Cyber Threats and NATO 2030: Horizon Scanning and Analysis

Total Page:16

File Type:pdf, Size:1020Kb

Cyber Threats and NATO 2030: Horizon Scanning and Analysis King’s Research Portal Document Version Publisher's PDF, also known as Version of record Link to publication record in King's Research Portal Citation for published version (APA): Stevens, T., Ertan, A., Floyd, K., & Pernik, P. (Eds.) (2021). Cyber Threats and NATO 2030: Horizon Scanning and Analysis . NATO Cooperative Cyber Defence Centre of Excellence. https://ccdcoe.org/uploads/2020/12/Cyber-Threats-and-NATO-2030_Horizon-Scanning-and-Analysis.pdf Citing this paper Please note that where the full-text provided on King's Research Portal is the Author Accepted Manuscript or Post-Print version this may differ from the final Published version. If citing, it is advised that you check and use the publisher's definitive version for pagination, volume/issue, and date of publication details. And where the final published version is provided on the Research Portal, if citing you are again advised to check the publisher's website for any subsequent corrections. General rights Copyright and moral rights for the publications made accessible in the Research Portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognize and abide by the legal requirements associated with these rights. •Users may download and print one copy of any publication from the Research Portal for the purpose of private study or research. •You may not further distribute the material or use it for any profit-making activity or commercial gain •You may freely distribute the URL identifying the publication in the Research Portal Take down policy If you believe that this document breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim. Download date: 25. Sep. 2021 Published by Cyber Threats and NATO 2030: Horizon Scanning and Analysis A. Ertan, K. Floyd, P. Pernik, T. Stevens (Eds.) Published by Cyber Threats and NATO 2030: Horizon Scanning and Analysis A. Ertan, K. Floyd, P. Pernik, T. Stevens (Eds.) Cyber Threats and NATO 2030: Horizon Scanning and Analysis Copyright © 2020 by NATO CCDCOE Publications. All rights re- served. ISBN (print): 978-9916-9565-0-2 ISBN (pdf): 978-9916-9565-1-9 COPYRIGHT AND REPRINT PERMISSIONS No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, or for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: Cyber Threats and NATO 2030: Horizon Scanning and Analysis A. Ertan, K. Floyd, P. Pernik, T. Stevens (Eds.) 2020 © NATO CCDCOE Publications NATO CCDCOE Publications LEGAL NOTICE: This publication contains Filtri tee 12, 10132 Tallinn, Estonia the opinions of the respective authors only. They do not necessarily reflect the policy or Phone: +372 717 6800 the opinion of NATO CCDCOE, NATO, or any Fax: +372 717 6308 agency or any government. NATO CCDCOE E-mail: [email protected] may not be held responsible for any loss or Web: www.ccdcoe.org harm arising from the use of information contained in this book and is not responsi- ble for the content of the external sources, including external websites referenced in this publication. NATO COOPERATIVE CYBER DEFENCE CENTRE OF EXCELLENCE The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) is a NATO-accredited cyber defence hub focusing on research, training and exercises. It represents a community of 29 nations providing a 360-degree look at cyber defence, with expertise in technology, strategy, operations and law. The heart of the Centre is a diverse group of international experts from military, government, academia and industry backgrounds. The CCDCOE is home to the Tallinn Manual 2.0, the most comprehensive guide on how international law applies to cyber operations. The Centre organises the world’s largest and most complex international live-fire cyber defence exercise Locked Shields and hosts the International Conference on Cyber Conflict (CyCon), a unique annual event in Tallinn, joining key experts and decision-makers from the global cyber defence community. As the Department Head for Cyberspace Operations Training and Education, the CCDCOE is responsible for identifying and coordinating education and training solutions in the field of cyber defence operations for all NATO bodies across the Alliance. The Centre is staffed and financed by its member nations: Austria, Belgium, Bulgaria, Croatia, the Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Italy, Latvia, Lithuania, Montenegro, the Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey, the United Kingdom and the United States. NATO-accredited centres of excellence are not part of the NATO Command Structure. KING’S COLLEGE LONDON King’s College London is the fourth oldest university in England and provides world-class teaching in the heart of London to over 31,000 students from 150 countries. It has a distinguished reputation in law, the humanities, science— particularly health and medicine—and the social sciences, including international affairs. As King’s approaches its 200th anniversary in 2029, it continues to encourage the critical thinkers, problem-solvers and change- makers the world needs to address its diverse challenges. Its School of Security Studies is dedicated to the understanding of security issues in an increasingly complex and uncertain world. Harnessing the depth and breadth of expertise across the War Studies and Defence Studies Departments, we are one of the largest communities of scholars