Publisher: Henley-Putnam University   (Total: 1 journals)   [Sort by number of followers]

Showing 1 - 1 of 1 Journals sorted alphabetically
J. of Strategic Security     Open Access   (Followers: 11, SJR: 0.194, CiteScore: 0)
Similar Journals
Journal Cover
Journal of Strategic Security
Journal Prestige (SJR): 0.194
Number of Followers: 11  

  This is an Open Access Journal Open Access journal
ISSN (Print) 1944-0464 - ISSN (Online) 1944-0472
Published by Henley-Putnam University Homepage  [1 journal]
  • Resisting Exortion: Victims, Criminals, and States in Latin America. By
           Eduardo Moncada. Cambridge University Press, 2021.

    • Authors: Nicholas Barnes; Ph.D.
      PubDate: Fri, 02 Jun 2023 10:12:27 PDT
  • African Intelligence Services: Early Postcolonial and Contemporary
           Challenges. Edited by Ryan Shaffer. Lanham, MD: Rowman and Littlefield,

    • Authors: Mitchel P. Roth; Ph.D.
      PubDate: Fri, 02 Jun 2023 10:12:25 PDT
  • Trafficking Data: How China is Winning the Battle for Digital Sovereignty.
           By Aynne Kokas. Oxford: Oxford University Press, 2022.

    • Authors: Chris Bronk; Ph.D.
      PubDate: Fri, 02 Jun 2023 10:12:23 PDT
  • Fixing American Cybersecurity ed. Larry Clinton, Georgetown University
           Press, 2023.

    • Authors: Mark T. Peters II
      PubDate: Fri, 02 Jun 2023 10:12:20 PDT
  • How Putin's Cyberwar Failed in Ukraine

    • Authors: Austen D. Givens et al.
      Abstract: As Russian military forces surged across the Ukrainian border in February 2022, cybersecurity analysts shared predictions about the ways in which the Russian government would use cyberattacks to thwart Ukrainian defenses. Some government agencies and private sector organizations forecast that the Russians would launch a blitz of devastating electronic attacks against Ukrainian critical infrastructure targets, such as electrical power plants and air traffic control networks, crippling the country. While Russian cyberattacks have played a role in the conflict, their effects to date have been significantly less than what some analysts anticipated. But why' This article examines how analysts’ most extreme predictions about Russia’s use of cyberattacks in Ukraine missed the mark, links these findings to the literatures on military and intelligence forecasting, and offers recommendations for additional research.
      PubDate: Fri, 02 Jun 2023 10:12:12 PDT
  • The Brave New World of Third Party Location Data

    • Authors: Shelby Brennan et al.
      Abstract: The use of third-party location data (3PLD)—geospatial data captured by smart devices and sold by ‘data brokers’—for intelligence and investigations is increasing each year. This data source provides opportunities for analysts and decision makers to better understand as well as counter a host of security threats from common criminals to terrorists. However, and like other emerging and potent sources of intelligence like social media intelligence (SOCMINT), 3PLD must also be wielded legitimately by the government. We argue that the in the US context the legal framework surrounding these data is unclear. Due to the legal ambiguity as well as technological advancements, we note that misuse by the government is more likely to occur. Concurrently, malicious actors are using 3PLD in ways that threaten security. We argue action from a variety of stakeholders will be necessary to navigate these challenges in the brave new world of commercially available location data.
      PubDate: Fri, 02 Jun 2023 10:12:05 PDT
  • A Taxonomy of Radiofrequency Jamming and Spoofing Strategies and Criminal

    • Authors: Tegg Westbrook
      Abstract: This article provides a taxonomy of radiofrequency (RF) jamming and spoofing tactics and strategies associated with specific criminal objectives. This is based on the fact that the motivations and strategies of cyber-attackers – predominantly financial – is well-known, but the motivations behind specific electromagnetic interferences is lacking in the current literature. Previous research has also overlooked the motivations of other actors using jamming and spoofing devices.The objective is to identify the most desirable spoofing and jamming strategies, likely targets, and likely motivations. The article finds that (a) previous literature on the subject overlooks a number of non-state actor motives, and therefore this research aims to fill this gap in knowledge; (b) out of 8 actors identified, denial of service attacks (7 out of 8), as well as so-called decoy spoofing (6), trojan spoofing (5), and jamming-enabled crime (5) are the most desirable strategies utilized; (c) out of 11 strategies identified, grey and black hat hackers (11 out of 11), terrorists (11) and activists (8), are likely to take advantage of most identified.
      PubDate: Fri, 02 Jun 2023 10:11:59 PDT
  • Desperate and Opportunistic: CBRN Terrorists and Civilian Radiological

