MARC details
000 -LEADER |
fixed length control field |
02167nam a22002177a 4500 |
001 - CONTROL NUMBER |
control field |
48129 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250611152017.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250611b |||||||| |||| 00| 0 eng d |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
BROEDERS Dennis |
Relator term |
author |
245 ## - TITLE STATEMENT |
Title |
Cyber intelligence and international security: |
Remainder of title |
breaking the legal and diplomatic silence? / |
Statement of responsibility, etc. |
Dennis Broeders |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Date of publication, distribution, etc. |
2024 |
520 ## - SUMMARY, ETC. |
Summary, etc. |
In cyberspace intelligence agencies, rather than militaries, are the most prominent security actors. However, many cyber operations conducted by intelligence agencies are not ‘classic’ espionage activities but may be best described as digital covert action (sabotage, subversion, information operations). Given the fact that international law and diplomacy traditionally do not address espionage, cyber operations conducted by intelligence agencies have developed in a legal grey zone that gets stretched by the behaviour of the intelligence agencies of the most brazen cyber powers. The digital age has significantly transformed the capabilities and the role of intelligence agencies, which raises the question if the traditional international consensus that ‘intelligence is not discussed’ is still useful in state-to-state relations. The theoretically underdefined role and activities of intelligence agencies are affected by four big changes in the digital age: increase in scale of their activities and effects, heightened ambiguity, massive expansion of the attack surface and trickle-down insecurity, which point to a need to rethink how cyber intelligence agencies should operate. Some states will continue to push the boundaries of what is possible in cyberspace, unless other states break with the legal and diplomatic silence to discuss ‘guardrails’ to cyber intelligence activities. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
CYBER OPERATIONS |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
INTELLIGENCE |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
ESPIONAGE |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
CYBER DIPLOMACY |
General subdivision |
INTERNATIONAL LAW |
773 ## - HOST ITEM ENTRY |
Related parts |
Intelligence and National Security, Volume 39, Number 7, December 2024, pages: 1213-1229 |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://www.tandfonline.com/doi/full/10.1080/02684527.2024.2398077">https://www.tandfonline.com/doi/full/10.1080/02684527.2024.2398077</a> |
Public note |
Click here for full text |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Journal Articles |
Suppress in OPAC |
No |