9,743 research outputs found

    Peeling Back the Onion of Cyber Espionage after Tallinn 2.0

    Get PDF
    Tallinn 2.0 represents an important advancement in the understanding of international law’s application to cyber operations below the threshold of force. Its provisions on cyber espionage will be instrumental to states in grappling with complex legal problems in the area of digital spying. The law of cyber espionage as outlined by Tallinn 2.0, however, is substantially based on rules that have evolved outside of the digital context, and there exist serious ambiguities and limitations in its framework. This Article will explore gaps in the legal structure and consider future options available to states in light of this underlying mismatch

    Coalitions of things: supporting ISR tasks via Internet of Things approaches

    Get PDF
    In the wake of rapid maturing of Internet of Things (IoT) approaches and technologies in the commercial sector, the IoT is increasingly seen as a key ‘disruptive’ technology in military environments. Future operational environments are expected to be characterized by a lower proportion of human participants and a higher proportion of autonomous and semi-autonomous devices. This view is reflected in both US ‘third offset’ and UK ‘information age’ thinking and is likely to have a profound effect on how multinational coalition operations are conducted in the future. Much of the initial consideration of IoT adoption in the military domain has rightly focused on security concerns, reflecting similar cautions in the early era of electronic commerce. As IoT approaches mature, this initial technical focus is likely to shift to considerations of interactivity and policy. In this paper, rather than considering the broader range of IoT applications in the military context, we focus on roles for IoT concepts and devices in future intelligence, surveillance and reconnaissance (ISR) tasks, drawing on experience in sensor-mission resourcing and human-computer collaboration (HCC) for ISR. We highlight the importance of low training overheads in the adoption of IoT approaches, and the need to balance proactivity and interactivity (push vs pull modes). As with sensing systems over the last decade, we emphasize that, to be valuable in ISR tasks, IoT devices will need a degree of mission-awareness in addition to an ability to self-manage their limited resources (power, memory, bandwidth, computation, etc). In coalition operations, the management and potential sharing of IoT devices and systems among partners (e.g., in cross-coalition tactical-edge ISR teams) becomes a key issue due heterogeneous factors such as language, policy, procedure and doctrine. Finally, we briefly outline a platform that we have developed in order to experiment with human-IoT teaming on ISR tasks, in both physical and virtual settings

    Girt by sea: understanding Australia’s maritime domains in a networked world

    Get PDF
    This study aims to provide the background, language and context necessary for an informed understanding of the challenges and dilemmas faced by those responsible for the efficacy of Australia’s maritime domain awareness system. Abstract Against a rapidly changing region dominated by the rise of China, India and, closer to home, Indonesia, Australia’s approaches to understanding its maritime domains will be influenced by strategic factors and diplomatic judgements as well as operational imperatives.  Australia’s alliance relationship with the United States and its relationships with regional neighbours may be expected to have a profound impact on the strength of the information sharing and interoperability regimes on which so much of Australia’s maritime domain awareness depends. The purpose of this paper is twofold.  First, it seeks to explain in plain English some of the principles, concepts and terms that maritime domain awareness practitioners grapple with on a daily basis.  Second, it points to a series of challenges that governments face in deciding how to spend scarce tax dollars to deliver a maritime domain awareness system that is necessary and sufficient for the protection and promotion of Australia’s national interests

    A Fake Inquiry on a Major Event. Analysis of the Mutsinzi report on the 6th April 1994 attack on the Rwandan President’s aeroplane

    Get PDF
    The report of the Mutsinzi commission attempts to show that President Habyarimana's airplane was not downed by the RPF, as the French investigating judge Bruguière concluded but by Hutu radicals who were close to the main victim of the attack. The report raises a number of serious questions. The Mutsinzi committee claims to be impartial, but all the commissioners are members of the RPF, which means that it is both judge and party. This is made abundantly clear from the beginning of the report and is subsequently confirmed throughout the body of the report, which treats as solid evidence testimonies showing the complicity of Hutu extremists, but systematically disregards the evidence pointing towards the RPF. While the committee claims to have interviewed hundreds of witnesses, the validity of their testimonies must be considered with caution. Of those identified, many are members of the former government army FAR; all of them were interviewed while convicted or detained, or fearing arrest, in full awareness of what those in power expected them to say, and of the price to be paid if they did not. Their testimonies are thus of doubtful quality. The committee uses certain documents, for instance from Belgian judicial files, in a selective and sometimes dishonest way. Numerous examples in the report show that the method used by the committee raises serious doubts. The committee generally proceeds by first presenting unsubstantiated hypotheses or even downright untruths as facts; the accumulation of these “facts” is then used to establish the “truth”. The conclusion the committee reaches is not credibly based on the information emanating from the enquiry, and the fraudulent way in which the report was made rather reinforces the suspicion that the RPF committed the attack. There are now two radically opposed versions of the truth as to who is responsible for the downing of the presidential plane: one is in the findings of the Bruguière inquiry, the other in the Mutsinzi report. Both point fingers at suspects, albeit different ones, and both indicate that a crime has been committed. The natural way of dealing with such findings is to conduct a contradictory debate in a court of law. However, it would seem that both Rwanda and France, in their attempt to improve relations, are intent on sacrificing justice on the altar of political expediency. The Rwandan people deserve better.

    No soldiers left behind: An IoT-based low-power military mobile health system design

    Get PDF
    © 2013 IEEE. There has been an increasing prevalence of ad-hoc networks for various purposes and applications. These include Low Power Wide Area Networks (LPWAN) and Wireless Body Area Networks (WBAN) which have emerging applications in health monitoring as well as user location tracking in emergency settings. Further applications can include real-Time actuation of IoT equipment, and activation of emergency alarms through the inference of a user\u27s situation using sensors and personal devices through a LPWAN. This has potential benefits for military networks and applications regarding the health of soldiers and field personnel during a mission. Due to the wireless nature of ad-hoc network devices, it is crucial to conserve battery power for sensors and equipment which transmit data to a central server. An inference system can be applied to devices to reduce data size for transfer and subsequently reduce battery consumption, however this could result in compromising accuracy. This paper presents a framework for secure automated messaging and data fusion as a solution to address the challenges of requiring data size reduction whilst maintaining a satisfactory accuracy rate. A Multilayer Inference System (MIS) was used to conserve the battery power of devices such as wearables and sensor devices. The results for this system showed a data reduction of 97.9% whilst maintaining satisfactory accuracy against existing single layer inference methods. Authentication accuracy can be further enhanced with additional biometrics and health data information

    The Legality of Using Drones to Unilaterally Monitor Atrocity Crimes

    Get PDF
    corecore