in the world engaged in the teaching and research of all aspects of conflict, war, security and defence. Through our multi-disciplinary approach, we promote and value the study of security from different perspectives and methodologies. Our distinctiveness derives from the long history of King’s College London as a university dedicated to the advancement of knowledge, learning and understanding of issues in the service of society. WILLIAM & MARY William & Mary, in Williamsburg, Virginia, carries on an educational tradition that traces back more than three centuries. As the second-oldest institution of higher education in the United States, William & Mary was founded by King William III and Queen Mary II of England as an American overseas campus representing the British Crown. Known as the alma mater of globally- renowned historical figures such as George Washington, Thomas Jefferson, James Monroe and John Marshall, William & Mary today is a leading force for international education and training ground for international specialists around the world. William & Mary boats more than 40 undergraduate programs and more than 40 graduate and professional degree programs, attracting students from 50 states and more than 60 foreign countries. The mission of the William & Mary Whole of Government Center of Excellence is to train a new generation of future leaders who have hands-on, practical experience working across the different organizational cultures. These leaders must harmonize to facilitate true interagency collaboration— long before finding themselves forced to deal with such issues during a foreign deployment or national emergency. The work of the Center is primarily focused on training, education, and research related to interagency collaboration, complex national security challenges, and other public policy problems for mid-career policy professionals and military officers. The Center also brings together leaders from all levels of government and the military for symposia, discussions, and projects to promote creative, collaborative solutions to emerging issues. Disclaimer The views expressed in this volume belong to the authors of the chapters. This publication is a product of the NATO CCDCOE. It does not necessarily reflect the policy or the opinion of the CCDCOE or NATO. The CCDCOE may not be held responsible for any loss or harm arising from the use of information contained in this publication and is not responsible for the content of the external sources, including external websites referenced in this publication. Digital or hard copies of this publication may be produced for internal use within NATO and for personal or educational use when for non-profit and non-commercial purpose, provided that copies bear a full citation. TABLE OF CONTENTS Foreword 1 Ciaran Martin Introduction 4 PART I Cyberspace Adversaries and NATO’s Response 9 1 The Russian National Segment of the Internet as a Source of Structural Cyber Asymmetry Juha Kukkola 2 Russia’s Cyber Limitations in Personnel and 31 Innovation, Their Potential Impact on Future Operations, and How NATO and Its Members Can Respond Joe Cheravitch and Bilyana Lilly 3 Cyberspace Escalation: Ladders or Lattices? 60 Martin C. Libicki and Olesya Tkacheva PART II New Technologies and NATO’s Response 4 Securing 5G: A NATO’s Role in Collaborative Risk As- 74 sessment and Mitigation Luiz A. DaSilva, Jeffrey H. Reed, Sachin Shetty, Jerry Park, Duminda Wijesekera and Haining Wang 5 The Impact of New and Emerging Technologies on The 88 Cyber Threat Landscape
Recommended publications
  • Air Defence in Northern Europe
    FINNISH DEFENCE STUDIES AIR DEFENCE IN NORTHERN EUROPE Heikki Nikunen National Defence College Helsinki 1997 Finnish Defence Studies is published under the auspices of the National Defence College, and the contributions reflect the fields of research and teaching of the College. Finnish Defence Studies will occasionally feature documentation on Finnish Security Policy. Views expressed are those of the authors and do not necessarily imply endorsement by the National Defence College. Editor: Kalevi Ruhala Editorial Assistant: Matti Hongisto Editorial Board: Chairman Prof. Pekka Sivonen, National Defence College Dr. Pauli Järvenpää, Ministry of Defence Col. Erkki Nordberg, Defence Staff Dr., Lt.Col. (ret.) Pekka Visuri, Finnish Institute of International Affairs Dr. Matti Vuorio, Scientific Committee for National Defence Published by NATIONAL DEFENCE COLLEGE P.O. Box 266 FIN - 00171 Helsinki FINLAND FINNISH DEFENCE STUDIES 10 AIR DEFENCE IN NORTHERN EUROPE Heikki Nikunen National Defence College Helsinki 1997 ISBN 951-25-0873-7 ISSN 0788-5571 © Copyright 1997: National Defence College All rights reserved Oy Edita Ab Pasilan pikapaino Helsinki 1997 INTRODUCTION The historical progress of air power has shown a continuous rising trend. Military applications emerged fairly early in the infancy of aviation, in the form of first trials to establish the superiority of the third dimension over the battlefield. Well- known examples include the balloon reconnaissance efforts made in France even before the birth of the aircraft, and it was not long before the first generation of flimsy, underpowered aircraft were being tested in a military environment. The Italians used aircraft for reconnaissance missions at Tripoli in 1910-1912, and the Americans made their first attempts at taking air power to sea as early as 1910-1911.
