Cyber Security
Cyber security
Visible War: Information War, Surveillance and Speed
Cowardly Traitor or Heroic Whistleblower? The Impact of Edward Snowden’s Disclosures on Canada and the United Kingdom’s Security Establishments
Beyond the Castle Model of Cybersecurity
Identifying Digital Threats in a Hacker Web Forum
The ecology of trust among hackers
Abstract: Malicious hackers profit from the division of labour among highly skilled associates. However, duplicity and betrayal form an intrinsic part of their daily operations. This article examines how a – …
The International Monetary Fund and Surveillance
Centers of Concatenation: Fusing Data in Post-9/11 Security Organizations
CSIS Annual Report, 2010-2011
Cyber Warriors in the Middle East: The Case of the Syrian Electronic Army
This paper investigates the online hacking group, the Syrian Electronic Army (SEA), and examines its goals. (Source: Publication).
The Social Network of Hackers
Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical – …
We Don’t Have These Laser Beams and Stuff Like That’: Police Investigations as Low-Tech Work in a High-Tech World
The Proliferation of Cyber Security Strategies and Their Implications for Privacy
The commercial internet has now been in existence for almost fifteen years, but it seems that Western government have barely realized the extent to which this technology is redefining security – …
Evolving Transnational Threats and Border Security: A New Research Agenda
TSAS WP14-01: Researching Terrorism and Counter-Terrorism through a Network Lens
In this paper, we argue that integrating network concepts and network methods to the study of terrorism and counter-terrorism are central ingredients in bringing the field forward from theoretical, empirical, – …
Preliminary Analytical Considerations in Designing a Terrorism and Extremism Online Network Extractor
It is now widely understood that extremists use the internet in attempts to accomplish many of their objectives. In this chapter we present a web-crawler called the terrorism and Extremism – …
A Vision of Crimes in the Future
How Cyberattacks Threaten Real-World Peace
The Security Mirage
Informing (In)Stability: The Security Implications of a Shifting News and Media Environment
This 60-page booklet contains highlights from the February 21-22 2012 conference that was held by the Canadian Security Intelligence Service in collaboration with Policy Horizons Canada.
Assessing Cyber Threats to Canadian Infrastructure
The purpose of this study is threefold: (1) to examine the cyber threat environment confronting Canada’s Critical National Infrastructure (CNI), with a particular focus on four key sectors and their – …
‘Bomb-Making for Beginners’: Inside al Al-Qaeda E-Learning Course
This study explores how terrorists utilise the Internet to learn bomb-making skills. Unlike previous studies, it does not focus on assessing the quality of online bomb recipes. (Source: Publication).