1
Introduction
References
2
Cyber Threats and the Security Risks They Pose to National Security: An Assessment of Cybersecurity Policy in the United Kingdom
Abstract
Introduction
The Most Prevalent Cyber Threats
The UK Cyber Landscape
How Cyber Threats Are Identified in the UK
Perpetrators of Cyber Threats
Types of Cyber-Attacks
The UK Cybersecurity Policies and Practices
Cybersecurity in Government Policies and Strategies
Current Policies, Strategies, and Practices
National Cyber Security Centre
Active Cyber Defence Programme
National Cyber Security Strategy 2022-2030
Recommendations
Criticisms of the NCSC and Recommendation
Criticisms of the ACD and Recommendations
Criticisms of the NCSS 2022-2030 and Recommendations
Recommendations for the Government's Role
Discussion and Conclusion
Key Findings
Limitations of the Chapter
Concluding Remarks
References
3
Internet of Things and Artificial Intelligence in National Security: Applications and Issues
Abstract
Introduction
Background
Definitions
National and Domestic Security
Definition of Artificial Intelligence
The Internet of Things
The Internet of Things Forensics
AI and IoT in National and Domestic Security
The Role of AI and IoT in Digital Security
AI for Protecting IoT Devices against Hacking
The Malicious Use of AI to Hack IoT Devices
The Use of AI in the Military to Hack IoT Devices
The Use of AI by Institutions to Safeguard Citizens
AI and IoT in Political Security
Deepfake and Mis- and Disinformation
AI and the Formation of Filter Bubbles
AI and Online Content Moderation
AI and IoT in Physical Security
Augmented Intelligence Analysis
Military Weaponisation of AI and the IoT
Privacy Implications of AI Algorithms
Impacts of AI Algorithms on User Privacy
Legal Frameworks for Privacy Relating AI Algorithms
Potential Solutions for Privacy Implications
Conclusion
References
4
Artificial Intelligence and the Internet of Things Forensics in a National Security Context
Abstract
Introduction
AI Techniques in Automating Tasks of IoT Forensics
A Brief Summary of IoT Forensics from Chapter 3
Types
About the Author: Dr. Reza Montasari is a Senior Lecturer in Cyber Threats at the Department of Criminology, Sociology and Social Policy in the School of Social Sciences at Swansea University, Wales, United Kingdom (UK). Dr. Montasari is also a member of the Cyber Threats Research Centre (CYTREC) at Swansea University, which focuses on addressing a wide range of online threats, from terrorism, extremism and cybercrime to child sexual exploitation and grooming online. Reza serves as a Member of Strategic Independent Advisory Group at South Wales Police (Cardiff, Wales, UK), and a Programme Chair, Programme Steering Member, and Committee Member of the Annual International Conference on Global Security, Safety & Sustainability. Reza holds a BSc (Hons) in Multimedia Computing and an MSc in Computer Forensics both from the University of South Wales and a PhD in Digital Forensics from the University of Derby. He is a Fellow of Higher Education Academy (FHEA), a Chartered Engineer (CEng), and a Member of the Institution of Engineering and Technology (IET).
Reza's main research interests lie in the areas of Digital Forensics, Cyber Security, Cyber Warfare, and Artificial Intelligence but also include Cyber Law and Cyber Criminology. Reza is a prolific publisher of academic research and is frequently invited to present or be a panelist at various international security-related conferences. Reza is an experienced professor, supervisor and examiner of both undergraduate and postgraduate candidates, as well as having extensive experience in reviewing and examining programmes of study. Reza is also very experienced at designing, developing and validating both new programmes of studies and new modules. He is or has been an External Examiner to various universities and has also acted as the External Member of Validation Panel for various undergraduate and postgraduate courses