Cyber intelligence and international security: (Record no. 48129)

MARC details
000 -LEADER
fixed length control field 02167nam a22002177a 4500
001 - CONTROL NUMBER
control field 48129
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250611152017.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250611b |||||||| |||| 00| 0 eng d
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name BROEDERS Dennis
Relator term author
245 ## - TITLE STATEMENT
Title Cyber intelligence and international security:
Remainder of title breaking the legal and diplomatic silence? /
Statement of responsibility, etc. Dennis Broeders
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Date of publication, distribution, etc. 2024
520 ## - SUMMARY, ETC.
Summary, etc. In cyberspace intelligence agencies, rather than militaries, are the most prominent security actors. However, many cyber operations conducted by intelligence agencies are not ‘classic’ espionage activities but may be best described as digital covert action (sabotage, subversion, information operations). Given the fact that international law and diplomacy traditionally do not address espionage, cyber operations conducted by intelligence agencies have developed in a legal grey zone that gets stretched by the behaviour of the intelligence agencies of the most brazen cyber powers. The digital age has significantly transformed the capabilities and the role of intelligence agencies, which raises the question if the traditional international consensus that ‘intelligence is not discussed’ is still useful in state-to-state relations. The theoretically underdefined role and activities of intelligence agencies are affected by four big changes in the digital age: increase in scale of their activities and effects, heightened ambiguity, massive expansion of the attack surface and trickle-down insecurity, which point to a need to rethink how cyber intelligence agencies should operate. Some states will continue to push the boundaries of what is possible in cyberspace, unless other states break with the legal and diplomatic silence to discuss ‘guardrails’ to cyber intelligence activities.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element CYBER OPERATIONS
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element INTELLIGENCE
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element ESPIONAGE
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element CYBER DIPLOMACY
General subdivision INTERNATIONAL LAW
773 ## - HOST ITEM ENTRY
Related parts Intelligence and National Security, Volume 39, Number 7, December 2024, pages: 1213-1229
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://www.tandfonline.com/doi/full/10.1080/02684527.2024.2398077">https://www.tandfonline.com/doi/full/10.1080/02684527.2024.2398077</a>
Public note Click here for full text
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Journal Articles
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total checkouts Full call number Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Mindef Library & Info Centre Mindef Library & Info Centre Journals 11/06/2025   INTELLIGENCE 11/06/2025 11/06/2025 Journal Articles