Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (2)
- Databases and Information Systems (2)
- Other Computer Sciences (2)
- Business (1)
- Defense and Security Studies (1)
-
- Engineering (1)
- International Relations (1)
- Management Information Systems (1)
- Military and Veterans Studies (1)
- OS and Networks (1)
- Organizational Behavior and Theory (1)
- Other Political Science (1)
- Peace and Conflict Studies (1)
- Policy Design, Analysis, and Evaluation (1)
- Political Science (1)
- Political Theory (1)
- Public Affairs (1)
- Public Affairs, Public Policy and Public Administration (1)
- Public Policy (1)
- Risk Analysis (1)
- Social and Behavioral Sciences (1)
- Systems Architecture (1)
Articles 1 - 4 of 4
Full-Text Articles in Physical Sciences and Mathematics
Emerging Forms Of Covert Surveillance Using Gps-Enabled Devices, Roba Abbas, Katina Michael, M G. Michael, Anas Aloudat
Emerging Forms Of Covert Surveillance Using Gps-Enabled Devices, Roba Abbas, Katina Michael, M G. Michael, Anas Aloudat
Professor Katina Michael
This paper presents the real possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance within a community setting, resulting in community members engaging in the covert observation of family, friends, or acquaintances. This paper investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring people will have on society at large. The five stakeholder types explored in this paper include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies such as mobile camera phones, global positioning system data loggers, …
Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M G. Michael
Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M G. Michael
Professor Katina Michael
This paper presents the real possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non traditional covert policing within a community setting, resulting in community members engaging in covert policing of family, friends, or acquaintances. This paper investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring people will have on society at large. The five stakeholder types explored in this paper include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies such as mobile camera phones, global positioning system data loggers, …
Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg
Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg
Jan Kallberg
La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …
Covert Shells, John Christian Smith
Covert Shells, John Christian Smith
John Christian Smith
The potential for covert communications exist anywhere that legitimate communication channels are in use. In order to maintain control of the channel once exploited, the insertion of a backdoor Trojan horse server, to be used with a client that provides shell access, is often a necessary prerequisite to establishing and using a covert channel long term.
We discuss covert channel communications methods ranging from embedded channels to disguised protocols. What follows is a review of available covert shell tools. The underground, historical evolution of covert shells is reviewed, focusing on selected, available tools, which range from simple encapsulation methods to …