|
Sort Order |
|
|
|
Items / Page
|
|
|
|
|
|
|
Srl | Item |
1 |
ID:
142686
|
|
|
Summary/Abstract |
Cyberspace is increasingly becoming an area of contestation among nation states. Similar to the physical domains of land, sea, air and space, superiority in the cyber domain enables a nation state to exert its cyber power. In recent years, China has invested colossal amounts in building the requisite infrastructure and capabilities of its armed forces as well as governance practices to advance towards āinformationalisationā. This article seeks to discern the motives, threats, objectives, strategy and intent that drive China to amass cyber power.
|
|
|
|
|
|
|
|
|
|
2 |
ID:
178329
|
|
|
Summary/Abstract |
A āconnected battlespaceā (CB) aims to leverage emerging technologies, such as low Earth orbit satellites, internet of things devices, cloud computing, and artificial intelligence, in order to collect, process, and disseminate large quantities of data in real time, thereby providing decision-makers with the ability to respond to threats faster and with more precision. Despite its promise, as a concept, a CB is still misunderstood, underdeveloped, and understudied. In an effort to fill this gap, this policy brief describes several key findings derived from an expert stakeholder workshop that the authors convened in July 2020. Workshop participants probed several questions about the development of Canadaās CB infrastructure, touching on a number of themes, including alliance partnerships, emerging technology, procurement, national security, and defence strategy. Our article synthesizes and analyzes key discussions held during this workshop.
|
|
|
|
|
|
|
|
|
|
3 |
ID:
138793
|
|
|
Summary/Abstract |
Hollywood has not been slow to appreciate and exploit the cinematic potential of the threat from cyber attacks. Films such as Live Free or Die Hard contain graphic depictions of the chaos caused when hackers take control of US transportation networks, the stock market and natural-gas and power grids on the Eastern Seaboard. Hollywood did not, however, anticipate that it would become the target of the first-ever alleged state-sponsored destructive computer-network attack to take place on US soil ā and that by virtue of this fact it would find itself, not for the first time, playing the role of a major national-security actor.
|
|
|
|
|
|
|
|
|
|
4 |
ID:
139499
|
|
|
Summary/Abstract |
The use of cyber operations, as well as the interaction of other elements of power that have an effect on cyber operations, represents another method by which nations and non-state actors may attempt to achieve political ends. The Syrian civil war has encompassed many elements of warfare, including cyber operations. A study of the observed cyber operations by both direct and indirect participants in the Syrian civil war can lead to valuable lessons regarding who operates in the cyber domain, what these operators can accomplish, and how a nation-state can respond. These lessons may be applied to future conflicts.
|
|
|
|
|
|
|
|
|
|
5 |
ID:
128921
|
|
|
6 |
ID:
176597
|
|
|
Summary/Abstract |
Iran and Israel have been bitter foes for more than four decades. Prime Minister Benjamin Netanyahu has been the world's most outspoken leader against Iran's nuclear program, and Jerusalem has been accused of assassinating Iranian nuclear scientists. Tehran has been the main backer of Hezbollah, which has been involved in several military skirmishes against the Jewish state and has targeted Israel's cities with sophisticated rockets. Since the beginning of the civil war in Syria in 2011, Israel has been bombing Iranian and Shiite targets almost with impunity.
|
|
|
|
|
|
|
|
|
|
7 |
ID:
173104
|
|
|
8 |
ID:
122056
|
|
|
|
|
|
|
|