Spelling suggestions: "subject:"espionage"" "subject:"spionage""
31 |
Increasing Effectiveness of U.S. Counterintelligence: Domestic and International Micro-Restructuring Initiatives to MitigateFerguson, Cody J. 20 August 2012
Approved for public release; distribution is unlimited. / Cyberespionage is a prolific threat that undermines the power projection capacity of the United States through
reduced economic prowess and a narrowing of the technical advantage employed by the American military.
International attempts to limit hostile cyber activity through the development of institutions, normative patterns of
behavior, or assimilation of existing laws do not provide the American national security decision maker with a timely
or effective solution to address these threats. Unfortunately, the stove-piped, redundant and inefficient nature of the
U.S. counterintelligence community does not deliver a viable alternative to mitigating cyberespionage in an effective
manner. Instituting a domestic and international micro-restructuring approach within the Department of Defense
(DoD) addresses the need for increased effectiveness within an environment of fiscal responsibility. Domestic
restructuring places emphasis on developing a forcing mechanism that compels the DoD counterintelligence services
to develop joint approaches for combating cyberespionage by directly addressing the needs of the Combatant
Commands. International restructuring places an emphasis on expanding cybersecurity cooperation to like-minded
nations and specifically explores the opportunity and challenges for increased cyber cooperation with Taiwan. This
approach recognizes that Taiwan and the United States are both negatively affected from hostile cyber activity
derived from within the People’s Republic of China.
|
32 |
Wirtschaftsspionage in Verhandlungen aus Informationsökonomischer und Wirtschaftsetischer Perspektive : eine Interdisziplinäre Analyse / Industrial espionage in international negotiationsSøilen, Klaus Solberg January 2004 (has links)
The dissertation examines a case of industrial espionage by one of the parties involved in a forthcoming international negotiation. We want to know what consequences a burglary has for the actual negotiation. The dissertation consist of five hypothesis, of which the three first were empirically tested. The discussion of thesis four and five is supported basically by research literature, but have also found indirect support in the empirical study. A game theoretical model of four information sets is used. Thesis 1: Pay-offs do not change significantly from one information set to the other. confirmed Thesis 2: Behavior do not change significantly from one information set to the other. confirmed Thesis 3: The perception of fairness do not change significantly from one information set to the other. confirmed Thesis 4: International negotiations is socially so complex that it only makes sense to study the phenomena from an interdisciplinary angle. confirmed Thesis 5: A descriptive evolutionary approach can be an alternative to neoclassical economic theory in understanding the study of international negotiations. confirmed The study also confirms that economic theory is correct in excluding the ethical dimension from their models, as these factors have little influence on the end price. Fairness plays only a minor role in international negotiations. ** / <p>Forskarens hemsida: http://www.bth.se/iem/kss.nsf Disputerat vid Universität Leipzig, Wirtschaftswissenschaftliche Fakultät, http://www.uni-leipzig.de/ Avhandlingen utgiven av BTH.</p>
|
33 |
The Defense Against the latest Cyber Espionage both insider and outsider attacksNsambu, Emmanuel, Aziz, Danish January 2012 (has links)
This study was carried out with the intention of examining the defensive mechanism employed against the latest cyber espionage methods including both insider and outsider attacks. The main focus of this study was on web servers as the targets of the cyber attacks. Information in connection to the study was obtained from researchers’ online articles. A survey was also conducted at MidSweden University in order to obtain information about the latest cyber attacks on web servers and about the existing defensive mechanism against such attacks. The existing defensive mechanism was surveyed and a simple design was created to assist in the investigation of the efficiency of the system. Some simple implementations of the existing defensive mechanism were made in order to provide some practical results that were used for the study. The existing defensive mechanism was surveyed and improved upon where possible. The improved defensive mechanism was designed and implemented and its results were compared with the results from the existing defensive mechanism. Due to the fact that the majority of the attackers use defensive mechanisms’ vulnerability in order to find their way into devices such as web servers, it was felt that, even with the most sophisticated improved defensive mechanism in place, it would not be entirely correct to claim that it is possible to fully protect web servers against such attacks.