    [Show full text]
  • English Online Exclusive January 2018
    President of the Syrian Arab Republic Bashar Assad (second from left), Russian President Vladimir Putin (center left), Russian minister of defense General of the Army Sergey Shoygu (second from right), and chief of the general staff of the Russian Federation armed forces General of the Army Valery Gerasimov (right) meet 21 November 2017 in Sochi, Russia, to discuss the closing phases of Russian support for operations in Syria. (Photo courtesy of Administration of the President of Russia) What Kind of Victory for Russia in Syria? Michael Kofman Matthew Rojansky, JD he war in Syria has ground on for more than to house them, while others have sought safety as far half a decade. Hundreds of thousands have away as Europe and North America, exacerbating died, entire cities and towns have been de- divisive battles over immigration, jobs, and cultural Tstroyed, and billions of dollars in infrastructure have identity in Western democracies. been decimated. Millions of refugees have flooded into Syria has tested every world leader individually and neighboring Middle Eastern states that can ill afford collectively, and has laid bare the failure of international 2 January 2018 MILITARY REVIEW ONLINE EXCLUSIVE VICTORY FOR RUSSIA? institutions to deal effectively with the problems those hardly the centerpiece of either state’s global strategy, institutions were designed to manage and prevent. or even their respective regional policies. Despite a prolonged commitment of U.S. military and Russian-Syrian relations draw on a Cold War legacy, diplomatic resources to the conflict, a peaceful settlement since Moscow first began to support Syria after the remains remote, and the bloody-handed Assad regime 1956 Suez Crisis.
    [Show full text]
  • Finnish Defence Forces International Centre the Many Faces of Military
    Finnish Defence Forces International Finnish Defence Forces Centre 2 The Many Faces of Military Crisis Management Lessons from the Field Edited by Mikaeli Langinvainio Finnish Defence Forces FINCENT Publication Series International Centre 1:2011 1 FINNISH DEFENCE FORCES INTERNATIONAL CENTRE FINCENT PUBLICATION SERIES 1:2011 The Many Faces of Military Crisis Management Lessons from the Field EDITED BY MIKAELI LANGINVAINIO FINNISH DEFENCE FORCES INTERNATIONAL CENTRE TUUSULA 2011 2 Mikaeli Langinvainio (ed.): The Many Faces of Military Crisis Management Lessons from the Field Finnish Defence Forces International Centre FINCENT Publication Series 1:2011 Cover design: Harri Larinen Layout: Heidi Paananen/TKKK Copyright: Puolustusvoimat, Puolustusvoimien Kansainvälinen Keskus ISBN 978–951–25–2257–6 ISBN 978–951–25–2258–3 (PDF) ISSN 1797–8629 Printed in Finland Juvenens Print Oy Tampere 2011 3 Contents Jukka Tuononen Preface .............................................................................................5 Mikaeli Langinvainio Introduction .....................................................................................8 Mikko Laakkonen Military Crisis Management in the Next Decade (2020–2030) ..............................................................12 Antti Häikiö New Military and Civilian Training - What can they learn from each other? What should they learn together? And what must both learn? .....................................................................................20 Petteri Kurkinen Concept for the PfP Training