    • Authors: Oliver Mihell-Hale
      Abstract: Chemical, Biological, Radiological, and Nuclear (CBRN) terrorism has long been a threat that has concerned policy makers. This paper highlights the factors which determine when a group is likely to use CBRN weapons given the numerous constraints on their use. A group which is desperate, small, and innovative is most likely to resort to their use as the taboos which constrain groups under normal circumstances become an incentive. These characteristics also determine what type of CBRN weapon will be used, a basic radiological weapon. A radiological weapon is relatively easy to develop compared to other options, and the material for it can be easily acquired. Using International Atomic Energy Agency (IAEA) reports, this research explores numerous shortcomings in sectors using radiological material both past and present. Significant failures have occurred in, and continue to occur in the medical, scrap metal, energy, and industrial practices. These are shown to provide ample opportunity to a resource poor group to carry out a successful CBRN attack.
      PubDate: Fri, 02 Jun 2023 10:11:53 PDT
  • Counterterrorism Law and Policy in the United Kingdom, Canada, and
           Australia: A Comparative Perspective

    • Authors: Nadav Morag
      Abstract: This article looks at the similarities and differences in British, Canadian, and Australian counterterrorism laws and policies. Canada and Australia are contrasted with the United Kingdom because their respective approaches to counterterrorism are based on the British approach, and yet have evolved to take into account differences in the nature and scope of the threat and the differing styles of governance in place in Canada and Australia. The article looks at each country in the context of: counterterrorism laws; detention and disruption practices; investigatory approaches; intelligence and law enforcement institutions; and the treatment of foreign fighters. The article then draws some conclusions regarding the evolution and divergence of counterterrorism law and policy in these countries and posits a question for future research.
      PubDate: Fri, 02 Jun 2023 10:11:48 PDT
  • Extended Space Deterrence: Providing Security Assurance in Space

    • Authors: Kiseok Michael Kang
      Abstract: Many U.S. allies are increasingly dependent on space-based platforms for their military and economic activities. At the same time, the counterspace threats from U.S. adversaries such as China and Russia are rapidly intensifying. The United States has provided extended deterrence to its allies through its overwhelming nuclear and conventional capabilities for decades. The question arises as to whether the time-tested logic of extended deterrence is applicable in the space domain. This research argues that U.S. extended deterrence in space—relying on the traditional mechanism of deterrence-by-punishment—is ineffective due to the unique nature of outer space.
      PubDate: Fri, 02 Jun 2023 10:11:42 PDT
  • Disrupting Deterrence Signaling: Examining the Fifth Wave of
           Technology’s Impact

    • Authors: Brendan Balestrieri
      Abstract: A critical component of deterrence is signaling, or how states communicate desired images of themselves and their intentions.[i] While scholars advocate for a re-examination of classical deterrence theories in light of the emergence of artificial intelligence (AI) and autonomous systems, some view the impact of AI and autonomy as a force that will diminish human agency as a component of deterrence and interactions between nations. This article argues the contrary and posits that the emergence of AI and autonomous systems will magnify the importance of human agency by enabling decision-makers to more accurately gauge credibility, will-to-fight factors, and the national resolve of their opponents based on aggregated sentiment analysis and psychological profiling of civilian populations. Furthermore, this article contends that traditional forms of signaling are undermined by the pervasiveness of AI, autonomous systems, social media, metadata, and the ability of nation-state actors to more accurately surmise the credibility and national resolve of an opponent.[i] Robert Jervis, Perception and Misperception in International Politics, New Edition (Princeton: Princeton University Press, 1976), xvi,
      PubDate: Fri, 02 Jun 2023 10:11:37 PDT
  • Digitized Statecraft in Multilateral Treaty Participation: Global
           Quasi-Legislative Behavior of 193 Sovereign States. By Takashi Inoguchi
           and Lien Thi Quynh Le. Singapore: Springer Nature, 2021.

    • Authors: Melisa Perut et al.
      PubDate: Fri, 03 Mar 2023 13:22:01 PST
  • Unmanned Combat Aerial Vehicles: Current Types, Ordnance and Operations.
           By Dan Gettinger. Wien, Austria: Harpia Publishing, 2021.

