<a href="https://picryl.com/media/major-ethnic-groups-in-central-asia">Public Domai</a>n – <a href="https://creativecommons.org/licenses/publicdomain/">Creative Commons</a> <a href="https://creativecommons.org/choose/zero/">CC0</a>)</p> <p>Central Asia’s digitalization is generating opportunities, but also risks. The onboarding of Central Asians is occurring amidst a complex backdrop of top-down secular authoritarianism, bottom-up agitation for more progressive democracticization and a contest between moderate and hardline Islam. Digital transformation, then, could accelerate digital authoritarianism. Indeed, there is a real push from China, Russia and the US to shape the wider technology environment, with profound implications for the future of civic freedoms and digital rights. And as more Central Asians go online, their exposure to digital harms, including violent extremism, is increasing.</p> <p>New <a href="https://foreignpolicy.com/2020/11/11/online-extremism-central-asia-islamic-state-terrorism/">SecDev Group-led research</a> is shining a light on the scope, scale and dynamics of online violent extremism across Central Asia. For one, while persistent, violent extremist actors have a modest online footprint: a small number of entities are disproportionately responsible for a high proportion of harmful content. Related, extremist groups are using third party networks to amplify their reach and moving between platforms to avoid take-downs. What’s more, their appeals are linked to regional grievances, from Afghanistan and Syria to Muslim grievances in France and the treatment of Uyghurs in China.</p> <p>A managed risk approach is critical to prevent, disrupt and reduce online violent extremism in Central Asia. Too often, interventions are narrowly targeted, having comparatively limited impact and potentially making the problem worse. The spread of violent extremism is connected fundamentally to wider geopolitical, regional and domestic factors such as the continued repression of minorities in Xinjiang and the impending withdrawal of NATO troops from Afghanistan. These tensions will continue to stoke grievances and serve as a focal for radicalization. Ultimately, intervention strategies must account for these political realities in their design.</p> <p>While appealing, police-led interventions and platform-led strategies focused on taking down content will not successfully deter online violent extremism. To the contrary: they can potentially incentivize extremist groups to move to more obscure platforms and adapt their strategies, generating new challenges. Interventions designed to disrupt online extremist groups and remove radical content need to be mindful of the unintended consequences of aggressive take-downs. For example, overzealous efforts can <a href="https://thediplomat.com/2020/04/have-press-freedoms-improved-in-central-asia/">undermine media independence</a>, ramp-up indiscriminate surveillance and trigger anti-terrorist legislation and operations that curb rights.</p> <p>Several Central Asian governments are actively exploring ways to adopt more stringent surveillance and censorship laws and to make use of artificial intelligence and other intrusive surveillance technologies ostensibly to “fight terrorism.” There is a danger that digital transformation and smart city initiatives could lead to indiscriminate surveillance, with dangerous implications for civic and human rights. What is needed now more than ever are approaches that do not focus reservedly on violent extremism, but rather emphasize the prevention and reduction of digital harms. European and US partners have a key role to play here, not least in strengthening inclusive digital transformation, promoting independent and high quality online media and bolstering digital literacy.</p> <p>One way to disrupt the risks of digital harms is by applying lessons from public health. This begins by continuously diagnosing the online threats, mitigating risk factors, reinforcing protective factors, and testing out measures to evaluate their outcomes. The US, Europe, and multilateral organizations can work with Central Asian public authorities, social media platforms and representatives of civil society to double down on inclusive digital transformation that simultaneously manages digital harms and short circuits the transition towards digital authoritarianism. This will require applying a wide range of measures in partnership with gatekeepers—trusted brokers—to deliver safer and secure online environments.</p> <p><strong>For Additional Reading</strong></p> <p>Rafal Rohozinski and Robert Muggah, “<a href="https://www.usip.org/publications/2021/06/central-asias-growing-internet-carries-new-risks-violence">Central Asia’s Growing Internet Carries New Risks of Violence</a>.” <em>United States Institute of Peace</em>. 15 June 2021. </p> <p>Kumar Bekbolotov, Robert Muggah, and Rafal Rohozinski, “<a href="https://foreignpolicy.com/2020/11/11/online-extremism-central-asia-islamic-state-terrorism/">Jihadist Networks Dig In on Social Media Across Central Asia</a>.” <em>Foreign Policy</em>, 11 November 2020.</p> <p> </p> </div> <span><span>ZFTWARNING</span></span> <span>Mon, 06/21/2021 - 7:52pm</span> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/blog/disrupting-digital-harms-central-asia" rel="tag" title="Disrupting digital harms in Central Asia" hreflang="en">Read more<span class="visually-hidden"> about Disrupting digital harms in Central Asia</span></a></li><li class="comment-comments"><a href="/index.php/blog/disrupting-digital-harms-central-asia#comments" title="Jump to the first comment." hreflang="en">3 comments</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/378/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1673877685" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Mon, 21 Jun 2021 23:52:59 +0000 ZFTWARNING 139663 at http://archive.smallwarsjournal.com Cyber-States and US National Security: Learning from Covid-19 http://archive.smallwarsjournal.com/jrnl/art/cyber-states-and-us-national-security-learning-covid-19 <span>Cyber-States and US National Security: Learning from Covid-19</span> <span><span>SWJED</span></span> <span>Fri, 03/20/2020 - 11:42am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">What are the current implications for US national security? The first implication is our open market view of cyberspace and the sale of data by private social network companies like Facebook. Our national security is encumbered when private companies can use the data of citizens to sell to any entity who can pay, like the Cambridge Analytica case.