    [Show full text]
  • Cyber Law and Espionage Law As Communicating Vessels
    Maurer School of Law: Indiana University Digital Repository @ Maurer Law Books & Book Chapters by Maurer Faculty Faculty Scholarship 2018 Cyber Law and Espionage Law as Communicating Vessels Asaf Lubin Maurer School of Law - Indiana University, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/facbooks Part of the Information Security Commons, International Law Commons, Internet Law Commons, and the Science and Technology Law Commons Recommended Citation Lubin, Asaf, "Cyber Law and Espionage Law as Communicating Vessels" (2018). Books & Book Chapters by Maurer Faculty. 220. https://www.repository.law.indiana.edu/facbooks/220 This Book is brought to you for free and open access by the Faculty Scholarship at Digital Repository @ Maurer Law. It has been accepted for inclusion in Books & Book Chapters by Maurer Faculty by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds.) 30 May - 01 June 2018, Tallinn, Estonia 2018 10TH INTERNATIONAL CONFERENCE ON CYBER CONFLicT CYCON X: MAXIMISING EFFECTS Copyright © 2018 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1826N-PRT ISBN (print): 978-9949-9904-2-9 ISBN (pdf): 978-9949-9904-3-6 COPYRigHT AND REPRINT PERmissiONS No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]).
    [Show full text]
  • Who Is Who in Pakistan & Who Is Who in the World Study Material
    1 Who is Who in Pakistan Lists of Government Officials (former & current) Governor Generals of Pakistan: Sr. # Name Assumed Office Left Office 1 Muhammad Ali Jinnah 15 August 1947 11 September 1948 (died in office) 2 Sir Khawaja Nazimuddin September 1948 October 1951 3 Sir Ghulam Muhammad October 1951 August 1955 4 Iskander Mirza August 1955 (Acting) March 1956 October 1955 (full-time) First Cabinet of Pakistan: Pakistan came into being on August 14, 1947. Its first Governor General was Muhammad Ali Jinnah and First Prime Minister was Liaqat Ali Khan. Following is the list of the first cabinet of Pakistan. Sr. Name of Minister Ministry 1. Liaqat Ali Khan Prime Minister, Foreign Minister, Defence Minister, Minister for Commonwealth relations 2. Malik Ghulam Muhammad Finance Minister 3. Ibrahim Ismail Chundrigar Minister of trade , Industries & Construction 4. *Raja Ghuzanfar Ali Minister for Food, Agriculture, and Health 5. Sardar Abdul Rab Nishtar Transport, Communication Minister 6. Fazal-ul-Rehman Minister Interior, Education, and Information 7. Jogendra Nath Mandal Minister for Law & Labour *Raja Ghuzanfar’s portfolio was changed to Minister of Evacuee and Refugee Rehabilitation and the ministry for food and agriculture was given to Abdul Satar Pirzada • The first Chief Minister of Punjab was Nawab Iftikhar. • The first Chief Minister of NWFP was Abdul Qayum Khan. • The First Chief Minister of Sindh was Muhamad Ayub Khuro. • The First Chief Minister of Balochistan was Ataullah Mengal (1 May 1972), Balochistan acquired the status of the province in 1970. List of Former Prime Ministers of Pakistan 1. Liaquat Ali Khan (1896 – 1951) In Office: 14 August 1947 – 16 October 1951 2.
