scispace - formally typeset
Search or ask a question
Author

Drew Marvel

Bio: Drew Marvel is an academic researcher. The author has contributed to research in topics: Data security & National security. The author has an hindex of 1, co-authored 1 publications receiving 1 citations.

Papers
More filters
Journal Article
TL;DR: In 2016, Russian government-backed hackers infiltrated the networks and computers of the Democratic National Committee (DNC), the Democratic Congressional Campaign Committee and various campaign officials, harvesting private information and installing spyware and malware for ongoing intelligence purposes as discussed by the authors.
Abstract: Since the 2016 U.S. presidential election, the threat of foreign interference in U.S. elections has loomed large in the minds of the American public. During the 2016 campaign season, Russian government-backed hackers infiltrated the networks and computers of the Democratic National Committee (DNC), the Democratic Congressional Campaign Committee (DCCC), and various campaign officials, harvesting private information and installing spyware and malware for ongoing intelligence purposes. U.S. intelligence officials have indicated that, using similar tactics, the Russian hackers also targeted election systems and officials in all fifty states, successfully breaching at least two of those states’ election systems, Illinois and Florida.

2 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This paper examines and analyses the rationale and modus operandi—both methods and types—that lead to regard questionable content as a new form of collective victimisation in India.
Abstract: Traditionally, the idea of being a victim is associated with a crime, accident, trickery or being duped. With the advent of globalisation and rapid growth in the information technology sector, the world has opened itself to numerous vulnerabilities. These vulnerabilities range from individual-centric privacy issues to collective interests in the form of a nation's political and economic interests. While we have victims who can identify themselves as victims, there are also victims who can barely identify themselves as victims, and there are those who do not realise that they have become victims. Misinformation, disinformation, fake news and other methods of spreading questionable content can be regarded as a new and increasingly widespread type of collective victimisation. This paper, drawing on recent examples from India, examines and analyses the rationale and modus operandi-both methods and types-that lead us to regard questionable content as a new form of collective victimisation.

2 citations

Journal ArticleDOI
TL;DR: In this article , the authors argue that liberal democracies like the United States might be at a severe disadvantage to fight against cyber proxy warfare due to legal and constitutional barriers, but at the same time, the emergence of platform governance and self-regulation might be proven as a new force within these proxy wars and reshape its boundaries.
Abstract: Abstract:The cyber domain emerged as a perfect platform for international struggle over power and influence. International powers are actively engaged in cyber proxy warfare due to the relatively low risk of escalation, various enforcement challenges, and the vagueness of international law within this realm. These indirect conflicts might lead some global powers to close or restrict their virtual borders to avoid or reduce the plausibility of cyber proxy warfare or unwanted foreign influence in general. The formation of such restricted networks, articulated in this article as "internet bubbles," is already shaping within the realm of actors like Russia, China, North Korea, and Iran. The authors argue that liberal democracies like the United States might be at a severe disadvantage to fight against cyber proxy warfare due to legal and constitutional barriers. But at the same time, the emergence of platform governance and self-regulation might be proven as a new force within these proxy wars and reshape its boundaries.