National Security

The Developmental History of the Center for Asymmetric Threat Studies (CATS)

Abstract:

This article describes how to develop, adapt, and manage an independent think tank approaching new cross-sectoral forms of national security threats within a government stove-piped system. The Center for Asymmetric Threat Studies at the Swedish Defence University was in a European context a unique hybrid entity that combined academic research with policy relevant recommendations and trusted second opinions to Cabinet departments and agencies. This article explores how to bend stovepipes within a Swedish context in the areas of Counter Terrorism, Intel-ligence Studies, Cyber Security, and Influence Operations.

Fitting the Artificial Intelligence Approach to Problems in DoD

Abstract: 

Emerging and disruptive technologies, due to advances made over the last couple of decades, have become the centrepiece of Department of Defense (DoD) concerns about national security. The technologies are unique because they can both benefit and hinder the DoD from its mission. Artificial Intelligence (AI) is revered in DoD circles as one of the most important of these technologies because of its potential as an absolute ‘gamechanger’ in cybersecurity operations. In this study, the focus is on the DoD fitting the Artificial Intelligence approach to its problems in a time of limited and diminishing resources.

Understanding and Assessing Information Influence and Foreign Interference

Abstract: 

The information influence framework was developed to identify and to assess hostile, strategy-driven, state-sponsored information activities. This research proposes and tests an analytical approach and assessment tool called information influence and interference to measure changes in the level of strategy-driven, state-sponsored information activities by the timeliness, specificity, and targeted nature of communications as well as the dissemination tactics of publicly available information. 

A Human-Centric Approach to Cybersecurity: Securing the Human in the Era of Cyberphobia

ABSTRACT

Cybersecurity relates to the threats posed to a nation’s critical infrastructure, but should not be limited to the traditional concept of national security. The militarization of the cybersecurity discourse has produced a security dilemma, which is not sufficiently addressing the needs of people. This article highlights this shortcoming and views cybersecurity through a human-centric perspective. The challenge ahead is to establish a governance regime for cyberspace that successfully addresses human rights norms.

Information Terrorism in the New Security Environment

ABSTRACT

Over the years there have been many interpretations of what constitutes Information Terrorism. This paper reviews literature on Information Warfare and Terrorism to deduce what the threat of Information Terrorism is considered to be in the new security environment. This provides a deduced interpretation/definition of Information Terrorism, which is explained by outlining the threat itself, and its potential impact, capability and advantages. The positives that can be derived to counter it are then examined. The paper concludes with remarks that Information Terrorism is a major dynamic contributing to a new national security environment. 

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com