    [Show full text]
  • Beyond MOV ADD XOR – the Unusual and Unexpected
    Beyond MOV ADD XOR the unusual and unexpected in x86 Mateusz "j00ru" Jurczyk, Gynvael Coldwind CONFidence 2013, Kraków Who • Mateusz Jurczyk o Information Security Engineer @ Google o http://j00ru.vexillium.org/ o @j00ru • Gynvael Coldwind o Information Security Engineer @ Google o http://gynvael.coldwind.pl/ o @gynvael Agenda • Getting you up to speed with new x86 research. • Highlighting interesting facts and tricks. • Both x86 and x86-64 discussed. Security relevance • Local vulnerabilities in CPU ↔ OS integration. • Subtle CPU-specific information disclosure. • Exploit mitigations on CPU level. • Loosely related considerations and quirks. x86 - introduction not required • Intel first ships 8086 in 1978 o 16-bit extension of the 8-bit 8085. • Only 80386 and later are used today. o first shipped in 1985 o fully 32-bit architecture o designed with security in mind . code and i/o privilege levels . memory protection . segmentation x86 - produced by... Intel, AMD, VIA - yeah, we all know these. • Chips and Technologies - left market after failed 386 compatible chip failed to boot the Windows operating system. • NEC - sold early Intel architecture compatibles such as NEC V20 and NEC V30; product line transitioned to NEC internal architecture http://www.cpu-collection.de/ x86 - other manufacturers Eastern Bloc KM1810BM86 (USSR) http://www.cpu-collection.de/ x86 - other manufacturers Transmeta, Rise Technology, IDT, National Semiconductor, Cyrix, NexGen, Chips and Technologies, IBM, UMC, DM&P Electronics, ZF Micro, Zet IA-32, RDC Semiconductors, Nvidia, ALi, SiS, GlobalFoundries, TSMC, Fujitsu, SGS-Thomson, Texas Instruments, ... (via Wikipedia) At first, a simple architecture... At first, a simple architecture... x86 bursted with new functions • No eXecute bit (W^X, DEP) o completely redefined exploit development, together with ASLR • Supervisor Mode Execution Prevention • RDRAND instruction o cryptographically secure prng • Related: TPM, VT-d, IOMMU Overall..
    [Show full text]
  • STRATEGIC FORUM National Defense University
    January 2020 STRATEGIC FORUM National Defense University About the Authors Håkon Lunde Saxi, Ph.D., is an As- Baltics Left of Bang: Nordic sociate Professor at the Norwegian Defence University College. Bengt Total Defense and Implications Sundelius is a Professor Emeritus of Political Science at the Swedish Defense University. Brett Swaney is an for the Baltic Sea Region Assistant Research Fellow in the Center for Strategic Research, Institute for Na- tional Strategic Studies, at the National by Håkon Lunde Saxi, Bengt Sundelius, and Brett Defense University. Swaney Key Points ponsored by the U.S. National Defense University (NDU) and the Swed- ish National Defense University, this paper is the second in a series of ◆◆ Nordic states (Norway, Sweden, and Finland) efforts to enhance Institute for National Strategic Studies Strategic Forums dedicated to societal resilience through unique the multinational exploration of the strategic and defense challenges faced by “total defense” and “comprehen- S sive security” initiatives are unlikely the Baltic states. The December 2017 U.S. National Security Strategy described to change the near-term strategic Russia as “using subversive measures to weaken the credibility of America’s com- calculus of Russia. Over time, how- ever, a concerted application of to- mitment to Europe, undermine transatlantic unity, and weaken European insti- tal defense in harmony with Article tutions and governments.”1 The U.S. and European authors of this paper, along 3 of the North Atlantic Treaty will with many others, came together in late 2017 to explore possible responses to aid in the resilience to, and deter- rence of, Russian hostile measures the security challenges facing the Baltic Sea Region (BSR).
