Threat Landscape

Liberating Cyberspace: Defining Cyberlibertarian Extremism and Exploring its Social Ramifications

Abstract:

One form of libertarian political ideology—cyberlibertarianism—aligns with libertarian principles applied to cyberspace and emphasizes minimal government intervention for individuals’ engagement in online spaces. Examples from media politics scholars provide insights into how cyberlibertarian beliefs intersect with social issues, like free speech advocacy and online behavior regulation. The current work aims to define cyberliberationist extremism thoroughly and to contrast how its ideological messages might differ from traditional far-left and far-right political extremist messaging. In a case study analysis, the authors pose three questions, investigate notable activities by the hacking group Anonymous, and argue that these actions fall under cyberlibertarian extremism. The work ends with an informed discussion regarding the societal consequences of cyberlibertarian extremism.

Achieving Confidence in Cyberspace in an Ever-Changing Ecosystem

ABSTRACT

The Information Assurance Directorate (IAD) of the National Security Agency is charged with developing security solutions that protect and defend National Security Systems. This cannot be accomplished by NSA alone. Partnerships with industry, academia, U.S. and foreign government entities are critical to delivering solutions that will meet and defeat cyber challenges of today and tomorrow. A comprehensive approach and strategy are needed. Key components of this defensive strategy include collaboration, security automation, resiliency, and a robust, sustainable cyber workforce. While the United States Government (USG) will certainly benefit from the successful implementation of these strategies, ultimately the entire global ecosystem will be more strongly protected by the advanced level of secure systems and capabilities available, and through a greater awareness of the harm that sophisticated and determined adversaries can cause to the cyber ecosystem.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com