International Security Studies (ISS) has changed and diversified in many ways since 1945. This book provides the first intellectual history of the development of the subject in that period. It ...explains how ISS evolved from an initial concern with the strategic consequences of superpower rivalry and nuclear weapons, to its current diversity in which environmental, economic, human and other securities sit alongside military security, and in which approaches ranging from traditional Realist analysis to Feminism and Post-colonialism are in play. It sets out the driving forces that shaped debates in ISS, shows what makes ISS a single conversation across its diversity, and gives an authoritative account of debates on all the main topics within ISS. This is an unparalleled survey of the literature and institutions of ISS that will be an invaluable guide for all students and scholars of ISS, whether traditionalist, 'new agenda' or critical.
How did the individual human being become the focus of the contemporary
discourse on security? What was the role of the United Nations in
securing the individual? What are the payoffs and costs of ...this
extension of the concept? Neil MacFarlane and Yuen Foong Khong tackle these
questions by analyzing historical and contemporary debates about what is to be
secured. From Westphalia through the 19th century, the state's claim to be the
object of security was sustainable because it offered its subjects some measure of
protection. The state's ability to provide security for its citizens came under
heavy strain in the 20th century as a result of technological, strategic, and
ideological innovations. By the end of World War II, efforts to reclaim the security
rights of individuals gathered pace, as seen in the Universal Declaration of Human
Rights and a host of United Nations covenants and conventions. MacFarlane and Khong
highlight the UN's work in promoting human security ideas since the 1940s, giving
special emphasis to its role in extending the notion of security to include
development, economic, environmental, and other issues in the 1990s.
At a time when many observers question the EU's ability to achieve integration of any significance, and indeed Europeans themselves appear disillusioned, Mai'a K. Davis Cross argues that the EU has ...made remarkable advances in security integration, in both its external and internal dimensions. Moreover, internal security integration-such as dealing with terrorism, immigration, cross-border crime, and drug and human trafficking-has made even greater progress with dismantling certain barriers that previously stood at the core of traditional state sovereignty.
Such unprecedented collaboration has become possible thanks to knowledge-based transnational networks, or "epistemic communities," of ambassadors, military generals, scientists, and other experts who supersede national governments in the diplomacy of security decision making and are making headway at remarkable speed by virtue of their shared expertise, common culture, professional norms, and frequent meetings. Cross brings together nearly 80 personal interviews and a host of recent government documents over the course of five separate case studies to provide a microsociological account of how governance really works in today's EU and what future role it is likely to play in the international environment.
"This is an ambitious work which deals not only with European security and defense but also has much to say about the policy-making process of the EU in general."-Ezra Suleiman, Princeton University
"This book compares and contrasts publicly espoused security concepts in the Nordic region, and explores the notion of societal security. Outside observers often assume that Nordic countries take ...similar approaches to the security and safety of their citizens. This book challenges that assumption and traces the evolution of ‘societal security’, and its broadly equivalent concepts, in Sweden, Norway, Denmark and Finland. The notion of societal security is deconstructed and analysed in terms of its different meanings and implications for each country, through both country- and issue-focused studies. Each chapter traces the evolution of key security concepts and related practices, allowing for a comparison of similarities and differences between these four countries. Using discourses and practices as evidence, this is the first book to explore how different Nordic nations have conceptualised domestic security over time. The findings will be valuable to scholars from across the geographical and theoretical spectrum, while highlighting how Nordic security discourses and practices may deviate from traditional assumptions about Nordic values. This book will be of much interest to students of security studies, Nordic politics and International Relations."
Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy ...limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world.
