Number of results to display per page
Search Results
202. Redes sociales, desinformación, cibersoberanía y vigilancia digital: una visión desde la ciberseguridad
- Author:
- Mariano César Bartolomé
- Publication Date:
- 11-2021
- Content Type:
- Journal Article
- Journal:
- Journal on International Security Studies (RESI)
- Institution:
- International Security Studies Group (GESI) at the University of Granada
- Abstract:
- Luego de un desarrollo de cincuenta años, Internet es la piedra basal del ciberespacio. Los usuarios de esta red superan ampliamente la mitad de la población mundial y su influencia alcanza todos los aspectos de las sociedades contemporáneas. En la actualidad, la libertad de acceso a Internet está considerada dentro del campo de los Derechos Humanos; sin embargo, al mismo tiempo crecen las dudas acerca de la credibilidad de la información existente en la red, así como la preocupación por la privacidad de los datos personales que allí circulan. Este artículo se enfoca, desde una perspectiva de ciberseguridad, en tres aspectos vinculados al respeto de las garantías y derechos individuales: la accesibilidad a Internet y la vigilancia digital; el funcionamientode las redes sociales y la privacidad de los datos personales que ellas emplean y almacenan; y el uso de las redes sociales en acciones de desinformación que incluyen noticias falsas (fake news) y narrativas de posverdad
- Topic:
- Sovereignty, Cybersecurity, Social Media, Surveillance, and Disinformation
- Political Geography:
- Global Focus
203. Exposing the Financial Footprints of North Korea’s Hackers
- Author:
- Jason Bartlett
- Publication Date:
- 11-2020
- Content Type:
- Special Report
- Institution:
- Center for a New American Security (CNAS)
- Abstract:
- North Korea conducts intricate and sweeping cyberattacks against the United States and its allies to acquire funds to support its illicit nuclear proliferation efforts. Unlike more economically advanced nuclear states possessing domestic research, development, and deployment capacities to establish weapon of mass destruction (WMD) programs, the Democratic People’s Republic of Korea (DPRK) must seek financial resources, assistance, and institutional knowledge, at least initially, from overseas. It has developed its cyber capabilities in order to circumvent financial sanctions and global safeguards, conducting elaborate online bank heists and hacking attacks; stealing funds through fraudulent bank transfers, Society for Worldwide Interbank Financial Telecommunications (SWIFT) transactions, and ATM cash-outs; launching ransomware attacks demanding payment in cryptocurrency; and hacking cryptocurrency exchanges. The scale and sophistication of these innovative sanctions evasion tactics create a challenge that calls for stronger measures to confront them. In addition to providing policy recommendations for U.S. leadership and financial institutions, this report will outline the ways North Korea supports, expands, and utilizes cyber operations to acquire funds for its nuclear weapons program.
- Topic:
- Science and Technology, Cybersecurity, and Finance
- Political Geography:
- Asia, North Korea, North America, and United States of America
204. Defense Technology Strategy
- Author:
- Paul Scharre and Ainikki Riikonen
- Publication Date:
- 11-2020
- Content Type:
- Special Report
- Institution:
- Center for a New American Security (CNAS)
- Abstract:
- The Department of Defense’s (DoD) ever-shifting technology priorities jeopardize its ability to win a long-term technology competition. The DoD needs a systematic approach—a technology strategy—for how to prioritize technology investments. The dominant global tech trend today is the information revolution, which is leading to exponential growth in digital capabilities. The top priority of the DoD’s technology strategy should be rapidly spinning in and militarizing digital technologies generated in the private sector. The DoD should invest in key military-specific technologies, such as hypersonics or directed energy weapons, when there is clear operational value but should expect advancements to be incremental.
- Topic:
- Defense Policy, Science and Technology, Cybersecurity, and Investment
- Political Geography:
- North America and United States of America
205. Rebooting Congressional Cybersecurity Oversight
- Author:
- Carrie Cordero and David Thaw
- Publication Date:
- 01-2020
- Content Type:
- Special Report
- Institution:
- Center for a New American Security (CNAS)
- Abstract:
- Cybersecurity oversight is due for a reboot. This paper explores the need for refreshed congressional oversight of cybersecurity. After laying out why cybersecurity oversight presents special challenges, this paper suggests that the disparate nature of the cybersecurity policymaking legal framework is mismatched to the nature of the cybersecurity problem, resulting in difficulty legislating in this space. It then provides two key recommendations to guide a congressional cybersecurity oversight reboot. Cybersecurity is a broad challenge spanning many disciplines and industries. This paper argues that the current “patchwork” legal framework is ill suited to address cybersecurity questions either for legislative oversight or effective policymaking. The paper provides an overview of the nature and scope of the cybersecurity problem, with a focus on how the complexity of the field affects congressional oversight activities. Congress has been conducting a substantial amount of oversight in this area in recent years. Those efforts, however, have not yet resulted in legislative actions that have demonstrably improved national cybersecurity. This paper seeks to aid the effort to craft legal authorities that deal with an increasingly complex set of cyberthreats. This short exposition provides a path to rebooting Congress’ approach to cybersecurity oversight in a way that would allow these issues to be addressed more comprehensively.
