greekislands21Romeo-Ionuț Mînican
(Phd Student, National Defense University ‘Carol I’, Bucharest, Romania)

Copyright: Research Institute for European and American Studies (www.rieas.gr) Publication date: 17 January 2021

Note: The article reflects the opinion of the author and not necessarily the views of the Research Institute for European and American Studies (RIEAS)

Introduction

The secret services are constantly looking for new methods, means, techniques and procedures to improve their basic functions and to recruit the best trained people. In the fight for the supremacy of the secret services, first of all, the human resource makes the difference between them. Secondly, the technology used by secret services. The use of network science in intelligence domain can improve the intelligence process. Also, the use of certain elements of game theory can add value to the intelligence process.....Read more

cyberspace1Jared Bowman
(Postgraduate scholar, pursuing MA-Science Degree, National Security Studies – Information Protection and Security Concentration at the University of New Haven, West Haven, CT, USA)

Copyright: Research Institute for European and American Studies (www.rieas.gr) Publication date: 17 January 2021

Note: The article reflects the opinion of the author and not necessarily the views of the Research Institute for European and American Studies (RIEAS)

Carl von Clausewitz was famous for his description of the changing character of warfare. As nation-states evolve over time, the manner in which war manifests itself has also evolved. To many Americans, the concepts of cyberwarfare and cyber espionage are mostly foreign. With the world of fiberoptic cables and technical jargon being less attractive as seeing a bomb blow up enemy combatants, many Americans, including those within the federal government, have often put cybersecurity concerns on the backburner. ..Read more

mingchaoNovember 20, 2020

Copyright: Taipei Representative Office in Taiwan (ROC) (https://www.roc-taiwan.org/gr_en/index.html)
Reposted at RIEAS web site (www.rieas.gr) on 21/11/2020

Taiwan’s national antipandemic and cybersecurity teams

Since emerging in late 2019, COVID-19 has evolved into a global pandemic. According to World Health Organization statistics, as of September 30, 2020, there were more than 33.2 million confirmed COVID-19 cases and more than 1 million related deaths worldwide. Having experienced and fought the SARS epidemic in 2003, Taiwan made advance preparations in the face of COVID-19, conducting early onboard screening of inbound travelers, taking stock of antipandemic supply inventories, and forming a national mask production team. The government’s swift response and the Taiwanese people’s cooperation helped effectively contain the spread of the disease... Read more

ASIS20Graeme Dobell
(Australian Strategic Policy Institute Journalist Fellow)

Copyright: (Australian Strategic Policy Institute (ASPI)

Reposted at RIEAS web site on 29 October 2020

Australia’s overseas spies shelter in the most silent spaces of the spook universe.The 68-year-old ethos of the spies of the Australian Secret Intelligence Service is never to speak publicly, just as they aim never to be seen or known.The chief spy, the director-general of ASIS, has only ever given one public speech—back in 2012. Now, today’s top spy, Paul Symon, scores another first, with a series of video interviews with ASPI. Read more

intelstudies20How do you transition from military to civilian in the intelligence community? In this episode, David Jimenez shares how he utilized his military intelligence training in his civilian intelligence career -- what translated over well, what he needed to improve on, and how it gave him a unique perspective on how to approach investigations. David gives insight on different tools he used over his career as well as explains HIDTA's role in the law enforcement and intelligence world. The Intelligence Community is vast and provides numerous resources; David encourages listeners to research those entities that provide tools and resources that all law enforcement analysts can use (e.g. HIDTA, RISS, DHS, etc.). David is currently a Strategic Intelligence Analyst with the West Texas High Intensity Drug Trafficking Area (HIDTA). Click on to listen

cybersec5Andrew N. Liaropoulos
(Assistant Professor, Department of International and European Studies,
University of Piraeus, Greece)

Copyright: Research Institute for European and American Studies (www.rieas.gr) Publication date: 18 July 2020

Note: The article reflects the opinion of the author and not necessarily the views of the Research Institute for European and American Studies (RIEAS)

Over the past months, Greek governmental websites have been attacked and as a result, many of them went offline. Websites affected by the cyber-attacks included among others the Greek Parliament, the Ministry of Foreign Affairs, the Ministry of Finance, the National Intelligence Service, the Athens Stock Market and several Greek businesses. Media reports have attributed the attacks to Turkish hackers. After the attacks were revealed, a Greek hacker-group called Anonymous Greece, responded by launching cyber-attacks on Turkish websites. Such incidents are common and take place on a daily basis. Nevertheless, cyber-attacks consist only one part of the answer to our question. ... Read more

We use cookies

We use cookies on our website. Some of them are essential for the operation of the site, while others help us to improve this site and the user experience (tracking cookies). You can decide for yourself whether you want to allow cookies or not. Please note that if you reject them, you may not be able to use all the functionalities of the site.