On Cyber Threats and Information Warfare
Years ago, when I worked in the telecom sector for the wireless operator Telia Mobile and later on for Ericsson, I became interested in the mega change we are into to today – the information revolution. At that time mo- bile phones and the Internet were relatively new phenomena. As more and more people are getting connected to the global network and use more advanced services and applications, questions arise regarding how to secure and protect information, and information and communications systems. From having developed mobile systems, I now try to understand vulne- rabilities and security holes in networks and functions for illigetimate cyber activities and their eventual consequenses at security policy level as well as at socio-technical systems levels. This book tries to explain the growth of varied and serious phenomena on the net, the dark sides of the Internet, including the battle for information superiority, cyber terrorism, criminality and espionage as well political-ideological hacking, “hacktivism”. For fruitful discussions on different aspects of information security and cyber threats, I would like to thank my friend and co-worker Dan Larsson, senior expert at the Swedish Defence Radio Establishment. I also want to express my gratitude to “Nico” and his colleagues at the Swedish Armed Forces for their profound knowledge and stringency within the field. Lars Nicander, head of the Center for Asymmetrical Threats and Terrorism Stu- dies (CATS) at the Swedish National Defence College, deserves great praise for his expertise and his neverending will to convey insights and knowledge on this...
You are not authenticated to view the full text of this chapter or article.
This site requires a subscription or purchase to access the full text of books or journals.
Do you have any questions? Contact us.Or login to access all content.