try another color:
try another fontsize: 60% 70% 80% 90%

The Journal of Intelligence and Cyber Security

Neil Kent, University of Cambridge, Editor-in-Chief
Irina du Quenoy, Georgetown University, Managing Editor

Editorial Board

Bodo Hechelhammer, Chief Historian, Bundesnachrichtendienst, Berlin

Stephen Jolly, University of Cambridge

W. Caffey Norman, III, Partner, Squire Patton Boggs, Washington, D.C.

Alfred Rollington, Co-Founder, Cyber Security Intelligence, Surrey

Vsevolod Samokhvalov, Department of Political Science, University of Liège

The Journal of Intelligence and Cyber Security publishes research articles and thought-provoking essays of the highest quality on a wide range of subjects related to intelligence, cyber security, and related topics. While the paramount importance of intelligence is obvious, cyberattacks targeting military and civilian operations rank among the greatest threats facing the world today. Edited by Professor Neil Kent of the University of Cambridge, the journal contributes to our understanding of these vital issues in a rapidly changing world. It is international in scope and supported by leading practitioners working in related areas at prestigious institutions around the world and in the global private sector. The journal received startup funding from the Cyber Conflict Documentation Project, a U.S.-based non-political, non-commercial, public service think tank led by J. D. Work, an experienced intelligence professional who has taught at Columbia University and now holds the Bren Chair in Cyber Conflict and Security at the Marine Corps University.

The journal benefits from the generous sponsorship of Omina Technologies, an ethical artificial intelligence company based in Europe and North America, and the Cadbury Foundation, a UK charitable endeavor. The journal appears online and feature new articles on a rolling basis. Academica Press will publish an annual hardcover volume of each issue’s articles in its pioneering international relations series, St. James’s Studies in World Affairs. The Journal of Intelligence and Cyber Security will appeal to members of the military, intelligence, and business communities, as well as to academic specialists.

The journal happily accepts articles of 8,000-12,000 words in length from qualified specialists in the global scholarly community. All submissions will be subject to rigorous peer review and should follow the Chicago Manual of Style and be submitted in MS Word format, double-spaced with one-inch margins in 12 point Times New Roman font.

Please submit all submissions with a short biographical statement and 5 keywords to Please indicate "Submission to The Journal of Intelligence and Cyber Security" in subject line of the e-mail.

Vol 3, No 1 (2020)
Table of Contents

Cybercrime in Austria – Methods and Strategies on Fighting Online Crime
Mag. Judith Grohmann (Donau Universität Krems)

Soviet Intelligence on the Eve of the Great Patriotic War
Gaël-Georges Moullec (Rennes School of Business and Sorbonne Paris Nord University)

The PRC and the Cyber Pax Sinica: Growth in the Shadow of Pax Americana
Samuel Sheffield, 1LT, USAR, M.S. (Webster University)

BOOK REVIEW: Marat H. Mardanov, Komintern v Baškirii. Deâtelʹnostʹ specialʹnyh škol Kominterna v gody
Velikoj Otečestvennoj vojny (1941-1943 gg.) [The Comintern in Bachkiria: The Activities
of the Komintern Special Schools in the Years of the Great Patriotic War (1941-1943)],
Sbornik dokumentov i materialov (Ufa: Ineš, 2018), 288 p.

Gaël-Georges MOULLEC

Vol 2, No 2 (2019)
Table of Contents

The Essential Digital Transformation of the Battlefield and Its Effects
Gérard de Boisboissel (École spéciale militaire de Saint-Cyr)

From Pamphlets to Privacy: How the Printing Press Helps Us Understand the Internet Age
Leslie N. Gruis (Retired Senior Intelligence Officer, National Security Agency)

The Internet of Things Disruptive Evolution for Intelligence Collection
Peter Chuzie (Mercyhurst University) and Michael Klipstein, PhD (Arnold A. Saltzman Institute of War and Peace Studies at Columbia University)

Historical Reflections. Israel And Its Neighbors 2001–2011: A Decade of Security and Diplomatic Cooperation
Craig Stanley-Adamson (Nottingham University)

Vol 2, No 1 (2019)
Table of Contents

The Turkish Cyber Security Strategy: Structure, Legislation, and Challenges
Emin Daskin (Ghent University)

The Use of Cyber Activities as a Weapon: The Empirical Case of Ukraine
Christine Dugoin-Clement (Paris 1 Pantheon Sorbonne and
Centre de recherche écoles de Saint-Cyr Coëtquidan)

How to Prevent Motorbike Attacks in the Sahel?
Thomas Flichy de La Neuville (École spéciale militaire de Saint-Cyr)

State of the what Field?: A Topic Modeling Approach to Assessing the Impact of Digital Issues on Terrorism Research
Christopher Whyte (L. Douglas Wilder School of Government and Public Affairs)

Vol 1, No 1 (2018)
Table of Contents

Calibrating the Cyberwarfare Threat Using Examples from Recent History
Matthew Cadbury

Cyber-Manipulations: Old Means for a New End
Thomas Flichy de La Neuville

Planes, Trains, and Automobiles: A New Dimension in Cyber Conflict
Alessandro Guarino and Emilio Iasiello

Cybersecurity in India: An Evolving Concern for National Security
Sushma Devi Parmar