{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T06:10:19Z","timestamp":1651903819948},"reference-count":24,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"abstract":"<jats:p>The authors claim that location information of stationary ICT components can never be unclassified. They describe how swarm-mapping (crowd sourcing) is used by Apple and Google to worldwide harvest geo-location information on wireless access points and mobile telecommunication systems' base stations to build up gigantic databases with very exclusive access rights. After having highlighted the known technical facts, in the speculative part of this article, the authors argue how this may impact cyber deterrence strategies of states and alliances understanding the cyberspace as another domain of geostrategic relevance. The states and alliances spectrum of activities due to the potential existence of such databases may range from geopolitical negotiations by institutions understanding international affairs as their core business, mitigation approaches at a technical level, over means of cyber deterrence-by-retaliation.<\/jats:p>","DOI":"10.4018\/ijcwt.2018040101","type":"journal-article","created":{"date-parts":[[2018,4,12]],"date-time":"2018-04-12T14:41:30Z","timestamp":1523544090000},"page":"1-16","source":"Crossref","is-referenced-by-count":1,"title":["Measuring the World"],"prefix":"10.4018","volume":"8","author":[{"given":"Dirk","family":"Westhoff","sequence":"first","affiliation":[{"name":"University of Applied Sciences Offenburg, Offenburg, Germany"}]},{"given":"Maximilian","family":"Zeiser","sequence":"additional","affiliation":[{"name":"University of Applied Sciences Offenburg, Offenburg, Germany"}]}],"member":"2432","reference":[{"key":"IJCWT.2018040101-0","unstructured":"BBC. (2011, June). US Pentagon to treat cyber-attacks as \u2018act of war.\u2019"},{"key":"IJCWT.2018040101-1","unstructured":"Benedikt, A., & Metzger, T. (2015). Deterrence Theory in the cyber-century \u2013 Lessons from a state-of-the-art literature review (working paper). SWP Berlin."},{"key":"IJCWT.2018040101-2","doi-asserted-by":"publisher","DOI":"10.1007\/s00287-016-0964-7"},{"key":"IJCWT.2018040101-3","author":"L.Freedman","year":"2004","journal-title":"Deterrence"},{"key":"IJCWT.2018040101-4","unstructured":"Goldmedia GmbH Strategy Consulting. (2014). Location-based Service Monitor. Retrieved from https:\/\/www.blm.de\/files\/pdf1\/140512_Location-based_Services_Monitor_2014.pdf"},{"key":"IJCWT.2018040101-5","article-title":"Differences in RSSI readings made by different Wi-Fi chipsets: A limitation of WLAN localization","author":"L.Gough","year":"2011","journal-title":"International Conference on Localization and GNSS"},{"key":"IJCWT.2018040101-6","unstructured":"Greenwald, G. (2014). No Place to Hide \u2013 Edward Snowden, the NSA & the Surveillance State."},{"key":"IJCWT.2018040101-7","unstructured":"Grunow, F., & Schiess, N. (2017), Exploring North Korea\u2019s Surveillance Technology, Troopers, Heidelberg, Retrieved October 12, 2017 from https:\/\/www.ernw.de\/download\/exploring_north_koreas_survelliance_technology_troopers17.pdf"},{"key":"IJCWT.2018040101-8","first-page":"(pp. 110","article-title":"Potential Cyber Warfare Capabilities of major Technology Vendors","author":"A.J\u00f8sang","year":"2014","journal-title":"Proceedings of the 13th European Conference on Cyber Warfare and Security"},{"key":"IJCWT.2018040101-9","unstructured":"Kantar. (2016). Android share tops 75 in Europe\u2019s largest markets. Retrieved from https:\/\/www.kantarworldpanel.com\/global\/News\/Android-Share-Tops-75-in-Europes-Largest-Markets"},{"key":"IJCWT.2018040101-10","unstructured":"Kehlmann, D. (2005). Die Vermessung der Welt."},{"key":"IJCWT.2018040101-11","unstructured":"Kim, Y. (2014). Cell Phones in North Korea: Has North Korea Entered the Telecommunication Revolution? USKOREA Institute. Retrieved October 11, 2017, from http:\/\/uskoreainstitute.org\/wp-content\/uploads\/2014\/03\/Kim-Yonho-Cell-Phones-in-North-Korea.pdf"},{"key":"IJCWT.2018040101-12","unstructured":"Libicki, M. (2013). Brandishing Cyberattack Capabilities. RAND National Defense Research Institute."