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/cyber-states-and-us-national-security-learning-covid-19" rel="tag" title="Cyber-States and US National Security: Learning from Covid-19" hreflang="en">Read more<span class="visually-hidden"> about Cyber-States and US National Security: Learning from Covid-19</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/cyber-states-and-us-national-security-learning-covid-19#comments" title="Jump to the first comment." hreflang="en">1 comment</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/378/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1632478795" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Fri, 20 Mar 2020 15:42:45 +0000 SWJED 136645 at http://archive.smallwarsjournal.com False Flags During Times of Geopolitical Conflict – The Right Time to Strike http://archive.smallwarsjournal.com/jrnl/art/false-flags-during-times-geopolitical-conflict-right-time-strike <span>False Flags During Times of Geopolitical Conflict – The Right Time to Strike</span> <span><span>SWJED</span></span> <span>Wed, 03/11/2020 - 8:18am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">The question of attribution has always remained a murky effort, largely because of the difficulty in proving direct links between the activity and a specific state, but it appears that over the past few years the threshold for that rigor has significantly decreased.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/false-flags-during-times-geopolitical-conflict-right-time-strike" rel="tag" title="False Flags During Times of Geopolitical Conflict – The Right Time to Strike" hreflang="en">Read more<span class="visually-hidden"> about False Flags During Times of Geopolitical Conflict – The Right Time to Strike</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/false-flags-during-times-geopolitical-conflict-right-time-strike#comments" title="Jump to the first comment." hreflang="en">1 comment</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/378/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1632478834" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Wed, 11 Mar 2020 12:18:59 +0000 SWJED 136066 at http://archive.smallwarsjournal.com Cyberwar to Kinetic War: 2020 Election and the Possibility of Cyber-Attack on Critical Infrastructure on the United States http://archive.smallwarsjournal.com/jrnl/art/cyberwar-kinetic-war-2020-election-and-possibility-cyber-attack-critical-infrastructure <span>Cyberwar to Kinetic War: 2020 Election and the Possibility of Cyber-Attack on Critical Infrastructure on the United States</span> <span><span>SWJED</span></span> <span>Wed, 01/29/2020 - 12:26am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">The current possibility of the United States walking into a trap of a kinetic war is exceptionally likely, given the conditions that will be enumerated here, and the historical pattern of the US reacting to surprise attacks with the force of a giant rudely awakened from a deep slumber is not ahistorical. The Election of 2016 was a sure indicator of one phase of election manipulation.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/cyberwar-kinetic-war-2020-election-and-possibility-cyber-attack-critical-infrastructure" rel="tag" title="Cyberwar to Kinetic War: 2020 Election and the Possibility of Cyber-Attack on Critical Infrastructure on the United States" hreflang="en">Read more<span class="visually-hidden"> about Cyberwar to Kinetic War: 2020 Election and the Possibility of Cyber-Attack on Critical Infrastructure on the United States</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/cyberwar-kinetic-war-2020-election-and-possibility-cyber-attack-critical-infrastructure#comments" title="Jump to the first comment." hreflang="en">1 comment</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/378/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1632483147" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Wed, 29 Jan 2020 05:26:21 +0000 SWJED 132766 at http://archive.smallwarsjournal.com Challenging Snowden: Spycraft, Ethics, and Amendments http://archive.smallwarsjournal.com/jrnl/art/challenging-snowden-spycraft-ethics-and-amendments <span>Challenging Snowden: Spycraft, Ethics, and Amendments</span> <span><span>SWJED</span></span> <span>Thu, 01/23/2020 - 12:32am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">Is it ethical for the country’s intelligence agencies to exploit nearly every known wireless communication modality in favor of U.S. policies and interests even though it could potentially involve spying on countless American citizens in violation of the Fourth Amendment? Edward Snowden utilized principles of ethical decision making, but faulty logic resulted in a treasonous act with longstanding damage to U.S. intelligence operations and foreign diplomacy.