Identification of new threats to the national security of the state
Identificación de nuevas amenazas a la seguridad nacional del Estado
Abstract
The objective of the article was to identify new threats to the national security of countries and, at the same time, to determine the adaptation tasks related to their identification. The synergistic approach, comparative legal analysis methods and foresight were the main tools of this research. Manipulation actions involving deep forgeries are spreading rapidly. Autonomous weapons with artificial intelligence are used to create negative fake events. Criminal use of users’ smart devices to create a unique behavioural profile has been detected. New cyber threats to Ukraine’s national security during the military conflict are characterized by attempts to disrupt critical infrastructure. It is concluded that “cyber looting” has emerged with the use of social engineering methods. The activities of the Belgian Center for Cyber Security (CCB) are a positive example of the identification of new cyber threats in the countries of the European Union EU. Furthermore, CCB performs activities related to the identification, monitoring and analysis of online security issues. Coordination between relevant services and agencies, public authorities, private sector and academia is ensured.
Downloads
References
ALQUDHAIBI, Adel; ALBARRAK, Majed; ALOSEEL, Abdulmohsan; JAGTAP, Sandeep; SALONITIS, Konstantinos. 2023. “Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations” In: Sensors. Vol. 23, No. 9, pp. 4539.
BOHÁČEK, Matyáš; FARID, Hany. 2022. “Protecting world leaders against deep fakes using facial, gestural, and vocal mannerisms” In: Proceedings of the National Academy of Sciences of the United States of America. Vol. 119, No, 48, pp. e2216035119.
BONDARENKO, Svitlana; BRATKO, Artem; ANTONOV, Volodymyr; KOLISNICHENKO, Roman; HUBANOV, Oleh; MYSYK, Anatoliy. 2022. “Improving the State system of strategic planning of national security in the context of informatization of society” In: Journal of Information Technology Management. Vol. 14, Special Iss.: Digitalization of Socio- Economic Processes, pp. 01-24.
CCB. 2023. The Centre for Cybersecurity Belgium. Organisation. Available online. In: https://ccb.belgium.be/en/organisation. Consultation date: 03/02/2023.
CERT-UA. 2023. Russia’s Cyber Tactics: Lessons Learned in 2022 — SSSCIP analytical report on the year of russia’s full-scale cyberwar against Ukraine. Available online. In: https://cip.gov.ua/en/news/russia-s- cyber-tactics-lessons-learned-in-2022-ssscip-analytical-report-on-the- year-of-russia-s-full-scale-cyberwar-against-ukraine. Consultation date: 03/03/2023.
CHANCELLERIE DU PREMIER MINISTRE. 2019. Loi établissant un cadre pour la sécurité des réseaux et des systèmes d’information d’intérêt général pour la sécurité publique. Dossier No. 2019-04- 07/15. Available online. In: http://www.ejustice.just.fgov.be/cgi_loi/change_lg.pl?language=fr&la=F&cn=2019040715&table_name=loi. Consultation date: 08/04/2023.
COMPTIA. 2023. Top 50 Cybersecurity Statistics, Figures and Facts. Available online. In: https://connect.comptia.org/blog/cyber-security-stats-facts. Consultation date: 03/03/2023.
CRISTEA, Cristea Lavinia. 2020. “Current security threats in the national and international context” In: Accounting and Management Information Systems. Vol. 19, No. 01, pp. 351-378.
DECREE OF THE PRESIDENT OF UKRAINE No. 392/2020. 2020. “On the decision of the National Security and Defense Council of Ukraine 2020 “On the National Security Strategy of Ukraine”” Available online. In: https://zakon.rada.gov.ua/laws/show/392/2020#n5. Consultation date: 08/03/2023.
DEVANNY, Joe; GOLDONI, Luiz Rogerio Franco; MEDEIROS, Breno Pauli. 2022. “Strategy in an Uncertain Domain: Threat and Response in Cyberspace” In: Journal of Strategic Security. Vol. 15, No. 02, pp. 34-47.
DOBÁK, Imre. 2021. “Thoughts on the evolution of national security in cyberspace” In: Security and Defence Quarterly. Vol. 33, No. 01, pp. 75- 85.
EMA. 2023. Payment Fraud Matrix. Reboot: Analysis, Trends and Forecasts, 2022/2023. Available online. In: https://www.ema.com.ua/news/matricja-platizhnogo-shahrajstva-perezavantazhennja-analiz-trendi-ta- prognozi-2022-2023/. Consultation date: 03/06/2023.
ENISA. 2023. Identifying emerging cyber security threats and challenges for 2030. Available online. In: https://www.enisa.europa.eu/publications/ enisa-foresight-cybersecurity-threats-for-2030. Consultation date: 08/03/2023.