- Topic:
- Security, Science and Technology, and Cybersecurity
- Political Geography:
- Global Focus
206. AI in the Age of Cyber-Disorder
- Author:
- Fabio Rugge, John R Allen, Giampiero Massolo, Thomas A. Campbell, Samuele Dominioni, Caitlin Chin, Mishaela Robison, John Villasenor, Darrell M. West, and Paola Benanti
- Publication Date:
- 11-2020
- Content Type:
- Special Report
- Institution:
- Italian Institute for International Political Studies (ISPI)
- Abstract:
- The rise of Artificial Intelligence applications is accelerating the pace and magnitude of the political, securitarian, and ethical challenges we are now struggling to manage in cyberspace and beyond. So far, the relationship between Artificial Intelligence and cyberspace has been investigated mostly in terms of the effects that AI could have on the digital domain, and thus on our societies. What has been explored less is the opposite relationship, namely, how the cyberspace geopolitics can affect AI. Yet, AI applications have so far suffered from growing unrest, disorder, and lack of normative solutions in cyberspace. As such, from algorithm biases, to surveillance and offensive applications, AI could accelerate multiple growing threats and challenges in and through cyberspace. This report by ISPI and The Brookings Institution is an effort to shed light on this less studied, but extremely relevant, relationship.
- Topic:
- Gender Issues, Authoritarianism, Cybersecurity, Inequality, Surveillance, Artificial Intelligence, Disinformation, and Cyberspace
- Political Geography:
- Global Focus
207. Ensuring a trusted 5G ecosystem of vendors and technology
- Author:
- Rajiv Shah
- Publication Date:
- 09-2020
- Content Type:
- Special Report
- Institution:
- Australian Strategic Policy Institute (ASPI)
- Abstract:
- 5G will be the next generation of mobile telecommunications. There are differing views on how quickly it will become commonplace and exactly what form it will take, but it will ultimately transform much of what we do and how society functions. The trustworthiness, security and resilience of 5G networks will therefore be critical. A key part of this will be the partnerships that network operators form with vendors to provide and maintain the network infrastructure. There’s now a good understanding that 5G will underpin critical national infrastructure in a way that previous telecommunication technologies don’t, and that supply-chain trust and security are key national security issues. Australia and some other countries have eliminated specific vendors from their 5G supply chains, but the space is globally contested and there is no consensus on what happens next. There is a need for a trusted ecosystem of vendors, which may also bring enormous opportunities for states, including Australia, to develop sovereign 5G capabilities and grow their 5G market. However, barriers to entry and a lack of consensus among key 5G stakeholders across the public and private sectors are holding up progress towards these goals.
- Topic:
- Markets, Science and Technology, Cybersecurity, and 5G
- Political Geography:
- Global Focus
208. Critical technologies and the Indo-Pacific: A new India-Australia partnership
- Author:
- Aakriti Bachhawat, Danielle Cave, Jocelinn Kang, Rajeswari Pillai, and Trisha Ray
- Publication Date:
- 10-2020
- Content Type:
- Special Report
- Institution:
- Australian Strategic Policy Institute (ASPI)
- Abstract:
- This report by ASPI’s International Cyber Policy Centre and India’s Observer Research Foundation argues that as the India-Australia bilateral relationship continues to grow and evolve, both governments should invest in the construction of a new India–Australia partnership on technology. The foundation for such a partnership already exists, and further investment areas of complementary interests could stimulate regional momentum in a range of key critical and emerging technology areas including in 5G, Artificial Intelligence, quantum technologies, space technologies and in critical minerals. The report contains 14 policy recommendations that will help build this new technology partnership. This new report outlines what this new India-Australia technology partnership could look like. It examines the current state of the India–Australia relationship; provides an overview of current technology cooperation and where challenges and roadblocks lie; analyses each state’s competitive and complementary advantages in selected technology areas and highlights opportunities for further collaboration across the areas of 5G, Artificial Intelligence, Quantum technologies, Space technologies and in critical minerals.
- Topic:
- Foreign Policy, Science and Technology, Bilateral Relations, Partnerships, and Cybersecurity
- Political Geography:
- India and Australia
209. Final Week Cybersecurity Considerations: Top Takeaways
- Author:
- Belfer Center
- Publication Date:
- 10-2020
- Content Type:
- Policy Brief
- Institution:
- Belfer Center for Science and International Affairs, Harvard University
- Abstract:
- This election has already faced threats from cyber adversaries seeking to influence its outcome. The joint CISA-FBI alert confirming Russian state-sponsored activity targeting government networks on October 22 builds on other advisories around potential cyberattacks on election systems ahead of the election, including advisories of DDOS attacks against election infrastructure. Making unplanned or last-minute changes ahead of election day can introduce serious risks, especially given the short window to test changes. Here are some considerations as you work to address and prepare to counter potential cyber threats.
- Topic:
- Security, Science and Technology, Infrastructure, Elections, and Cybersecurity
- Political Geography:
- Russia and United States of America
210. Weathering TechNationalism
- Author:
- Alex W. Schulman
- Publication Date:
- 05-2020
- Content Type:
- Working Paper
- Institution:
- EastWest Institute
- Abstract:
- eathering TechNationalism provides policymakers, regulators, and corporate executives a five-part framework for mitigating supply chain risk in a holistic way. The framework lays out measures of assurance, transparency, and accountability that ICT buyers, operators, and vendors can implement jointly. Supplementing this framework, the report recommends several balanced, risk-informed policy measures—in accordance with national and industry-specific policy goals—that may further ICT and supply chain security and avoid the negative consequences of TechNationalism he action roadmap provides a whole-of-society approach and recommends that policymakers: Enable threat and vulnerability information sharing, Require diverse sources of supply, Make strategic science and technology investments, Consider narrow national security exceptions, and Review and adapt national supply chain security goals and policies.
- Topic:
- Security, National Security, Science and Technology, Cybersecurity, and Information Technology
- Political Geography:
- Global Focus