    [Show full text]
  • Przegląd Wschodnioeuropejski
    UNIWERSYTET WARMIŃSKO-MAZURSKI W OLSZTYNIE UNIVERSITY OF WARMIA AND MAZURY IN OLSZTYN Przegląd WschodnioeuroPejski X/1 2019 Wydawnictwo Uniwersytetu Warmińsko-Mazurskiego w Olsztynie Rada Programowa Saule Abisheva (Almaty), Miomir Abović (Tivat), Zbigniew Anculewicz (Olsztyn), Selim Chazbijewicz (Astana), Milosav Čarkič (Belgrad), Jim Dingley (London), Victor Dönninghaus (Lüneburg), Włodzimierz Dubiczyński (Charków), Jordan Eftimow (Sofia), Michael Fleischer (Wrocław), Helmut Jachnow (Bochum), Ēriks Jēkabsons (Ryga), Norbert Kasparek, (Olsztyn), Andrzej de Lazari (Łódź), Piotr Majer (Olsztyn), Adam Maldzis (Mińsk), Rimantas Miknys (Wilno), Iwona Ndiaye (Olsztyn), Żanna Niekraszewicz-Karotkaja (Mińsk), Aleksander Nikulin (Moskwa), Alvydas Nikžentajtis (Wilno), Marek Melnyk (Olsztyn), Predrag Piper (Belgrad), Zbigniew Puchajda (Olsztyn), Andrzej Sitarski (Poznań), Aleś Smalańczuk (Grodno), Klaus Steinke (Erlangen), Henryk Stroński (Olsztyn), Andrzej Szmyt (Olsztyn), Józef Śliwiński (Olsztyn), Daniel Weiss (Zürich), Alexander Zholkovsky (Los-Angeles), Bogusław Żyłko (Gdańsk) Adres redakcji Uniwersytet Warmińsko-Mazurski w Olsztynie Centrum Badań Europy Wschodniej ul. Kurta Obitza 1, 10-725 Olsztyn tel. ++48 602175802, fax ++48 89 5351486 (87) e-mail: [email protected] http://www.uwm.edu.pl/cbew/p.wschodnioeuropejski.html Tytuł angielski: East European Review Kolegium Redakcyjne Aleksander Kiklewicz (redaktor naczelny), Roman Jurkowski (sekretarz naukowy), Norbert Kasparek, Helena Pociechina, Dariusz Radziwiłłowicz, Marek Szczepaniak Recenzenci Prof. dr hab. Adam Bezwiński (Bydgoszcz) Prof. dr hab. Tomasz Kośmider (Warszawa) Prof. dr hab. Károly Bibok (Szeged) Prof. dr hab. Michaił Kotin (Zielona Góra) Prof. dr hab. Rustem Ciunczuk (Kazań) Prof. dr hab. Ałła Kożynowa (Mińsk) Prof. dr hab. Rafał Czachor (Polkowice) Prof. dr hab. Walentyna G. Kulpina (Moskwa) Prof. dr hab. Michaił Darwin (Moskwa) Prof. dr hab. Oleg Leszczak (Kielce) Prof. dr hab. Michaił Dymarski (Sankt Petersburg) Prof.
    [Show full text]
  • Conscription in the European Union Armed Forces: National Trends, Benefits and EU Modernised Service
    Food for thought 07-2019 Conscription in the European Union Armed Forces: National Trends, Benefits and EU Modernised Service Written by AN EXPERTISE FORUM CONTRIBUTING TO EUROPEAN CONTRIBUTING TO FORUM AN EXPERTISE SINCE 1953 ARMIES INTEROPERABILITY European Army Interoperability Center Joeri Rongé and Giulia Abrate This paper was drawn up by Joeri Rongé and Giulia Abrate, under the supervision and guidance of the Director of the Permanent Secretariat, Mr. Mario Blokken. This Food for Thought paper is a document that gives an initial reflection on the theme. The content is not reflecting the positions of the member states, but consists of elements that can initiate and feed the discussions and analyses in the domain of the theme. TABLE OF CONTENTS Introduction 3 Part one: The concept of conscription and the EU’ situation 4 Part two: The relevance of universal conscription 10 Promoting equality between genders and social-economic statuses 11 Economic results 12 The efficiency of armies 13 Part three: Conscription in the changing nature of war 15 Part four: The way forward, the European Union Service 20 The “European Security and Defence Studies” 21 The “EU Military Service” 22 The European Voluntary Service 25 Conclusion 27 Bibliography 28 Conscription in the European Union Armed Forces: National Trends, Benefits and EU Modernised Service 2 INTRODUCTION During the 19th and 20th centuries, most Secondly, the paper will delineate the argu- countries, whether authoritarian or not, en- ments in favour and against conscription. visaged conscription in order to involve the Having a global vision of the advantages and citizenry in their armies.