|
34 |
Studien zum politischen Verständnis moderner englischer UnterhaltungsliteraturSchultze, Bruno. January 1977 (has links)
Habilitationsschrift--Hamburg. / Includes bibliographical references (p. 225-238).
|
35 |
Bundesbürger im Dienst der DDR-Spionage : eine analytische Studie /Herbstritt, Georg. January 2007 (has links)
Zugl.: Berlin, Humboldt-Universiẗat, Diss., 2007.
|
36 |
Élaboration d'un système de contrôle de l'espionnage industriel par la fonction contrôle de gestion / Elaboration of a system of control of the industrial espionage by the management control functionFane, Oumar 12 November 2018 (has links)
Plusieurs problèmes accablent les organisations, mais l’espionnage industriel occupe de plus en plus une place grandissante. Ses conséquences sont catastrophiques, allant des pertes de sommes colossales à la faillite de certaines entreprises. Ce travail de recherche, s’inscrivant dans le champ disciplinaire des Sciences de Gestion, particulièrement du contrôle de gestion, a pour finalité d’appréhender le processus de contrôle de l’espionnage industriel dans les organisations, en élaborant un système de contrôle de l’espionnage industriel par la fonction contrôle de gestion. Après une revue de littérature et une première vague d’entretiens semi-directifs, qui ont montré les limites des protections juridiques et les vides de gestion des protections techniques contre l’espionnage industriel, nous avons construit un modèle théorique du processus de contrôle de l’espionnage industriel par la fonction contrôle de gestion, qui met en interaction les figures imposées / libres, les leviers de contrôle diagnostic / interactif et leurs outils, et les six dimensions d’analyse réajustées. Ensuite, nous avons élaboré un système de contrôle de l’espionnage industriel, en déterminant ses outils et en spécifiant son instrumentation dans les organisations. Une deuxième vague d’entretiens semi-directifs a été effectuée pour justifier la pertinence dudit système auprès des spécialistes professionnels et universitaires du contrôle de gestion. / Several problems overwhelm organizations, but industrial espionage is becoming more and more important. Its consequences are catastrophic, ranging from the loss of colossal sums to the bankruptcy of certain companies. This research work, which is part of the disciplinary field of Management Sciences, particularly management control, aims to understand the process of controlling industrial espionage in organizations by developing a control system of industrial espionage by the management control function. After a literature review and a first wave of semi-directive interviews, which showed the limits of legal protections and management gaps of technical protections against industrial espionage, we constructed a theoretical model of the control process of industrial espionage by the management control function, which puts into interaction the imposed / free figures, the diagnostic / interactive control levers and their tools, and the six readjusted analysis dimensions. Then we developed a system of control of the industrial espionage by determining its tools and specifying its instrumentation in organizations. A second wave of semi-directive interviews was conducted to justify the relevance of this system with professional and academic management control specialists.
|
37 |
Novas fronteiras para a comunicação ativista em rede = um olhar sobre o centro de mídia independente / New frontiers for activist communication networks : a look on the independent media centerBatalha, Marcelo da Luz 18 August 2018 (has links)
Orientador: Thomas Patrick Dwyer / Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Filosofia e Ciências Humanas / Made available in DSpace on 2018-08-18T01:14:15Z (GMT). No. of bitstreams: 1
Batalha_MarcelodaLuz_M.pdf: 4525323 bytes, checksum: 7b2582c21c2f00cec1d2766cab1a8c28 (MD5)
Previous issue date: 2010 / Resumo: Esta pesquisa resulta de uma investigação sobre os repertórios de ação política do Centro de Mídia Independente, uma rede de ativista organizada e distribuída através da rede mundial de computadores. A proposta de investigação dirige-se à relação entre os movimentos sociais e a mídia, no que conforma uma nova estrutura de comunicação e recurso material com o advento da Internet e a sua apropriação pelos movimentos sociais e grupos ativistas. Através do Centro de Mídia Independente se teoriza sobre a cultura hacker, seus fundamentos e orientações morais e éticas de acesso, abertura e compartilhamento coletivo do conhecimento e informação, fundamentados pelo movimento do software livre. Esses princípios éticos e a prática ativista para fins políticos colocam desafios às instituições estabelecidas como os Estados e a mídia de massa. Sobremaneira, essas instituições estão a reorientar a geopolítica do ciberespaço, se justificando principalmente pelos acontecimentos do 11 de setembro, em que se declarou um estado de