• Complain

Neil Kent - Cyber Security Meets National Security: International Perspectives on Digital Era Threats

Here you can read online Neil Kent - Cyber Security Meets National Security: International Perspectives on Digital Era Threats full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Washington, D.C., year: 2022, publisher: Academica Press, genre: Science / Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Cyber Security Meets National Security: International Perspectives on Digital Era Threats
  • Author:
  • Publisher:
    Academica Press
  • Genre:
  • Year:
    2022
  • City:
    Washington, D.C.
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Cyber Security Meets National Security: International Perspectives on Digital Era Threats: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Cyber Security Meets National Security: International Perspectives on Digital Era Threats" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Today more than ever, the line between national security and cyber security is becoming increasingly erased. As recent attacks on US infrastructure show (for example, the oil pipeline hack of 2021), nontraditional threats ranging from hacking for the purposes of extracting ransom to terrorist communications online are emerging as central to national threat assessment. In an innovative fashion that allows for the comparison of approaches to this nexus in the developed and developing countries his volume brings together European and African experts offering an in-depth analysis of the relationship between national and cyber security. The individual chapters theorize the current and future implications of global digitalization; a cogent discussion of the threats French military and security forces face in terms of cyber security failures from within; and an exploration of the relationship between cyber security and national security in the volatile Nigerian context.

Neil Kent: author's other books


Who wrote Cyber Security Meets National Security: International Perspectives on Digital Era Threats? Find out the surname, the name of the author of the book and a list of all author's works by series.

Cyber Security Meets National Security: International Perspectives on Digital Era Threats — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Cyber Security Meets National Security: International Perspectives on Digital Era Threats" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
List of Figures
Guide
Pagebreaks of the Print Version
Cyber Security Meets National SecurityInternational Perspectives on Digital - photo 1
Cyber Security Meets National Security:International Perspectives on Digital Era Threats

Neil KentandIrina du Quenoy

Editors

St. James Studies in World Affairs

Academica PressWashington~London

Library of Congress Cataloging-in-Publication Data

Names: Kent, Neil (editor) | du Quenoy, Irina (editor)

Title: Cyber security meets national security : international perspectives on digital era threats | Neil Kent and Irina du Quenoy

Description: Washington : Academica Press, 2022. | Includes references.

Identifiers: LCCN 2022947439 | ISBN 9781680537789 (hardcover) | 9781680537796 (e-book)

Copyright 2022 Neil Kent and Irina du Quenoy

Contents
  1. Thomas Flichy de La Neuville
  2. Antoine-Louis de Prmonville
  3. Babayo Sule, Bakri Mat, Usman Sambo, Mohammed Kwarah Tal, Muhammad Aminu Yahaya
Digitalizing the World: The Era of Invisible Power

Thomas Flichy de La Neuville (Rennes School of Business)

Introduction

It is clear that the digitalization the world, which interconnects people and equipment, represents a major civilizational transition. It is changing the ways in which power is exercised, partly concealing it from public view. Hackers operate anonymously, attacking websites that collect unwitting users information.

Indeed, one of the dilemmas faced by research into cybersecurity is that most data is not accessible to the wider public. This complex field of study can only be deciphered using the technical capabilities of the army or intelligence services. Still, it is possible to overcome this barrier by exploring the sources of information at either end of the chain. Upstream, a small number of philosophers are reflecting critically on the digital world. One example is Bernard Stiegler, who considers that the internet is a disruptive technology, in that digital automation leads to tax avoidance and unemployment. Downstream, various blogs and websites testify to the current vitality of technology. It is useful to cross-reference technology website Wired.com, which is written for a nonspecialist audience, with French websites InternetActu.net and Reflets.info, which offer a more critical reading of the subject.

Various online tools also enable us to assess the evolution of digital technology, from maps of the underwater cable network that carries 99 percent of internet data to maps of the users of TensorFlow or Shodan.io, which provides an overview of connected devices. To understand this, we have to examine the digital revolutions workings so that we can sketch out the potential geopolitical consequences.

