368 research outputs found

    Information Warfare: The Legal Aspects of Using Satellites and Jamming Technologies in Propaganda Battles

    Get PDF
    This paper examines the right of states to broadcast propaganda by satellite in times of war. In exploring this issue, the author addresses the hypothetical question of whether a state may use DBS technology to broadcast a commercial news program, such as CNN, into an enemy state in wartime as part of a larger campaign to win the support of the civilian population. The author begins by establishing that that the consent of a receiving state is required prior to such broadcasts, whether in peacetime or in times of war. This requirement of prior consent is the only restriction of the broadcasting of such news programs since the programs do not rise to the level of illegal war propaganda nor would such broadcasts be prohibited by the international law demanding that outer space be used only for peaceful purposes. This analysis concludes with the warning that the inviolability of the prior consent doctrine may be threatened by the recent adoption by the United States of a more relaxed theory of what measures may be taken under the right of self-defense. Finally, the author takes up the related question regarding the right of states to use jamming technologies to block illegal satellite transmissions

    Paper Session II-C - Assured Access To and Use of Space: A Military Perspective

    Get PDF
    On 23 September 1985, the Joint Chiefs of Staff (JCS) formed the Unified Space Command (USSPACECOM) with headquarters in Colorado Springs, Colorado. The components of the new command are the Air Force Space Command, the Naval Space Command, and the Army Element. General Robert T. Herres was named Commander-in- Chief of the Aerospace Defense Command (ADCOM) which began deactivation after formation of USSPACECOM. The missions of ADCOM were divided between USSPACECOM and the North American Aerospace Defense Command (NORAD). Those ADCOM missions reassigned to USSPACECOM are Attack Warning/Attack Assessment and Space Defense, renamed Space Control. Space Support, a previously unassigned space operation, was also assigned to CINC USSPACECOM or CINCSPACE. Formation of USSPACECOM is an acknowledgement of the extent to which the National Command Authorities (NCA) and worldwide air, land, sea, and other space operational forces depend on the missions which space systems perform. CINCSPACE is responsible through the JCS to the NCA for conducting effective military space operations and integrating them into the military operations of the traditional forces. Space operations, therefore, will become more responsive to NCA direction and to the operational needs of the unified and specified CINCs. The JCS tasked CINCSPACE TO maintain assured access to and use of space for the U.S. and her allies at all times. 3 The purpose of this paper is to examine that task. What are the basic elements of space operations? How important are they? Is there a threat? If so, are U.S. space systems and operations strong enough to survive in the face of a determined effort to defeat them

    Wojny cybernetyczne jako element niekonwencjonalnej konfrontacji międzypaństwowej. Pragmatyczna rzeczywistość, nieunikniona przyszłość

    Get PDF
    The aim of this article is to examine the phenomenon of cyber warfare as part of an unconventional confrontation between states in contemporary international relations. The construction of this study, dictated by an attempt to achieve a response on the above research subject, brought the author to adopt the following structure. The first part of the work presents the development of computer hardware and networks together with visualizing the cyberspace importance. Next, the conditions of this theoretical issues, in particular, the basic determinants categories of network attacks and their classifications are presented. Further, the practical aspects of the application of those attacks are shown, taking a point of view specific casus i.e. Kosovo, China, Estonia, Georgia and Iran. At the end, the cyberwars were under consideration including the differences, similarities and lessons learned for the future.Celem niniejszego artykułu jest zbadanie zjawiska wojny cybernetycznej, jako elementu niekonwencjonalnej konfrontacji międzypaństwowej we współczesnych stosunkach międzynarodowych. Konstrukcja niniejszej pracy, podyktowana próbą osiągnięcia odpowiedzi na powyższy temat badawczy, sprowadziła autora do przyjęcia następującej struktury. W pierwszej części pracy, przedstawiono rozwój sprzętu komputerowego i sieci informatycznych wespół z uwidocznieniem znaczenia cyberprzestrzeni. Następnie, opisano uwarunkowania teoretyczne przedmiotowej problematyki, w szczególności podstawowe determinanty, kategorie ataków z sieci oraz ich klasyfikacje. W dalszej kolejności, ukazano praktyczne aspekty zastosowania powyższych ataków biorąc za punkt widzenia konkretne casusy tj. Kosowa, Chin, Estonii, Gruzji oraz Iranu. Na koniec zaś poddano pod rozwagę cyberwojny poruszając różnice i podobieństwa oraz płynące z nich wnioski na przyszłość

    The United States Postal Service: an Essential Public Health Agency?

    Get PDF

    Report of committee to investigate communist activities in South Carolina [1971]

    Get PDF
    This committee was created to develop and execute an educational program to inform the people of the state of South Carolina of the threat of communism to the national security

    Generation of realistic signal strength measurements for a 5G Rogue Base Station attack scenario

    Get PDF
    The detection and prevention of cyber-attacks is one of the main challenges in Vehicle-to-Everything (V2X) autonomous platooning scenarios. A key tool in this activity is the measurement report that is generated by User Equipment (UE), containing received signal strength and location information. Such data is effective in techniques to detect Rogue Base Stations (RBS) or Subscription Permanent Identifier SUPI/5G-GUTI catchers. An undetected RBS could result in unwanted consequences such as Denial of Service (DoS) attacks and subscriber privacy attacks on the network and UE. Motivated by this, this paper presents the novel simulation of a 5G cellular system to generate a realistic dataset of signal strength measurements that can later be used in the development of techniques to identify and prevent RBS interventions. The results show that the tool can create a large dataset of realistic measurement reports which can be used to develop and validate RBS detection techniques

    The impact of cybercrime on e-banking: A proposed model

    Get PDF
    Each day cybercrime attacks are getting more frequent, dangerous and sophisticated. In 2016 the FBI’s Internet Crime Complaint Center received 1,408,849 complaints and a reported loss of $4.63 billion. The concept of cybercrime is complex, and as such the drive to overcome the problem is very difficult. However, the continual escalation of cybercrimes can have a negative impact on businesses and by extension the economies of countries. As a result, it is imperative that measures be identified to overcome the problem. Hence, this study seeks to propose a research model which can be used to evaluate the significance of cybercrime in deterring the use of e-banking in the financial sector. It is hoped that the proposed research model will influence other researchers to conduct empirical research in their context
    corecore