Surveillance

Mini-Drone Swarms: Their Issues and Potential in Conflict Situations

Abstract:

Drones are currently used for a wide range of operations, such as border surveillance, general surveillance, reconnaissance, transport, aerial photography, traffic control, earth observation, communications, broadcasting, and armed attacks.

Investigation and Surveillance on the Darknet – A Secure Architecture to Reconcile Legal Aspects with Technology

Abstract:

Regarding efficient forensics and police activities, legalities often limit the ability to respond with technical action. Things that are technically feasible may be legally forbidden and must comply with a rigorous legal framework. This paper discusses a project of highly secure architecture that enables anyone to take part in the surveillance of the Darknet while complying with all the known legal constraints.

A Century of Convergence: Technology, Ideology, and U.S. National Security

Abstract:

‘Convergence’ is a term typically used to denote the conflation of several technologies. In a larger sense, convergence can signify the blending of technology, law, policy, doctrine, and capability in ways that boost knowledge and power for those who compel or defend states. The world has become globalized in the sense that virtually anyone, anywhere, can be targeted. These awesome powers of surveillance and force are still growing, but their oversight lags far behind. Ironically, efforts to limit surveillance have helped to spur the overall growth of surveillance capabilities, in part to answer the growing demand for intelligence for precision targeting. Understanding the origins and current breadth of that gap is key to resolving it.

The Threat Response Spy Files: A Case Study about an Arms Manufacturer, a Private Intelligence Company and Many Infiltrators

ABSTRACT

British Aerospace paid a private intelligence company to spy on CAAT, the Campaign Against Arms Trade. Daily reports on activists’ whereabouts were sent to Britain’s largest arms dealer by Evelyn le Chêne, a woman with a well-known record in intelligence work. Analysing the original spy documents, this paper will address two sets of questions. One involves the implications for grassroots work, the other raises the issue of appropriate research methodologies.

Vulnerability by Design in Mobile Network Security

ABSTRACT

The GSM network, commonly called 2G, was designed during the 1980s when the Cold War was still ongoing. Due to political pressure from European governments, the security of GSM was deliberately made weak to allow easy interception by law enforcement agencies. Despite strengthened security in subsequent mobile network technologies of 3G and 4G, the weak security of 2G represents the ‘weakest link’ and thereby limits the security level of mobile networks in general. This article describes the evolution of mobile network security architectures, analyses their security vulnerabilities, and proposes solutions to mitigate the threats posed by these vulnerabilities.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com