suspeita e vigilância total sob a ameaça iminente de uma ciberguerra declarada por grupos étnicos e políticos aos Estados. No entanto, as fronteiras do ciberespaço estão mais do que abertas, estão em constante expansão, como atesta os repertórios de segurança e privacidade dos grupos ativistas frente à tentativa de controle das suas atividades online / Abstract: This research stems from an investigation into the repertoires of political action of the Independent Media Center, a network of activist organizations and distributed through a worldwide network of computers. The proposed research addresses the relationship between social movements and the media, which conforms to a new structure of communication and resource material with the advent of the Internet and its appropriation by social movements and activist groups. Through the Independent Media Center is theorizes about the hacker culture, its foundations and moral and ethical guidelines for access, openness and sharing of collective knowledge and information, substantiated by the free software movement. These ethical principles and practice for political activist pose challenges to established institutions like the States and mass media. Overwhelmingly, these institutions are to reorient the geopolitics of cyberspace, is justified mainly by the events of September 11, which declared a state of total surveillance and suspicion under the imminent threat of cyberwar declared by ethnic and political groups to states. However, the boundaries of cyberspace are more than open, they are constantly expanding, as evidenced by the repertoires of security and privacy advocacy groups before the attempt to control their online activities / Mestrado / Movimentos Sociais, Cultura e Política / Mestre em Ciência Política
|
38 |
Open-source environmental scanning and risk assessment in the statutory counterespionage milieuDuvenage, Petrus Carolus 23 May 2011 (has links)
The research focuses on the utilisation of open-source information in
augmentation of the all-source counterespionage endeavour. The study has the
principal objective of designing, contextualising and elucidating a micro-theoretical
framework for open-source environmental scanning within the civilian, statutory
counterespionage sphere.
The research is underpinned by the central assumption that the environmental
scanning and the contextual analysis of overt information will enable the
identification, description and prioritisation of espionage risks that would not
necessarily have emerged through the statutory counterespionage process in
which secretly collected information predominates. The environmental scanning
framework is further assumed to offer a theoretical foundation to surmount a
degenerative counterespionage spiral driven by an over-reliance on classified
information. Flowing from the central assumption, five further assumptions formulated
and tested in the research are the following: (1) A methodically demarcated referent premise enables the focusing and
structuring of the counterespionage environmental scanning process amid the
exponential proliferation of overt information.
(2) Effective environmental scanning of overt information for counterespionage
necessitates a distinctive definition of ‘risk’ and ‘threat’, as these are
interlinked yet different concepts. It is therefore asserted that current notions
of ‘threat’ and ‘risk’ are inadequate for feasible employment within an overt
counterespionage environmental scanning framework. (3) A framework for overt counterespionage environmental scanning has as its
primary requirement the ability to identify diverse risks, descriptively and
predicatively, on a strategic as well as a tactical level. (4) The degree of adversity in the relationship between a government and an
adversary constitutes the principal indicator and determinant of an espionage
risk. (5) The logical accommodation of a framework for overt counterespionage
environmental scanning necessitates a distinctive counterintelligence cycle,
as existing conceptualisations of the intelligence cycle are inadequate.
The study’s objective and the testing of these five assumptions are pursued on both the
theoretical and pragmatic-utilitarian levels. The framework for counterespionage,
open-source environmental scanning and risk assessment is presented as part of
a multilayered unison of alternative theoretical propositions on the all-source
intelligence, counterintelligence and counterespionage processes. It is furthermore
advanced from the premise of an alternative proposition on an integrated
approach to open-source intelligence. On a pragmatic-utilitarian level, the
framework’s design is informed and its application elucidated through an
examination of the 21st century espionage reality confronting the nation state,
contemporary statutory counterintelligence measures and the ‘real-life’ difficulties
of open-source intelligence confronting practitioners.