},{"key":"IJCWT.2018040101-13","doi-asserted-by":"crossref","unstructured":"Libicki, M. (2017). The Coming of Cyber Espionage Norms. In 9th International Conference on Cyber Conflict - Defending the Core (H. R\u00f5igas, R. Jakschis, L. Lindstr\u00f6m, T. Min\u00e1rik Eds.). NATO CCD COE Publication.","DOI":"10.23919\/CYCON.2017.8240325"},{"key":"IJCWT.2018040101-14","unstructured":"Lockie, A. (2017). A former US Navy SEAL tweeted his solution to the North Korean crisis \u2014 and it just might work. Independent.co.uk. Retrieved October 11, 2017 from http:\/\/www.independent.co.uk\/news\/world\/asia\/north-korea-crisis-us-navy-seal-tweets-solution-kim-jong-un-nuclear-missile-testing-a7942756.html"},{"key":"IJCWT.2018040101-15","unstructured":"MacRumors. (2017). Google Says There Are Now More Than 2 Billion Monthly Active Android Devices, Retrieved October 5, 2017 from https:\/\/www.macrumors.com\/2017\/05\/17\/2-billion-active-android-devices\/"},{"key":"IJCWT.2018040101-16","article-title":"CellSense: A Probabilistic RSSI-Based GSM Positioning System","author":"I.Mohamed","year":"2010","journal-title":"Global Telecommunications Conference (GLOBECOM 2010)"},{"key":"IJCWT.2018040101-17","unstructured":"Nagelhus, S. N., & Gjesvik, L. (2017). China\u2019s cyber sovereignty. Retrieved September 20, 2017 from https:\/\/brage.bibsys.no\/xmlui\/bitstream\/handle\/11250\/2434904\/China%2527s%2bCyber%2bSovereignty%2bPolicy%2bBrief.pdf?sequence=2&isAllowed=y"},{"key":"IJCWT.2018040101-18","unstructured":"Pijnenburg Muller, L., & Stevens, T. (2017). Upholding the NATO cyber pledge - Cyber Deterrence and Resilience: Dilemmas in NATO defence and security politics, Retrieved September 20, 2017 from https:\/\/brage.bibsys.no\/xmlui\/bitstream\/handle\/11250\/2442559\/NUPI_Policy_Brief_5_17_LMuller_TStevens.pdf?sequence=1&isAllowed=y"},{"key":"IJCWT.2018040101-19","unstructured":"Reinhold, T. (2016). Cyberspace als Kriegsschauplatz? Herausforderung f\u00fcr V\u00f6lkerrecht und Sicherheitspolitik. Aus Politik und Zeitgeschichte, Moderne Kriegsf\u00fchrung, APuZ, 22-27."},{"key":"IJCWT.2018040101-20","unstructured":"The Guardian. (2012). Obama orders US to draw up overseas target list for cyber-attacks, Retrieved September 20, 2017, from https:\/\/www.theguardian.com\/world\/2013\/jun\/07\/obama-china-targets-cyber-overseas"},{"key":"IJCWT.2018040101-21","doi-asserted-by":"crossref","unstructured":"van Niekerk, B., & Maharaj, M. (2010). Mobile security from an information warfare perspective. In Information Security for South Africa.","DOI":"10.1109\/ISSA.2010.5588339"},{"key":"IJCWT.2018040101-22","doi-asserted-by":"crossref","unstructured":"Vanhoef, M., & Piessens, F. (2017). Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. In ACM CCS 2017, Dallas, TX, October.","DOI":"10.1145\/3133956.3134027"},{"key":"IJCWT.2018040101-23","unstructured":"Whittaker, Z. (2015), Russia plans to leave Apple, android behind by building its own smartphone software. ZDNet. Retrieved October 11, 2017, from http:\/\/www.zdnet.com\/article\/russia-mobile-platforms-ios-android-national-security\/"}],"container-title":["International Journal of Cyber Warfare and Terrorism"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=204416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T14:12:19Z","timestamp":1651846339000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCWT.2018040101"}},"subtitle":["How the Smartphone Industry Impacts Cyber Deterrence Credibility"],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":24,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.4018\/ijcwt.2018040101","relation":{},"ISSN":["1947-3435","1947-3443"],"issn-type":[{"value":"1947-3435","type":"print"},{"value":"1947-3443","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4]]}}}