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/challenging-snowden-spycraft-ethics-and-amendments" rel="tag" title="Challenging Snowden: Spycraft, Ethics, and Amendments" hreflang="en">Read more<span class="visually-hidden"> about Challenging Snowden: Spycraft, Ethics, and Amendments</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/challenging-snowden-spycraft-ethics-and-amendments#comments" title="Jump to the first comment." hreflang="en">3 comments</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/378/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1632483459" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Thu, 23 Jan 2020 05:32:14 +0000 SWJED 132179 at http://archive.smallwarsjournal.com Uniting the Cyber Domain Stakeholders http://archive.smallwarsjournal.com/jrnl/art/uniting-cyber-domain-stakeholders <span>Uniting the Cyber Domain Stakeholders</span> <span><span>SWJED</span></span> <span>Tue, 01/21/2020 - 12:11am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">The United States faces an organizational dilemma when it comes to the cyber domain, as the Department of Defense, Department of Homeland Security, Intelligence Community, and the private sector all are stakeholders in the domain and the security. Uniting the stakeholders under one security domain, specifically quantum encryption, would strengthen the United States cyber defense against their adversaries.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/uniting-cyber-domain-stakeholders" rel="tag" title="Uniting the Cyber Domain Stakeholders" hreflang="en">Read more<span class="visually-hidden"> about Uniting the Cyber Domain Stakeholders</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/uniting-cyber-domain-stakeholders#comments" title="Jump to the first comment." hreflang="en">1 comment</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/378/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1632483474" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Tue, 21 Jan 2020 05:11:47 +0000 SWJED 131945 at http://archive.smallwarsjournal.com Would da Vinci Support the Pentagon’s New Cyber Strategy? http://archive.smallwarsjournal.com/jrnl/art/would-da-vinci-support-pentagons-new-cyber-strategy <span>Would da Vinci Support the Pentagon’s New Cyber Strategy?</span> <span><span>SWJED</span></span> <span>Thu, 01/16/2020 - 8:03am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">Drawing inspiration from da Vinci’s observations on force, power, and movement – elements in which “all the works of mortals have their beginning and their end” – this article suggests four cyberspace operations principles.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/would-da-vinci-support-pentagons-new-cyber-strategy" rel="tag" title="Would da Vinci Support the Pentagon’s New Cyber Strategy?" hreflang="en">Read more<span class="visually-hidden"> about Would da Vinci Support the Pentagon’s New Cyber Strategy?</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/would-da-vinci-support-pentagons-new-cyber-strategy#comments" title="Jump to the first comment." hreflang="en">3 comments</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/378/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1632483504" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Thu, 16 Jan 2020 13:03:51 +0000 SWJED 131408 at http://archive.smallwarsjournal.com Destination Atlanta: Ransomware Lessons for Municipalities and Law Enforcement http://archive.smallwarsjournal.com/jrnl/art/destination-atlanta-ransomware-lessons-municipalities-and-law-enforcement <span>Destination Atlanta: Ransomware Lessons for Municipalities and Law Enforcement</span> <span><span>SWJED</span></span> <span>Fri, 08/23/2019 - 4:29pm</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">The rise of ransomware as an attack vector has continued to thrive and appears focused on those municipalities and law enforcement agencies with limited resources and unchecked system vulnerabilities. Of major concern are the evidentiary losses and reduction in consumer confidence within these governmental organizations requiring a new focus and financial expenditures to mitigate these attacks from occurring in the future.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/destination-atlanta-ransomware-lessons-municipalities-and-law-enforcement" rel="tag" title="Destination Atlanta: Ransomware Lessons for Municipalities and Law Enforcement" hreflang="en">Read more<span class="visually-hidden"> about Destination Atlanta: Ransomware Lessons for Municipalities and Law Enforcement</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/destination-atlanta-ransomware-lessons-municipalities-and-law-enforcement#comments" title="Jump to the first comment." hreflang="en">1 comment</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/378/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1632571450" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Fri, 23 Aug 2019 20:29:00 +0000 SWJED 124291 at http://archive.smallwarsjournal.com OODA Loops in Cyberspace: How Cyber Awareness Training Helps Threat Actors http://archive.smallwarsjournal.com/jrnl/art/ooda-loops-cyberspace-how-cyber-awareness-training-helps-threat-actors <span>OODA Loops in Cyberspace: How Cyber Awareness Training Helps Threat Actors</span> <span><span>SWJED</span></span> <span>Wed, 09/05/2018 - 6:45am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">Cybersecurity’s human adversarial engagement is often lost in discussions of cybersecurity. We discuss how defenders’ focus on technology unintentionally creates vulnerabilities which can be exploited by threat actors. In particular, we discuss how the convergence of cyber awareness training and defensive technologies is exploited by threat actors with devastating consequences.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/ooda-loops-cyberspace-how-cyber-awareness-training-helps-threat-actors" rel="tag" title="OODA Loops in Cyberspace: How Cyber Awareness Training Helps Threat Actors" hreflang="en">Read more<span class="visually-hidden"> about OODA Loops in Cyberspace: How Cyber Awareness Training Helps Threat Actors</span></a></li><li class="comment-forbidden"></li><li></li></ul> Wed, 05 Sep 2018 10:45:40 +0000 SWJED 103835 at http://archive.smallwarsjournal.com