The Journal of Intelligence and Cyber Security

Neil Kent, University of Cambridge, Editor-in-Chief
Irina du Quenoy, Georgetown University, Managing Editor

Editorial Board

Bodo Hechelhammer, Chief Historian, Bundesnachrichtendienst, Berlin

W. Caffey Norman, III, Partner, Squire Patton Boggs, Washington, D.C.

Alfred Rollington, Co-Founder, Cyber Security Intelligence, Surrey

Vsevolod Samokhvalov, Department of Political Science, University of Liège

Clément Chevalier, École de Guerre, Paris

The Journal of Intelligence and Cyber Security publishes research articles and thought-provoking essays of the highest quality on a wide range of subjects related to intelligence, cyber security, and related topics. While the paramount importance of intelligence is obvious, cyberattacks targeting military and civilian operations rank among the greatest threats facing the world today. Edited by Professor Neil Kent of the University of Cambridge, the journal contributes to our understanding of these vital issues in a rapidly changing world. It is international in scope and supported by leading practitioners working in related areas at prestigious institutions around the world and in the global private sector. The journal received startup funding from the Cyber Conflict Documentation Project, a U.S.-based non-political, non-commercial, public service think tank led by J. D. Work, an experienced intelligence professional who has taught at Columbia University and now holds the Bren Chair in Cyber Conflict and Security at the Marine Corps University.

The journal benefits from the generous sponsorship of Omina Technologies, an ethical artificial intelligence company based in Europe and North America, the Cadbury Foundation, a UK charitable organization, and Mr. Andreas Nilsson. The journal appears online and feature new articles on a rolling basis. Academica Press will publish an annual hardcover volume of each issue’s articles in its pioneering international relations series, St. James’s Studies in World Affairs. The Journal of Intelligence and Cyber Security will appeal to members of the military, intelligence, and business communities, as well as to academic specialists.

The journal happily accepts articles of 8,000-12,000 words in length from qualified specialists in the global scholarly community. All submissions will be subject to rigorous peer review and should follow the Chicago Manual of Style and be submitted in MS Word format, double-spaced with one-inch margins in 12 point Times New Roman font.

Please submit all submissions with a short biographical statement and 5 keywords to editorial@academicapress.com. Please indicate "Submission to The Journal of Intelligence and Cyber Security" in subject line of the e-mail.

Vol 5, No 1 (2022)
Table of Contents

Health and Healthcare in Afghanistan
Danielle Deboutte, PhD, Liverpool School of Tropical Medicine, University of Liverpool
PDF

Armed Forces Facing the Media Storm
Antoine-Louis de Prémonville (officer in the French Army and independent researcher in History and Geopolitics)
PDF

Vol 4, No 1 (2021)
Table of Contents

Digitalizing the World: The Era of Invisible Power
Thomas Flichy de La Neuville (Rennes School of Business)
PDF

The “Strategic Corporal”: Facing the Cyber Threat in French Armies and Homeland Security Forces
Antoine-Louis de Prémonville (officer in the French Army and independent researcher in History and Geopolitics)
PDF

Cybersecurity and Cybercrime in Nigeria: The Implications on National Security and Digital Economy
Babayo Sule (Department of Political Science, Federal University of Kashere Gombe, Gombe State Nigeria); Bakri Mat (School of International Studies, Universiti Utara Malaysia); Usman Sambo (Department of Public Administration, Yobe State University, Damaturu, Yobe State Nigeria); Mohammed Kwarah Tal (Department of Political Science, Federal University of Kashere Gombe, Gombe State Nigeria); and Muhammad Aminu Yahaya (Department of Public Administration, Gombe State University Gombe State Nigeria).
*Corresponding author: babayosule@gmail.com
PDF

Vol 3, No 2 (2020)
Table of Contents

Chilling the Guns of August: Measures to Mitigate an Arctic War
John Ash (Scott Polar Research Institute, University of Cambridge)
PDF

The Fight against Russian “Illegal” Spies in Great Britain During the Early Cold War
Trevor Barnes (Corpus Christi College, University of Cambridge)
PDF

The Solzhenitsyn Affair: Yuri Andropov's Personal Obsesssion
Christian Orr (USPIS Intelligence)
PDF

Vol 3, No 1 (2020)
Table of Contents

Cybercrime in Austria – Methods and Strategies on Fighting Online Crime
Mag. Judith Grohmann (Donau Universität Krems)
PDF

Soviet Intelligence on the Eve of the Great Patriotic War
Gaël-Georges Moullec (Rennes School of Business and Sorbonne Paris Nord University)
PDF

The PRC and the Cyber Pax Sinica: Growth in the Shadow of Pax Americana
Samuel Sheffield, 1LT, USAR, M.S. (Webster University)
PDF

BOOK REVIEW: Marat H. Mardanov, Komintern v Baškirii. Deâtelʹnostʹ specialʹnyh škol Kominterna v gody
Velikoj Otečestvennoj vojny (1941-1943 gg.) [The Comintern in Bachkiria: The Activities
of the Komintern Special Schools in the Years of the Great Patriotic War (1941-1943)],
Sbornik dokumentov i materialov (Ufa: Ineš, 2018), 288 p.

Gaël-Georges MOULLEC
PDF

Vol 2, No 2 (2019)
Table of Contents

The Essential Digital Transformation of the Battlefield and Its Effects
Gérard de Boisboissel (École spéciale militaire de Saint-Cyr)
PDF

From Pamphlets to Privacy: How the Printing Press Helps Us Understand the Internet Age
Leslie N. Gruis (Retired Senior Intelligence Officer, National Security Agency)
PDF

The Internet of Things Disruptive Evolution for Intelligence Collection
Peter Chuzie (Mercyhurst University) and Michael Klipstein, PhD (Arnold A. Saltzman Institute of War and Peace Studies at Columbia University)
PDF

Historical Reflections. Israel And Its Neighbors 2001–2011: A Decade of Security and Diplomatic Cooperation
Craig Stanley-Adamson (Nottingham University)
PDF

Vol 2, No 1 (2019)
Table of Contents

The Turkish Cyber Security Strategy: Structure, Legislation, and Challenges
Emin Daskin (Ghent University)
PDF

The Use of Cyber Activities as a Weapon: The Empirical Case of Ukraine
Christine Dugoin-Clement (Paris 1 Pantheon Sorbonne and
Centre de recherche écoles de Saint-Cyr Coëtquidan)
PDF

How to Prevent Motorbike Attacks in the Sahel?
Thomas Flichy de La Neuville (École spéciale militaire de Saint-Cyr)
PDF

State of the what Field?: A Topic Modeling Approach to Assessing the Impact of Digital Issues on Terrorism Research
Christopher Whyte (L. Douglas Wilder School of Government and Public Affairs)
PDF

Vol 1, No 1 (2018)
Table of Contents

Calibrating the Cyberwarfare Threat Using Examples from Recent History
Matthew Cadbury
PDF

Cyber-Manipulations: Old Means for a New End
Thomas Flichy de La Neuville
PDF

Planes, Trains, and Automobiles: A New Dimension in Cyber Conflict
Alessandro Guarino and Emilio Iasiello
PDF

Cybersecurity in India: An Evolving Concern for National Security
Sushma Devi Parmar
PDF