Being an easy-to-deploy and cost-effective low power wireless solution, Bluetooth Low Energy (BLE) has been widely used by Internet-of-Things (IoT) devices. In a typical IoT scenario, an IoT device ...first needs to be connected with its companion mobile app which serves as a gateway for its Internet access. To establish a connection, a device first broadcasts advertisement packets with UUIDs to nearby smartphone apps. Leveraging these UUIDs, a companion app is able to identify the device, pairs and bonds with it, and allows further data communication. However, we show that there is a fundamental flaw in the current design and implementation of the communication protocols between a BLE device and its companion mobile app, which allows an attacker to precisely fingerprint a BLE device with static UUIDs from the apps. Meanwhile, we also discover that many BLE IoT devices adopt "just works" pairing, allowing attackers to actively connect with these devices if there is no app-level authentication. Even worse, this vulnerability can also be directly uncovered from mobile apps. Furthermore, we also identify that there is an alarming number of vulnerable app-level authentication apps, which means the devices connected by these apps can be directly controlled by attackers. To raise the public awareness of IoT device fingerprinting and also uncover these vulnerable BLE IoT devices before attackers, we develop an automated mobile app analysis tool BLESCOPE and evaluate it with all of the free BLE IoT apps in Google Play store. Our tool has identified 1,757 vulnerable mobile apps in total. We also performed a field test in a 1.28 square miles region, and identified 5,822 real BLE devices, among them 5,509 (94.6%) are fingerprintable by attackers, and 431 (7.4%) are vulnerable to unauthorized access. We have made responsible disclosures to the corresponding app developers, and also reported the fingerprinting issues to the Bluetooth Special Interest Group.
The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security. ...Acknowledging that the very notion of peace and security has become more complex, the volume seeks to determine which questions of cybersecurity are indeed of relevance for international peace and security and which, while requiring international attention, are simply issues of contemporary governance or development. The Handbook offers a variety of thematic, regional and disciplinary perspectives on the question of international cybersecurity, and the chapters contextualize cybersecurity in the broader contestation over the world order, international law, conflict, human rights, governance and development. The volume is split into four thematic sections:Concepts and frameworks;Challenges to secure and peaceful cyberspace;National and regional perspectives on cybersecurity;Global approaches to cybersecurity.
This book will be of much interest to students of cybersecurity, computer science, sociology, international law, defence studies and International Relations in general.
Smart Locks Ho, Grant; Leung, Derek; Mishra, Pratyush ...
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security,
05/2016
Conference Proceeding
We examine the security of home smart locks: cyber-physical devices that replace traditional door locks with deadbolts that can be electronically controlled by mobile devices or the lock ...manufacturer's remote servers. We present two categories of attacks against smart locks and analyze the security of five commercially-available locks with respect to these attacks. Our security analysis reveals that flaws in the design, implementation, and interaction models of existing locks can be exploited by several classes of adversaries, allowing them to learn private information about users and gain unauthorized home access. To guide future development of smart locks and similar Internet of Things devices, we propose several defenses that mitigate the attacks we present. One of these defenses is a novel approach to securely and usably communicate a user's intended actions to smart locks, which we prototype and evaluate. Ultimately, our work takes a first step towards illuminating security challenges in the system design and novel functionality introduced by emerging IoT systems.
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working ...relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment between security and your business can start at the top at the C-suite or happen at the line of business, IT, development, or user level. It has a corrosive effect on any security project it touches. But it does not have to be like this. Author Dan Blum presents valuable lessons learned from interviews with over 70 security and business leaders. You will discover how to successfully solve issues related to: risk management, operational security, privacy protection, hybrid cloud management, security culture and user awareness, and communication challenges. This open access book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience. Common challenges and good practices are provided for businesses of different types and sizes. And more than 50 specific keys to alignment are included. What You Will Learn Improve your security culture: clarify security-related roles, communicate effectively to businesspeople, and hire, motivate, or retain outstanding security staff by creating a sense of efficacy Develop a consistent accountability model, information risk taxonomy, and risk management framework Adopt a security and risk governance model consistent with your business structure or culture, manage policy, and optimize security budgeting within the larger business unit and CIO organization IT spend Tailor a control baseline to your organization’s maturity level, regulatory requirements, scale, circumstances, and critical assets Help CIOs, Chief Digital Officers, and other executives to develop an IT strategy for curating cloud solutions and reducing shadow IT, building up DevSecOps and Disciplined Agile, and more Balance access control and accountability approaches, leverage modern digital identity standards to improve digital relationships, and provide data governance and privacy-enhancing capabilities Plan for cyber-resilience: work with the SOC, IT, business groups, and external sources to coordinate incident response and to recover from outages and come back stronger Integrate your learnings from this book into a quick-hitting rational cybersecurity success plan Who This Book Is For Chief Information Security Officers (CISOs) and other heads of security, security directors and managers, security architects and project leads, and other team members providing security leadership to your business