The Commercial Dynamics of the Digital Revolution

Driven by an ambition to replace human unpredictability with artificial intelligence, the digital revolution uses captology to monopolize consumers attention and has remained largely untouched by cyber-dysfunctionalities.

Artificial Intelligence: A Trojan Horse Designed to Rob Humans of Their Independence

In the years to come, the development of artificial intelligence will be flanked by the development of 5G and quantum computing. 5G is one hundred times faster than 4G and interconnects people with digital devices, providing the conditions for everything from smart cities to automated environments. 5G is designed for the Internet of Things, such as smart cars and drones, for example. Switzerland has taken an early lead in this area, launching 338 5G masts on April 17, 2019. This technology is not without its risks, however, as it must be relayed every 800 meters. The waves are very high in frequency and noncontinuous. The situation is further complicated by the fact that China has a number of 5G-related patents, with obvious geopolitical implications. In May 2019, US president Donald Trump banned American telecoms networks from buying Huawei equipment. Indeed, the United States has expressed fears about wide-scale espionage and has pressured its allies to freeze out the Chinese company. However, should Huawei and other Chinese businesses be prevented from rolling out 5G capabilities in Europe, the cost to European telecoms operators would be 55 billion and eighteen months of lost time.

On the quantum computing side, new quantum computers (and IBM Q in particular) are rendering current cryptographic protocols obsolete. While the ten or so quantum computers currently in existence are still in the experimental stage, in the next few years, the development of AI will primarily allow it to not only guide consumers choices but also to reform state bureaucracy. A new science captology has been developed to this end.

Captology: The Art of Invisible Manipulation

AI is first and foremost about emotions. Algorithms turn our mental space into code in an effort to capture our attention. The origins of captology reside in the work of Stanford Universitys B. J. Fogg, who published Persuasive Technology:Using Computers to Change What WeThink and Do in 2003. Persuasive technologies have been designed by choice architects to nudge peoples choices in a certain direction. Rooted in behavioral economics and neuro-marketing, they lend algorithms a governing power. This new economy considers our attention spans to be a rare and precious resource that can be used to a businesss advantage when it is focused on information that, in turn, provokes a particular action. Recognizing the potential negative effect of these techniques, Bernard Stiegler has criticized psychotechnology that short-circuits our attention spans, as had Noam Chomsky and Edward S. Herman before him when they denounced the medias role in manufacturing consent. Captology can also builds on artificially generated anxieties, such as the fear of missing out. This particular fear is largely fueled by certain aspects of modern technology, such as mobile phones and social networking sites, such as Facebook or Twitter, which enable users to constantly compare their profiles. As the worlds internet usage grows, a proportion of individuals will become psychologically dependent on being online and suffer from anxiety whenever they are not logged in.

Captologys potential for generating negative outcomes within the context of global digitalization is clearand yet in the imagination of the global citizenry and security services it is overshadowed by fear of cybercrime, which, however, tends to be overemphasized in the surrounding discourse.

Cybercrimes Minimal Impact on Global Digitalization

Although cybercrime is becoming increasingly prevalent, especially in developing countries, groups of hackers rarely manage to paralyze organizations or states for long periods of time. As for subversion, while it is easy to start a protest movement online, it is very difficult to maintain in the long run. As a result, sabotage makes it temporarily trickier for the world to go digital, whereas espionage harvests the results of our constant connectivity. Ultimately, only noncommercial subversion is capable of endangering the current digital transition, but it is too infrequently executed to pose any serious kind of threat.

Having examined the digital revolutions workings, we can now sketch out the potential geopolitical consequences. Indeed, as can be seen from the preceding discussion, global digitalization is rooted in market dynamics and enables power to be exerted invisibly upon connected individuals. From a broader standpoint, it is aiding financial capitalism maneuver toward a new international geopolitical configuration, to which we now turn.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Cyber Security Meets National Security: International Perspectives on Digital Era Threats»

Look at similar books to Cyber Security Meets National Security: International Perspectives on Digital Era Threats. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Cyber Security Meets National Security: International Perspectives on Digital Era Threats»

Discussion, reviews of the book Cyber Security Meets National Security: International Perspectives on Digital Era Threats and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.