    [Show full text]
  • Sectoral Qualifications Framework for the Military Officer Profession 
    Sectoral Qualifications Framework for the Military Officer Profession SQF-MILOF VOL 01 We inspire, we train, we challenge! This document has been produced with the financial assistance of the European Union. The contents of this document are the sole responsibility of the European Security and Defence College (ESDC) and can under no circumstances be regarded as reflecting the position of the European Union. Edited by Col (RO A) Alin BODESCU, PhD, ESDC Training Manager Reviewed by: Dr Sylvain PAILE-CALVO: Senior Researcher in European Studies, University of Liège, Belgium Mrs. Joana CALDEIRA: Higher Education Expert, Ministry of Defence, Portugal Mr. Nelson Davide SILVA REIS: Higher Education Expert, Ministry of Defence, Portugal Col (IT A) Gianluca CARRIERO: Joint Education Coordination Officer, Centre for Defence Higher How to use this publication? Studies, Italy The Sectoral Qualifications Framework for the Military Officer Profession - SQF-MILOF package is published in two volumes. Volume 1 describes the SQF-MILOF rationale and context and the development, validation and roadmaps for implementation. It has both historical and documentary value. Volume 2 is more technical, where interested practitioners can find useful information such as the Competence Profile or the taxonomy of learning outcomes in the tabular format of the SQF-MILOF and MILOF-CORE. Neither the European Security and Defence College nor any person acting on behalf of the European Security and Defence College is responsible for the use that might be made of the following information. Luxembourg: Publications Office of the European Union, 2021 © European Security and Defence College, 2021 Reproduction is authorised provided the source is acknowledged.
    [Show full text]
  • View See for Instance [13])
    Towards Dynamic Execution Environment for System Security Protection against Hardware Flaws Kenneth Schmitzy Oliver Keszocze∗y Jurij Schmidt∗y Daniel Große∗y Rolf Drechsler∗y ∗Institute of Computer Science, University of Bremen, 28359 Bremen, Germany yCyber-Physical Systems, DFKI GmbH, 28359 Bremen, Germany {kenneth, keszocze, grosse, drechsler}@cs.uni-bremen.de Abstract—Attacks exploiting security flaws in software are complex, verification and test become more challenging and very common. They are typically addressed during the ongoing flaws can remain undiscovered prior to the fabrication. Powerful software development process or by providing software patches. instruction set extensions to the x86 Instruction Set Architecture Attacks making use of hardware related flaws via malicious soft- ware recently gained popularity. Prominent examples are errata- (ISA) have been recently reported to result in unpredictable based, aging-related or, for example, the infamous Rowhammer- behavior [5]. Undocumented features inside the ISA, which can attack. In this paper, we present an approach to detect software- cause unpredictable system behavior, have been revealed [6] based attacks which exploit hardware flaws. Since the flaws are as well. typically triggered by characteristic instruction sequences, our approach is implemented as a dynamic execution environment for The second category covers flaws which are inherited program monitoring at runtime. Several case studies underline from the feature sizes used to fabricate the components. The the effectiveness and the low overhead of our approach. Rowhammer-attack affects Random Access Memory (RAM) and Solid-State Drives (SSDs) [7]. The malicious aging in I. INTRODUCTION circuits/cores (MAGIC) [8] leads to very fast semiconductor Malicious software such as Trojans or viruses can be aging.
    [Show full text]
  • Defining and Identifying Russia's Elite Groups
    Defining and identifying Russia’s elite groups Siloviki representation during Putin’s third term Master’s Thesis Russian and Eurasian Studies Leiden University, The Netherlands 23 January 2017 Sam Broekman Student Number: 1605062 Word Count: 18,005 Supervisor: Dr. M. Frear Table of contents Introduction ............................................................................................................................................. 2 Introducing the siloviki ......................................................................................................................... 2 General research gaps ......................................................................................................................... 2 Research question ............................................................................................................................... 3 Methodology ....................................................................................................................................... 4 Chapter overview ................................................................................................................................. 4 Section 1: Rise of the siloviki..................................................................................................................... 6 1.1 The Politburo 2.0 ........................................................................................................................... 6 1.2 Putin’s return to the presidency .................................................................................................
    [Show full text]