EUROPEAN PARLIAMENT AND OF THE COUNCIL. 2019. Regulation (EU) 2019/881 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act). Available online. In: https://eur-lex.europa.eu/ legal-content/EN/TXT/?uri=uriserv:OJ.L_.2019.151.01.0015.01. ENG&toc=OJ:L:2019:151:TOC. Consultation date: 08/03/2023.
EUROPEAN PARLIAMENT AND OF THE COUNCIL. 2022. “Proposal for a Regulation of the European Parliament and of the Council on horizontal cybersecurity requirements for products with digital elements and amending Regulation (EU) 2019/1020.” COM/2022/454 final. Available online. In: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A52022PC0454. Consultation date: 08/03/2023.
EUROPEAN PARLIAMENT AND OF THE COUNCIL. 2023. Proposal for a Regulation of the European Parliament and of the Council laying down measures to strengthen solidarity and capacities in the Union to detect, prepare for and respond to cybersecurity threats and incidents. COM (2023) 209 final. Available online. In: https://eur-lex.europa.eu/legal- content/EN/TXT/HTML/?uri=CELEX:52023PC0209. Consultation date: 03/06/2023.
FARID, Hany. 2021. “The Weaponization of Deep Fakes: Threats and Responses” In: The Journal of Intelligence, Conflict, and Warfare. Vol. 04, No. 02, pp. 87–94.
GUITTON, Matthieu; FRÉCHETTE, Julien. 2023. “Facing cyberthreats in a crisis and post-crisis era: Rethinking security services response strategy” In: Computers in Human Behavior Reports. Vol. 10, pp. 100-282.
HUNG, Ho Ting (Bosco). 2022. “A Critical Moment of Taiwan’s Security - Taiwan Has to Sharpen Its Cybercapacity in Response to China’s National Rejuvenation” In: ITSS Verona Magazine. Vol. 1, No. 2, pp. 01-13.
LI, Yuchong; LIU, Qinghui. 2021. “A comprehensive review study of cyber- attacks and cyber security; Emerging trends and recent developments” In: Energy Reports. Vol. 7, pp. 8176–8186.
NCSI. 2021b. 24. Ukraine 75.32. Available online. In: https://ncsi.ega.ee/country/ua/. Consultation date: 08/02/2023.
NCSI. 2021а. 1. Belgium. 94.81. Available online. In: https://ncsi.ega.ee/country/be/585/#details. Consultation date: 08/02/2023.
REZNIKOVA, Olga. 2022. “Strategic Analysis of Ukraine’s Security Environment.” In: Strategic Panorama. Available online. In: https://doi.org/10.53679/2616-9460.specialissue.2022.05. Consultation date: 14/01/2023.
SEMENENKO, Viacheslav; FROLOV, Valery. 2023. “Military Aspects of Countering Hybrid Aggression: Ukrainian Experiences” In: National Security and the Future. Vol. 01, No. 24, pp. 55-65.
SŁUGOCKI, Wojciech Łukasz; SOWA, Bogdan. 2021. “Disinformation as a threat to national security on the example of the COVID-19 pandemic” In: Security and Defence Quarterly. Vol. 35, No. 03, pp. 63-74.
STATISTA. 2023. Number of internet and social media users worldwide as of April 2023 (in billions). Available online. In: https://www.statista.com/statistics/617136/digital-population-worldwide/. Consultation date: 08/02/2023.
ŞTEFĂNESCU, Daniel-Cornel; PAPOI, Alina. 2020. “New threats to the national security of states – cyber threat” In: Scientific Journal of Silesian University of Technology. Series Transport. Vol. 107, pp. 1773182.
URYCH, Ilona; MATYASIK, Grzegorz. 2022. “Preparing youth for defence: Socialisation, education, and training of young people in Europe for national security” In: Security and Defence Quarterly. Vol. 38, No. 02, pp. 01-15.
WILLETT, Marcus. 2022. “The Cyber Dimension of the Russia–Ukraine War” In: Survival. Vol. 64, No. 05, pp. 07-26.
Copyright
The authors who publish in this journal agree to the following terms:
The authors retain the copyright and guarantee the journal the right to be the first publication where the article is presented, which is published under a Creative Commons Attribution License, which allows others to share the work prior to the recognition of the authorship of the article work and initial publication in this journal.
Authors may separately establish additional agreements for the non-exclusive distribution of the version of the work published in the journal (for example, placing it in an institutional repository or publishing it in a book), with an acknowledgment of its initial publication in this journal.
This work is under license:
Creative Commons Reconocimiento-NoComercial-CompartirIgual 4.0 Internacional (CC BY-NC-SA 4.0)