National Security, Journalism, and Law in an Age of Information Warfare


Book Description

National Security, Journalism, and Law in an Age of Information Warfare helps one understand how secret-keepers, journalists, and sources are navigating unprecedented challenges in an age when trust in government and traditional media is low and the spread of disinformation through social media undermines efforts to inform and protect the public.




Information Warfare in the Age of Cyber Conflict


Book Description

This book examines the shape, sources and dangers of information warfare (IW) as it pertains to military, diplomatic and civilian stakeholders. Cyber warfare and information warfare are different beasts. Both concern information, but where the former does so exclusively in its digitized and operationalized form, the latter does so in a much broader sense: with IW, information itself is the weapon. The present work aims to help scholars, analysts and policymakers understand IW within the context of cyber conflict. Specifically, the chapters in the volume address the shape of influence campaigns waged across digital infrastructure and in the psychology of democratic populations in recent years by belligerent state actors, from the Russian Federation to the Islamic Republic of Iran. In marshalling evidence on the shape and evolution of IW as a broad-scoped phenomenon aimed at societies writ large, the authors in this book present timely empirical investigations into the global landscape of influence operations, legal and strategic analyses of their role in international politics, and insightful examinations of the potential for democratic process to overcome pervasive foreign manipulation. This book will be of much interest to students of cybersecurity, national security, strategic studies, defence studies and International Relations in general.




Law, Policy, and Technology


Book Description

"This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact"--Provided by publisher.




War on Words


Book Description

This unprecedented book provides a comprehensive examination of the issue of protecting journalists in conflict situations from both a practical and humanitarian law perspective. Violent criminals and corrupt governmental officials harass, co-opt, and kill local and foreign journalists in countries from Mexico to Afghanistan, to Russia and the Philippines. Staggeringly, there has been little or no prosecution in 89 percent of journalist murders worldwide. Such widespread impunity is arguably one of the greatest threats to press freedom. A number of international organizations and advocates have developed efforts to mitigate this problem, but belligerents continue to act with few restraints and little, if any, accountability. War on Words: Who Should Protect Journalists? is an examination of the deteriorating and dangerous environment facing journalists and what stakeholders are doing to address this serious problem threatening democracy worldwide. The authors explore the peril facing journalists, delve into the legal and practical history of press protection, evaluate current safety strategies for journalists, and gather opinions from an array of local and international correspondents and practitioners on how to improve this untenable situation.







Strategic Information Warfare


Book Description

Future U.S. national security strategy is likely to be profoundly affected by the ongoing, rapid evolution of cyberspace--the global information infrastructure--and in particular by the growing dependence of the U.S. military and other national institutions and infrastructures on potentially vulnerable elements of the U.S. national information infrastructure. To examine these effects, the authors conducted a series of exercises employing a methodology known as the Day After ... in which participants are presented with an information warfare crisis scenario and asked to advise the president on possible responses. Participants included senior national security community members and representatives from security-related telecommunications and information-systems industries. The report synthesizes the exercise results and presents the instructions from the exercise materials in their entirety.




Journalism After Snowden


Book Description

Edward Snowden's release of classified NSA documents exposed the widespread government practice of mass surveillance in a democratic society. The publication of these documents, facilitated by three journalists, as well as efforts to criminalize the act of being a whistleblower or source, signaled a new era in the coverage of national security reporting. The contributors to Journalism After Snowden analyze the implications of the Snowden affair for journalism and the future role of the profession as a watchdog for the public good. Integrating discussions of media, law, surveillance, technology, and national security, the book offers a timely and much-needed assessment of the promises and perils for journalism in the digital age. Journalism After Snowden is essential reading for citizens, journalists, and academics in search of perspective on the need for and threats to investigative journalism in an age of heightened surveillance. The book features contributions from key players involved in the reporting of leaks of classified information by Edward Snowden, including Alan Rusbridger, former editor-in-chief of The Guardian; ex-New York Times executive editor Jill Abramson; legal scholar and journalist Glenn Greenwald; and Snowden himself. Other contributors include dean of Columbia Graduate School of Journalism Steve Coll, Internet and society scholar Clay Shirky, legal scholar Cass Sunstein, and journalist Julia Angwin. Topics discussed include protecting sources, digital security practices, the legal rights of journalists, access to classified data, interpreting journalistic privilege in the digital age, and understanding the impact of the Internet and telecommunications policy on journalism. The anthology's interdisciplinary nature provides a comprehensive overview and understanding of how society can protect the press and ensure the free flow of information.




The Oxford Handbook of Cyber Security


Book Description

Cyber security is concerned with the identification, avoidance, management and mitigation of risk in, or from, cyber space. The risk concerns harm and damage that might occur as the result of everything from individual carelessness, to organised criminality, to industrial and national security espionage and, at the extreme end of the scale, to disabling attacks against a country's critical national infrastructure. However, there is much more to cyber space than vulnerability, risk, and threat. Cyber space security is an issue of strategy, both commercial and technological, and whose breadth spans the international, regional, national, and personal. It is a matter of hazard and vulnerability, as much as an opportunity for social, economic and cultural growth. Consistent with this outlook, The Oxford Handbook of Cyber Security takes a comprehensive and rounded approach to the still evolving topic of cyber security. The structure of the Handbook is intended to demonstrate how the scope of cyber security is beyond threat, vulnerability, and conflict and how it manifests on many levels of human interaction. An understanding of cyber security requires us to think not just in terms of policy and strategy, but also in terms of technology, economy, sociology, criminology, trade, and morality. Accordingly, contributors to the Handbook include experts in cyber security from around the world, offering a wide range of perspectives: former government officials, private sector executives, technologists, political scientists, strategists, lawyers, criminologists, ethicists, security consultants, and policy analysts.




Threatcasting


Book Description

Impending technological advances will widen an adversary’s attack plane over the next decade. Visualizing what the future will hold, and what new threat vectors could emerge, is a task that traditional planning mechanisms struggle to accomplish given the wide range of potential issues. Understanding and preparing for the future operating environment is the basis of an analytical method known as Threatcasting. It is a method that gives researchers a structured way to envision and plan for risks ten years in the future. Threatcasting uses input from social science, technical research, cultural history, economics, trends, expert interviews, and even a little science fiction to recognize future threats and design potential futures. During this human-centric process, participants brainstorm what actions can be taken to identify, track, disrupt, mitigate, and recover from the possible threats. Specifically, groups explore how to transform the future they desire into reality while avoiding an undesired future. The Threatcasting method also exposes what events could happen that indicate the progression toward an increasingly possible threat landscape. This book begins with an overview of the Threatcasting method with examples and case studies to enhance the academic foundation. Along with end-of-chapter exercises to enhance the reader’s understanding of the concepts, there is also a full project where the reader can conduct a mock Threatcasting on the topic of “the next biological public health crisis.” The second half of the book is designed as a practitioner’s handbook. It has three separate chapters (based on the general size of the Threatcasting group) that walk the reader through how to apply the knowledge from Part I to conduct an actual Threatcasting activity. This book will be useful for a wide audience (from student to practitioner) and will hopefully promote new dialogues across communities and novel developments in the area.




Targeted Killings


Book Description

The controversy surrounding targeted killings represents a crisis of conscience for policymakers, lawyers and philosophers grappling with the moral and legal limits of the war on terror. This text examines the legal and philosophical issues raised by government efforts to target suspected terrorists.