    • Authors: James M. Duggan; Ph.D.
      PubDate: Fri, 03 Mar 2023 13:21:58 PST
  • The Russia Conundrum: How the West Fell for Putin’s Power Gambit – And
           How to Fix It. By Mikhail Borisovich Khodorkovsky with Martin Sixsmith.
           New York: St. Martin’s Press, 2022.

    • Authors: Edward M. Roche, Ph.D; J.D.
      PubDate: Fri, 03 Mar 2023 13:21:56 PST
  • Cyber Cases: The PICCA Framework for Documenting Geopolitically Relevant
           Cyber Action

    • Authors: Chris Bronk et al.
      Abstract: This article presents a novel framework called the Policy Informative Cyber Case Analysis for cyberattack incidents. The aim of this framework is to provide a structured documentation and translational assessment tool for cyber incidents of geopolitical significance to a broader policy audience. The article discusses case study method as applied to cyber incidents, situates the framework amongst other useful methods, discusses the application of structured analytic techniques (SAT) such as “chronologies and timelines” and “devil’s advocacy,” presents the framework, and provides conclusions. Cyber incident cases, primarily the 2015 attack on the Ukrainian electric-grid is used throughout to elucidate the utility and application of the framework.
      PubDate: Fri, 03 Mar 2023 13:21:47 PST
  • The Information Age: Transnational Organized Crime, Networks, and Illicit

    • Authors: John P. Sullivan
      Abstract: In his landmark trilogy, The Information Age: Economy, Society and Culture, sociologist Manuel Castells argued that networks, information technology, and global economic flows were altering the nature of politics, power, and states. This article examines the network dynamics Castells wrote about in relation to transnational crime and illicit economic markets. The article further explores Castells’s influence on the study of transnational organized crime, illicit networks, and the global illicit economy.
      PubDate: Fri, 03 Mar 2023 13:21:42 PST
  • Modern Cognitive Operations and Hybrid Warfare

    • Authors: Yuriy Danyk et al.
      Abstract: Concepts of cognitive warfare and operations are explored in the context of hybrid warfare, including how cyber technologies promote greater asymmetric opportunities for influence, control, and undermining of one’s adversary. Research areas are analyzed in the interconnection with hybrid cognitive operations. The purpose of the article is to study the features and theoretical and applied substantiation of cognitive actions in cyberspace and through cyberspace and their possible consequences within the framework of hybrid conflicts.
      PubDate: Fri, 03 Mar 2023 13:21:35 PST
  • Military Advisors, Service Strategies, and Great Power Competition

    • Authors: Mike Anderson
      Abstract: United States professional military advisors play a critical role across the spectrum of conflict within the various services’ strategies in support of the overall National Defense Strategy. In an era of great power competition, the role of advisory forces within the shadow of large-scale conflict, provide a crucial edge for the US military services fulfilling their strategic role. Within each of the services’ unique strategies - the Army’s multidomain operations, the Marine Corps expeditionary advanced base operations nested within the Navy’s broader littoral operations in a contested environment, and the Air Force’s forward projecting agile basing concept - advisors from across the force support developing doctrines with conducting interoperability, providing access, and building relationships with allies and partners across key regions in great power competition. Even so, within each of these services, there is room for maximizing the utility of the advisory forces’ support to the service strategies.
      PubDate: Fri, 03 Mar 2023 13:21:30 PST
  • China's Strategic Devaluing of American Social Capital

    • Authors: Garrett Martin
      Abstract: The information technology era has opened a myriad of new battlespaces through which nations engage each other. China has advanced their “three warfares” doctrine – political warfare, public opinion warfare, and legal warfare – behind a robust and aggressive economic agenda. Direct financial investment and tightly controlled access to both their large consumer market and cheap labor force has given them considerable leverage in key sectors of American industry, particularly those in the communication sphere. The narrative crafting capabilities increasingly acquired by China are beginning to appear as genuine cultural hegemony. This indicates an ability to shape the American collective consciousness by shifting values and behaviors, and ultimately weaken the social bonds within the population. This article thus frames the nature of warfare in the information age as the strategic devaluing of social capital. This reframing of adversarial strategies may be helpful to countering such efforts by providing new insight into the tactics currently employed.
      PubDate: Fri, 03 Mar 2023 13:21:25 PST
  • Technology, Data, & The Future of Warfare: A Review Essay by James

    • Authors: James Torrence; DSS
      PubDate: Mon, 05 Dec 2022 18:44:57 PST
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Tel: +00 44 (0)131 4513762

Your IP address:
Home (Search)
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-