Although with certain qualifications, the assumptions are in the main validated by
the research. The research furthermore affirms this as an exploratory thesis in a
largely unexplored field. / Thesis (Ph.D)--University of Pretoria, 2010. / Political Sciences / Unrestricted
|
39 |
Espionagem corporativa por meio da internet e segurança da informação nas empresas brasileiras / Corporative espionage through internet and security of information in brazilian companiesFreitas, Vitor Hugo das Dores 12 December 2015 (has links)
Submitted by Nadir Basilio (nadirsb@uninove.br) on 2016-05-13T19:31:23Z
No. of bitstreams: 1
Vitor Hugo das Dores Freitas.pdf: 4490734 bytes, checksum: b281b5be1f7b51ff13fac3c9abcb43b3 (MD5) / Made available in DSpace on 2016-05-13T19:31:23Z (GMT). No. of bitstreams: 1
Vitor Hugo das Dores Freitas.pdf: 4490734 bytes, checksum: b281b5be1f7b51ff13fac3c9abcb43b3 (MD5)
Previous issue date: 2015-12-12 / To achieve your goals in a highly competitive market companies use strategic confidential information, which constitute most valuable asset, which travels over the Internet and internal computer networks. This asset is targeted for corporate espionage practiced through the Internet, whose activity is growing on a global scale. The aim of this study is whether there are legal, standardized safety standards and technology for Brazilian companies dealing with corporate espionage and security of your confidential information. For this we used the hypothetical-deductive method, analysis of legal literature on trade secrets, technical literature on espionage, Internet, cyberspace, methods of attacks by the World Wide Web, malicious programs, statistics and specific cases. The results showed that: a) there are legal, standardized safety standards and technology for the prevention of corporate espionage and protection of confidential business information; b) due to cultural and financial factors, among others, companies are not giving the real importance in their strategic asset protection, confidential information; c) that adoption of physical and virtual barriers to preventive protection of confidential information constitutes a key element for business activities and their disregard not only imply negative factor for the sustainability and corporate social responsibility as well as that information loses its character confidentiality. It must be the creation of a public agency, nationwide, that has the objective of developing concrete and effective awareness policies, awareness and prevention of security incidents on the Internet as well as public forums. It is suggested that future research should be made to investigate any need for implementation in the curriculum of educational institutions, specific matters aimed at information security as a means of developing and consolidating culture on the subject. / Para a consecução de seus objetivos em mercado altamente competitivo as empresas utilizam informações confidenciais estratégicas, que se constituem em seu ativo mais valioso, as quais trafegam pela Internet e redes internas de computadores. Este ativo é visado pela espionagem corporativa praticada por meio da Internet, cuja atividade vem crescendo em escala global. O objetivo deste estudo consiste em saber se existem condições legais, normas de segurança padronizadas e tecnologia para as empresas brasileiras lidarem com a espionagem corporativa e a segurança de suas informações confidenciais. Para tanto foi utilizado o método hipotético-dedutivo, a análise da literatura jurídica sobre segredo comercial, literatura técnica sobre espionagem, Internet, ciberespaço, métodos de ataques pela rede mundial de computadores, programas maliciosos, estatísticas e casos concretos. Dos resultados obtidos se conclui que: a) existem condições legais, normas de segurança padronizadas e tecnologia para a prevenção contra a espionagem corporativa e a proteção das informações confidenciais da empresa; b) em razão de fatores culturais e financeiros, dentre outros, as empresas ainda não estão dando a devida importância na proteção de seu ativo estratégico, a informação confidencial; c) que a adoção de barreiras físicas e virtuais para a proteção preventiva da informação confidencial se constitui elemento chave para as atividades empresariais e sua desconsideração não só implica em fator negativo para a sustentabilidade e responsabilidade social corporativa como também que a informação perde seu caráter de confidencialidade. Impõe-se a criação de órgão público, de âmbito nacional, que tenha por objetivo desenvolver políticas concretas e efetivas de conscientização, sensibilização e prevenção de incidentes de segurança na Internet além de fóruns públicos. Sugere-se que futuramente sejam efetuadas pesquisas que visem apurar eventual necessidade de implementação, na grade curricular de instituições de ensino, de matéria específica voltada à segurança da informação como forma de desenvolver e consolidar cultura a respeito do assunto.
|
40 |
The Spy and the State: The History and Theory of American Civil-Intelligence RelationsRogg, Jeffrey Pela January 2020 (has links)
No description available.
|
Page generated in 0.2231 seconds