Search This Blog

5.26.2020


  How To Use Quotes In Your Paper (APA)


http://www.yorku.ca/igreene/citgd.htm

 

          

4.01.2020

Upcoming lecture reading list


For the upcoming lecture - 4.05.2020 :

What are the intelligence studies is all about?

https://scholar.google.com/scholar?hl=iw&as_sdt=0%2C5&q=What+is+Intelligence+Studies%3F+Peter+Gill+%26+Mark+Phythian+++&btnG=


 For the upcoming lecture - 
4.06.2020, please read the article:

Does the Intelligence Cycle Still Exist?‏

https://scholar.google.com/scholar?hl=iw&as_sdt=0%2C5&q=THEORY+OF+NATIONAL+SECURITY+LT.+COL.+CSABA+VIDA%2CPHD+INTELLIGENCE+ANALYSIS&btnG=


 For the upcoming lecture - 4.08.2019 please read the article:

Controlling the intelligence Bulgarian Document 6


For the upcoming lecture - 4.021.2020, please read: pp 8 - 25

Controlling the intelligence Bulgarian Document 7

For the upcoming lecture - 4.24.2020 ,  please read: pp 56 - 72 

Intelligence Information and Policy Makers.





Dear students,

Games without frontiers is an advanced course in political science and military history, introducing the operating framework of the intelligence organization's operation in Western democracies.

In addition to classic intelligence studies, we will review aspects of Cybersecurity & Cyber intelligence.

Here is the sum of subjects we will review:


1. Basic concepts of national intelligence organizations

Understanding the difference between foreign and internal intelligence services.
Current and classic technological concepts of intelligence work.

Human intelligence in the age of cyber. 

Information and disinformation. "A view to a kill"- differences between operating intelligence service in popular fiction versus Reality.

Operating foreign intelligence services within the framework of democratic states.


2. Operating intelligence services in democracies, new democracies, and autocracies 

          The legal framework in which foreign intelligence services are operating. 

          The question of subordination between the intelligence services and the political decision-makers, what actually is the chain of command?

           The relationships between political decision-makers (echelons) and the intelligence services, theoretical models versus practice.


3. Political oversight models over the intelligence 

Existing political control models over intelligence services, are they adequate to the challenges of the present?

           Cybersphere challenges, obstacle or opportunities, regarding intelligence services oversight?

Up to date approaches of civic control over foreign intelligence services.

The role of the intelligence report to the political decision-makers within the intelligence cycle. Between personal and political ambiguity.


4.  Cyber intelligence:

        What is cyber-security? Introduction of: "Darknet", "social engineering" and “hacking” terminologies.

Introducing basic concepts of Cyber Warfare, Military Use and Deterrence, Countermeasures and Counterattacks.

Reviewing some of the major methodologies and concepts guiding intelligence organizations. Focusing on political and ethical dilemmas, defining the framework of civic control and supervision over the intelligence services.

Examining the interaction between political decision-makers and intelligence services, in order to identify patterns of decision making and future possible models for cooperation between the states’ political elites and the intelligence professionals.

Basic Bibliography for cyber intelligence:

Andress, J. & Winterfeld, S. (2011). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Boston, MA: Syngress.
Bouchard, M., and H. Nguyen. (2009) “Is it Who You Know or How Many That Counts? Criminal Networks and Cost Avoidance in a Sample of Young Offenders.” Justice Quarterly 27, no. 1

Brenner, Susan. Cyberthreats: The Emerging Fault Lines of the Nation State. New York: Oxford University Press, 2008.

Chandler and R Boadhurst, "Social Engineering and Crime Prevention in Cyberspace," Queensland Univeristy of Technology, Brisbane, 2006.

Carr, J. (2011). Inside Cyber Warfare: Mapping the Cyber Underworld. Sebastopol, CA: O'Reilly Media Incorporated.
Clarke, R.A. and Knake, R.K. (2010). Cyber War: The Next Threat to National Security and What to Do About It New York, NY: Ecco.
Decary-Hetu, David, and Benoit Dupont. “The Social Network of Hackers.” Global Crime 13 (2012)

F. Barbhuiya, S. Biswas, N. Hubballi, and S. Nandi, “A host based DES approach for detecting arp spoofing,” in Computational Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on, april 2011

Holt, Thomas J., Deborah Strumsky, Olga Smirnova, and Max Kilger. “Examining the Social Networks of Malware Writers and Hackers.” International Journal of Cyber Criminology 6 (2012)

Holt, Thomas J., and Eric Lampke. “Exploring Stolen Data Markets On-line: Products and Market Forces.” Criminal Justice Studies 23 (2010)


Kramer, F.D., Starr, S.H., & Wentz, L. eds. (2009). Cyberpower and National Security. Washington D.C.: National Defense University Press and Potomac Books.

Lowenthal, Mark M. Intelligence: From Secrets to Policy. 5th ed. Washington, DC: CQ Press, 2012.
Liu, E.C., (2013, January). Reauthorization of the FISA Amendments. Congressional Research Service Report for Congress, 7-5700, R42725. Available online at: http://www.fas.org/sgp/crs/intel/R42725.pdf.
Menn, J. (2010). Fatal System Error, New York, NY: Public Affairs.
Tremblay, P., M. Bouchard, and S. Petit. “The Size and Influence of a Criminal Organization: A Criminal Achievement Perspective.” Global Crime 10 (2009)
Markham, Annette N. “Internet Research.” In Qualitative Research: Issues of Theory, Method, and Practice. 3rd ed., edited by David Silverman, 111-127. Thousand Oaks, CA: Sage, 2011.

M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, “A detailed analysis of the kdd cup 99 data set,” in Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE Symposium on, july 2009
O. Linda, M. Manic, T. Vollmer, and J. Wright, “Fuzzy logic based anomaly detection for embedded network security cyber sensor,” in Computational Intelligence in Cyber Security (CICS), 2011 IEEE Sym­posium on, april 2011
S. Yu and D. Dasgupta, “An effective network-based intrusion detection using conserved self pattern recognition algorithm augmented with near-deterministic detector generation,” in Computational Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on, april 2011

Wang, Q., W. T. Yue, and K. Hui. (2012) “Do Hacker Forums Contribute to Security Attacks?” Lecture Notes In Business Information Processing 108

Internet sources
Frontline: Behind Taliban Lines, February 23,2010. Available online at:
Federation of American Scientists publishes various reports at http://www.fas.org/pubs/briefs.html or http://www.fas.org/blog/secrecv/.
http://www.ncix.gov/publications/reports/fecie all/Foreign Economic Collection 2011.pdf.
Cyberwar: War in the Fifth Domain. (2010). The Economist. Online at: http://www.economist.com/node/16478792
Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. This text is a 2010 compilation of papers prepared by the National Research Council. For more information: http://www.nap.edu/catalog.php7record id=12997.
FBI. “Directorate of Intelligence, Intelligence Collection Disciplines.” http://www.fbi.gov/about-us/intelligence/disciplines

Chu, Bill, Thomas J. Holt, and Gail Joon Ahn. Examining the Creation, Distribution, and Function of Malware On-Line. Washington, DC: National Institute of Justice, 2010. Accessed April 11, 2011. http://www.ncjrs.gov/pdffiles1/nij/grants/230112.pdf.

Dunn, Justin E. “Russia Cybercrime Market Doubles in 2011, Says Report.” IT World (2012). Accessed September 23. http://www.itworld.com/security/272448/russia-cybercrime-market- doubles-2011-says-report.

 Symantec Corporation. Symantec Internet Security Threat Report, Vol. 17. Accessed June 20, 2012.             http://www.symantec.com/threatreport.